Science.gov

Sample records for presentation du protocole

  1. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  2. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  3. Coronagraphy at Pic du Midi: Present state and future projects

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2012-12-01

    The Pic du Midi coronagraph (CLIMSO) is a group of four instruments in parallel, taking images of the whole solar photosphere and low corona. It provides series of 2048*2048 pixels images taken nominally at 1 minute time intervals, all year long, weather permitting. A team of ≃q 60 persons, by groups of 2 or 3 each week, operate the instruments. Their work is programmed in collaboration with Institut de Recherches en astrophysique et planétologie (IRAP) of Observatoire Midi Pyrénées (OMP), and with Programme National Soleil Terre (PNST). The four instruments of CLIMSO (L1, C1, L2 and C2) collect images of the Sun as following: 1) L1 : photosphere in H-α (656.28 nm) ; 2) L2 : photosphere in Ca-II (393.37 nm) ; 3) C1 : prominences in H-α ; 4) C2 : prominences in He-I (1083.0 nm). The data taken are stored in fits format images and mpeg films. They are available publicly on data bases such as BASS 2000 Meudon ({http://bass2000.obspm.fr/home.php?lang=en} and BASS2000 Tarbes ({http://bass2000.bagn.obs-mip.fr/base/sun/index.php}). Several solar studies are carried in relation with these data. In addition to the raw fits images, new images will soon be sent to the data bases: they will be calibrated in solar surface emittance, expressed in W/m^2/nm/steradian. Series of mpeg films for each day are presented in superposed color layers, so as to visualize the multispectral information better. New instrumental developments are planned for the next years and already financed. They will use spectropolarimetry to measure the magnetic field and radial velocities in the photosphere and corona. The data will cover the entire solar disc and have a sample rate of one map per minute.

  4. Clinical presentation and protocol for management of hepatic sarcoidosis.

    PubMed

    Modaresi Esfeh, Jamak; Culver, Daniel; Plesec, Thomas; John, Binu

    2015-03-01

    The liver is one of the most commonly involved extrapulmonary sites in sarcoidosis. Hepatic sarcoidosis has a broad range of presentations from scattered, asymptomatic noncaseating granulomas with normal liver enzymes, which are very common in patients with known pulmonary sarcoidosis, to portal hypertension and cirrhosis, which are relatively uncommon. Diagnosis is based on a combination of clinical, laboratory and histological manifestations. The authors' protocol for management of patients with suspected sarcoidosis of the liver without focal lesions includes a transjugular liver biopsy with portal pressure measurements to confirm the diagnosis, rule out coexisting liver diseases and to identify select patients with fibrosis or portal hypertension for consideration of immunosuppression. Steroids and azathioprine are the preferred agents and methotrexate is not recommended.

  5. Lymphome malin non hodgkinien du cavum: protocoles thérapeutiques et facteurs pronostiques

    PubMed Central

    Ouraini, Saloua; Nakkabi, Ismail; Benariba, Fouad

    2015-01-01

    Le lymphome malin non hodgkinien est une entité histologique rare parmi les cancers du cavum, la plupart des tumeurs du nasopharynx étant des carcinomes indifférenciés ou Undifferencied Carcinoma of Nasopharyngeal Type (UCNT); Il pose souvent un problème de diagnostic positif clinique et histologique. La symptomatologie est généralement peu spécifique et la démarche étiologique repose sur la biopsie du cavum faite à l'examen endoscopique avec examen immuno-histochimique. Nous rapportons le cas d'un lymphome non hodgkinien avec atteinte du nasopharynx, l'analyse anatomopathologique est en faveur d'un lymphome malin non hodgkinien de phénotype B. Les aspects cliniques, radiologiques, histologiques et thérapeutiques sont décrits. PMID:26889334

  6. Surgical Position, Cause of Extracranial Internal Carotid Artery Dissection, Presenting as Pourfour Du Petit Syndrome: Case Report and Literature Review.

    PubMed

    Villalba Martinez, Gloria; Navalpotro Gomez, Irene; Serrano Perez, Laura; Gonzalez Ortiz, Sofia; Fernández-Candil, Juan L; Steinhauer, Eva Giralt

    2015-01-01

    Dissection of the internal carotid artery is a rare cause of stroke overall, but causes 22% of strokes in younger patients. A common clinical presentation is as Claude Bernard Horner syndrome. We report a craniotomy with 30 degrees rotation of the neck (standard position) in a patient with no major risk factors for carotid dissection, who showed a Pourfour du Petit syndrome due to a dissection of the internal carotid artery. To the best of our knowledge, this is the first reported case in which a common surgical position causes an internal carotid artery dissection in a patient without relevant risk factors. The presentation with Pourfour du Petit syndrome is extremely unusual.

  7. The Potsdam plates of the Carte du Ciel project: I. Present inventory and plate catalogue

    NASA Astrophysics Data System (ADS)

    Tsvetkova, K.; Tsvetkov, M.; Böhm, P.; Steinmetz, M.; Dick, W. R.

    2009-10-01

    We present an inventory of the Carte du Ciel (CdC) plates stored in the Astrophysical Institute Potsdam. The Potsdam CdC zone (+32° to +39°) was divided into 1232 areas and about 2200 plates from the first and second epochs were obtained within the framework of the CdC project. At present, only 977 plates (45% of all) are stored in AIP, the others got lost during the Second World War. The plates for the first epoch measurements had been obtained during the period 1893 May-1900 February. The plates for the second epoch (1913 August-1924 February) can be separated into two time intervals according to the observer and the observing method used: from 1913 August till 1914 July, and from 1916 February to 1924 February. The present work aims to provide online access to the plate information, given in the plate catalogue and is the first step to online access to the plate images digitized with flatbed scanners.

  8. La Traduction des formes verbales du present francais en bafia (Translation of Verb Forms from the French Present into Bafia).

    ERIC Educational Resources Information Center

    Aroga Bessong, Dieudonne P.

    1982-01-01

    Translation into Bafia of the French present tense in its different values requires the translator to make some decisions based on semantic values and implied time factors. Specific considerations and problems are discussed with examples given. (MSE)

  9. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  10. A Video Recording and Viewing Protocol for Student Group Presentations: Assisting Self-Assessment through a Wiki Environment

    ERIC Educational Resources Information Center

    Barry, Shane

    2012-01-01

    The purpose of this research was to firstly develop a protocol for video recording student group oral presentations, for later viewing and self-assessment by student group members. Secondly, evaluations of students' experiences of this process were undertaken to determine if this self-assessment method was a positive experience for them in gaining…

  11. Magnetic nanobeads present during enzymatic amplification and labeling for a simplified DNA detection protocol based on AC susceptometry

    NASA Astrophysics Data System (ADS)

    Bejhed, Rebecca S.; Strømme, Maria; Svedlindh, Peter; Ahlford, Annika; Strömberg, Mattias

    2015-12-01

    Magnetic biosensors are promising candidates for low-cost point-of-care biodiagnostic devices. For optimal efficiency it is crucial to minimize the time and complexity of the assay protocol including target recognition, amplification, labeling and read-out. In this work, possibilities for protocol simplifications for a DNA biodetection principle relying on hybridization of magnetic nanobeads to rolling circle amplification (RCA) products are investigated. The target DNA is recognized through a padlock ligation assay resulting in DNA circles serving as templates for the RCA process. It is found that beads can be present during amplification without noticeably interfering with the enzyme used for RCA (phi29 polymerase). As a result, the bead-coil hybridization can be performed immediately after amplification in a one-step manner at elevated temperature within a few minutes prior to read-out in an AC susceptometer setup, i.e. a combined protocol approach. Moreover, by recording the phase angle ξ = arctan(χ″/χ'), where χ and χ″ are the in-phase and out-of-phase components of the AC susceptibility, respectively, at one single frequency the total assay time for the optimized combined protocol would be no more than 1.5 hours, often a relevant time frame for diagnosis of cancer and infectious disease. Also, applying the phase angle method normalization of AC susceptibility data is not needed. These findings are useful for the development of point-of-care biodiagnostic devices relying on bead-coil binding and magnetic AC susceptometry.

  12. Temporal presentation protocols in stereoscopic displays: Flicker visibility, perceived motion, and perceived depth

    PubMed Central

    Hoffman, David M.; Karasev, Vasiliy I.; Banks, Martin S.

    2011-01-01

    Most stereoscopic displays rely on field-sequential presentation to present different images to the left and right eyes. With sequential presentation, images are delivered to each eye in alternation with dark intervals, and each eye receives its images in counter phase with the other eye. This type of presentation can exacerbate image artifacts including flicker, and the appearance of unsmooth motion. To address the flicker problem, some methods repeat images multiple times before updating to new ones. This greatly reduces flicker visibility, but makes motion appear less smooth. This paper describes an investigation of how different presentation methods affect the visibility of flicker, motion artifacts, and distortions in perceived depth. It begins with an examination of these methods in the spatio-temporal frequency domain. From this examination, it describes a series of predictions for how presentation rate, object speed, simultaneity of image delivery to the two eyes, and other properties ought to affect flicker, motion artifacts, and depth distortions, and reports a series of experiments that tested these predictions. The results confirmed essentially all of the predictions. The paper concludes with a summary and series of recommendations for the best approach to minimize these undesirable effects. PMID:21572544

  13. Experimental Control of Nodality via Equal Presentations of Conditional Discriminations in Different Equivalence Protocols under Speed and No-Speed Conditions

    ERIC Educational Resources Information Center

    Imam, Abdulrazaq A.

    2006-01-01

    A within-participant comparison of simple-to-complex, complex-to-simple, and simultaneous protocols was conducted establishing different sets of three 7-member equivalence classes for 4 undergraduate students. The protocols were implemented under either accuracy-only or accuracy-plus-speed conditions while keeping number of presentations of…

  14. The 2008 Charles H. Thompson Lecture-Colloquium Presentation: From Du Bois to Obama--The Education of Peoples of African Descent in the United States in the 21st Century

    ERIC Educational Resources Information Center

    Lee, Carol D.

    2009-01-01

    This article presents the text of a lecture delivered by American Educational Research Association President Carol D. Lee at the 29th Annual Charles H. Thompson Lecture-Colloquium Series which was held on November 5, 2008. In her lecture, Lee discussed several points of similarities between W. E. B. Du Bois and President Barack Obama. These…

  15. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  16. A new protocol for screening adults presenting with their own medical problems at the Emergency Department to identify children at high risk for maltreatment.

    PubMed

    Diderich, Hester M; Fekkes, Minne; Verkerk, Paul H; Pannebakker, Fieke D; Velderman, Mariska Klein; Sorensen, Peggy J G; Baeten, Paul; Oudesluys-Murphy, Anne Marie

    2013-12-01

    Identifying child abuse and neglect solely on the grounds of child characteristics leaves many children undetected. We developed a new approach (Hague protocol) based on characteristics of parents who attend the Emergency Department (ED) because they have the following problems: (1) intimate partner violence, (2) substance abuse, or (3) suicide attempt or other serious psychiatric problems. The goal of this protocol is to enable the Reporting Center for Child Abuse and Neglect (RCCAN) to rapidly assess family problems and offer voluntary community based support to these parents. The aim of this study is to assess whether this protocol for screening adults presenting for care in the Emergency Department can identify children at high risk for maltreatment. A before and after study was conducted at 9 EDs in 3 regions in the Netherlands (one intervention region and 2 control regions). During the period January 2006 to November 2007, prior to the introduction of the Hague protocol, from a total of 385,626 patients attending the ED in the intervention region 4 parents (1 per 100,000) were referred to the RCCAN. In the period after introduction of the protocol (December 2007 to December 2011), the number rose to 565 parents from a total of 885,301 patients attending the ED (64 per 100,000). In the control region, where the protocol was not implemented, these figures were 2 per 163,628 (1 per 100,000) and 10 per 371,616 (3 per 100,000) respectively (OR=28.0 (95 CI 4.6-170.7)). At assessment, child abuse was confirmed in 91% of referred cases. The protocol has a high positive predictive value of 91% and can substantially increase the detection rate of child abuse in an ED setting. Parental characteristics are strong predictors of child abuse. Implementing guidelines to detect child abuse based on parental characteristics of parents attending the adult section of the ED can increase the detection rate of child abuse and neglect allowing appropriate aid to be initiated for

  17. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    PubMed

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (p<0.08, effect size=0.19) and EXP 2 (p<0.02, effect size=0.31), favoring the visual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation.

  18. Modelisation du Signal Radar EN Milieu Stratifie et Evaluation de Techniques de Mesure de L'humidite du Sol

    NASA Astrophysics Data System (ADS)

    Boisvert, Johanne

    La presente etude se penche sur des problemes relies a l'echantillonnage de l'humidite de sol et a l'estimation du signal radar sur sols nus. Le travail se divise en deux volets. Le volet 1 evalue trois techniques de mesure de l'humidite du sol (gravimetrie, reflectometrie temporelle et sonde dielectrique) et deux protocoles d'echantillonnage. Dans le volet 2, un modele de simulation du signal en milieu stratifie est developpe, et les estimes de signal obtenus sont compares aux estimes bases uniquement sur une valeur moyenne d'humidite du sol prise sur une profondeur fixe d'echantillonnage. Les differences entre les deux estimes dependent de la frequence et du choix judicieux de la profondeur d'echantillonnage; elles sont plus importantes aux faibles angles et en polarisation HV, puis VV. Le modele de simulation a aussi ete utilise pour etudier la profondeur de penetration du signal et en deduire la profondeur optimale d'echantillonnage en tenant compte des caracteristiques du signal. Une variation de 25 ^circ de l'angle d'incidence a peu d'effet sur la profondeur de penetration en bande Ku; l'ecart reste inferieur ou egal a 0,5 cm en bande C mais peut atteindre 1,3 cm en bande L. L'impact de la polarisation est nul en bande Ku mais croi t avec l'angle d'incidence en bande C et L. A 50^circ, il est, en moyenne de 1 cm en bande C et de 2 cm en bande L. En polarisation VV, la profondeur croi t avec une augmentation de l'angle alors que l'effet est inverse en polarisation HH. Deux methodes pour estimer la profondeur d'echantillonnage en conditions operationnelles sont presentees. Lorsqu'on inverse un modele pour estimer l'humidite du sol a partir du signal, ces methodes permettent aussi d'estimer l'epaisseur de sol representee par l'humidite ainsi estimee.

  19. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    PubMed

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. PMID:25728461

  20. Correcting non cephalic presentation with moxibustion: study protocol for a multi-centre randomised controlled trial in general practice

    PubMed Central

    Vas, Jorge; Aranda, José Manuel; Barón, Mercedes; Perea-Milla, Emilio; Méndez, Camila; Ramírez, Carmen; Aguilar, Inmaculada; Modesto, Manuela; Lara, Ana María; Martos, Francisco; García-Ruiz, Antonio J

    2008-01-01

    Background Non cephalic presentation in childbirth involves various risks to both the mother and the foetus. The incidence in Spain is 3.8% of all full-term pregnancies. The most common technique used to end the gestation in cases of non cephalic presentation is that of caesarian section, and although it provokes a lower rate of morbi-mortality than does vaginal delivery in such situations, there remains the possibility of traumatic injury to the foetal head and neck, while maternal morbidity is also increased. The application of heat (moxibustion) to an acupuncture point, in order to correct non cephalic presentation, has been practised in China since ancient times, but as yet there is insufficient evidence of its real effectiveness. Methods/Design The experimental design consists of a multi-centre randomised controlled trial with three parallel arms, used to compare real moxibustion, sham moxibustion and the natural course of events, among pregnant women with a non cephalic presentation and a gestational duration of 33–35 weeks (estimated by echography). The participants in the trial will be blinded to both interventions. The results obtained will be analyzed by professionals, blinded with respect to the allocation to the different types of intervention. In addition, we intend to carry out a economic analysis. Discussion This trial will contribute to the development of evidence concerning moxibustion in the correction of non cephalic presentations. The primary outcome variable is the proportion of cephalic presentations at term. As secondary outcomes, we will evaluate the proportion of cephalic presentations at week 38 of gestation, determined by echography, together with the safety of the technique, the specificity of moxibustion and the control of the blinding process. This study has been funded by the Health Ministry of the Andalusian Regional Government. Trial registration Current Controlled Trials ISRCTN10634508. PMID:18495031

  1. Efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole 2010 de l'Organisation Mondiale de la Santé au Centre Médical Saint Camille de Ouagadougou (Burkina Faso)

    PubMed Central

    OuédraogoYugbaré, Solange Odile; Zagré, Nikaise; Koueta, Fla; Dao, Lassina; Kam, Ludovic; Ouattara, Diarra Yé; Simporé, Jacques

    2015-01-01

    L’épidémie du Virus de l'Immunodéficience Humaine en milieu pédiatrique est surtout le résultat de la transmission mère-enfant. Notre étude a pour objectif de décrire l'efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole OMS 2010 (Option A et trithérapie) au centre médical saint Camille de Ouagadougou. Nous avons mené une étude d'une cohorte d'enfants suivis dans le cadre de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine au centre médical saint Camille de Ouagadougou sur une période de 2 ans allant du 1er Janvier 2012 au 31 Décembre 2013. Nous avons obtenu l'accord de 4900 femmes enceintes pour le dépistage de l'infection du Virus de l'Immunodéficience Humaine et 238 gestantes ont été diagnostiquées séropositives soit 4,86% de séroprévalence. Les femmes étaient surtout infectées par le Virus de l'Immunodéficience Humaine avec de type I (95,38%)). La majorité était sous trithérapie (74,3%) et (25,7%) sous prophylaxie (option A). Les nouveau-nés (92,5%) ont reçu un traitement antirétroviral à base de névirapine dans les 72 heures après la naissance. L'allaitement sécurisé a été appliquée dans 78% des cas. Le taux global de transmission mère-enfant du VIH était de 3,6% avec 3% de transmission chez les enfants nés de mères sous trithérapie antirétrovirale et 6,3% dans les cas de prophylaxie antirétrovirale. Le facteur de risque de transmission a été le long délai du début d'administration des antirétroviraux chez le nouveau-né. La mortalité infantile à un an était de 3,5%. Cette étude a révélé l'efficacité de l'Option A et conforté celle de la trithérapie, le passage à l'Option B+ serait donc plus bénéfique. PMID:26966499

  2. Development and validation of a screening tool to predict the risk of chronic low back pain in patients presenting with acute low back pain: a study protocol

    PubMed Central

    Traeger, Adrian; Henschke, Nicholas; Hübscher, Markus; Williams, Christopher M; Kamper, Steven J; Maher, Chris G; Moseley, G Lorimer; McAuley, James H

    2015-01-01

    Introduction Around 40% of people presenting to primary care with an episode of acute low back pain develop chronic low back pain. In order to reduce the risk of developing chronic low back pain, effective secondary prevention strategies are needed. Early identification of at-risk patients allows clinicians to make informed decisions based on prognostic profile, and researchers to select appropriate participants for secondary prevention trials. The aim of this study is to develop and validate a prognostic screening tool that identifies patients with acute low back pain in primary care who are at risk of developing chronic low back pain. This paper describes the methods and analysis plan for the development and validation of the tool. Methods/analysis The prognostic screening tool will be developed using methods recommended by the Prognosis Research Strategy (PROGRESS) Group and reported using the Transparent Reporting of a multivariable prediction model for Individual Prognosis Or Diagnosis (TRIPOD) statement. In the development stage, we will use data from 1248 patients recruited for a prospective cohort study of acute low back pain in primary care. We will construct 3 logistic regression models to predict chronic low back pain according to 3 definitions: any pain, high pain and disability at 3 months. In the validation stage, we will use data from a separate sample of 1643 patients with acute low back pain to assess the performance of each prognostic model. We will produce validation plots showing Nagelkerke R2 and Brier score (overall performance), area under the curve statistic (discrimination) and the calibration slope and intercept (calibration). Ethics and dissemination Ethical approval from the University of Sydney Ethics Committee was obtained for both of the original studies that we plan to analyse using the methods outlined in this protocol (Henschke et al, ref 11-2002/3/3144; Williams et al, ref 11638). PMID:26179647

  3. Actes du colloque: Tendances actuelles de la recherche sur la langue parlee (Conference Presentations: Current Trends in Research on Oral Language).

    ERIC Educational Resources Information Center

    Auger, Julie, Ed.

    Student papers presented at a sociolinguistics conference include: "La variation phonologique [d'une voyelle] a Hull"; "La force illocutoire des pronoms personnels 'je' et 'tu' en tant qu'insignes des places d'ou parlent les femmes et les hommes"; "L'emploi des modes indicatif et subjonctif dans le francais parle de la ville de Quebec"; "A Study…

  4. Effectiveness of a primary care based complex intervention to promote self-management in patients presenting psychiatric symptoms: study protocol of a cluster-randomized controlled trial

    PubMed Central

    2014-01-01

    Background Anxiety, Depression and Somatoform (ADSom) disorders are highly prevalent in primary care. Managing these disorders is time-consuming and requires strong commitment on behalf of the General Practitioners (GPs). Furthermore, the management of these patients is restricted by the high patient turnover rates in primary care practices, especially in the German health care system. In order to address this problem, we implement a complex, low-threshold intervention by an Advanced Practice Nurse (APN) using a mixture of case management and counseling techniques to promote self-management in these patients. Here we present the protocol of the “Self-Management Support for Anxiety, Depression and Somatoform Disorders in Primary Care” (SMADS)-Study. Methods/Design The study is designed as a cluster-randomized controlled trial, comparing an intervention and a control group of 10 primary care practices in each case. We will compare the effectiveness of the intervention applied by an APN with usual GP-care. A total of 340 participants will be enrolled in the study, 170 in either arm. We use the Patient Health Questionnaire-German version (PHQ-D) as a screening tool for psychiatric symptoms, including patients with a score above 5 on any of the three symptom scales. The primary outcome is self-efficacy, measured by the General Self-Efficacy Scale (GSE), here used as a proxy for self-management. As secondary outcomes we include the PHQ-D symptom load and questionnaires regarding coping with illness and health related quality of life. Outcome assessments will be applied 8 weeks and 12 months after the baseline assessment. Discussion The SMADS-study evaluates a complex, low threshold intervention for ambulatory patients presenting ADSom-symptoms, empowering them to better manage their condition, as well as improving their motivation to engage in self-help and health-seeking behaviour. The benefit of the intervention will be substantiated, when patients can enhance

  5. Cri-du-chat (5p-) syndrome presenting with cerebellar hypoplasia and hypospadias: prenatal diagnosis and aCGH characterization using uncultured amniocytes.

    PubMed

    Chen, Chih-Ping; Huang, Ming-Chao; Chen, Yi-Yung; Chern, Schu-Rern; Wu, Peih-Shan; Su, Jun-Wei; Town, Dai-Dyi; Wang, Wayseen

    2013-07-25

    We present prenatal diagnosis of a de novo distal deletion involving 5p(5p15.1→pter) using uncultured amniocytes in a pregnancy with cerebellar hypoplasia, hypospadias and facial dysmorphisms in the fetus. We discuss the genotype-phenotype correlation and the consequence of haploinsufficiency of CTNND2, SEMA5A, TERT, SRD5A1 and TPPP. We speculate that haploinsufficiency of SRD5A1 and TPPP may be responsible for hypospadias and cerebellar hypoplasia, respectively, in this case. PMID:23500598

  6. The RTS2 protocol

    NASA Astrophysics Data System (ADS)

    Kubánek, Petr; Jelínek, Martin; French, John; Prouza, Michal; Vítek, Stanislav; Castro-Tirado, Alberto J.; Reglero, Victor

    2008-07-01

    Remote Telescope System 2nd version (RTS2) is an open source project aimed at developing a software environment to control a fully robotic observatory. RTS2 consists of various components, which communicate via an ASCII based protocol. As the protocol was from the beginning designed as an observatory control system, it provides some unique features, which are hard to find in the other communication systems. These features include advanced synchronisation mechanisms and strategies for setting variables. This presentation describes the protocol and its unique features. It also assesses protocol performance, and provides examples how the RTS2 library can be used to quickly build an observatory control system.

  7. Optimal protocols for nonlocality distillation

    SciTech Connect

    Hoeyer, Peter; Rashid, Jibran

    2010-10-15

    Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

  8. Etude de l'affaiblissement du comportement mecanique du pergelisol du au rechauffement climatique

    NASA Astrophysics Data System (ADS)

    Buteau, Sylvie

    Le rechauffement climatique predit pour les prochaines decennies, aura des impacts majeurs sur le pergelisol qui sont tres peu documentes pour l'instant. La presente etude a pour but d'evaluer ces impacts sur les proprietes mecaniques du pergelisol et sa stabilite a long terme. Une nouvelle technique d'essai de penetration au cone a taux de deformation controle, a ete developpee pour caracteriser en place le pergelisol. Ces essais geotechniques et la mesure de differentes proprietes physiques ont ete effectues sur une butte de pergelisol au cours du printemps 2000. Le developpement et l'utilisation d'un modele geothermique 1D tenant compte de la thermodependance du comportement mecanique ont permis d'evaluer que les etendues de pergelisol chaud deviendraient instables a la suite d'un rechauffement de l'ordre de 5°C sur cent ans. En effet, la resistance mecanique du pergelisol diminuera alors rapidement jusqu'a 11,6 MPa, ce qui correspond a une perte relative de 98% de la resistance par rapport a un scenario sans rechauffement.

  9. "Cirque du Freak."

    ERIC Educational Resources Information Center

    Rivett, Miriam

    2002-01-01

    Considers the marketing strategies that underpin the success of the "Cirque du Freak" series. Describes how "Cirque du Freak" is an account of events in the life of schoolboy Darren Shan. Notes that it is another reworking of the vampire narrative, a sub-genre of horror writing that has proved highly popular with both adult and child readers. (SG)

  10. Long-Term Follow-Up of Autotransplantation Trials for Multiple Myeloma: Update of Protocols Conducted by the Intergroupe Francophone du Myelome, Southwest Oncology Group, and University of Arkansas for Medical Sciences

    PubMed Central

    Barlogie, Bart; Attal, Michel; Crowley, John; van Rhee, Frits; Szymonifka, Jackie; Moreau, Philippe; Durie, Brian G.M.; Harousseau, Jean-Luc

    2010-01-01

    Purpose The purpose of this study was to update outcomes of autotransplantation trials for myeloma conducted by the Intergroupe Francophone du Myelome (IFM), the Southwest Oncology Group, and the University of Arkansas for Medical Sciences (Total Therapy [TT]). Methods IFM90 (N = 194), IFM04 (N = 402), IFM9902 (N = 692), IFM9904 (N = 197), S9321 (N = 817), TT1 (N = 231), TT2 (N = 668), and TT3 (N = 303) were updated, and results were compared with original reports. Results Superior survival with single transplantation versus standard therapy in IFM90 was confirmed (P = .004), and a trend in favor of tandem versus single transplantation was maintained in IFM94 (P = .08). S9321 data were validated, with comparable survival in single transplantation and standard treatment arms (P = .35). A survival benefit from thalidomide maintenance in IFM9902 was not confirmed (P = .39) but emerged for the thalidomide arm of TT2 (P = .04). On multivariate analysis, survival was superior in TT2, TT3, and IFM9902 (all P < .001); tandem transplantations were superior to both single transplantations and standard therapies (P < .001), as were tandem transplantations with added thalidomide versus trials without thalidomide (P < .001). Postrelapse survival (PRS) was superior when initial event-free survival (EFS) exceeded 1280 days and when tandem transplantations had been administered, whereas PRS was shorter when EFS lasted 803 days or less and when trials had included thalidomide and bortezomib. Conclusion These long-term follow-up data of transplantation trials provide a crucial framework of reference for outcome reporting of novel agent–based trials reportedly exhibiting remarkable short-term efficacy approaching high-dose therapy results. PMID:20085933

  11. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  12. Superiority of pictorial versus verbal presentation and initial exposure in the P300-based, complex trial protocol for concealed memory detection.

    PubMed

    Rosenfeld, J Peter; Ward, Anne; Thai, Michelle; Labkovsky, Elena

    2015-06-01

    Two mock guilty groups had either pictorial or verbal initial exposure to crime items (probes) on which they were told they would later be tested. Then each subject was tested in two sessions on two successive days with both verbal and pictorial presentation, one test modality per session/day. The three dependent variables analyzed were three different estimates of the same basic measurement: the difference between P300s evoked by key (probe) and irrelevant stimuli. All three indexes were significantly increased more by both initial pictorial exposure, as well as by pictorial presentation modality, than by verbal exposure and presentation. We saw no main effect of exposure-presentation modality congruence, as congruence interacted with exposure: The largest probe-irrelevant differences were evoked by congruent pictorial exposure and presentation modality, and the smallest by congruent verbal exposure and presentation modality. PMID:25772317

  13. Etude et simulation du protocole TTEthernet sur un sous-systeme de gestion de vols et adaptation de la planification des tâches a des fins de simulation

    NASA Astrophysics Data System (ADS)

    Abidi, Dhafer

    TTEthernet is a deterministic network technology that makes enhancements to Layer 2 Quality-of-Service (QoS) for Ethernet. The components that implement its services enrich the Ethernet functionality with distributed fault-tolerant synchronization, robust temporal partitioning bandwidth and synchronous communication with fixed latency and low jitter. TTEthernet services can facilitate the design of scalable, robust, less complex distributed systems and architectures tolerant to faults. Simulation is nowadays an essential step in critical systems design process and represents a valuable support for validation and performance evaluation. CoRE4INET is a project bringing together all TTEthernet simulation models currently available. It is based on the extension of models of OMNeT ++ INET framework. Our objective is to study and simulate the TTEthernet protocol on a flight management subsystem (FMS). The idea is to use CoRE4INET to design the simulation model of the target system. The problem is that CoRE4INET does not offer a task scheduling tool for TTEthernet network. To overcome this problem we propose an adaptation for simulation purposes of a task scheduling approach based on formal specification of network constraints. The use of Yices solver allowed the translation of the formal specification into an executable program to generate the desired transmission plan. A case study allowed us at the end to assess the impact of the arrangement of Time-Triggered frames offsets on the performance of each type of the system traffic.

  14. Preventing avoidable incidents leading to a presentation to the emergency department (ED) by older adults with cognitive impairment: protocol for a scoping review

    PubMed Central

    Provencher, Véronique; Généreux, Mélissa; Gagnon-Roy, Mireille; Veillette, Nathalie; Egan, Mary; Sirois, Marie-Josée; Lacasse, Francis; Rose, Kathy; Stocco, Stéphanie

    2016-01-01

    Introduction Older adults with cognitive impairment represent a large portion (21–42%) of people (65+) who consult at an emergency department (ED). Because this sub-group is at higher risk for hospitalisation and mortality following an ED visit, awareness about ‘avoidable’ incidents should be increased in order to prevent presentations to the ED due to such incidents. This study aims to synthetise the actual knowledge related to ‘avoidable’ incidents (ie, traumatic injuries, poisoning and other consequences of external causes) (WHO, 2016) leading to ED presentations in older people with cognitive impairment. Methodology and analysis A scoping review will be performed. Scientific and grey literature (1996–2016) will be searched using a combination of key words pertaining to avoidable incidents, ED presentations, older adults and cognitive impairment. A variety of databases (MEDLINE, CINAHL, Ageline, SCOPUS, ProQuest Dissertations/theses, EBM Reviews, Healthstar), online library catalogues, governmental websites and published statistics will be examined. Included sources will pertain to community-dwelling older adults presenting to the ED as a result of an avoidable incident, with the main focus on those with cognitive impairment. Data (eg, type, frequency, severity, circumstances of incidents, preventive measures) will be extracted and analysed using a thematic chart and content analysis. Discussion and dissemination This scoping review will provide a picture of the actual knowledge on the subject and identify knowledge gaps in existing literature to be filled by future primary researches. Findings will help stakeholders to develop programmes in order to promote safe and healthy environments and behaviours aimed at reducing avoidable incidents in seniors, especially those with cognitive impairment. PMID:26873049

  15. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  16. Cirque du Monde as a health intervention

    PubMed Central

    Fournier, Cynthia; Drouin, Mélodie-Anne; Marcoux, Jérémie; Garel, Patricia; Bochud, Emmanuel; Théberge, Julie; Aubertin, Patrice; Favreau, Gil; Fleet, Richard

    2014-01-01

    Abstract Objective To present Cirque du Soleil’s social circus program, Cirque du Monde, to explore its potential as a primary health care tool for family physicians. Data sources A review of the literature in PubMed, the Cochrane Library, PsycINFO, LaPresse, Eureka, Google Scholar, and Érudit using the key words circus, social circus, Cirque du Monde, and Cirque du Soleil; a Montreal-based initiative, Espace Transition, modeled on Cirque du Monde; and personal communication with Cirque du Soleil’s Social Circus Training Advisor. Study selection The first 50 articles or websites identified for each key word in each of the databases were examined on the basis of their titles and abstracts in the case of articles, and on the basis of their titles and page content in the case of websites. Articles and websites that explored an aspect of social circuses or that described an intervention that involved circuses were then retained for analysis. Because all literature on social circuses was searched, no criterion for year of publication was used. Synthesis No articles on the social circus as a health intervention were found. One study on the use of the circus as an intervention in schools was identified. It demonstrated an increase in self-esteem in the children who took part. One study on the use of the circus in a First Nations community was found; it contained nonspecific, qualitative findings. The other articles identified were merely descriptions of social circuses. One website was identified on the use of the social circus to help youth who had been treated in a hospital setting for major psychiatric disorders to re-enter the community. The team in the pediatric psychiatry department at Centre Hospitalier Universitaire Sainte-Justine, the children’s hospital in Montreal, Que, was contacted; they were leading this project, called Espace Transition. The unpublished preliminary findings of its pilot project demonstrate substantial improvements in overall patient

  17. Unilateral hyperhydrosis in Pourfour du Petit syndrome.

    PubMed

    Kara, Murat; Dikmen, Erkan; Akarsu, Cengiz; Birol, Ahu

    2004-08-01

    Upper limp hyperhydrosis is an idiopathic disease with bilateral involvement. However, Pourfour du Petit syndrome, the opposite of Horner syndrome, may result in unilateral upper limb hyperhydrosis. It occurs following hyperactivity of the sympathetic cervical chain as a consequence of irritation secondary to trauma. We report herein two cases with Pourfour du Petit syndrome showing unilateral upper limb hyperhydrosis. The patients presented with right-sided mydriasis and ipsilateral hemifacial hyperhydrosis. The onset of disease was followed by a trauma in both patients. They underwent upper thoracic sympathectomy with favorable outcome. A history of an antecedent trauma in patients with unilateral upper limb hyperhydrosis and anisocoria may imply a possible diagnosis of Pourfour du Petit syndrome. PMID:15296919

  18. Rational Protocols

    NASA Astrophysics Data System (ADS)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  19. Sign Communication in Cri du Chat Syndrome

    ERIC Educational Resources Information Center

    Erlenkamp, Sonja; Kristoffersen, Kristian Emil

    2010-01-01

    This paper presents findings from a study on the use of sign supported Norwegian (SSN) in two individuals with Cri du chat syndrome (CCS). The study gives a first account of some selected aspects of production and intelligibility of SSN in CCS. Possible deviance in manual parameters, in particular inter- and/or intra-subject variation in the use…

  20. Cri du Chat syndrome

    PubMed Central

    Cerruti Mainardi, Paola

    2006-01-01

    The Cri du Chat syndrome (CdCS) is a genetic disease resulting from a deletion of variable size occurring on the short arm of chromosome 5 (5p-). The incidence ranges from 1:15,000 to 1:50,000 live-born infants. The main clinical features are a high-pitched monochromatic cry, microcephaly, broad nasal bridge, epicanthal folds, micrognathia, abnormal dermatoglyphics, and severe psychomotor and mental retardation. Malformations, although not very frequent, may be present: cardiac, neurological and renal abnormalities, preauricular tags, syndactyly, hypospadias, and cryptorchidism. Molecular cytogenetic analysis has allowed a cytogenetic and phenotypic map of 5p to be defined, even if results from the studies reported up to now are not completely in agreement. Genotype-phenotype correlation studies showed a clinical and cytogenetic variability. The identification of phenotypic subsets associated with a specific size and type of deletion is of diagnostic and prognostic relevance. Specific growth and psychomotor development charts have been established. Two genes, Semaphorin F (SEMAF) and δ-catenin (CTNND2), which have been mapped to the "critical regions", are potentially involved in cerebral development and their deletion may be associated with mental retardation in CdCS patients. Deletion of the telomerase reverse transcriptase (hTERT) gene, localised to 5p15.33, could contribute to the phenotypic changes in CdCS. The critical regions were recently refined by using array comparative genomic hybridisation. The cat-like cry critical region was further narrowed using quantitative polymerase chain reaction (PCR) and three candidate genes were characterised in this region. The diagnosis is based on typical clinical manifestations. Karyotype analysis and, in doubtful cases, FISH analysis will confirm the diagnosis. There is no specific therapy for CdCS but early rehabilitative and educational interventions improve the prognosis and considerable progress has been made in

  1. Testing Protocol for Module Encapsulant Creep (Presentation)

    SciTech Connect

    Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

    2012-02-01

    Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

  2. Precise clock synchronization protocol

    NASA Astrophysics Data System (ADS)

    Luit, E. J.; Martin, J. M. M.

    1993-12-01

    A distributed clock synchronization protocol is presented which achieves a very high precision without the need for very frequent resynchronizations. The protocol tolerates failures of the clocks: clocks may be too slow or too fast, exhibit omission failures and report inconsistent values. Synchronization takes place in synchronization rounds as in many other synchronization protocols. At the end of each round, clock times are exchanged between the clocks. Each clock applies a convergence function (CF) to the values obtained. This function estimates the difference between its clock and an average clock and corrects its clock accordingly. Clocks are corrected for drift relative to this average clock during the next synchronization round. The protocol is based on the assumption that clock reading errors are small with respect to the required precision of synchronization. It is shown that the CF resynchronizes the clocks with high precision even when relatively large clock drifts are possible. It is also shown that the drift-corrected clocks remain synchronized until the end of the next synchronization round. The stability of the protocol is proven.

  3. Indoor air quality investigation protocols

    SciTech Connect

    Greene, R.E.; Williams, P.L.

    1996-10-01

    Over the past 10 to 15 years, an increasing number of complaints about discomfort and health effects related to indoor air quality (IAQ) have been reported. The increase in complaints has been accompanied by an increase in requests for IAQ investigations. This study presents an overview of the many IAQ investigation protocols published since 1984. For analysis, the protocols are divided into four categories: solution-oriented, building diagnostics, industrial hygiene, and epidemiology. In general, the protocols begin with general observations, proceed to collect more specific data as indicated, and end with conclusions and recommendations. A generic IAQ protocol is presented that incorporates the common aspects of the various protocols. All of the current protocols place heavy emphasis on the ventilation system during the investigation. A major problem affecting all of the current protocols is the lack of generally accepted IAQ standards. IN addition, the use of questionnaires, occupant interviews, and personal diaries (as well as the point in the investigation at which they are administered) differs among the protocols. Medical evaluations and verification procedures also differ among the protocols.

  4. Cost-Effective Remediation of Depleted Uranium (DU) at Environmental Restoration Sites

    SciTech Connect

    MILLER,MARK; GALLOWAY,ROBERT B.; VANDERPOEL,GLENN; JOHNSON,ED; COPLAND,JOHN; SALAZAR,MICHAEL

    1999-11-03

    Numerous sites in the United States and around the world are contaminated with depleted uranium (DU) in various forms. A prevalent form is fragmented DU originating from various scientific tests involving high explosives and DU during weapon-development programs, at firing practice ranges, or in war theaters where DU was used in armor-piercing projectiles. The contamination at these sites is typically very heterogeneous, with discrete, visually identifiable DU fragments mixed with native soil. The bulk-averaged DU activity is quite low, whereas DU fragments, which are distinct from the soil matrix, have much higher specific activity. DU is best known as a dark metal that is nearly twice as dense as lead, but DU in the environment readily weathers (oxidizes) to a distinctive bright yellow color that is quite visible. While the specific activity (amount of radioactivity per mass of soil) of DU is relatively low and presents only a minor radiological hazard, the fact that DU is radioactive and visually identifiable makes it desirable to remove the DU ''contamination'' from the environment. The typical approach to conducting this DU remediation is to use radiation-detection instruments to identify the contaminant and then to separate it from the adjacent soil, packaging it for disposal as radioactive waste. This process can be performed manually or by specialized, automated equipment. Alternatively, a more cost-effective approach might be simple mechanical or gravimetric separation of the DU fragments from the host soil matrix. At SNL/NM, both the automated and simple mechanical approaches have recently been employed. This paper discusses the pros/cons of the two approaches.

  5. Peters anomaly in cri-du-chat syndrome.

    PubMed

    Hope, William C; Cordovez, Jose A; Capasso, Jenina E; Hammersmith, Kristin M; Eagle, Ralph C; Lall-Trail, Joel; Levin, Alex V

    2015-06-01

    The cri-du-chat syndrome is a rare genetic disorder caused by deletions in the short arm of chromosome 5. It presents with a distinctive catlike high-pitched cry, psychomotor delays, microcephaly, craniofacial abnormalities, and, in many cases, ocular findings. We report the first child with cri-du-chat and the findings of unilateral corneal staphyloma due to Peters anomaly and retinal dysplasia. PMID:26059676

  6. Consequences experimentales des effets des fluctuations du vide sur la fluorescence parametrique et la generation du second harmonique en milieu confine

    NASA Astrophysics Data System (ADS)

    Robichaud, Luc

    Les fluctuations du vide, qui consistent en l'apparition momentanee de particules, ce qui est permit par le principe d'incertitude de Heisenberg, joue un role primordial dans les processus photoniques, en particulier les processus non-lineaires. Par la manipulation de ces fluctuations du vide a l'aide de confinement optique, on retrouve deux phenomenes particuliers : l'intensification de la fluorescence parametrique (Walker, 2008) et l'inhibition de la generation du second harmonique (Collette, 2013). Dans ce travail, on presente les resultats dans le cas classique ; c'est-a-dire sans fluctuations du vide et confinement. Par la suite, on presente les effets des fluctuations du vide et du confinement, ce qui mene aux deux effets mentionnes. Dans le cas de la fluorescence parametrique, le bruit quantique sur le champ interne et externe est calcule, le role du desaccord de phase dans le modele est expose et une generalisation tridimensionnelle est etudiee afin de generaliser la conception du modele d'un cas unidimensionnel a un cas tridimensionnel planaire. Dans le cas de la generation du second harmonique, les difficultes d'un modele purement tridimensionnel sont exposees et ensuite le cas limite planaire est etudie.

  7. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols. PMID:25355092

  8. Publishing protocols for partnered research.

    PubMed

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols.

  9. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  10. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  11. DuPont extends CFC production after EPA warns of scarcity

    SciTech Connect

    Kirschner, E.

    1994-01-05

    DuPont reversed its voluntary commitment to phase out CFC production at the end of 1994 to prevent a possible shortage for automotive air conditioning repairs. In a December letter, the US EPA asked Dupont to continue producing its full 1995 allowance of 76 million tons of CFC-12 under the Montreal Protocol.

  12. Determination of periodontopathogens in patients with Cri du chat syndrome

    PubMed Central

    Ballesta-Mudarra, Sofía; Torres-Lagares, Daniel; Rodríguez-Caballero, Ángela; Yáñez-Vico, Rosa M.; Solano-Reina, Enrique; Perea-Pérez, Evelio

    2013-01-01

    Objectives: Cri du chat syndrome is a genetic alteration associated with some oral pathologies. However, it has not been described previously any clinical relationship between the periodontal disease and the syndrome. The purpose of this comparative study was to compare periodontopathogenic flora in a group with Cri du chat syndrome and another without the síndrome, to assess a potential microbiological predisposition to suffer a periodontitis. Study Design: The study compared nineteen subjects with Cri du chat Syndrome with a control group of nineteen patients without it. All patients were clinically evaluated by periodontal probing, valuing the pocket depth, the clinical attachmente level and bleeding on probing. There were no significant differences between both groups. Aggregatibacter actinomycetemcomitans, Porphyromonas gingivalis, Prevotella intermedia, Tannerella forsythia and Treponema denticola were detected by multiplex-PCR using 16S rDNA (microIDENT). Results: When A. actinomycetemcomitans, P. gingivalis, P. intermedia and T. denticola were compared, no statistically significant differences were found between the two groups (p>0.05). The value of T. forsythia was significantly higher for Cri du chat syndrome (31.6%) than for the control group (5.3%). The odds ratio for T. forsythia was 8.3. Conclusions: In the present study T. forsythia is associated with Cri du chat syndrome subjects and not with healthy subjects. Key words:Cri du Chat syndrome, periodontal health, microbiology, special care dentistry. PMID:24121919

  13. The diagnosis of urinary tract infections in young children (DUTY): protocol for a diagnostic and prospective observational study to derive and validate a clinical algorithm for the diagnosis of UTI in children presenting to primary care with an acute illness

    PubMed Central

    2012-01-01

    Background Urinary tract infection (UTI) is common in children, and may cause serious illness and recurrent symptoms. However, obtaining a urine sample from young children in primary care is challenging and not feasible for large numbers. Evidence regarding the predictive value of symptoms, signs and urinalysis for UTI in young children is urgently needed to help primary care clinicians better identify children who should be investigated for UTI. This paper describes the protocol for the Diagnosis of Urinary Tract infection in Young children (DUTY) study. The overall study aim is to derive and validate a cost-effective clinical algorithm for the diagnosis of UTI in children presenting to primary care acutely unwell. Methods/design DUTY is a multicentre, diagnostic and prospective observational study aiming to recruit at least 7,000 children aged before their fifth birthday, being assessed in primary care for any acute, non-traumatic, illness of ≤ 28 days duration. Urine samples will be obtained from eligible consented children, and data collected on medical history and presenting symptoms and signs. Urine samples will be dipstick tested in general practice and sent for microbiological analysis. All children with culture positive urines and a random sample of children with urine culture results in other, non-positive categories will be followed up to record symptom duration and healthcare resource use. A diagnostic algorithm will be constructed and validated and an economic evaluation conducted. The primary outcome will be a validated diagnostic algorithm using a reference standard of a pure/predominant growth of at least >103, but usually >105 CFU/mL of one, but no more than two uropathogens. We will use logistic regression to identify the clinical predictors (i.e. demographic, medical history, presenting signs and symptoms and urine dipstick analysis results) most strongly associated with a positive urine culture result. We will then use economic evaluation

  14. NATCON Papers 1999 = Les Actes du CONAT. [Papers Presented at the Annual Meeting of the National Consultation on Career Development (NATCON) (25th, Ottawa, Ontario, Canada, January 25-27, 1999)].

    ERIC Educational Resources Information Center

    National Consultation on Career Development (NATCON), Toronto (Ontario).

    This book contains the texts of a number of presentations from the 1999 NATCON conferences. These papers are: (1) "A Book of Surprises: Games, Stories, and Magic for Career Practitioners" (E. Sylvester); (2) "Academic and Career Choices for Lesbian and Gay Young Adults" (M. Schneider and J. McCurdy-Myers); (3)"Adolescent Values Development:…

  15. Quantum three-pass cryptography protocol

    NASA Astrophysics Data System (ADS)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  16. L'Aventure du LHC

    SciTech Connect

    2010-06-11

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  17. Modelisation par elements finis du muscle strie

    NASA Astrophysics Data System (ADS)

    Leonard, Mathieu

    Ce present projet de recherche a permis. de creer un modele par elements finis du muscle strie humain dans le but d'etudier les mecanismes engendrant les lesions musculaires traumatiques. Ce modele constitue une plate-forme numerique capable de discerner l'influence des proprietes mecaniques des fascias et de la cellule musculaire sur le comportement dynamique du muscle lors d'une contraction excentrique, notamment le module de Young et le module de cisaillement de la couche de tissu conjonctif, l'orientation des fibres de collagene de cette membrane et le coefficient de poisson du muscle. La caracterisation experimentale in vitro de ces parametres pour des vitesses de deformation elevees a partir de muscles stries humains actifs est essentielle pour l'etude de lesions musculaires traumatiques. Le modele numerique developpe est capable de modeliser la contraction musculaire comme une transition de phase de la cellule musculaire par un changement de raideur et de volume a l'aide des lois de comportement de materiau predefinies dans le logiciel LS-DYNA (v971, Livermore Software Technology Corporation, Livermore, CA, USA). Le present projet de recherche introduit donc un phenomene physiologique qui pourrait expliquer des blessures musculaires courantes (crampes, courbatures, claquages, etc.), mais aussi des maladies ou desordres touchant le tissu conjonctif comme les collagenoses et la dystrophie musculaire. La predominance de blessures musculaires lors de contractions excentriques est egalement exposee. Le modele developpe dans ce projet de recherche met ainsi a l'avant-scene le concept de transition de phase ouvrant la porte au developpement de nouvelles technologies pour l'activation musculaire chez les personnes atteintes de paraplegie ou de muscles artificiels compacts pour l'elaboration de protheses ou d'exosquelettes. Mots-cles Muscle strie, lesion musculaire, fascia, contraction excentrique, modele par elements finis, transition de phase

  18. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  19. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  20. Non-destructive analysis of DU content in the NIF hohlraums

    SciTech Connect

    Gharibyan, Narek; Moody, Ken J.; Shaughnessy, Dawn A.

    2015-12-16

    The advantage of using depleted uranium (DU) hohlraums in high-yield deuterium-tritium (DT) shots at the National Ignition Facility (NIF) is addressed by Döppner, et al., in great detail [1]. This DU based hohlraum incorporates a thin layer of DU, ~7 μm thick, on the inner surface along with a thin layer of a gold coating, ~0.7 μm thick, while the outer layer is ~22 μm thick gold. A thickness measurement of the DU layer can be performed using an optical microscope where the total DU weight can be computed provided a uniform DU layer. However, the uniformity of the thickness is not constant throughout the hohlraum since CAD drawing calculations of the DU weight do not agree with the computed values from optical measurements [2]. Therefore, a non-destructive method for quantifying the DU content in hohlraums has been established by utilizing gamma-ray spectroscopy. The details of this method, along with results from several hohlraums, are presented in this report.

  1. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  2. Past Tense Morphology in Cri Du Chat Syndrome: Experimental Evidence

    ERIC Educational Resources Information Center

    Wium, Kristin; Kristoffersen, Kristian Emil

    2008-01-01

    It has been observed that persons with Cri du chat syndrome (CDCS) have poor language production. However, very few studies have addressed the question whether all aspects of language production are equally afflicted, or whether there are differences between for instance phonological and morphological abilities. The present study was aimed at…

  3. College of DuPage Student Portrait, Fall Quarter 1999.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL. Office of Research and Planning.

    The report profiles the College of DuPage's (COD) fall quarter 1999 student body. It presents a brief history of the college's enrollment and a comparison of enrollments with other Illinois community colleges. It also provides demographic information on current students. Additionally, enrollment information is included by program, division, and…

  4. "The Moon Ring": A Conversation with Randy DuBurke.

    ERIC Educational Resources Information Center

    Pearson, Susan

    2003-01-01

    Discusses how the author, currently Editor-at-Large of Chronicle Books, chooses books to publish and discusses four attributes in a book that catch her eye. Presents an interview with Randy DuBurke and a conversation about his first picture book, "The Moon Ring." (SG)

  5. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  6. Properties, use and health effects of depleted uranium (DU): a general overview.

    PubMed

    Bleise, A; Danesi, P R; Burkart, W

    2003-01-01

    Depleted uranium (DU), a waste product of uranium enrichment, has several civilian and military applications. It was used as armor-piercing ammunition in international military conflicts and was claimed to contribute to health problems, known as the Gulf War Syndrome and recently as the Balkan Syndrome. This led to renewed efforts to assess the environmental consequences and the health impact of the use of DU. The radiological and chemical properties of DU can be compared to those of natural uranium, which is ubiquitously present in soil at a typical concentration of 3 mg/kg. Natural uranium has the same chemotoxicity, but its radiotoxicity is 60% higher. Due to the low specific radioactivity and the dominance of alpha-radiation no acute risk is attributed to external exposure to DU. The major risk is DU dust, generated when DU ammunition hits hard targets. Depending on aerosol speciation, inhalation may lead to a protracted exposure of the lung and other organs. After deposition on the ground, resuspension can take place if the DU containing particle size is sufficiently small. However, transfer to drinking water or locally produced food has little potential to lead to significant exposures to DU. Since poor solubility of uranium compounds and lack of information on speciation precludes the use of radioecological models for exposure assessment, biomonitoring has to be used for assessing exposed persons. Urine, feces, hair and nails record recent exposures to DU. With the exception of crews of military vehicles having been hit by DU penetrators, no body burdens above the range of values for natural uranium have been found. Therefore, observable health effects are not expected and residual cancer risk estimates have to be based on theoretical considerations. They appear to be very minor for all post-conflict situations, i.e. a fraction of those expected from natural radiation.

  7. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  8. The Pic du Midi solar survey

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2015-12-01

    We carry a long term survey of the solar activity with our coronagraphic system at Pic du Midi de Bigorre in the French Pyrenees (CLIMSO). It is a set of two solar telescopes and two coronagraphs, taking one frame per minute for each of the four channels : Solar disk in H-α (656.28 nm), prominences in H-α, disk in Ca II (393.3 nm), prominences in He I (1083 nm), all year long, weather permitting. Since 2015 we also take images of the FeXIII corona (1074.7 nm) at the rate of one every 10 minutes. These images cover a large field: 1.25 solar diameter, 2k*2K pixels, and are freely downloadable form a database. The improvements made since 2015 concern an autoguiding system for better centering of the solar disk behind the coronagraphic masks, and a new Fe XIII channel at λ=1074.7 nm. In the near future we plan to provide radial velocity maps of the disc and polarimetry maps of the disk and corona. This survey took its present form in 2007 and we plan to maintain image acquisition in the same or better experimental conditions for a long period: one or several solar cycles if possible. During the partial solar eclipse of March 20, 2015, the CLIMSO instruments and the staff at Pic du Midi operating it have provided several millions internet users with real time images of the Sun and Moon during all the phenomenon.

  9. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  10. L'Aventure du LHC

    ScienceCinema

    None

    2016-07-12

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  11. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  12. Cryptanalysis of the arbitrated quantum signature protocols

    SciTech Connect

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Cryptanalysis of the arbitrated quantum signature protocols

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  14. Carte du Ciel, San Fernando zone

    NASA Astrophysics Data System (ADS)

    Abad, C.

    2014-06-01

    An updated summary of a future large astrometric catalogue is presented, based on the two most important astrometric projects carried out by the Real Instituto y Observatorio de la Armada de San Fernando (ROA). The goal is to make a catalogue of positions and proper motions based on ROA's Cart du Ciel (CdC) and the Astrographic Catalogue (AC) San Fernando zone plates, and the HAMC2 meridian circle catalogue. The CdC and AC plates are being reduced together to provide first-epoch positions while HAMC2 will provide second-epoch ones. New techniques have been applied, that range from using a commercial flatbed scanner to the proper reduction schemes to avoid systematics from it. Only thirty plates (out of 540) remain to be processed, due to scanning problems that are being solved.

  15. Tendencies in the development of utilization protocols, seminar report

    NASA Astrophysics Data System (ADS)

    Roveri, A.

    1983-07-01

    The open system interconnections model (OSI) structured approach to specify protocols is discussed. A stratification in seven levels characterizes the architecture of the system. Transfer level protocol characterization of utilization protocols in the OSI model, data flow control, and presentation and application levels are described.

  16. Presentation by the scientific and technical commission on the analysis of the events relating to the unexpected ice storm of 5 to 9 January; Presentation a la commission scientifique et technique chargee d`analyser les evenements relatifs (a) la tempete de verglas survenue du 5 au 9 janvier 1998

    SciTech Connect

    1998-12-31

    The first part of this report contains three presentations in French by directors of Hydro-Quebec regarding the utility`s actions during the January 1998 ice storm and initiatives to reinforce and maintain the power network to avoid ice storm problems in the future. The second part is in a question and answer format and covers the utility`s response to ice storm threats in the following areas: Climate (forecasting of ice storm periods, line design criteria, impact of climatic changes and El Nino, ice data interpretation and measurement, research); structural aspects, including failures of components, towers, and lines; electrical aspects, including consolidation of the transmission system, power system security, burying of installations, conductor de-icing, strategic lines, and manpower use; economic aspects (network improvement, reliability, continuity and maintenance expenditures, interconnections, internal communications, service enhancement programs, work force reduction, strategic plans); and the management of emergency measures, including planning, service restoration priorities, human and material resources management, coordination, communications, and risk analysis.

  17. Quantum key distribution protocol using random bases

    NASA Astrophysics Data System (ADS)

    Meslouhi, A.; Amellal, H.; Hassouni, Y.; El Baz, M.; El Allati, A.

    2016-04-01

    In order to enhance the quantum key distribution (QKD) security, a new protocol, “QKDPRB” based on random bases is proposed. It consists of using standard encoding bases moving circularly with a variable rotational angle α which depends on angular velocity ω(t); thus, the traditional bases turn into relative ones. To prove the security and the efficiency of the protocol, we present a universal demonstration which proves a high level security of the proposed protocol, even in the presence of the intercept and resend attack. Finally, the QKDPRB may improve the security of QKD.

  18. A receptor tyrosine kinase, UFO/Axl, and other genes isolated by a modified differential display PCR are overexpressed in metastatic prostatic carcinoma cell line DU145.

    PubMed

    Jacob, A N; Kalapurakal, J; Davidson, W R; Kandpal, G; Dunson, N; Prashar, Y; Kandpal, R P

    1999-01-01

    We have used a modified differential display PCR protocol for isolating 3' restriction fragments of cDNAs specifically expressed or overexpressed in metastatic prostate carcinoma cell line DU145. Several cDNA fragments were identified that matched to milk fat globule protein, UFO/Axl, a receptor tyrosine kinase, human homologue of a Xenopus maternal transcript, laminin and laminin receptor, human carcinoma-associated antigen, and some expressed sequence tags. The transcript for milk fat globule protein, a marker protein shown to be overexpressed in breast tumors, was elevated in DU145 cells. The expression of UFO/Axl, a receptor tyrosine kinase, was considerably higher in DU145 cells as compared to normal prostate cells and prostatic carcinoma cell line PC-3. The overexpression of UFO oncogene in DU145 cells is discussed in the context of prostate cancer metastasis.

  19. The CHICO (Children's Cough) Trial protocol: a feasibility randomised controlled trial investigating the clinical and cost-effectiveness of a complex intervention to improve the management of children presenting to primary care with acute respiratory tract infection

    PubMed Central

    Turnbull, Sophie L; Redmond, Niamh M; Lucas, Patricia; Cabral, Christie; Ingram, Jenny; Hollinghurst, Sandra; Hay, Alastair D; Peters, Tim J; Horwood, Jeremy; Little, Paul; Francis, Nick; Blair, Peter S

    2015-01-01

    Introduction While most respiratory tract infections (RTIs) will resolve without treatment, many children will receive antibiotics and some will develop severe symptoms requiring hospitalisation. There have been calls for evidence to reduce uncertainty regarding the identification of children who will and will not benefit from antibiotics. The aim of this feasibility trial is to test recruitment and the acceptance of a complex behavioural intervention designed to reduce antibiotic prescribing, and to inform how best to conduct a larger trial. Methods and analysis The CHICO (Children's Cough) trial is a single-centre feasibility cluster randomised controlled trial (RCT) comparing a web-based, within-consultation, behavioural intervention with usual care for children presenting to general practitioner practices with RTI and acute cough. The trial aims to recruit at least 300 children between October 2014 and April 2015, in a single area in South West England. Following informed consent, demographic information will be recorded, and symptoms and signs measured. Parents/carers of recruited children will be followed up on a weekly basis to establish symptom duration, resource use and cost of the illness to the parent until the child's cough has resolved or up to 8 weeks, whichever occurs earlier. A review of medical notes, including clinical history, primary care reconsultations and hospitalisations will be undertaken 2 months after recruitment. The trial feasibility will be assessed by: determining acceptability of the intervention to clinicians and parent/carers; quantifying differential recruitment and follow-up; determining intervention fidelity; the success in gathering the data necessary to conduct a cost-effectiveness analysis; and collecting data about antibiotic prescribing rates to inform the sample size needed for a fully powered RCT. Ethics and dissemination The study was approved by the North West—Haydock Research Ethics Committee, UK (reference

  20. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  1. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located.

  2. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located. PMID:25526520

  3. InterGroup Protocols

    2003-04-02

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not in general scale well to a large number of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays andmore » a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered.« less

  4. Approche de prise en charge du trouble du spectre de l’autisme

    PubMed Central

    Lee, Patrick F.; Thomas, Roger E.; Lee, Patricia A.

    2015-01-01

    Résumé Objectif Se pencher sur les critères diagnostiques du trouble du spectre de l’autisme (TSA) comme les définit le Manuel diagnostique et statistique des troubles mentaux, cinquième édition (DSM-V), et concevoir une approche de prise en charge du TSA à l’aide du cadre CanMEDS–Médecine familiale (CanMEDS-MF). Sources d’information Le DSM-V, publié par l’American Psychiatric Association en mai 2013, énonce de nouveaux critères diagnostiques du TSA. Le cadre CanMEDS-MF du Collège des médecins de famille du Canada fournit un plan d’orientation pour la prise en charge complexe du TSA. Nous avons utilisé des données recueillies par le Centers for Disease Control and Prevention afin de déterminer la prévalence du TSA, ainsi que la revue systématique et méta-analyse détaillée effectuée par le National Institute for Health and Care Excellence du R.-U. pour ses lignes directrices sur le TSA dans le but d’évaluer les données probantes issues de plus de 100 interventions. Message principal Selon les données du Centers for Disease Control and Prevention, la prévalence du TSA se chiffrait à 1 sur 88 en 2008 aux États-Unis. La classification du TSA dans la quatrième édition du DSM incluait l’autisme, le syndrome d’Asperger, le trouble envahissant du développement et le trouble désintégratif de l’enfance. La dernière révision du DSM-V réunit tous ces troubles sous la mention TSA, avec différents niveaux de sévérité. La prise en charge du TSA est complexe; elle exige les efforts d’une équipe multidisciplinaire ainsi que des soins continus. Les rôles CanMEDS-MF fournissent un cadre de prise en charge. Conclusion Les médecins de famille sont au cœur de l’équipe de soins multidisciplinaire pour le TSA, et le cadre CanMEDS-MF tient lieu de plan détaillé pour guider la prise en charge d’un enfant atteint de TSA et aider la famille de cet enfant.

  5. Les plaies du tendon patellaire

    PubMed Central

    Mechchat, Atif; Elidrissi, Mohammed; Mardy, Abdelhak; Elayoubi, Abdelghni; Shimi, Mohammed; Elibrahimi, Abdelhalim; Elmrini, Abdelmajid

    2014-01-01

    Les plaies du tendon patellaire sont peu fréquentes et sont peu rapportés dans la littérature, contrairement aux ruptures sous cutanées. Les sections du tendon patellaire nécessitent une réparation immédiate afin de rétablir l'appareil extenseur et de permettre une récupération fonctionnelle précoce. A travers ce travail rétrospectif sur 13 cas, nous analysons les aspects épidémiologiques, thérapeutiques et pronostiques de ce type de pathologie en comparant différents scores. L’âge moyen est de 25 ans avec une prédominance masculine. Les étiologies sont dominées par les accidents de la voie publique (68%) et les agressions par agent tranchant (26%) et contendant (6 %). Tous nos patients ont bénéficié d'un parage chirurgical avec suture tendineuse direct protégée par un laçage au fils d'aciers en légère flexion. La rééducation est débutée après sédation des phénomènes inflammatoires. Au dernier recul les résultats sont excellents et bon à 92%. Nous n'avons pas noté de différence de force musculaire et d'amplitude articulaire entre le genou sain et le genou lésé. Les lésions ouvertes du tendon patellaire est relativement rare. La prise en charge chirurgicale rapide donne des résultats assez satisfaisants. La réparation est généralement renforcée par un semi-tendineux, synthétique ou métallique en forme de cadre de renfort pour faciliter la réadaptation et réduire le risque de récidive après la fin de l'immobilisation. PMID:25170379

  6. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  7. Routing protocols in wireless sensor networks.

    PubMed

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  8. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  9. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  10. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  11. Learning about Cri du Chat Syndrome

    MedlinePlus

    ... chat syndrome - also known as 5p- syndrome and cat cry syndrome - is a rare genetic condition that ... du chat syndrome usually include a high-pitched cat-like cry, mental retardation, delayed development, distinctive facial ...

  12. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  13. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  14. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  15. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  16. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  17. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  18. Pru du 2S albumin or Pru du vicilin?

    PubMed

    Garino, Cristiano; De Paolis, Angelo; Coïsson, Jean Daniel; Arlorio, Marco

    2015-06-01

    A short partial sequence of 28 amino acids is all the information we have so far about the putative allergen 2S albumin from almond. The aim of this work was to analyze this information using mainly bioinformatics tools, in order to verify its rightness. Based on the results reported in the paper describing this allergen from almond, we analyzed the original data of amino acids sequencing through available software. The degree of homology of the almond 12kDa protein with any other known 2S albumin appears to be much lower than the one reported in the paper that firstly described it. In a publicly available cDNA library we discovered an expressed sequence tag which translation generates a protein that perfectly matches both of the sequencing outputs described in the same paper. A further analysis indicated that the latter protein seems to belong to the vicilin superfamily rather than to the prolamin one. The fact that also vicilins are seed storage proteins known to be highly allergenic would explain the IgE reactivity originally observed. Based on our observations we suggest that the IgE reactive 12kDa protein from almond currently known as Pru du 2S albumin is in reality the cleaved N-terminal region of a 7S vicilin like protein.

  19. Overview of wideband packet protocols

    NASA Astrophysics Data System (ADS)

    Sherif, M. H.

    1992-10-01

    Wideband packet networks operate at rates equal to, or higher than, 64 kb/s, but lower than the basic broadband rate of 150 Mb/s, on cables or satellite links. Wideband packet protocols are the transmission protocols for these networks. They define open interfaces that can be used for public and private ISDNs. The protocols are defined in CCITT Recommendations G.764 and G.765. This paper describes the objectives of the wideband protocols, and how the objectives were achieved.

  20. Biokinetics and dosimetry of depleted uranium (DU) in rats implanted with DU fragments.

    SciTech Connect

    Guilmette, Ray A.; Hahn, Fletcher F.; Durbin, P. W.

    2004-01-01

    A number of U. S. veterans of the Persian Gulf War were wounded with depleted uranium (DU) metal fragments as a result of 'friendly fire' incidents, in which Abrams tanks and Bradley fighting vehicles were struck by DU anti-armor munitions. Some of the crew members who survived were left with multiple small fragments of DU in their muscles and soft tissues. The number, size and location of the fragments made them inoperable in general, and therefore subject to long-term retention. Because there was inadequate data to predict the potential carcinogenicity of DU fragments in soft tissues, Hahn et al. (2003) conducted a lifespan cancer study in rats. As part of that study, a number of rats were maintained to study the biokinetics and dosimetry of DU implanted intramuscularly in male Wistar rats. Typically, four metal fragments, either as cylindrical pellets or square wafers were implanted into the biceps femoris muscles of the rats. Urine samples were collected periodically during their lifespans, and DU was analyzed in kidneys and eviscerated carcass (minus the implant sites) at death. The daily DU urinary excretion rate increased steeply during the first 30 d after implantation peaking at about 90 d at 3-10 x 10{sup -3}%/d. During the first 150 d, the average excretion rate was 2.4 x 10{sup -3}%/d, decreasing thereafter to about 1 x 10{sup -3}%/d. Serial radiographs were made of the wound sites to monitor gross morphologic changes in the DU implant and the surrounding tissue. As early as 1 w after implantation, radiographs showed the presence of surface corrosion and small, dense bodies near the original implant, presumably DU. This corrosion from the surface of the implant continued with time, but did not result in an increasing amount of DU reaching the blood and urine after the first 3 mo. During this 3-mo period, connective tissue capsules formed around the implants, and are hypothesized to have reduced the access of DU to tissue fluids by limiting the diffusion

  1. The Design of a Reliable Multipeer Protocol for DVEs.

    ERIC Educational Resources Information Center

    Stuer, Gunther; Broeckhove, Jan; Arickx, Frans

    2003-01-01

    Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…

  2. Role and mechanism of Twist1 in modulating the chemosensitivity of FaDu cells.

    PubMed

    Lu, Sumei; Yu, Liang; Mu, Yakui; Ma, Juke; Tian, Jiajun; Xu, Wei; Wang, Haibo

    2014-07-01

    Multidrug resistance (MDR) is one of the most important obstacles affecting the efficacy of chemotherapy treatments for numerous types of cancer. In the present study, we have demonstrated the possible function of Twist1 in the chemosensitivity of head and neck squamous cell carcinoma (HNSCC) and have identified that its mechanism maybe associated with MDR1/P-gp regulation. To investigate this, the hypopharyngeal cancer cell line, FaDu, and its MDR cell line induced by taxol, FaDu/T, were employed. Stable transfectants targeted to Twist1 overexpression and Twist1 silencing based on FaDu were also conducted. Morphological observation, flow cytometry, reverse transcription-polymerase chain reaction (RT-PCR), western blotting and laser scanning confocal microscope detection were utilized to detect the associations between Twist1 and the chemosensitivity of FaDu cells. Our results demonstrated that Twist1 and MDR1/P-gp were upregulated in FaDu/T cells in a MDR dose-dependent manner. The anti-apoptotic capabilities of FaDu/T cells were enhanced during MDR progression, with apoptosis-related proteins (Bcl-2, Bax, activated caspase-3 and caspase-9) changing to resist apoptosis. Twist1 overexpression decreased the sensitivity of cells to taxol as revealed by a significant increase in MDR1/P-gp and IC50 (P<0.05). This overexpression also enhanced the resistance to apoptosis, with apoptotic proteins changing to resist cell death, and inhibited Ca2+ release induced by taxol (P<0.05). Detections in Twist1 silencing cells also confirmed this result. This study provided evidence that alterations of Twist1 expression modulates the chemosensitivity of FaDu cells to taxol. Therefore, Twist1 knockdown may be a promising treatment regimen for advanced hypopharyngeal carcinoma patients with MDR.

  3. Berberine-induced anticancer activities in FaDu head and neck squamous cell carcinoma cells.

    PubMed

    Seo, Yo-Seob; Yim, Min-Ji; Kim, Bok-Hee; Kang, Kyung-Rok; Lee, Sook-Young; Oh, Ji-Su; You, Jae-Seek; Kim, Su-Gwan; Yu, Sang-Joun; Lee, Gyeong-Je; Kim, Do Kyung; Kim, Chun Sung; Kim, Jin-Soo; Kim, Jae-Sung

    2015-12-01

    In the present study, we investigated berberine‑induced apoptosis and the signaling pathways underlying its activity in FaDu head and neck squamous cell carcinoma cells. Berberine did not affect the viability of primary human normal oral keratinocytes. In contrast, the cytotoxicity of berberine was significantly increased in FaDu cells stimulated with berberine for 24 h. Furthermore, berberine increased nuclear condensation and apoptosis rates in FaDu cells than those in untreated control cells. Berberine also induced the upregulation of apoptotic ligands, such as FasL and TNF-related apoptosis-inducing ligand, and triggered the activation of caspase-8, -7 and -3, and poly(ADP ribose) polymerase, characteristic of death receptor-dependent extrinsic apoptosis. Moreover, berberine activated the mitochondria‑dependent apoptotic signaling pathway by upregulating pro-apoptotic factors, such as Bax, Bad, Apaf-1, and the active form of caspase-9, and downregulating anti-apoptotic factors, such as Bcl-2 and Bcl-xL. In addition, berberine increased the expression of the tumor suppressor p53 in FaDu cells. The pan-caspase inhibitor Z-VAD-fmk suppressed the activation of caspase-3 and prevented cytotoxicity in FaDu cells treated with berberine. Interestingly, berberine suppressed cell migration through downregulation of vascular endothelial growth factor (VEGF), matrix metalloproteinase (MMP)-2, and MMP-9. Moreover, the phosphorylation of extracellular signal-regulated kinase (ERK1/2) and p38, components of the mitogen-activated protein kinase pathway that are associated with the expression of MMP and VEGF, was suppressed in FaDu cells treated with berberine for 24 h. Therefore, these data suggested that berberine exerted anticancer effects in FaDu cells through induction of apoptosis and suppression of migration. Berberine may have potential applications as a chemotherapeutic agent for the management of head and neck squamous carcinoma.

  4. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  5. Résultats du traitement du synovialosarcome des members

    PubMed Central

    Lukulunga, Loubet Unyendje; Moussa, Abdou Kadri; Mahfoud, Mustapha; El Bardouni, Ahmed; Ismail, Farid; Kharmaz, Mohammed; Berrada, Mohamed Saleh; El Yaacoubi, Moradh

    2014-01-01

    Les synovialosarcomes, sarcomes de haut grade, sont de diagnostic tardif et le traitement est complexe et onéreux, nécessitant la mise en œuvre d'une équipe pluridisciplinaire. Le but de ce travail était d'apprécier les résultats de l'association de la chirurgie à la radio chimiothérapie des synovialosarcomes des membres. Il s'agissait d'une étude rétrospective portant sur des patients présentant de synovialosarcomes des membres pris en charge dans le service de chirurgie orthopédique et traumatologique du CHU Ibn SINA de Rabat allant de Janvier 2006 à Décembre 2011 (6 ans). Nous avons inclus les malades présentant de synovialosarcomes des membres dont la clinique et l'imagerie médicale étaient en faveur, confirmés par l'examen anatomopathologique et la prise en charge effectuée dans le service. Les patients ont été revus avec un recul moyen de 3 ans. Nous n'avons pas retenu les patients dont les dossiers étaient incomplets, perdus de vue. Nous avons apprécié les résultats selon les critères carcinologiques et le score MSTS (Musculoskeletal Tumor Society). La saisie et l'analyse des données ont été faites sur le logiciel SPSS Stastic 17.0 Nous avons colligé 20 cas de synovialosarcome des membres dans le Service de Chirurgie Orthopédique et Traumatologique au CHU Ibn SINA de Rabat Le sexe masculin a prédominé avec 65% (n = 13) avec un sex ratio 1,85. L’âge moyen a été de 42,6 ans avec des extrêmes allant de 20 ans et 70 ans. Notre délai moyen de consultation était de 14,42 mois. Tous les malades ont consulté pour une tuméfaction dans 100% (localisée au membre inférieur dans 65% (n = 13), membre supérieur dans 35% (n = 7). La douleur était associée à la tuméfaction dans 55% (n = 11), quant à l'altération de l’état général et l'ulcération de la masse, elles ont été notées dans 3 cas chacune. Nous avons réalisé un bilan d'imagerie médicale comprenant: radiographie standard, échographie, écho doppler

  6. Wireless Sensor Networks Energy-Efficient MAC Protocol

    NASA Astrophysics Data System (ADS)

    Lijuan, Du; Yuanpeng, Wang; WeiPeng, Jing

    This paper presents a new wireless sensor network energy-efficient MAC protocol, ES-MAC protocol, and shows the results of simulation experiments. During the transmission the nodes do not send ACK packages while use a small amount of new information packets, so they can reduce unnecessary energy loss and wasted time. The theoretical analysis and simulation results show that ES-MAC protocol reduces energy consumption while reducing network latency and improving network throughput.

  7. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  8. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  9. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  11. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  12. The association between Cri du chat syndrome and dental anomalies.

    PubMed

    Hall, Charmaine; Hallett, Kerrod; Manton, David

    2014-01-01

    Cri du chat syndrome (CdcS), also known as 5p deletion syndrome is a genetic disorder caused by the partial deletion of chromatin from the short arm of chromosome 5. There is a paucity of literature on the dental manifestations in CdcS. The purposes of this report are to present the case of a nine-year-old girl with the syndrome, CdcS and to review its dental and clinical manifestations and their management in children. PMID:25514263

  13. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  14. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  15. Social Protocols for Agile Virtual Teams

    NASA Astrophysics Data System (ADS)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  16. Standardized North American marsh bird monitoring protocol

    USGS Publications Warehouse

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  17. STATISTICAL PRINCIPLES FOR PROSPECTIVE STUDY PROTOCOLS:

    PubMed Central

    Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means, risk differences, and other quantities that convey information. One of the goals in biomedical research is to develop parsimonious models ‐ meaning as simple as possible. This approach is valid if the subsequent research report (the article) is written independent of whether the results are “statistically significant” or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain the statistical principles for trial protocols in terms of design, analysis, and reporting of findings. PMID:23091782

  18. Probabilistic protocols in quantum information science: Use and abuse

    NASA Astrophysics Data System (ADS)

    Caves, Carlton

    2014-03-01

    Protocols in quantum information science often succeed with less than unit probability, but nonetheless perform useful tasks because success occurs often enough to make tolerable the overhead from having to perform the protocol several times. Any probabilistic protocol must be analyzed from the perspective of the resources required to make the protocol succeed. I present results from analyses of two probabilistic protocols: (i) nondeterministic (or immaculate) linear amplification, in which an input coherent state is amplified some of the time to a larger-amplitude coherent state, and (ii) probabilistic quantum metrology, in which one attempts to improve estimation of a parameter (or parameters) by post-selecting on a particular outcome. The analysis indicates that there is little to be gained from probabilistic protocols in these two situations.

  19. Variable bandwidth broadcasting protocol for video-on-demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Long, Darrell D. E.

    2003-01-01

    We present the first broadcasting protocol that can alter the number of channels allocated to a given video without inconveniencing the viewer and without causing any temporary bandwidth surge. Our variable bandwidth broadcasting (VBB) protocol assigns to each video a minimum number of channels whose bandwidths are all equal to the video consumption rate. Additional channels can be assigned to the video at any time to reduce the customer waiting time or retaken to free server bandwidth. The cost of this additional flexibility is quite reasonable as the bandwidth requirements of our VBB fall between those of the fast broadcasting protocol and the new pagoda broadcasting protocol.

  20. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  1. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  2. Clinical Protocol Information System

    PubMed Central

    Wirtschafter, David D.; Gams, Richard; Ferguson, Carol; Blackwell, William; Boackle, Paul

    1980-01-01

    The Clinical Protocol Information System (CPIS) supports the clinical research and patient care objectives of the SouthEastern Cancer Study Group (SEG). The information system goals are to improve the evaluability of clinical trials, decrease the frequency of adverse patient events, implement drug toxicity surveillance, improve the availability of study data and demonstrate the criteria for computer networks that can impact on the general medical care of the community. Nodes in the network consist of Data General MicroNova MP-100 minicomputers that drive the interactive data dialogue and communicate with the network concentrator (another DG MicroNova) in Birmingham. Functions supported include: source data editing, care “advice,” care “audit,” care “explanation,” and treatment note printing. The complete database is updated nightly and resides on UAB's IBM 370/158-AP.

  3. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  4. Concurrent Think-Aloud Protocol as a Socially Situated Construct

    ERIC Educational Resources Information Center

    Sasaki, Tomomi

    2008-01-01

    Verbal report protocols have been considered as direct representations of individual cognitive processes. The present study examined the social nature of verbal reports, particularly focusing on whether and in what ways concurrent think-aloud (TA) protocol data are recipient-designed. The results of this study suggest that verbal reports elicited…

  5. Presentation Timer

    2010-06-23

    Abstract Conferences and Meetings feature many presentations on a tight schedule. The Session Timer system provides an electronic display for showing the remaining time in a presentation. It provides continuous feedback so the speaker can judge the pace throughout a presentation. The timer automates the job so the session chairman does not have to awkwardly interrupt the speaker.

  6. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-06-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  7. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-12-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  8. Prejudice: From Allport to DuBois.

    ERIC Educational Resources Information Center

    Gaines, Stanley O., Jr.; Reed, Edward S.

    1995-01-01

    Examines the differences between Gordon Allport's and W. E. B. DuBois's theories on the origins of prejudice and the impact of discrimination on the personality and social development of blacks. The article argues that prejudice is a historically developed process, not a universal feature of human psychology. Implications for U.S. race relations…

  9. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.

    PubMed

    Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  10. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G. J. M.; Pyle, J. A.

    2015-05-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ~2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  11. The World Already Avoided: Quantifying the Ozone Benefits Achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, Martyn; Dhomse, Sandip; Feng, Wuhu; McKenzie, Richard; Velders, Guus; Pyle, John

    2015-04-01

    Chlorine and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic Ozone Hole expected to disappear by ~2050. However, we show that by 2014 the Montreal Protocol has already achieved significant benefits for the ozone layer. Using an off-line 3-D atmospheric chemistry model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with benefits for surface UV and climate. A deep Arctic Ozone Hole, with column values <120 DU, would have occurred given the meteorological conditions in 2011. The Antarctic Ozone Hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The ozone decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  12. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.

    PubMed

    Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A

    2015-05-26

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013.

  13. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    PubMed Central

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G.J.M.; Pyle, J. A.

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  14. [Herbological study of the botanical origin of Chinese crude drugs "Du-hua" and "Qiang-hua" in ancient China].

    PubMed

    Mikage, Masayuki; Ochimori, Akane

    2007-01-01

    The Chinese crude drug Qiang-hua was listed as an alias of Du-hua in Shen-nong-ben-cao-jing, an herbal journal written during the Han Dynasty, China. Du-hua and Qiang-hua are recognized as different herbs in China these days; the main botanical origin of Du-hua is Angelica spp. and that of Qiang-hua is Notopterygium spp., of the family Umbelliferae. To make clear the botanical origins of Du-hua and Qiang-hua in ancient China, the authors made a herbological study. The findings were as follows: the name of Qiang-hua was given to the genuine Du-hua, which is produced in Qiang Province, an ancient province located in northwest China; the botanical origin of Qiang-hua is presumed to be Notopterygium incisum Ting ex H.T. Chang and N. forbesii Boissieu based on both the morphology and habitat written in ancient herbal journals. Both species are prescribed as having the plant origin of Qiang-hua in the present Chinese Pharmacopoeia. Therefore, we concluded that Du-hua and Qiang-hua were essentially the same drug, and were originally derived from the Notopterygium species in ancient China.

  15. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  16. The simulation of communication protocols

    NASA Astrophysics Data System (ADS)

    de Carvalho Viola, F. E.

    1985-12-01

    Simulators for communication protocols specified in the ESTELLE and LC/1 languages are developed. The general principles of protocol simulation are reviewed; ESTELLE and LC/1 are characterized; a prototype LC/1 simulator based on predicate Petri nets is described; and a detailed specification for a driving interface for an ESTELLE simulator is given.

  17. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  18. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  19. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  20. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, Kritina; Sandor, A.; Thompson, S. G.; McCann, R. S.; Kaiser, M. K.; Begault, D. R.; Adelstein, B. D.; Beutter, B. R.; Stone, L. S.

    2008-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew on flight vehicles, surface landers and habitats, and during extra-vehicular activities (EVA). Designers of displays and controls for exploration missions must be prepared to select the text formats, label styles, alarms, electronic procedure designs, and cursor control devices that provide for optimal crew performance on exploration tasks. The major areas of work, or subtasks, within the Information Presentation DRP are: 1) Controls, 2) Displays, 3) Procedures, and 4) EVA Operations.

  1. Scalp Acupuncture Treatment Protocol for Anxiety Disorders: A Case Report

    PubMed Central

    Chen, Jia; Pan, Zimei; Ying, Zhou

    2014-01-01

    Anxiety disorders are among the most common psychiatric illnesses, and acupuncture treatment is widely accepted in the clinic without the side effects seen from various medications. We designed a scalp acupuncture treatment protocol by locating two new stimulation areas. The area one is between Yintang (M-HN-3) and Shangxing (DU-23) and Shenting (DU-24), and the area two is between Taiyang (M-HN-9) and Tianchong (GB-9) and Shuaigu (GB-8). By stimulating these two areas with high-frequency continuous electric waves, remarkable immediate and long-term effects for anxiety disorders have been observed in our practice. The first case was a 70-year-old male with general anxiety disorder (GAD) and panic attacks at night. The scalp acupuncture treatment protocol was applied with electric stimulation for 45 minutes once every week. After four sessions of acupuncture treatments, the patient reported that he did not have panic attacks at night and he had no feelings of anxiety during the day. Follow-up 4 weeks later confirmed that he did not have any episodes of panic attacks and he had no anxiety during the day since his last acupuncture treatment. The second case was a 35-year-old male who was diagnosed with posttraumatic stress disorder (PTSD) with a history of providing frontline trauma care as a Combat Medics from the Iraq combat field. He also had 21 broken bones and multiple concussions from his time in the battlefield. He had symptoms of severe anxiety, insomnia, nightmares with flashbacks, irritability, and bad temper. He also had chest pain, back pain, and joint pain due to injuries. The above treatment protocol was performed with 30 minutes of electric stimulation each time in combination with body acupuncture for pain management. After weekly acupuncture treatment for the first two visits, the patient reported that he felt less anxious and that his sleep was getting better with fewer nightmares. After six sessions of acupuncture treatments, the patient completely

  2. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, Kritina L.; Thompson, Shelby G.; Sandor, Aniko; McCann, Robert S.; Kaiser, Mary K.; Adelstein, Barnard D.; Begault, Durand R.; Beutter, Brent R.; Stone, Leland S.; Godfroy, Martine

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. In addition to addressing display design issues associated with information formatting, style, layout, and interaction, the Information Presentation DRP is also working toward understanding the effects of extreme environments encountered in space travel on information processing. Work is also in progress to refine human factors-based design tools, such as human performance modeling, that will supplement traditional design techniques and help ensure that optimal information design is accomplished in the most cost-efficient manner. The major areas of work, or subtasks, within the Information Presentation DRP for FY10 are: 1) Displays, 2) Controls, 3) Procedures and Fault Management, and 4) Human Performance Modeling. The poster will highlight completed and planned work for each subtask.

  3. Conservation Presentation.

    ERIC Educational Resources Information Center

    Friday, Gerald

    2001-01-01

    Introduces a project in which students teach about the importance of recycling and conservation by presenting demonstrations. Includes demonstrations on water, plastic, and other recycling products such as steel. (YDS)

  4. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, K.L.; Boyer, J.L.; Sandor, A.; Thompson, S.G.; McCann, R.S.; Begault, D.R.; Adelstein, B.D.; Beutter, B.R.; Stone, L.S.

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. The major areas of work, or subtasks, within this DRP are: 1) Displays, 2) Controls, 3) Electronic Procedures and Fault Management, and 4) Human Performance Modeling. This DRP is a collaborative effort between researchers at Johnson Space Center and Ames Research Center.

  5. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  6. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  7. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  8. Photographic protocol for image acquisition in craniofacial microsomia

    PubMed Central

    2011-01-01

    Craniofacial microsomia (CFM) is a congenital condition associated with orbital, mandibular, ear, nerve, and soft tissue anomalies. We present a standardized, two-dimensional, digital photographic protocol designed to capture the common craniofacial features associated with CFM. PMID:22208766

  9. [Implementation of a massive transfusion protocol in an emergency department].

    PubMed

    Tonglet, M; Minon, J M; Damas, F; Clanet, M; Vergnion, M

    2014-02-01

    We present here the massive transfusion protocol implemented in our institution in 2013. It will improve our management of critical massive bleeding, a situation which is rare in in our hospital, but carries a high mortality risk.

  10. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  11. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  12. Overview Presentation

    NASA Technical Reports Server (NTRS)

    Lytle, John

    2001-01-01

    This report provides an overview presentation of the 2000 NPSS (Numerical Propulsion System Simulation) Review and Planning Meeting. Topics include: 1) a background of the program; 2) 1999 Industry Feedback; 3) FY00 Status, including resource distribution and major accomplishments; 4) FY01 Major Milestones; and 5) Future direction for the program. Specifically, simulation environment/production software and NPSS CORBA Security Development are discussed.

  13. Collusive attacks to "circle-type" multi-party quantum key agreement protocols

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Xiao, Di; Jia, Heng-Yue; Liu, Run-Zong

    2016-05-01

    We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate in predetermining the key without being detected. In fact, the transmission structures of the quantum particles in those unfair MQKA protocols, three of which have already been analyzed, have much in common. We call these unfair MQKA protocols circle-type MQKA protocols. Likewise, the transmission structures of the quantum particles in MQKA protocols that can resist collusive attacks are also similar. We call such protocols complete-graph-type MQKA protocols. A MQKA protocol also exists that can resist the above attacks but is still not fair, and we call it the tree-type MQKA protocol. We first point out a common, easily missed loophole that severely compromises the fairness of present circle-type MQKA protocols. Then we show that two dishonest participants at special positions can totally predetermine the key generated by circle-type MQKA protocols. We anticipate that our observations will contribute to secure and fair MQKA protocols, especially circle-type protocols.

  14. DU-AGG pilot plant design study

    SciTech Connect

    Lessing, P.A.; Gillman, H.

    1996-07-01

    The Idaho National Engineering Laboratory (INEL) is developing new methods to produce high-density aggregate (artificial rock) primarily consisting of depleted uranium oxide. The objective is to develop a low-cost method whereby uranium oxide powder (UO[sub 2], U[sub 3]O[sub ]8, or UO[sub 3]) can be processed to produce high-density aggregate pieces (DU-AGG) having physical properties suitable for disposal in low-level radioactive disposal facilities or for use as a component of high-density concrete used as shielding for radioactive materials. A commercial company, G-M Systems, conducted a design study for a manufacturing pilot plant to process DU-AGG. The results of that study are included and summarized in this report. Also explained are design considerations, equipment capacities, the equipment list, system operation, layout of equipment in the plant, cost estimates, and the proposed plan and schedule.

  15. Mars' 1995 opposition from PIC du Midi

    NASA Astrophysics Data System (ADS)

    Erard, S.

    1997-03-01

    The last Martian apparition was observed from Pic du Midi between October 1994 and March 1995. Earth-based observation remains the only practicable way to perform continuous surveys of the planets, as opposed to orbital (HST) or space-borne observation. A good planetary site with limited demand for observational time like the 1-m telescope at Pic du Midi provides the optimal opportunity to monitor planetary activity, including atmospheric phenomena, surface variations, and polar caps recession. For instance, HST observations of Mars during this period, though yielding a much better spatial resolution, are limited to very few sessions and do not make it possible to monitor quick processes along a whole Martian season.

  16. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  17. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  18. Sustainable growth, the DuPont way.

    PubMed

    Holliday, C

    2001-09-01

    Like many manufacturers, DuPont traditionally has grown by making more and more "stuff." And its business growth has been proportional to the amount of raw materials and energy used--as well as the resulting waste and emissions from operations. Over the years, though, DuPont became aware that cheap supplies of nonrenewable resources wouldn't be endlessly available and that the earth's ecosystems couldn't indefinitely absorb the waste and emissions of production and consumption. Chad Holliday, chairman and CEO of DuPont, believes strongly in the challenge of sustainable growth and makes the business case for it: By using creativity and scientific knowledge effectively, he says, companies can provide strong returns for shareholders and grow their businesses--while also meeting the human needs of societies around the world and reducing the environmental footprint of their operations and products. In fact, a focus on sustainability can help identify new products, markets, partnerships, and intellectual property and lead to substantial business growth. Holliday describes how DuPont developed a three-pronged strategy to translate the concept of sustainability into nuts-and-bolts business practices. Focusing on integrated science, knowledge intensity, and productivity improvement, the strategy was accompanied by a new way to measure progress quantitatively. Sustainable growth should be viewed not as a program for stepped-up environmental performance but as a comprehensive way of doing business, one that delivers tremendous economic value and opens up new opportunities. Ultimately, companies will find that they can generate substantial business value through sustainability while both enhancing the quality of life around the world and protecting the environment.

  19. Sustainable growth, the DuPont way.

    PubMed

    Holliday, C

    2001-09-01

    Like many manufacturers, DuPont traditionally has grown by making more and more "stuff." And its business growth has been proportional to the amount of raw materials and energy used--as well as the resulting waste and emissions from operations. Over the years, though, DuPont became aware that cheap supplies of nonrenewable resources wouldn't be endlessly available and that the earth's ecosystems couldn't indefinitely absorb the waste and emissions of production and consumption. Chad Holliday, chairman and CEO of DuPont, believes strongly in the challenge of sustainable growth and makes the business case for it: By using creativity and scientific knowledge effectively, he says, companies can provide strong returns for shareholders and grow their businesses--while also meeting the human needs of societies around the world and reducing the environmental footprint of their operations and products. In fact, a focus on sustainability can help identify new products, markets, partnerships, and intellectual property and lead to substantial business growth. Holliday describes how DuPont developed a three-pronged strategy to translate the concept of sustainability into nuts-and-bolts business practices. Focusing on integrated science, knowledge intensity, and productivity improvement, the strategy was accompanied by a new way to measure progress quantitatively. Sustainable growth should be viewed not as a program for stepped-up environmental performance but as a comprehensive way of doing business, one that delivers tremendous economic value and opens up new opportunities. Ultimately, companies will find that they can generate substantial business value through sustainability while both enhancing the quality of life around the world and protecting the environment. PMID:11550629

  20. Du Pont Classifications of 6 Supernovae

    NASA Astrophysics Data System (ADS)

    Morrell, N.; Shappee, Benjamin J.

    2016-06-01

    We report optical spectroscopy (range 370-910 nm) of six supernovae from the Backyard Observatory Supernova Search (BOSS) and the All-Sky Automated Survey for Supernovae (ASAS-SN) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on June 17 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  1. [Diagnostic protocol and special tests].

    PubMed

    Bellia, M; Pennarola, R

    2008-01-01

    Diagnostic protocol and special tests to ionizing radiations have a preventive function in the medical surveillance of the exposed worker. This protocol must be provided with laboratory and special test assessing fitness for working at the risk of ionizing radiations. The health of workers must be compatible with working conditions and radiation risk. This healthiness of workers is evalued in the time to give an assessment fitness for working at ionizing radiations. For this purpose the basic diagnostic protocol must guarantee minimum information about state of organs and apparatus in addition to the normality of the metabolisms. The diagnostic protocol of the exposed worker to ionizing radiations must be adapted to the specific clinical situation so as to finally make a costs-benefits balance sheet. PMID:19288808

  2. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  3. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  4. Multiagency Protocols in Intellectual Disabilities Transition Partnerships: A Survey of Local Authorities in Wales

    ERIC Educational Resources Information Center

    Kaehne, Axel

    2010-01-01

    The paper presents the findings of a study of transition protocols (for adolescents leaving school and entering the general marketplace) in place for intellectual disability partnerships in 22 local authorities in Wales. The study consisted of a survey of existing protocols and a documentary analysis of the content of the obtained protocols. The…

  5. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  6. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  7. Step-up-to-Excellence: A Change Navigation Protocol for Transforming School Systems

    ERIC Educational Resources Information Center

    Duffy, Francis M.

    2006-01-01

    This article presents a protocol change leaders can use to navigate whole-system change in their school districts. The information describing the protocol will help change leaders in school districts and policymakers interested in whole-district change answer the question, "How do we transform our entire school system"? The protocol is…

  8. Traitement des Images pour la Reconnaissance de Formes EN Presence de Bruit Dependant du Signal

    NASA Astrophysics Data System (ADS)

    Terrillon, Jean-Christophe

    En traitement d'images, tres peu de recherches ont jusqu'a present considere le probleme de la reconnaissance de formes en presence de bruit dependant du signal. L'originalite de ce travail reside d'une part dans l'etude de la reconnaissance de formes par correlation, invariante sous translation et invariante simultanement sous rotation et translation, en presence de bruit dependant du signal et, d'autre part, dans le developpement de nouvelles methodes de traitement d'images qui preservent la reconnaissance en presence du bruit lorsque les methodes existantes ont echoure. Nous considerons principalement le speckle, qui peut se manifester dans les correlateurs optiques operant en eclairement coherent. Les nouvelles methodes que nous proposons consistent en un pre-traitement des images bruitees base sur la theorie de l'estimation. Au moyen de simulations numeriques et d'une analyse statistique, nous montrons les avantages du pre-traitement, en particulier pour la reconnaissance avec les filtres de correlation invariants sous rotation et translation.

  9. Quantum Private Comparison Protocol Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Long, Dongyang

    2013-01-01

    We present a quantum private comparison (QPC) protocol, enabling two players to compare the equality of their information without revealing any information about their respective private inputs, in which the four-particle cluster states as the information carriers are used. The presented protocol can ensure correctness, privacy, and fairness with the assistance of a semi-trusted third party (TP). Meanwhile, the participants including the TP are just required having the ability to perform single-particle measurements, which make the presented protocol more feasible in technique. Furthermore, the photon transmission is a one-way distribution; the Trojan horse attacks can be automatically avoided. The security of this protocol is also analyzed.

  10. Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection

    NASA Astrophysics Data System (ADS)

    Gaertner, Sascha; Bourennane, Mohamed; Kurtsiefer, Christian; Cabello, Adán; Weinfurter, Harald

    2008-02-01

    We introduce a new quantum protocol for solving detectable Byzantine agreement (also called detectable broadcast) between three parties, and also for solving the detectable liar detection problem. The protocol is suggested by the properties of a four-qubit entangled state, and the classical part of the protocol is simpler than that of previous proposals. In addition, we present an experimental implementation of the protocol using four-photon entanglement.

  11. Experimental demonstration of a quantum protocol for byzantine agreement and liar detection.

    PubMed

    Gaertner, Sascha; Bourennane, Mohamed; Kurtsiefer, Christian; Cabello, Adán; Weinfurter, Harald

    2008-02-22

    We introduce a new quantum protocol for solving detectable Byzantine agreement (also called detectable broadcast) between three parties, and also for solving the detectable liar detection problem. The protocol is suggested by the properties of a four-qubit entangled state, and the classical part of the protocol is simpler than that of previous proposals. In addition, we present an experimental implementation of the protocol using four-photon entanglement.

  12. A Quantum Watermarking Protocol Based on Bell Dual Basis

    NASA Astrophysics Data System (ADS)

    Mo, Jia; Ma, Zhaofeng; Yang, Yixian; Niu, Xinxin

    2013-11-01

    This paper presents a Bell-dual-basis-based quantum watermarking protocol composed of three major algorithms: watermark embedding and extracting and the intercepting test. The first two are completed by using the entanglement swapping property of Bell dual basis and the test is accomplished through IBF protocol to guarantee its bottom security. The watermarking protocol is mainly designed for the protection of digital copyright in the existence of classical information. This design finds that the quality of digital contents is not damaged with its zero-watermark attributes when embedding watermarks.

  13. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  14. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  15. Membrane Protein Production in Escherichia coli: Protocols and Rules.

    PubMed

    Angius, Federica; Ilioaia, Oana; Uzan, Marc; Miroux, Bruno

    2016-01-01

    Functional and structural studies on membrane proteins are limited by the difficulty to produce them in large amount and in a functional state. In this review, we provide protocols to achieve high-level expression of membrane proteins in Escherichia coli. The T7 RNA polymerase-based expression system is presented in detail and protocols to assess and improve its efficiency are discussed. Protocols to isolate either membrane or inclusion bodies and to perform an initial qualitative test to assess the solubility of the recombinant protein are also included. PMID:27485328

  16. Performance enhancement of OSPF protocol in the private network

    NASA Astrophysics Data System (ADS)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    The private network serves as an information exchange platform to support the integrated services via microwave channels and accordingly selects the open shortest path first (OSPF) as the IP routing protocol. But the existing OSPF can't fit the private network very well for its special characteristics. This paper presents our modifications to the standard protocol in such aspects as the single-area scheme, link state advertisement (LSA) types and formats, OSPF packet formats, important state machines, setting of protocol parameters and link flap damping. Finally simulations are performed in various scenarios and the results indicate that our modifications can enhance the OSPF performance in the private network effectively.

  17. Membrane Protein Production in Escherichia coli: Protocols and Rules.

    PubMed

    Angius, Federica; Ilioaia, Oana; Uzan, Marc; Miroux, Bruno

    2016-01-01

    Functional and structural studies on membrane proteins are limited by the difficulty to produce them in large amount and in a functional state. In this review, we provide protocols to achieve high-level expression of membrane proteins in Escherichia coli. The T7 RNA polymerase-based expression system is presented in detail and protocols to assess and improve its efficiency are discussed. Protocols to isolate either membrane or inclusion bodies and to perform an initial qualitative test to assess the solubility of the recombinant protein are also included.

  18. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  19. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  20. La reconstruction du sourcil par greffon composite du cuir chevelu: une astuce pour faciliter la technique

    PubMed Central

    El Omari, Mounia; El Mazouz, Samir; Gharib, Noureddine; EL Abbassi, Abdallah

    2015-01-01

    Les sourcils jouent un rôle important dans l’équilibre esthétique du visage. Leur reconstruction ou ophriopoïése, après séquelle de brûlure fait partie intégrante du programme de réhabilitation de la face brûlée. Plusieurs techniques ont été décrites. Nous insistons ici sur l'intérêt d'une technique simple, à la portée de tous les chirurgiens, et dont la méthode et les résultats peuvent être améliorés par un dessin bien planifié des zones donneuse et receveuse: la greffe composite prélevée au niveau du cuir chevelu dessinée à l'aide d'un calque du sourcil controlatéral. PMID:26401195

  1. Suivi après le traitement du cancer du sein

    PubMed Central

    Sisler, Jeffrey; Chaput, Geneviève; Sussman, Jonathan; Ozokwelu, Emmanuel

    2016-01-01

    Résumé Objectif Offrir aux médecins de famille un résumé des recommandations fondées sur les données probantes pour guider les soins aux survivantes traitées pour le cancer du sein. Qualité des données Une recherche documentaire a été effectuée dans MEDLINE entre 2000 et 2016 à l’aide des mots-clés anglais suivants : breast cancer, survivorship, follow-up care, aftercare, guidelines et survivorship care plans, en se concentrant sur la revue des lignes directrices publiées récemment par les organismes nationaux de cancérologie. Les données étaient de niveaux I à III. Message principal Les soins aux survivantes comportent 4 facettes : surveillance et dépistage, prise en charge des effets à long terme, promotion de la santé et coordination des soins. La surveillance des récidives ne se traduit que par une mammographie annuelle, et le dépistage d’autres cancers doit suivre les lignes directrices basées sur la population. La prise en charge des effets à long terme du cancer et de son traitement aborde des problèmes courants tels la douleur, la fatigue, le lymphœdème, la détresse et les effets indésirables des médicaments, de même que les préoccupations à long terme comme la santé du cœur et des os. La promotion de la santé met en relief les bienfaits de l’activité chez les survivantes du cancer, avec l’accent mis sur l’activité physique. Les soins aux survivantes sont de meilleure qualité lorsque divers services et professionnels de la santé participent aux soins, et le médecin de famille joue un rôle important dans la coordination des soins. Conclusion Les médecins de famille sont de plus en plus souvent les principaux fournisseurs de soins de suivi après le traitement du cancer du sein. Le cancer du sein doit être considéré comme une affection médicale chronique, même chez les femmes en rémission, et les patientes profitent de la même approche que celle utilisée pour les autres affections chroniques en

  2. ASNT certification of thermographers at DuPont Company

    NASA Astrophysics Data System (ADS)

    Eads, Lowry G.; Spring, Robert W.

    1996-03-01

    DuPont is one of the world's largest petrochemical firms. Infrared thermography has been a key nondestructive test method used in the predictive/preventive maintenance (PPM) areas for many years. This paper discusses the reasons why DuPont chooses to use the qualification and certification standards of the American Society for Nondestructive Testing (ASNT) to establish a certification program for thermographers.

  3. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  4. Protocols, practices, and the reproduction of technique in molecular biology.

    PubMed

    Lynch, Michael

    2002-06-01

    Protocols are one of the main organizational resources in molecular biology. They are written instructions that specify ingredients, equipment, and sequences of steps for making technical preparations. Some protocols are published in widely used manuals, while others are hand-written variants used by particular laboratories and individual technicians. It is widely understood, both in molecular biology and in social studies of science, that protocols do not describe exactly what practitioners do in the laboratory workplace. In social studies of science, the difference between protocols and the actual practices of doing them often is used to set up ironic contrasts between 'messy' laboratory practices and the appearance of technical order. Alternatively, in ethnomethodological studies of work, the difference is examined as a constitutive feature, both of the lived-work of doing technical projects, and of the administrative work of regulating and evaluating such projects. The present article takes its point of departure from ethnomethodology, and begins with a discussion of local problems with performing molecular biology protocols on specific occasions. The discussion then moves to particular cases in criminal law in which defense attorneys cross-examine forensic technicians and lab administrators. In these interrogations, the distinction between protocols and actual practices animates the dialogue and becomes consequential for judgments in the case at hand. The article concludes with a discussion of administrative science: the work of treating protocols and paper trails as proxies for actual 'scientific' practices.

  5. Apples to apples: the origin and magnitude of differences in asbestos cancer risk estimates derived using varying protocols.

    PubMed

    Berman, D Wayne

    2011-08-01

    Given that new protocols for assessing asbestos-related cancer risk have recently been published, questions arise concerning how they compare to the "IRIS" protocol currently used by regulators. The newest protocols incorporate findings from 20 additional years of literature. Thus, differences between the IRIS and newer Berman and Crump protocols are examined to evaluate whether these protocols can be reconciled. Risks estimated by applying these protocols to real exposure data from both laboratory and field studies are also compared to assess the relative health protectiveness of each protocol. The reliability of risks estimated using the two protocols are compared by evaluating the degree with which each potentially reproduces the known epidemiology study risks. Results indicate that the IRIS and Berman and Crump protocols can be reconciled; while environment-specific variation within fiber type is apparently due primarily to size effects (not addressed by IRIS), the 10-fold (average) difference between amphibole asbestos risks estimated using each protocol is attributable to an arbitrary selection of the lowest of available mesothelioma potency factors in the IRIS protocol. Thus, the IRIS protocol may substantially underestimate risk when exposure is primarily to amphibole asbestos. Moreover, while the Berman and Crump protocol is more reliable than the IRIS protocol overall (especially for predicting amphibole risk), evidence is presented suggesting a new fiber-size-related adjustment to the Berman and Crump protocol may ultimately succeed in reconciling the entire epidemiology database. However, additional data need to be developed before the performance of the adjusted protocol can be fully validated.

  6. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  7. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  8. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  9. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  10. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems. PMID:27640159

  11. Oncoplastie avec conservation mammaire dans le traitement du cancer du sein: à propos de 16 cas

    PubMed Central

    Bouzoubaa, Wail; Laadioui, Meryam; Jayi, Sofia; Alaoui, Fatime Zahra Fdili; Bouguern, Hakima; Chaara, Hikmat; Melhouf, Moulay Abdelilah

    2015-01-01

    Le cancer du sein est actuellement le cancer le plus fréquent chez la femme, et pose un véritable problème diagnostique et thérapeutique. Le dépistage des lésions à un stade de plus en plus précoce, a permis une extension des indications du traitement conservateur radiochirurgical, qui était initialement limitées aux tumeurs de moins de 3 cm, unifocales, non inflammatoires. Par ailleurs, l'utilisation de traitements préopératoires permet d’étendre les indications du traitement conservateur à des tumeurs plus volumineuses. Parallèlement à cette extension des indications de conservation mammaire, on a observé le développement de nouvelles approches thérapeutiques notamment la chirurgie oncoplastique, technique du ganglion sentinelle et chirurgie stéréotaxique, dont les résultats initiaux sont très encouragent. A travers cette étude réalisée dans le service de gynécologie et obstétrique II du CHU HASSAN II de FES au MAROC, après l'analyse rétrospective de 16 patientes traitées par traitement conservateur et oncoplastie, nous avons voulus montrer notre aptitude a réalisé ses techniques chirurgicales et a bien prendre en charge ces patientes, mais aussi évaluer ces techniques en termes de résultat carcinologique et de résultat esthétique, aussi en terme de survie globale, survie sans métastase et en termes de récidive locale entre les plasties mammaires et les traitements usuels: mastectomie et traitement conservateur classique. PMID:26430477

  12. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  13. La fin du jeûne?

    PubMed Central

    Naugler, Christopher; Sidhu, Davinder

    2014-01-01

    Résumé Objectif Présenter une mise à jour sur l’utilité clinique de ne pas être à jeun par rapport à l’être pour l’analyse des lipides dans le but d’améliorer l’observance par les patients, leur sécurité et l’évaluation clinique dans les tests du cholestérol. Qualité des données Les recommandations sont classées comme étant fondées sur des données probantes fortes, acceptables ou faibles (conflictuelles ou insuffisantes), selon les classifications adoptées par le Groupe d’étude canadien sur les soins de santé préventifs. Message principal Le dépistage de la dyslipidémie comme facteur de risque de coronaropathie et la prescription de médicaments hypolipidémiants sont des activités importantes en soins primaires. De récentes données probantes remettent en question la nécessité d’être à jeun pour la mesure des lipides. Dans des études sur la population, le cholestérol total, le cholestérol à lipoprotéines de haute densité et le cholestérol à lipoprotéines autres qu’à haute densité variaient tous d’en moyenne 2 % à jeun. Pour un dépistage de routine, la mesure du cholestérol sans être à jeun est maintenant une option de rechange raisonnable à l’analyse à jeun. Pour les patients diabétiques, l’exigence d’être à jeun peut représenter un important problème de sécurité en raison des possibilités d’hypoglycémie. Pour la surveillance des triglycérides et du cholestérol à lipoprotéines de basse densité chez les patients qui prennent des médicaments hypolipidémiants, le jeûne devient important. Conclusion Être à jeun pour la détermination routinière des niveaux lipidiques est largement inutile et il est improbable que le jeûne influence la stratification du risque clinique chez le patient, tandis que la mesure sans être à jeun pourrait améliorer l’observance par le patient et sa sécurité.

  14. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  15. Étude de la condensation par convection forcée du R113, R152a et du R12 sur une plaque plane horizontale

    NASA Astrophysics Data System (ADS)

    Louahlia, H.; Panday, P. K.

    1996-07-01

    Forced convection condensation of pure vapour flowing between two horizontal parallel plates with the bottom plate cooled is analysed numerically. The coupled boundary layer equations for the two phases are solved using an implicite finite difference procedure. The pressure gradient, shear stress, inertia and enthalpy convection terms, and turbulence in the two phases are retained in this analysis. The laminar model and the turbulent models of Pletcher [19] and Koyama et al. [20] are compared for condensation of R113. The mean heat transfer coefficients predicted with the model of Pletcher [19] are in good agreement with the experimental results of Lu and Suryanarayana [18]. The thermal performances of R152a and R12 are also compared. For the condensation of R152a, the pressure drop is 18% smaller and the mean heat transfer coefficients are 24% higher compared to those of R12. These results are in line with the experimental work of Cheng and Tao [12]. The influence of the temperature difference and inclination of the plate on the condensate film thikness are also reported. The results of the present calculations for the condensation of R12, R152a and R113 are represented by a non-dimensional equation. La condensation en film par convection forcée est analysé numériquement pour un écoulement de vapeur pure saturée entre deux plaques planes horizontales. Le condensat se forme uniquement sur une plaque inférieure. Les équations de la couche limite appliquées dans les deux phases sont couplées et résolues par une méthode des différences finies implicite. Le gradient de pression, les contraintes tangentielles, les termes d'inertie et de convection d'enthalpie ainsi que la turbulence dans les deux phases sont pris en compte. Le modèle laminaire ainsi que les modèles de turbulence de Pletcher [19] et de Koyama et al. [20] sont comparés pour la condensation du R113. Les coefficients d'échange thermique moyens prédits avec le modèle de Pletcher, s

  16. Rainfall in and near Du Page County, Illinois, February 1986-September 1991

    USGS Publications Warehouse

    Duncker, J.J.; Vail, T.J.; Earle, J.D.

    1993-01-01

    Rainfall for 14 rainfall-gaging stations located in and near Du Page County, Illinois, are presented. The rainfall data were collected from February 1986 through September 1991 as part of an on-going cooperative rainfall-runoff investigation. Station descriptions identify the location of and equpiment installed at each rainfall-gaging station. Total daily rainfall is tabulated for each rainfall-gaging staion for each water year. Periods of missing record and snow-affected precipitation totals are identified.

  17. Rainfall in and near Du Page County, Illinois, October 1991-September 1995

    USGS Publications Warehouse

    Straub, T.D.; Hornewer, N.J.; Duncker, J.J.

    1998-01-01

    Twenty-four hour rainfall data are presented for 11 rain gages in and near Du Page County, Illinois. Daily rainfall totals were recorded from October 1, 1991, to September 30, 1995. Station descriptions include site identifiers, locations, drainage basins, types of instrumentation, accuracy, and periods of record. Missing and partial rainfall data, and precipitation totals affected by snowfall have been noted for the periods of record.

  18. Cri du chat syndrome and primary ciliary dyskinesia: a common genetic cause on chromosome 5p.

    PubMed

    Shapiro, Adam J; Weck, Karen E; Chao, Kay C; Rosenfeld, Margaret; Nygren, Anders O H; Knowles, Michael R; Leigh, Margaret W; Zariwala, Maimoona A

    2014-10-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD. PMID:25066065

  19. Cri du Chat Syndrome and Primary Ciliary Dyskinesia: A Common Genetic Cause on Chromosome 5p

    PubMed Central

    Shapiro, Adam J.; Weck, Karen E.; Chao, Kay C.; Rosenfeld, Margaret; Nygren, Anders O. H.; Knowles, Michael R.; Leigh, Margaret W.; Zariwala, Maimoona A.

    2014-01-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD. PMID:25066065

  20. Multi-party Quantum Private Comparison Protocol Using d-Dimensional Basis States Without Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Liu, Wen; Wang, Yong-Bin; Wang, Xiao-Mei

    2014-04-01

    We present a new multi-party quantum private comparison protocol based on d-dimensional basis states. Different from previous protocols, our protocol have some advantages. n parties can determine wether their private information are equal or not in one time execution of our protocol. Without using the entangled character of d-dimensional basis states, we only need to perform the local unitary operation on particles to encode the information and to get the comparison result. We also discuss that our protocol can withstand various kinds of outside attacks and participant attacks.

  1. Mesure du taux de la capture radiative du muon par l'hydrogene liquide

    NASA Astrophysics Data System (ADS)

    Jonkmans, Guy

    À basse énergie, l'interaction faible entre leptons et quarks est décrite par une interaction de la forme courant × courant de type V - A. La présence de l'interaction forte induit des couplages additionnels qui doivent être déterminés expérimentalement. De ceux-ci, le couplage pseudoscalaire induit, gp , est mesuré avec la plus grande incertitude et fait l'objet de la présente recherche. L'hypothèse du Courant Axial Partiellement Conservé (CAPC) et l'usage de la relation de Goldberger-Treiman relie gp au couplage axial ga . Cette relation a été vérifiée traditionnellement par la Capture Ordinaire du Muon (COM) à une valeur fixe du moment de transfert q. La Capture Radiative du Muon (CRM), m- p-->nnmg , est un meilleur outil pour l'étude de gp à cause de sa dépendance variable en q2 qui offre une plus grande sensibilité dans la partie à haute énergie du spectre des photons. Toutefois, le petit rapport d'embranchement (~10-8) de la CRM par rapport à la désintégration du muon a retardé cette mesure jusqu'à ce jour. La théorie et les difficultés expérimentales associées à la détection des photons de CRM sont présentées au deuxième chapitre. On décrit ensuite, au troisième chapitre, les composantes du système de détection. Ce détecteur est un spectromètre à paires de grand angle solide (~3p) et qui permet l'observation des photons par l'analyse des électrons et des positrons de photo-conversion. Ainsi, le bruit de fond important des neutrons de la COM ne constitue pas un problème pour cette mesure. Nous décrivons, au quatrième chapitre, toutes les étapes de l'analyse, nécessaires pour la réduction des multiples bruits de fond. Le cinquième chapitre présente le calcul des efficacités ainsi que l'estimation des erreurs systématiques. Le sixième chapitre démontre comment l'on extrait le rapport d'embranchement pour la CRM ainsi que la valeur ae gp . On insiste sur la dépendance de gp en fonction de la valeur de

  2. Comparing Breast Screening Protocols: Inserting Catch Trials Does Not Improve Sensitivity over Double Screening

    PubMed Central

    Howe, Piers D. L.

    2016-01-01

    Breast screening is an important tool for the early detection of breast cancers. However, tumours are typically present in less than 1% of mammograms. This low prevalence could cause radiologists to detect fewer tumours than they otherwise would, an issue known as the prevalence effect. The aim of our study was to investigate a novel breast screening protocol, designed to decrease the number of tumours missed by radiologists, without increasing their workload. We ran two laboratory-based experiments to assess the degree to which the novel protocol, called the catch trial (CT) protocol, resulted in greater sensitivity (d’) than the double screener protocol (DS), currently utilised in Australia. In our first experiment we found evidence that the CT protocol resulted in a criterion shift relative to the DS protocol but the evidence that sensitivity was greater in the CT protocol relative to the DS protocol was less clear. A second experiment, using more realistic stimuli that were more representative of actual tumours, also failed to find convincing evidence that sensitivity was greater in the CT protocol than in the DS protocol. This experiment instead found that both the hit rate and the false alarm rate increased in the CT protocol relative to the DS protocol. So while there was again evidence that the CT protocol induced a criterion shift, the sensitivity appeared to be approximately the same in both protocols. Our results suggest the CT protocol is unlikely to result in an improvement in sensitivity over the DS protocol, so we cannot recommend that it be trialled in a clinical setting. PMID:27723788

  3. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  4. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  5. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  6. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  7. Le spasme du sanglot chez les nourrissons

    PubMed Central

    Goldman, Ran D.

    2015-01-01

    Résumé Question Des enfants qui fréquentent ma clinique ont des épisodes semblables à des convulsions pendant lesquels ils pleurent et retiennent leur souffle au point de faire survenir une cyanose et de perdre conscience. Les résultats à l’examen ou aux investigations sont normaux et les pédiatres consultés ne font pas d’autres investigations. Les spasmes du sanglot sont-ils communs et quels genres d’investigations faut-il faire? Réponse Le spasme du sanglot est un trouble non épileptique paroxysmal bénin qui se produit chez les enfants en santé de six à 48 mois. Les épisodes commencent par une provocation, comme un bouleversement émotionnel ou une blessure mineure, et peuvent progresser en une retenue de la respiration, une cyanose et une syncope. Les épisodes sont extrêmement effrayants à regarder mais ont des conséquences bénignes. Une fois le diagnostic clinique posé, on recommande de faire passer un électrocardiogramme et d’exclure la possibilité d’une anémie, mais aucune autre investigation ou demande de consultation n’est nécessaire.

  8. Élimination du bore du silicium par plasma inductif sous champ électrique

    NASA Astrophysics Data System (ADS)

    Combes, R.; Morvan, D.; Picard, G.; Amouroux, J.

    1993-05-01

    We analyzed purification mechanisms of silicon by inductive plasma with a fluoride slag. The aim is to study boron elimination from doped electronic grade silicon in function of the nature of the slag to obtain a photovoltaic grade silicon. The steady began with the calculation and the comparison of the stability diagram of boron compounds in presence of CaF2, BaF2 and MgF2. This study led us to conclude that BaF2 is the better slag for silicon purification. This has been confirmed by experience. In a second time, we made purifications under electric bias to enhance slag efficiency. We noticed that BaF2 is more sensitive to electric bias than other slags. Nous avons analysé le mécanisme de purification du silicium sous plasma inductif en présence d'un laitier fluoré. L'objectif principal est d'étudier l'élimination du bore du silicium électronique dopé en fonction de la nature du fluorure pour obtenir un silicium de qualité photovoltaïque. L'étude a commencé par l'établissement et la comparaison de diagrammes des composés du bore en présence de CaF2, de MgF2 et de BaF2. Nous avons déduit de cette première étude que BaF2 est le meilleur laitier pour la purification du silicium. Ceci a été corroboré par l'expérience. Nous avons ensuite opéré en présence d'un champ électrique dans le but d'améliorer encore l'efficacité des laitiers. Nous avons constaté que BaF2 est plus sensible au champ électrique que les deux autres laitiers utilisés.

  9. [Major advances in Oncology in 2013: the editorial board of the Bulletin du Cancer point of view].

    PubMed

    Vignot, Stéphane; Bay, Jacques-Olivier; André, Thierry; Blay, Jean-Yves; Goncalves, Anthony; Massard, Christophe; Orbach, Daniel; Wislez, Marie; Thariat, Juliette; Magné, Nicolas

    2014-01-01

    Many data are presented each year during the American Society of Clinical Oncology meeting and others international major meetings. This article is proposed by the editorial board of the Bulletin du Cancer as a synthesis of important new data. The purpose is to identify in these results those who may have an immediate impact on our clinical practices.

  10. E.I. DuPont De Nemours & Company/Oberlin Filter Company Microfiltration Technology. Applications Analysis Report

    EPA Science Inventory

    This report evaluates the DuPont/Oberlin microfiltration technology’s ability to remove metals (present in soluble or insoluble form) and particulates from liquid wastes while producing a dry filter cake and a filtrate that meet applicable disposal requirements. This report also ...

  11. Quantum oblivious set-member decision protocol

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2015-08-01

    We present and define a privacy-preserving problem called the oblivious set-member decision problem, which allows a server to decide whether a private secret of a user is a member of his private set in an oblivious manner. Namely, if the secret belongs to his private set, he does not know which member it is. We propose a quantum solution to the oblivious set-member decision problem. Compared to classical solutions, the proposed quantum protocol achieves an exponential reduction in communication complexity, since it only needs O (1 ) communication cost.

  12. Effects of HPV-16 infection on hypopharyngeal squamous cell carcinoma and FaDu cells.

    PubMed

    Lu, Wuhao; Feng, Long; Li, Ping; Wang, Yuanyuan; Du, Yuwen; Chen, Xiaonan; Wu, Shujun; Zhao, Guoqiang; Lou, Weihua

    2016-01-01

    Hypopharyngeal squamous cell carcinoma is a common type of malignant tumor among head and neck squamous cell carcinomas (HNSCCs). Heavy smoking and/or drinking is associated with the development of HNSCC. However, HNSCC also occurs in individuals that do not drink or smoke, possibly due to infection with the human papilloma virus (HPV). HPV-16 has been shown to be closely associated with the occurrence of several types of cancers. However, its role in hypopharyngeal squamous cell carcinoma remains unclear. In the present study, we investigated the effects of HPV-16 on hypopharyngeal squamous cell carcinoma and FaDu cells. Lentiviral vectors were used to establish FaDu cells that expressed the E6 and E7 proteins of HPV-16. We used quantitative reverse transcription-polymerase chain reaction (qRT-PCR) assays and western blotting to detect and determine the levels of expression for E6-E7 mRNAs and proteins. Cell Counting Kit-8 (CCK-8) assays, enzyme-linked immunosorbent assays (ELISA), Transwell assays, and flow cytometry were used to assess the effects of HPV-16 E6-E7 on the proliferation, invasion, metastasis and apoptosis of FaDu cells. Expression of microRNAs was analyzed by qRT-PCR. We found that the expression levels of HPV-16 E6-E7 were increased in FaDu cells transfected with the lentiviral vector compared with that observed in the control cells. In addition, the rates of apoptosis were decreased in the transfected cells, while proliferation was increased. The average numbers of cells penetrating the Matrigel were significantly higher than those for the controls. We detected miR-363 and miR-15a, and their expression levels were significantly increased in the HPV-16-positive patients and in FaDu cells expressing HPV-16 E6-E7. We found that HPV-16 E6-E7 appeared to inhibit apoptosis, and to increase cell proliferation, invasion and metastasis. Furthermore, miR-363 and miR-15a were overexpressed in the hypopharyngeal squamous cell carcinoma samples infected with

  13. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  14. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-01-01

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency. PMID:27685112

  15. Brain stem hypoplasia associated with Cri-du-Chat syndrome.

    PubMed

    Hong, Jin Ho; Lee, Ha Young; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu

    2013-01-01

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries. PMID:24265573

  16. Brain Stem Hypoplasia Associated with Cri-du-Chat Syndrome

    PubMed Central

    Hong, Jin Ho; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu

    2013-01-01

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries. PMID:24265573

  17. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  18. Depleted uranium (DU): a holistic consideration of DU and related matters.

    PubMed

    Hamilton, E I

    2001-12-17

    Following the use of depleted uranium (DU) during the Gulf and Balkan conflicts, unnecessary and costly confusion has existed for some 11 years concerning the hazard it constitutes, despite the fact that sufficient data are available to answer most of the relevant questions. In tracing the significance of uranium in the environment and humans, too much reliance is still placed upon the extrapolation of animal data. The existing radiological nomenclature is far too involved and complex to understand, let alone implement. The excellence of early health physics seems to have been lost, and hence there is a failure to utilise the large body of knowledge, and the manner in which it was obtained, in other disciplines. Health physics has failed to understand the nature of some natural processes that ultimately control radiation dose to the environment and humans. Examination of three types of DU, in particular the highly radioactive and potentially hazardous unprocessed, spent-reactor uranium fuel debris (UDU), alluded to as hot particles, has been poorly studied on the basis of scarcity in the environment. Fundamental geological processes are described which illustrate that, as a consequence of routine operation of nuclear reprocessing plants, especially in the past, and following reactor accidents, natural processes can result in an enrichment of DU particles in most types of sediment. Failure to grasp essential geological processes in relation to the dispersion of radionuclides in the environment is detrimental to public acceptance of an essential form of energy in association with others.

  19. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  20. On the Cost of Prioritized Atomic Multicast Protocols

    NASA Astrophysics Data System (ADS)

    Miedes, Emili; Muñoz-Escoí, Francesc D.

    A prioritized atomic multicast protocol allows an application to tag messages with a priority that expresses their urgency and tries to deliver first those with a higher priority. For instance, such a service can be used in a database replication context, to reduce the transaction abort rate when integrity constraints are used. We present a study of the three most important and well-known classes of atomic multicast protocols in which we evaluate the cost imposed by the prioritization mechanisms, in terms of additional latency overhead, computational cost and memory use. This study reveals that the behavior of the protocols depends on the particular properties of the setting (number of nodes, message sending rates, etc.) and that the extra work done by a prioritized protocol does not introduce any additional latency overhead in most of the evaluated settings. This study is also a performance comparison of these classes of total order protocols and can be used by system designers to choose the proper prioritized protocol for a given deployment.

  1. Experimental protocols and preparations to study respiratory long term facilitation

    PubMed Central

    Mateika, Jason H.; Sandhu, Kulraj S.

    2011-01-01

    Respiratory long-term facilitation is a form of neuronal plasticity that is induced following exposure to intermittent hypoxia. Long-term facilitation is characterized by a progressive increase in respiratory motor output during normoxic periods that separate hypoxic episodes and by a sustained elevation in respiratory activity for up to 90 min after exposure to intermittent hypoxia. This phenomenon is associated with increases in phrenic, hypoglossal or carotid sinus nerve inspiratory-modulated discharge. The examination of long-term facilitation has been steadily ongoing for approximately 3 decades. During this period of time a variety of animal models (e.g. cats, rats and humans), experimental preparations and intermittent hypoxia protocols have been used to study long-term facilitation. This review is designed to summarize the strengths and weaknesses of the models, preparations and protocols that have been used to study LTF over the past 30 years. The review is divided into two primary sections. Initially, the models and protocols used to study LTF in animals other than humans will be discussed, followed by a section specifically focused on human studies. Each section will begin with a discussion of various factors that must be considered when selecting an experimental preparation and intermittent hypoxia protocol to examine LTF. Model and protocol design recommendations will follow, with the goal of presenting a prevailing model and protocol that will ultimately ensure standardized comparisons across studies. PMID:21292044

  2. An Evaluation of Protocols for UAV Science Applications

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  3. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  4. Neonatal euthanasia: The Groningen Protocol.

    PubMed

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  5. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. Rosacea: clinical presentation and pathophysiology.

    PubMed

    Diamantis, Stephanie; Waldorf, Heidi A

    2006-01-01

    Acne rosacea is one of the most common diagnoses seen in the clinical dermatologic practice. The classic presentation of rosacea, acneiform papules, and pustules on a background of telangiectasia, is often easily identified by primary care physicians, patients, or their similarly afflicted friends or family members. However, rosacea actually represents a spectrum of disease from chronic skin hypersensitivity and flushing to rhinophyma. Although the pathogenesis of rosacea remains unknown, it is important to understand its various presentations and possible etiologies prior to developing individualized treatment protocols.

  7. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  8. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  9. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care. PMID:17238511

  10. A Wiki Based CT Protocol Management System.

    PubMed

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations.

  11. Le mouvement du pôle

    NASA Astrophysics Data System (ADS)

    Bizouard, Christian

    2012-03-01

    Les variations de la rotation terrestre. En conditionnant à la fois notre vie quotidienne, notre perception du ciel, et bon nombre de phénomènes géophysiques comme la formation des cyclones, la rotation de la Terre se trouve au croisement de plusieurs disciplines. Si le phenomena se faisait uniformément, le sujet serait vite discuté, mais c'est parce que la rotation terrestre varie, même imperceptiblement pour nos sens, dans sa vitesse angulaire comme dans la direction de son axe, qu'elle suscite un grand intérêt. D'abord pour des raisons pratiques : non seulement les aléas de la rotation terrestre modi_ent à la longue les pointés astrométriques à un instant donné de la journée mais in_uencent aussi les mesures opérées par les techniques spatiales ; en consequence l'exploitation de ces mesures, par exemple pour déterminer les orbites des satellites impliqués ou pratiquer le positionnement au sol, nécessite une connaissance précise de ces variations. Plus fondamentalement, elles traduisent les propriétés globales de la Terre comme les processus physiques qui s'y déroulent, si bien qu'en analysant les causes des fluctuations observées, on dispose d'un moyen de mieux connaître notre globe. La découverte progressive des fluctuations de la rotation de la Terre a une longue histoire. Sous l'angle des techniques d'observation, trois époques se pro-celle du pointé astrométrique à l'oeil nu, à l'aide d'instruments en bois ou métalliques (quart de cercle muraux par exemple). À partir du XVIIe siècle débute l'astrométrie télescopique dont les pointés sont complétés par des datations de plus en plus précises grâce à l'invention d'horloges régulées par balancier. Cette deuxième époque se termine vers 1960, avec l'avènement des techniques spatiales : les pointés astrométriques sont délaissés au profit de la mesure ultra-précise de durées ou de fréquences de signaux électromagnétiques, grâce à l'invention des horloges

  12. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent. PMID:27096611

  13. Toward a Standard Protocol for Micelle Simulation.

    PubMed

    Johnston, Michael A; Swope, William C; Jordan, Kirk E; Warren, Patrick B; Noro, Massimo G; Bray, David J; Anderson, Richard L

    2016-07-01

    In this paper, we present protocols for simulating micelles using dissipative particle dynamics (and in principle molecular dynamics) that we expect to be appropriate for computing micelle properties for a wide range of surfactant molecules. The protocols address challenges in equilibrating and sampling, specifically when kinetics can be very different with changes in surfactant concentration, and with minor changes in molecular size and structure, even using the same force field parameters. We demonstrate that detection of equilibrium can be automated and is robust, for the molecules in this study and others we have considered. In order to quantify the degree of sampling obtained during simulations, metrics to assess the degree of molecular exchange among micellar material are presented, and the use of correlation times are prescribed to assess sampling and for statistical uncertainty estimates on the relevant simulation observables. We show that the computational challenges facing the measurement of the critical micelle concentration (CMC) are somewhat different for high and low CMC materials. While a specific choice is not recommended here, we demonstrate that various methods give values that are consistent in terms of trends, even if not numerically equivalent.

  14. Resilient packet ring media access protocol

    NASA Astrophysics Data System (ADS)

    Thepot, Frederic

    2001-07-01

    The discussion will cover the new initiative to create a new MAC layer standard for resilient packet rings: IEEE 802.17 RPR. The key aspects of the presentation will include a preliminary address of the Metro Area Network today and the current networking technologies such as SONET/SDH which are not optimized to carry IP traffic over Metro MAN. The next segment will cover the options which could change the traditional and expensive layered networking model, and address the real benefits of marrying several technologies like Ethernet, SONET/SDH and IP into one technology. The next part of the discussion will detail the technical advantages a new MAC will bring to the services providers. Lastly a summary of the view and strategy about the acceptance and deployment of this new technology in the next 12 months, specifically, now one defines and develops standards for a Resilient Packet Ring Access Protocol for use in Local, Metropolitan, and Wide Area Networks for transfer of data packets at rates scalable to multiple gigabits per second; specifically address the data transmission requirements of carriers that have present and planned fiber optic physical infrastructure in a ring topology; and, defining and developing detailed specifications for using existing and/or new physical layers at appropriate data rates that will support transmission of this access protocol.

  15. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  16. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  17. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  18. Etude des phenomenes dynamiques ultrarapides et des caracteristiques impulsionnelles d'emission terahertz du supraconducteur YBCO

    NASA Astrophysics Data System (ADS)

    Savard, Stephane

    choisi, nous avons mesure les proprietes intrinseques du meme echantillon de YBa2Cu3O7- delta avec la technique pompe-visible et sonde-terahertz donnant, elle aussi, acces aux temps caracteristiques regissant l'evolution hors-equilibre de ce materiau. Dans le meilleur scenario, ces temps caracteristiques devraient correspondre a ceux evalues grace a la modelisation des antennes. Un bon controle des parametres de croissance des couches minces supraconductrices et de fabrication du dispositif nous a permis de realiser des antennes d'emission terahertz possedant d'excellentes caracteristiques en terme de largeur de bande d'emission (typiquement 3 THz) exploitables pour des applications de spectroscopie resolue dans le domaine temporel. Le modele developpe et retenu pour le lissage du spectre terahertz decrit bien les caracteristiques de l'antenne supraconductrice pour tous les parametres d'operation. Toutefois, le lien avec la technique pompe-sonde lors de la comparaison des proprietes intrinseques n'est pas direct malgre que les deux techniques montrent que le temps de relaxation des porteurs augmente pres de la temperature critique. Les donnees en pompe-sonde indiquent que la mesure du temps de relaxation depend de la frequence de la sonde, ce qui complique la correspondance des proprietes intrinseques entre les deux techniques. De meme, le temps de relaxation extrait a partir du spectre de l'antenne terahertz augmente en s'approchant de la temperature critique (T c) de YBa2Cu 3O7-delta. Le comportement en temperature du temps de relaxation correspond a une loi de puissance qui est fonction de l'inverse du gap supraconducteur avec un exposant 5 soit 1/Delta 5(T). Le travail presente dans cette these permet de mieux decrire les caracteristiques des antennes supraconductrices a haute temperature critique et de les relier aux proprietes intrinseques du materiau qui les compose. De plus, cette these presente les parametres a ajuster comme le courant applique, la puissance de

  19. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  20. Impact socio professionnel de la libération chirurgicale du syndrome du canal carpien

    PubMed Central

    Kraiem, Aouatef Mahfoudh; Hnia, Hajer; Bouzgarrou, Lamia; Henchi, Mohamed Adnène; Khalfallah, Taoufik

    2016-01-01

    L’objectif de notre travail était d’étudier les conséquences socioprofessionnelles d’une libération chirurgicale du SCC. Il s’agit d’une étude transversale portant sur les sujets opérés pour un SCC d’origine professionnelle ; recensés dans le Service de Médecine de Travail et de Pathologies Professionnelles au CHU Tahar Sfar de Mahdia en Tunisie sur une période de 8 ans allant du 1 Janvier 2006 au mois Décembre 2013. Le recueil des données s’est basé sur une fiche d’enquête, portant sur la description des caractéristiques socioprofessionnelles, médicales, et sur le devenir professionnel des participants. Pour étudier les contraintes psychosociales au travail, nous avons adopté le questionnaire de Karasek. La durée d’arrêt de travail après libération chirurgicale du SCC était significativement liée à l’existence d’autres troubles musculo-squelettiques autre que le SCC, la déclaration du SCC en maladie professionnelle et à l’ancienneté professionnelle des salariés. Quant au devenir professionnel des salariés opérés, 50,7% ont gardé le même poste, 15,3% ont bénéficié d’un aménagement de poste et 33,8% ont bénéficié d’un changement de poste dans la même entreprise. Le devenir professionnel de ces salariés était corrélé à leurs qualifications professionnelles et au type de l’atteinte sensitive et/ou motrice du nerf médian à l’EMG. Un certain nombre de facteurs non lésionnels déterminaient la durée de l’arrêt de travail, alors que le devenir professionnel des opérés pour SCC dépendait essentiellement de leurs qualifications professionnelles et des données de l’électromyogramme. Il est certain que des travaux beaucoup plus larges permettraient d’affiner encore ces résultats. PMID:27800089

  1. Classification moléculaire du cancer du sein au Maroc

    PubMed Central

    Fouad, Abbass; Yousra, Akasbi; Kaoutar, Znati; Omar, El Mesbahi; Afaf, Amarti; Sanae, Bennis

    2012-01-01

    Introduction La classification moléculaire des cancers du sein basée sur l'expression génique puis sur le profil protéique a permis de distinguer cinq groupes moléculaires: luminal A, luminal B, Her2/neu, basal-like et non-classées. L'objectif de cette étude réalisée au CHU Hassan II de Fès est de classer 335 cancers du sein infiltrant en groupes moléculaires, puis de les corréler avec les caractéristiques clinicopathologiques. Méthodes Etude rétrospective étalée sur 45 mois, comportant 335 patientes colligées au CHU pour le diagnostic et le suivi. Les tumeurs sont analysées histologiquement et classées après une étude immunohistochimique en groupes: luminal A, luminal B, Her2+, basal-like et non-classées. Résultats 54.3% des tumeurs sont du groupe luminal A, 16% luminal B, 11.3% Her2+, 11.3% basal-like et 7% non-classées. Le groupe luminal A renferme le plus faible taux de grade III, d'emboles vasculaires ainsi que de métastases; alors que le groupe des non-classées et basal-like représentent un taux élevé de grade III, une faible proportion d'emboles vasculaires et d'envahissement ganglionnaire. Ces facteurs sont significativement élevés dans les groupes luminal B et Her2+ avec un taux de survie globale de 78% et 76% respectivement. Dans le groupe luminal A, la survie globale des patientes est élevée (87%) alors qu'elle n'est que de 49% dans le groupe des triples négatifs (basal-like et non-classés). Conclusion Le groupe luminal B est différent du luminal A et il est de pronostic péjoratif vis à vis du groupe Her2+. Les caractéristiques clinicopathologiques concordent avec le profil moléculaire donc devraient être pris en considération comme facteurs pronostiques. PMID:23396646

  2. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 33 2012-07-01 2012-07-01 false Protocol. 792.120 Section 792.120 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a)...

  3. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  4. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  5. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 5 2011-04-01 2011-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  6. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  7. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 5 2014-04-01 2014-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  8. New practical treadmill protocol for clinical use.

    PubMed

    Wolthuis, R A; Froelicher, V F; Fischer, J; Noguera, I; Davis, G; Stewart, A J; Triebwasser, J H

    1977-05-01

    A new continuous treadmill protocol (USAFSAM) has been designed using a constant treadmill speed (3.3 miles/hour) and regular equal increments in treadmill grade (5%/3min). The constant treadmill speed requires only initial adaptation in patient stride, reduces technician adjustments and produces less electrocardiographic motion artifact than do protocols using multiple or higher treadmill speeds, or both. The regular equal increments in treadmill grade are easy to implement and provide a larger number of work loads than do protocols that are discontinuous or require larger changes in work load. The USAFSAM protocol was compared with the older Balke-Ware protocol in 26 healthy men (aged 30 to 59 years). Each fasting subject completed two maximal treadmill tests from each protocol. Measurements included minute heart rate from the electrocardiogram, auscultatory blood pressures and oxygen consumption obtained with standard techniques. Similarities in between-protocol measurements for submaximal and maximal treadmill efforts were impressive; differences were small and unimportant. Further, both protocols showed equal reproducibility for the measurements noted. Importantly, time to maximal effort was reduced by 24% with the USAFSAM protocol. The USAFSAM treadmill protocol has since been used in more than 500 clinical and screening examinations, thus confirming its advantages and practicality for routine clinical stress testing. Normal reference values previously established for the Balke-Ware protocol are shown to apply to the new USAFSAM protocol as well. PMID:857630

  9. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 Television Broadcasting Services; Fond du Lac, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this document, the Commission denies a petition...

  10. 1. Historic American Buildings Survey, drawn by Pierre du Simitiere ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Historic American Buildings Survey, drawn by Pierre du Simitiere (papers in Philadelphia Library) DRAWING OF REDWOOD LIBRARY IN 1768. - Redwood Library, 50 Bellevue Avenue, Newport, Newport County, RI

  11. The Cri-Du-Chat Syndrome: A Case Study.

    ERIC Educational Resources Information Center

    Sykes, Stewart C.; Christie, Margarette A.

    1987-01-01

    The developmental history of a 14-year-old girl with Cri-Du-Chat Syndrome (a genetic disorder characterized by a distinctive cry and severe physical and intellectual disabilities) is reported. (Author/DB)

  12. Lymphome primitif du sein: à propos d'un cas

    PubMed Central

    Njoumi, Noureddine; Najih, Mohamed; Haqqi, Laila; Atolou, Gilles; Bougtab, Abdessalm; Hachi, Hafid; Benjelloun, Samir

    2012-01-01

    Le lymphome primitif du sein est une entité histologique très rare du cancer du sein. Les aspects cliniques et radiologiques ne présentent pas de spécificités particulières. Le diagnostic est souvent retardé. Le traitement se base essentiellement sur la chimiothérapie. Le pronostic est globalement péjoratif. Nous rapportons un cas de lymphome malin non Hodgkinien primitif du sein chez une patiente de 38 ans. Parallèlement une revue de la littérature est entreprise évoquant les aspects épidémiologiques, cliniques, histologiques et thérapeutiques de ce néoplasme. PMID:22937198

  13. Difficult‐to‐control asthma management through the use of a specific protocol

    PubMed Central

    Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge

    2010-01-01

    The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219

  14. Two Quantum Protocols for Oblivious Set-member Decision Problem

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-01-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668

  15. Protocols for the In Silico Design of RNA Nanostructures

    NASA Astrophysics Data System (ADS)

    Shapiro, Bruce A.; Bindewald, Eckart; Kasprzak, Wojciech; Yingling, Yaroslava

    Recent developments in the field of nanobiology have significantly expanded the possibilities for new modalities in the treatment of many diseases, including cancer. Ribonucleic acid (RNA) represents a relatively new molecular material for the development of these biologically oriented nanodevices. In addition, RNA nanobiology presents a relatively new approach for the development of RNA-based nanoparticles that can be used as crystallization substrates and scaffolds for RNA-based nanoarrays. Presented in this chapter are some methodological shaped-based protocols for the design of such RNA nanostructures. Included are descriptions and background materials describing protocols that use a database of three-dimensional RNA structure motifs; designed RNA secondary structure motifs; and a combination of the two approaches. An example is also given illustrating one of the protocols.

  16. Two Quantum Protocols for Oblivious Set-member Decision Problem

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  17. Reactive broadcasting protocol for video on demand

    NASA Astrophysics Data System (ADS)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  18. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  19. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  20. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  1. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  2. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  3. Protocolized Resuscitation of Burn Patients.

    PubMed

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  4. National protocol framework for the inventory and monitoring of bees

    USGS Publications Warehouse

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  5. How to design a (good) epidemiological observational study: epidemiological research protocol at a glance.

    PubMed

    Fronteira, Ines

    2013-01-01

    In this article, we propose a general structure for designing a research protocol of an observational epidemiological study. We start by highlighting the importance of the research protocol, namely in accounting for some bias and guaranteeing methodologic rigor and study reproductability. Next, we reflect on some of the essential elements of a research protocol no matter its objective. We further present some specific issues to be included according to the type of study: cross-sectional, case-control and cohort.

  6. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  7. Development and validation of rapid magnetic particle based extraction protocols

    PubMed Central

    2014-01-01

    Background In order to control and eradicate transboundary animal diseases, early diagnosis and reaction is essential for the implementation of control activities. Thus, mobile diagnostic units which allow analytical testing close to the site of occurrence could provide valuable support for centralized laboratories. Consequently, the availability of diagnostic tests using mobile amplification and detection technologies has been increasing over the past years. However, methods enabling rapid and simple nucleic acid extraction also under resource-limited settings are still scarce. Methods In the present study rapid extraction protocols based on magnetic particle technology have been developed. For this purpose, the two open extraction platforms KingFisher™ Duo (Thermo Fisher Scientific) and BioSprint® 15 (Qiagen) as well as the fully automated EZ1® advanced XL instrument (Qiagen) were used. All protocols were validated in comparison to standard manual extraction using blood and serum samples from animals infected with Schmallenberg virus or bovine viral diarrhea virus. Results All newly developed protocols allowed a complete extraction within 30 minutes of time. The fully automated EZ1-extraction yielded the highest reproducibility, whereas slightly higher intra- and inter-assay variations were observed using the open platforms. Compared to the manual procedure, the analytical sensitivity of all the rapid protocols was 1 log10 step reduced for extraction from blood samples. For sera a reduced dynamic range could only be observed using the maximally shortened BioSprint 15 protocol. Validation using clinical samples showed an excellent concordance of all the rapid extraction protocols to the standard manual extraction procedure, independent of sample materials and target viruses. Conclusions The results of this study show that the speed-optimized novel extraction protocols allow rapid and simple nucleic acid extractions for a variety of target viruses without

  8. c-Met inhibitor SU11274 enhances the response of the prostate cancer cell line DU145 to ionizing radiation

    SciTech Connect

    Yu, Hongliang; Li, Xiaoying; Sun, Shaoqian; Gao, Xianshu; Zhou, Demin

    2012-10-26

    Highlights: Black-Right-Pointing-Pointer c-Met inhibition could significantly enhance the radiosensitivity of DU145 cells. Black-Right-Pointing-Pointer The mechanisms of the radiosensitization effect of c-Met inhibition on DU145 cells were also presented in this paper. Black-Right-Pointing-Pointer This is the first study demonstrating the effectiveness of c-Met inhibition on treating HRPC cells with radiotherapy. -- Abstract: Hormone-refractory prostate cancer shows substantial resistance to most conventional therapies including radiotherapy, constitutes a key impediment to curing patients with the disease. c-Met overexpression plays a key role in prostate cancer tumorigenesis and disease progression. Here, we demonstrate that c-Met inhibition by SU11274 could significantly suppress cell survival and proliferation as well as enhance the radiosensitivity of DU145 cells. The underlying mechanisms of the effects of SU11274 on DU145 cells may include the inhibition of c-Met signaling, depolarization of the mitochondrial membrane potential, impairment of DNA repair function, abrogation of cell cycle arrest, and enhancement of cell death. Our study is the first to show the effectiveness of combining c-Met inhibition with ionizing radiation to cure hormone-refractory prostate cancer.

  9. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  10. Protocols for calibrating multibeam sonar.

    PubMed

    Foote, Kenneth G; Chu, Dezhang; Hammar, Terence R; Baldwin, Kenneth C; Mayer, Larry A; Hufnagle, Lawrence C; Jech, J Michael

    2005-04-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University of New Hampshire. Methods for measuring the transfer characteristics of each sonar, with transducers attached, are described and illustrated with measurement results. The principal results, however, are the protocols themselves. These are elaborated for positioning the target, choosing the receiver gain function, quantifying the system stability, mapping the directionality in the plane of the receiving array and in the plane normal to the central axis, measuring the directionality of individual beams, and measuring the nearfield response. General preparations for calibrating multibeam sonars and a method for measuring the receiver response electronically are outlined. Advantages of multibeam sonar calibration and outstanding problems, such as that of validation of the performance of multibeam sonars as configured for use, are mentioned.

  11. A Protocol for Reducing Juvenile Recidivism through Relapse Prevention.

    ERIC Educational Resources Information Center

    Roget, Nancy A.; Fisher, Gary L.; Johnson, Michael L.

    1998-01-01

    The connection between alcohol and other drug use and juvenile crime activities is well established. The source of this connection and specific interventions with juvenile offenders involved in alcohol and drug use is unclear. Reviews existing literature and presents an adolescent-specific relapse-prevention protocol that provides a structure for…

  12. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  13. Performance Analysis of the HTTP Protocol on Geostationary Satellite Links

    NASA Technical Reports Server (NTRS)

    Krus, Hans; Allman, Mark; Griner, Jim; Tran, Diepchi

    1998-01-01

    Various issues associated with HTTP protocol on geostationary satellite links are presented in viewgraph form. Specific topics include: 1) Network reference points; 2) The HTTP 1.0 and 1.1 mechanisms; 3) Experimental setup; 4) TCP and HTTP configuration; 5) Modelling slow start and 6) Results and future work.

  14. An Art Therapy Protocol for the Medical Trauma Setting.

    ERIC Educational Resources Information Center

    Appleton, Valerie E.

    1993-01-01

    Presents art therapy intervention protocol developed for burn trauma unit over 10-year period. Considers research model for assessing artwork and psychosocial transition from trauma, rationales for art therapy in medical settings, and documentation. Case study illustrates ways that art media were used to review, integrate, and express personal…

  15. Variation among Examiners and Protocols on Oral Examinations.

    ERIC Educational Resources Information Center

    Lunz, Mary E.; And Others

    A method for understanding and controlling the multiple facets of an oral examination (OE) or other judge-intermediated examination is presented and illustrated. This study focused on determining the extent to which the facets model (FM) analysis constructs meaningful variables for each facet of an OE involving protocols, examiners, and…

  16. Massive Transfusion Protocol: a local two years' experience.

    PubMed

    Tonglet, M; Minon, J M; Pitance, F; Degesves, S

    2015-01-01

    Evidence supporting the implementation of a Massive Transfusion Protocol (MTP) and its effect on patients' outcome is still limited. However, we implemented in June 2013 a local MTP for trauma and nontrauma massively bleeding patients. Twenty months later, we propose here a short presentation of our MTP population and a critical analysis of the actual data supporting MTP implementation.

  17. Authenticated semi-quantum direct communication protocols using Bell states

    NASA Astrophysics Data System (ADS)

    Luo, Yi-Ping; Hwang, Tzonelih

    2016-02-01

    This study presents the first two authenticated semi-quantum direct communication protocols without using any classical channel. By pre-sharing a master secret key between two communicants, a sender with advanced quantum devices can transmit a secret message to a receiver who can only perform classical operations without any information leakage. The receiver is then capable of verifying the message up to the single-qubit level, i.e., a one-qubit modification of the transmitted quantum sequence can be detected with a probability close to 1. Moreover, the proposed protocols are resistant to several well-known attacks.

  18. [Protocol for the treatment of severe acute pancreatitis with necrosis].

    PubMed

    Barreda, Luis; Targarona, Javier; Rodriguez, César

    2005-01-01

    The Severe Acute Pancreatic Unit of Edgardo Rebagliati Martins National Hospital was officially created in the year 2000. Up to date, we have cared for more than 195 patients with Pancreatic Necrosis. All of them have been treated under a management protocol presented by us. This has helped us to standardize treatment and also to compare results with work groups around the world. This Protocol comes from our own experience and that of our colleagues abroad with a wide knowledge in this kind of pathology abroad, with whom we maintain close ties.

  19. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  20. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  1. RadNet: Open network protocol for radiation data

    SciTech Connect

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-12-31

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

  2. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    PubMed

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space. PMID:27534293

  3. Self-referenced continuous-variable quantum key distribution protocol

    SciTech Connect

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.

  4. Self-referenced continuous-variable quantum key distribution protocol

    DOE PAGES

    Soh, Daniel B. S.; Brif, Constantin; Coles, Patrick J.; Lutkenhaus, Norbert; Camacho, Ryan M.; Urayama, Junji; Sarovar, Mohan

    2015-10-21

    Here, we introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice’s and Bob’s measurement bases. The method of phase estimation and compensation based on the reference pulse measurement can be viewed as a quantum analog of intradyne detection used in classical coherent communication, which extracts the phase information from the modulated signal. We present a proof-of-principle, fiber-based experimental demonstration ofmore » the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of transmitters and receivers, with minimum sacrifice of performance. As such, it provides a pathway towards scalable integrated CV-QKD transceivers, a vital step towards large-scale QKD networks.« less

  5. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  6. Mise à jour sur le nouveau vaccin 9-valent pour la prévention du virus du papillome humain

    PubMed Central

    Yang, David Yi; Bracken, Keyna

    2016-01-01

    Résumé Objectif Informer les médecins de famille quant à l’efficacité, à l’innocuité, aux effets sur la santé publique et à la rentabilité du vaccin 9-valent contre le virus du papillome humain (VPH). Qualité des données Des articles pertinents publiés dans PubMed jusqu’en mai 2015 ont été examinés et analysés. La plupart des données citées sont de niveau I (essais randomisés et contrôlés et méta-analyses) ou de niveau II (études transversales, cas-témoins et épidémiologiques). Des rapports et recommandations du gouvernement sont aussi cités en référence. Message principal Le vaccin 9-valent contre le VPH, qui offre une protection contre les types 6, 11, 16, 18, 31, 33, 45, 52 et 58 du VPH, est sûr et efficace et réduira encore plus l’incidence des infections à VPH, de même que les cas de cancer lié au VPH. Il peut également protéger indirectement les personnes non immunisées par l’entremise du phénomène d’immunité collective. Un programme d’immunisation efficace peut prévenir la plupart des cancers du col de l’utérus. Les analyses montrent que la rentabilité du vaccin 9-valent chez les femmes est comparable à celle du vaccin quadrivalent original contre le VPH (qui protège contre les types 6, 11, 16 et 18 du VPH) en usage à l’heure actuelle. Toutefois, il faut investiguer plus en profondeur l’utilité d’immuniser les garçons avec le vaccin 9-valent contre le VPH. Conclusion en plus d’être sûr, le vaccin 9-valent protège mieux contre le VPH que le vaccin quadrivalent. Une analyse coûtefficacité en favorise l’emploi, du moins chez les adolescentes. Ainsi, les médecins devraient recommander le vaccin 9-valent à leurs patients plutôt que le vaccin quadrivalent contre le VPH.

  7. When Cri du chat syndrome meets Edwards syndrome.

    PubMed

    Xie, Yingjun; Zhou, Yi; Wu, Jianzhu; Sun, Yunxia; Chen, Yongzhen; Chen, Baojiang

    2015-03-01

    It has been well established that the 5p deletion causes Cri du chat syndrome, typically characterized by a cat‑like cry, and that duplication of 18q causes Edwards syndrome; the two are rare genetic abnormalities that separately lead to physical and mental impairments. However, the severity of the clinicopathological characteristics that arise when these two aberrations occur in one patient is unknown. Here, the first case in our knowledge of a single patient (a two‑year‑old female) with 5p partial monosomy and 18q partial trisomy is described. In the present study, chromosome microarray analysis was performed, which identified the imbalance of chromosomes 5 and 18 in the patient. The chromosome aberrations were further confirmed by fluorescence in situ hybridization. By comparing the phenotypes of combined case with those of the individual syndromes, severe clinical phenotypes of the 5p (5p15.33‑p13.3) deletion were confirmed, however, the net effect of the duplication of 18q22.3‑q23 was not determined, as this duplication only appeared to have a weak effect on the patient's phenotypes. The correlation between these chromosomal aberrations and their clinical features has implications for the identification of critical regions of 5p and 18q, particularly for the functional mapping of chromosome 18. PMID:25385231

  8. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  9. Message Protocols for Provisioning and Usage of Computing Services

    NASA Astrophysics Data System (ADS)

    Borissov, Nikolay; Caton, Simon; Rana, Omer; Levine, Aharon

    The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers of computational resources to express their technical and economic preferences using common language protocols. Ultimately, this requires clear, flexible and pragmatic communication protocols and policies for the expression of bids and resulting generation of service level agreements (SLAs). Further standardization efforts in such description languages will foster the specification of common interfaces and matching rules for establishing SLAs. Grid middleware are not compatible with market-orientated resource provisioning. We aim to reduce this gap by defining extensions to a standardized specification such as JSDL. Furthermore, we present a methodology for matchmaking consumer bids and provider offers and map the additional economic attributes into a SLA. We demonstrate the usage of the message protocols in an application scenario.

  10. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  11. A flexible acquisition cycle for incompletely defined fieldbus protocols.

    PubMed

    Gaitan, Vasile-Gheorghita; Gaitan, Nicoleta-Cristina; Ungurean, Ioan

    2014-05-01

    Real time data-acquisition from fieldbuses strongly depends on the network type and protocol used. Currently, there is an impressive number of fieldbuses, some of them are completely defined and others are incompletely defined. In those from the second category, the time variable, the main element in real-time data acquisition, does not appear explicitly. Examples include protocols such as Modbus ASCII/RTU, M-bus, ASCII character-based, and so on. This paper defines a flexible acquisition cycle based on the Master-Slave architecture that can be implemented on a Master station, called a Base Station Gateway (BSG). The BSG can add a timestamp for temporal location of data. It also presents a possible extension for the Modbus protocol, developed as simple and low cost solution based on existing hardware. PMID:24650922

  12. Future directions in packet radio architectures and protocols

    NASA Astrophysics Data System (ADS)

    Shacham, Nachum; Westcott, Jil

    1987-01-01

    The technology of packet switching over multihop, multiple-access channels has evolved to the point at which its protocols can now support internetwork operation of medium-size networks whose nodes possess some degree of mobility. As regards the needs and challenges of the future operating environment, it is clear that these can be met only by enhancing the packet radio architecture and its protocols. Several enhancements that allow the organization of large, dynamic networks that can operate over multiple channels, adapt to varying conditions, and possess self-monitoring and self-control capabilities are discussed. As these areas are examined, the attendant issues and tradeoffs are discussed; in addition, some protocols and information regarding their performance are presented.

  13. A Survey on Clustering Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Liu, Xuxun

    2012-01-01

    The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. Based on network structure, routing protocols in WSNs can be divided into two categories: flat routing and hierarchical or clustering routing. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. In this paper, we present a comprehensive and fine grained survey on clustering routing protocols proposed in the literature for WSNs. We outline the advantages and objectives of clustering for WSNs, and develop a novel taxonomy of WSN clustering routing methods based on complete and detailed clustering attributes. In particular, we systematically analyze a few prominent WSN clustering routing protocols and compare these different approaches according to our taxonomy and several significant metrics. Finally, we summarize and conclude the paper with some future directions. PMID:23112649

  14. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  15. Reporting of planned statistical methods in published surgical randomised trial protocols: a protocol for a methodological systematic review

    PubMed Central

    Madden, Kim; Arseneau, Erika; Evaniew, Nathan; Smith, Christopher S; Thabane, Lehana

    2016-01-01

    Introduction Poor reporting can lead to inadequate presentation of data, confusion regarding research methodology used, selective reporting of results, and other misinformation regarding health research. One of the most recent attempts to improve quality of reporting comes from the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) Group, which makes recommendations for the reporting of protocols. In this report, we present a protocol for a systematic review of published surgical randomised controlled trial (RCT) protocols, with the purpose of assessing the reporting quality and completeness of the statistical aspects. Methods We will include all published protocols of randomised trials that investigate surgical interventions. We will search MEDLINE, EMBASE, and CENTRAL for relevant studies. Author pairs will independently review all titles, abstracts, and full texts identified by the literature search, and extract data using a structured data extraction form. We will extract the following: year of publication, country, sample size, description of study population, description of intervention and control, primary outcome, important methodological qualities, and quality of reporting of planned statistical methods based on the SPIRIT guidelines. Ethics and dissemination The results of this review will demonstrate the quality of statistical reporting of published surgical RCT protocols. This knowledge will inform recommendations to surgeons, researchers, journal editors and peer reviewers, and other knowledge users that focus on common deficiencies in reporting and how to rectify them. Ethics approval for this study is not required. We will disseminate the results of this review in peer-reviewed publications and conference presentations, and at a doctoral independent study of oral defence. PMID:27259528

  16. Regional rainfall-runoff relations for simulation of streamflow for watersheds in Du Page County, Illinois

    USGS Publications Warehouse

    Duncker, James J.; Melching, Charles S.

    1998-01-01

    Rainfall and streamflow data collected from July 1986 through September 1993 were utilized to calibrate and verify a continuous-simulation rainfall-runoff model for three watersheds (11.8--18.0 square miles in area) in Du Page County. Classification of land cover into three categories of pervious (grassland, forest/wetland, and agricultural land) and one category of impervious subareas was sufficient to accurately simulate the rainfall-runoff relations for the three watersheds. Regional parameter sets were obtained by calibrating jointly all parameters except fraction of ground-water inflow that goes to inactive ground water (DEEPFR), interflow recession constant (IRC), and infiltration (INFILT) for runoff from all three watersheds. DEEPFR and IRC varied among the watersheds because of physical differences among the watersheds. Two values of INFILT were obtained: one representing the rainfall-runoff process on the silty and clayey soils on the uplands and lake plains that characterize Sawmill Creek, St. Joseph Creek, and eastern Du Page County; and one representing the rainfall-runoff process on the silty soils on uplands that characterize Kress Creek and parts of western Du Page County. Regional rainfall-runoff relations, defined through joint calibration of the rainfall-runoff model and verified for independent periods, presented in this report, allow estimation of runoff for watersheds in Du Page County with an error in the total water balance less than 4.0 percent; an average absolute error in the annual-flow estimates of 17.1 percent with the error rarely exceeding 25 percent for annual flows; and correlation coefficients and coefficients of model-fit efficiency for monthly flows of at least 87 and 76 percent, respectively. Close reproduction of the runoff-volume duration curves was obtained. A frequency analysis of storm-runoff volume indicates a tendency of the model to undersimulate large storms, which may result from underestimation of the amount of

  17. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  18. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  19. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  20. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2010-09-01

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. König, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from König suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from König requires less noise in storage to achieve security, our “canonical” protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  1. Serial link protocol design: a critique of the X. 25 standard, Level 2

    SciTech Connect

    Fletcher, J.G.

    1983-10-25

    There are certain technical design principles for link communication protocols which, if followed, result in a protocol that is less complex in both concept and implementation, but at the same time provides better service, than if the principles are not followed. These principles include modularization into subprotocols, symmetry between the nodes on the link, and use of the state-exchange model of a conversation rather than the command-response model. The principles are described, the extent to which they are followed by the standard protocol X.25, level 2, is examined, and a protocol adhering to them is presented.

  2. An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    NASA Astrophysics Data System (ADS)

    Li, Feng-Guang; Shi, Jian-Hong

    2015-06-01

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data encryption, it is not suitable for AQS. There are many attacks on AQS using QOTP. In this paper, we propose an AQS protocol based on another encryption scheme called the chained CNOT operations, which encrypts quantum message ensemble. Our protocol preserves all merits in the similar AQS schemes and has better security. Security analysis shows that our protocol cannot be forged and disavowed under the existing attacks.

  3. On the same page--physicist and radiologist perspectives on protocol management and review.

    PubMed

    Szczykutowicz, Timothy P; Siegelman, Jenifer

    2015-08-01

    To sustain compliance with accreditation requirements of the ACR, Joint Commission, and state-specific statutes and regulatory requirements, a CT protocol review committee requires a structure for systematic analysis of protocols. Safe and reproducible practice of CT in a complex environment requires that physician supervision processes and protocols be precisely and clearly presented. This article discusses necessary components for data structure, and a description of an IT-based approach for protocol review based on experiences at 2 academic centers, 3 community hospitals, 1 cancer center, and 2 outpatient clinics. PMID:26065337

  4. Hand Self-Wiping Protocol for the Investigation of Lead Exposure in the Workplace.

    PubMed

    Gorce, Jean-Philippe; Roff, Martin

    2015-01-01

    The purpose of this project was to develop and validate a hand wiping protocol to be used by occupational hygienists, scientists, or other competent persons, measuring skin exposure to lead in workplaces. Inadvertent lead ingestion is likely to occur once the hands of employees have become contaminated. Ideally, a hand wiping protocol should maximize the recovery of lead-based residues present on employees' hands in a cost-effective and reproducible manner. This article describes an effective and practical hand wiping procedure. Here, two standardized protocols (A and B) are designed. Protocol A is a self-wiping protocol requiring employees to wipe their own hands using four separate and successive wipes. Protocol B involves a scientist wiping the hands of employees using four wipes, followed by employees self-wiping their hands using two wipes (total of six wipes). Both protocols are defined by four wipe passes over each hand using Ghost wipes. Because this study took place in the workplace rather than in a simulated laboratory environment, only the relative (i.e., not absolute) removal efficiencies of the hand wiping protocols have been assessed. The two protocols were first evaluated at a double glazing panel manufacturing site where between 248 μg and 4544 μg of lead was found on employees' hands. A statistical analysis (t-test) on the mean relative lead levels recovered in the first parts of the protocols indicated that Protocol A was more efficient than Protocol B (73% for Protocol A vs. 65% for Protocol B). The relative recovery of the combined first two passes against the combined first three passes also confirmed the greater efficiency of Protocol A (83.3% for Protocol A vs. 76.5% for Protocol B). However, lead levels recovered on the fourth pass remain significant at more than 10% of the total recovered loadings. Nonetheless, Protocol A was preferred and further evaluated at a lead battery manufacturing site where between 149 μg and 18,784 μg of

  5. Hand Self-Wiping Protocol for the Investigation of Lead Exposure in the Workplace

    PubMed Central

    Gorce, Jean-Philippe; Roff, Martin

    2015-01-01

    The purpose of this project was to develop and validate a hand wiping protocol to be used by occupational hygienists, scientists, or other competent persons, measuring skin exposure to lead in workplaces. Inadvertent lead ingestion is likely to occur once the hands of employees have become contaminated. Ideally, a hand wiping protocol should maximize the recovery of lead-based residues present on employees’ hands in a cost-effective and reproducible manner. This article describes an effective and practical hand wiping procedure. Here, two standardized protocols (A and B) are designed. Protocol A is a self-wiping protocol requiring employees to wipe their own hands using four separate and successive wipes. Protocol B involves a scientist wiping the hands of employees using four wipes, followed by employees self-wiping their hands using two wipes (total of six wipes). Both protocols are defined by four wipe passes over each hand using Ghost wipes. Because this study took place in the workplace rather than in a simulated laboratory environment, only the relative (i.e., not absolute) removal efficiencies of the hand wiping protocols have been assessed. The two protocols were first evaluated at a double glazing panel manufacturing site where between 248 μg and 4544 μg of lead was found on employees’ hands. A statistical analysis (t-test) on the mean relative lead levels recovered in the first parts of the protocols indicated that Protocol A was more efficient than Protocol B (73% for Protocol A vs. 65% for Protocol B). The relative recovery of the combined first two passes against the combined first three passes also confirmed the greater efficiency of Protocol A (83.3% for Protocol A vs. 76.5% for Protocol B). However, lead levels recovered on the fourth pass remain significant at more than 10% of the total recovered loadings. Nonetheless, Protocol A was preferred and further evaluated at a lead battery manufacturing site where between 149 μg and 18,784

  6. Automatic quality assessment protocol for MRI equipment.

    PubMed

    Bourel, P; Gibon, D; Coste, E; Daanen, V; Rousseau, J

    1999-12-01

    The authors have developed a protocol and software for the quality assessment of MRI equipment with a commercial test object. Automatic image analysis consists of detecting surfaces and objects, defining regions of interest, acquiring reference point coordinates and establishing gray level profiles. Signal-to-noise ratio, image uniformity, geometrical distortion, slice thickness, slice profile, and spatial resolution are checked. The results are periodically analyzed to evaluate possible drifts with time. The measurements are performed weekly on three MRI scanners made by the Siemens Company (VISION 1.5T, EXPERT 1.0T, and OPEN 0.2T). The results obtained for the three scanners over approximately 3.5 years are presented, analyzed, and compared.

  7. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  8. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  9. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  10. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  11. Canine adenovirus downstream processing protocol.

    PubMed

    Puig, Meritxell; Piedra, Jose; Miravet, Susana; Segura, María Mercedes

    2014-01-01

    Adenovirus vectors are efficient gene delivery tools. A major caveat with vectors derived from common human adenovirus serotypes is that most adults are likely to have been exposed to the wild-type virus and exhibit active immunity against the vectors. This preexisting immunity limits their clinical success. Strategies to circumvent this problem include the use of nonhuman adenovirus vectors. Vectors derived from canine adenovirus type 2 (CAV-2) are among the best-studied representatives. CAV-2 vectors are particularly attractive for the treatment of neurodegenerative disorders. In addition, CAV-2 vectors have shown great promise as oncolytic agents in virotherapy approaches and as vectors for recombinant vaccines. The rising interest in CAV-2 vectors calls for the development of scalable GMP compliant production and purification strategies. A detailed protocol describing a complete scalable downstream processing strategy for CAV-2 vectors is reported here. Clarification of CAV-2 particles is achieved by microfiltration. CAV-2 particles are subsequently concentrated and partially purified by ultrafiltration-diafiltration. A Benzonase(®) digestion step is carried out between ultrafiltration and diafiltration operations to eliminate contaminating nucleic acids. Chromatography purification is accomplished in two consecutive steps. CAV-2 particles are first captured and concentrated on a propyl hydrophobic interaction chromatography column followed by a polishing step using DEAE anion exchange monoliths. Using this protocol, high-quality CAV-2 vector preparations containing low levels of contamination with empty viral capsids and other inactive vector forms are typically obtained. The complete process yield was estimated to be 38-45 %. PMID:24132487

  12. Nouvelles approches en theorie du champ moyen dynamique: le cas du pouvoir thermoelectrique et celui de l'effet orbital d'un champ magnetique

    NASA Astrophysics Data System (ADS)

    Arsenault, Louis-Francois

    Les applications reliees a la generation d'energie motivent la recherche de materiaux ayant un fort pouvoir thermoelectrique (S). De plus, S nous renseigne sur certaines proprietes fondamentales des materiaux, comme, par exemple, la transition entre l'etat coherent et incoherent des quasi-particules lorsque la temperature augmente. Empiriquement, la presence de fortes interactions electron-electron peut mener a un pouvoir thermoelectrique geant. Nous avons donc etudie le modele le plus simple qui tient compte de ces fortes interactions, le modele de Hubbard. La theorie du champ moyen dynamique (DMFT) est tout indiquee dans ce cas. Nous nous sommes concentres sur un systeme tridimensionnel (3d) cubique a face centree (fcc), et ce, pour plusieurs raisons. A) Ce type de cristal est tres commun dans la nature. B) La DMFT donne de tres bons resultats en 3d et donc ce choix sert aussi de preuve de principe de la methode. C) Finalement, a cause de la frustration electronique intrinseque au fcc, celui-ci ne presente pas de symetrie particule-trou, ce qui est tres favorable a l'apparition d'une grande valeur de S. Ce travail demontre que lorsque le materiau est un isolant a demi-remplissage a cause des fortes interactions (isolant de Mott), il est possible d'obtenir de grands pouvoirs thermoelectriques en le dopant legerement. C'est un resultat pratique important. Du point de vue methodologique, nous avons montre comment la limite de frequence infinie de S et l'approche dite de Kelvin, qui considere la limite de frequence nulle avant la limite thermodynamique pour S, donnent des estimations fiables de la vraie limite continue (DC) dans les domaines de temperature appropriee. Ces deux approches facilitent grandement les calculs en court-circuit ant la necessite de recourir a de problematiques prolongements analytiques. Nous avons trouve que la methode de calcul a frequence infinie fonctionne bien lorsque les echelles d'energie sont relativement faibles. En d'autres termes

  13. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  14. Layered protocols in voice interaction with computers

    NASA Astrophysics Data System (ADS)

    Taylor, M. M.

    1987-02-01

    The Layered Protocol model for human computer interfaces is described, with special reference to the problems of voice input and output. In a layered protocol, each level passes virtual messages back and forth between human and computer. These virtual messages are realized in the form of interchanges at the level below. The protocol at a level is analogous to the syntax of a sentence, in that it is the method by which the content of a message can be given an agreed interpretation. Each protocol can be designed or evaluated independently of all the others in an interface. The stability of a protocol is determined by its response delays and by the channel capacity of the lower level protocols that support its messages. Sometimes an unstable protocol can be stabilized and speeded by reducing the message rate of the supporting protocols. Users have been observed to do this intuitively. Voice input provides special problems because of the relatively high error probability inherent in the recognizer: errors in other modalities are likely to be due to operator fault. This tends to lead to unwarranted distrust of voice input, and to demands for types of feedback that are probably inappropriate to the level of protocol to which the recognizer is suited. Voice output can be used by the computer to initiate protocols, or to provide a response channel for protocols under conditions where the user's eyes are otherwise occupied. Consideration of protocol demands helps to clarify the requirements for precision in recognition, and for the characteristics of computer responses to voice input; it helps also in judging appropriate conditions for the use of voice output.

  15. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  16. Using Green Star Metrics to Optimize the Greenness of Literature Protocols for Syntheses

    ERIC Educational Resources Information Center

    Duarte, Rita C. C.; Ribeiro, M. Gabriela T. C.; Machado, Adélio A. S. C.

    2015-01-01

    A procedure to improve the greenness of a synthesis, without performing laboratory work, using alternative protocols available in the literature is presented. The greenness evaluation involves the separate assessment of the different steps described in the available protocols--reaction, isolation, and purification--as well as the global process,…

  17. Transport of Internet Protocol traffic over an Ethernet-over-wavelength-division-multiplexing architecture

    NASA Astrophysics Data System (ADS)

    Gilardi, Guido; Pattavina, Achille; Verticale, Giacomo

    2002-08-01

    We present a solution for transport of Internet Protocol (IP) packets over optical networks. The protocol relies heavily on the data link and physical layer of the proposed standard 10-Gbit/s Ethernet. The architecture is able to perform optical multiplexing and forwarding of asynchronous packets such as those generated by classical Ethernet devices.

  18. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  19. Cultural Heritage Documentation and Integrated Geomatics Techniques in AN Educational Context: Case Bois-Du (belgium)

    NASA Astrophysics Data System (ADS)

    Stal, C.; Goossens, R.; Carlier, L.; Debie, J.; Haoudy, K.; Nuttens, T.; De Wulf, A.

    2013-07-01

    maps of the site, including the inside domain of the buildings. Already available aerial photographs are processed to obtain a 3D model of the site and the wider region. In March 2013, the first campaign took place. During this first campaign, a topographical network was set out and a series of detail points were measured for the detailed topographic mapping. The topographical network was well-planned and covers almost the whole site, forming a set of permanently materialized reference points for later measurements. Besides, a large number of ground control points (GCPs) were taken for the 3D reconstruction of the area, based on high resolution airborne imagery. This enables the students to familiarize themselves with photogrammetric principles in a practical exercise. Both the topographic maps and the 3D model fit within the large scale geographic reference map of the Walloon Region. In this contribution, the results of this intensive trans-regional collaboration on the preservation of the sites are presented. This paper will discuss the first deliverables from the project and the advantages for the responsible government, the cultural heritage organisations (Ecomusée du Bois-du-Luc) and the students. The main focus here is on the educational context of the project. Furthermore, future projects on the same site will be discussed.

  20. Data Provenance in Photogrammetry Through Documentation Protocols

    NASA Astrophysics Data System (ADS)

    Carboni, N.; Bruseker, G.; Guillem, A.; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; de Kramer, M.; Ramos Calles, M. M.; Stathopoulou, E. K.; Suma, R.

    2016-06-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogrammetric workflow. We propose this pipeline, with descriptors to track all phases of digital product creation in order to assure data provenance and enable the validation of the operations from an analytic and production perspective. The approach aims to support adopters of the workflow to define procedures with a long term perspective. The conceptual schema we present is founded on an analysis of information and actor exchanges in the digitisation process. The metadata were defined through the synthesis of previous proposals in this area and were tested on a case study. We performed the digitisation of a set of cultural heritage artefacts from an Iron Age burial in Ilmendorf, Germany. The objects were captured and processed using different techniques, including a comparison of different imaging tools and algorithms. This augmented the complexity of the process allowing us to test the flexibility of the schema for documenting complex scenarios. Although we have only presented a photogrammetry digitisation scenario, we claim that our schema is easily applicable to a multitude of 3D documentation processes.

  1. La chirurgie du diaphragme sous aortique

    PubMed Central

    Moutakiallah, Younes; Maaroufi, Ilham; Aithoussa, Mahdi; Bamous, Mehdi; Abdou, Abdessamad; Atmani, Noureddine; Hatim, Abdedaïm; Amahzoune, Brahim; Bekkali, Youssef El; Boulahya, Abdelatif

    2016-01-01

    Le diaphragme sous aortique se caractérise par une certaine latence clinique et une faible morbi-mortalité. La chirurgie reste le traitement de choix malgré un réel risque de récurrence à long terme. Nous rapportons 18 patients opérés entre Avril 1994 et Mars 2011 pour diaphragme sous aortique d’âge moyen de 18,1±9,7 ans avec 11 patients de sexe masculin. Le diaphragme était de nature fibreuse chez 13 patients et fibro-musculaire chez 5 patients. Tous les patients ont été opérés par résection de diaphragme associée à une myectomie, une plastie aortique, une fermeture de communication interventriculaire et une ligature de canal artériel perméable respectivement chez 3, 3, 2 et 2 patients. La Mortalité opératoire était nulle et sans aucun cas de trouble de conduction postopératoire. Le suivi a duré en moyenne 44,3±36,8 mois sans aucun décès tardif. Deux patients ont présenté une récidive de diaphragme qui a nécessité une réopération avec bonne évolution. La tendance actuelle dans la chirurgie du diaphragme se fait vers des interventions précoces et des résections plus extensives. Cependant, le risque de récidive impose une surveillance échographique systématique et rapprochée. PMID:27516830

  2. Albumin activation of urinary amylase as determined with the Du Pont aca.

    PubMed

    Garber, C C; Carey, R N

    1978-04-01

    Protein activation of urinary alpha-amylase (EC 3.2.1.1) activity was observed during an evaluation of the Du Pont aca procedure for the determination of urinary alpha-amylase. This activation effect became constant for urinary albumin concentrations exceeding 1.50 g/liter. It is recommended that urinary alpha-amylase be analyzed with sufficient albumin added to maximize this effect. The aca alpha-amylase procedure is compared to an amyloclastic method for both serum and urine analysis. Expected ranges are presented for the aca method for serum and urinary amylase, amylase clearance, and the amylase clearance/creatinine clearance ratio.

  3. A case of recurrent facial pain associated with a Pourfour du Petit syndrome: a new entity?

    PubMed

    Collongues, Nicolas; Labouret, Pascale; Speeg, Claude; de Seze, Jérôme

    2014-02-01

    We report the case of a 38-year-old woman with a history of migraine who experienced an association of recurrent unilateral facial pain and Pourfour du Petit syndrome. The episodes occurred for between a few seconds and up to 3 minutes up to 6 times a day mimicking short-lasting unilateral neuralgiform headaches with cranial autonomic symptoms. No lesional cause was found and the use of topiramate led to a nearly complete disappearance of the episodes. This new entity raises the question of a novel autonomic dysfunction in short-lasting unilateral neuralgiform headaches with cranial autonomic symptoms or an unexpected presentation of migraine.

  4. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  5. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  6. Processus mis en jeu dans l'evolution morpho-dynamique de Roberts Bank (Delta du Fraser): Observation et modelisation hydrodynamiques et sedimentaires

    NASA Astrophysics Data System (ADS)

    Meule, Samuel

    Roberts Bank couvre le delta intertidal entre le bras principal du fleuve Fraser et la pointe du Cap Roberts en Colombie Britannique, Canada. Sous la pression du developpement urbain et la modification du regime sedimentaire, cette plage de sable fin est soumise a une erosion significative. L'identification des forces hydrodynamiques, leur importance et leur interaction permettent de determiner les zones de transport, et donc la stabilite de Roberts Bank. Deux periodes de mesures associees a des phases de modelisation de la houle et des courants ont ete effectuees lors de ce travail. La premiere periode de mesure, entre le 29 juin et le 8 juillet 2001, a permis l'identification de processus hydrodynamiques et sedimentaires associes aux forts courants de maree presents le long de Roberts Bank. La seconde phase de mesure, entre le 1er mars et le 26 mars 2002, a permis d'etudier les processus de remise en suspension associes a la houle. Des phases de modelisation ont ete menees a partir des connaissances acquises sur le terrain, afin d'affiner la comprehension des processus sedimentaires et notamment les interactions houle - courant - sediment. Les mecanismes, mis en evidence dans cette etude, participent au faconnage de Roberts Bank, contribuent a son erosion et a la mise en place de nouvelles structures sedimentaires. Les courants de flot de maree vont initier la creation de nuages de resuspension de sediment depuis le fond. En eau peu profonde, la composante " onshore" du courant de maree induit un transport a la cote, tandis qu'en eau plus profonde une faible composante " offshore" du courant peut favoriser un transport au large le long de la pente. Les chenaux, les dunes subaquatiques et les surfaces d'erosion affleurantes fournissent une rugosite de fond suffisante a la generation de turbulence et donc de nuages de sediment en suspension. Lors de la maree de jusant, les sediments resuspendus en eau peu profonde, sont transportes vers le large a partir d

  7. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  8. Les rivières et les sources de la Plaine du Cul-de-Sac: extrait du rapport sur les eaux souterraines de la Plaine du Cul-de-Sac

    USGS Publications Warehouse

    Taylor, George C.; Lemoine, Rémy C.

    1949-01-01

    Les principales rivières de la Plaine du Cul-de-Sac, la Rivière Grise ou Grande Rivière du Cul-de-Sac et la Rivière Blanche, prennent naissance sur le flanc Nord du Massif de la Selle à des altitudes de 1,300 à 1,800 mètres au dessus du niveau de la mer. Elles coulent à l’amont à travers des gorges profondes et sont éloignées de 9 Kms. dans la partie central de la bordure Sud de la plaine.

  9. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  10. Du pont ''Freon'' helps tap geothermal wells for power

    SciTech Connect

    Not Available

    1984-07-01

    Low-grade heat from geothermal wells can now be harnessed to produce electricity by using Du Pont ''Freon'' IF as the power conversion fluid. The new system was developed by Turbonetics Energy Inc. The company's Organic Rankine Cycle (ORC) system takes advantage of the low boiling point (117F) of Du Pont ''Freon'' TF. Geothermal energy is harnessed by utilizing the heat from 200F to 400F water to vaporize the ''Freon'' power fluid. Then the fluid expands through a turbine and drives a generator. The system can produce from 600 kW of electric power.

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to 21 U.S.C. 355(i) and 21 CFR 130.3, I, (Name and Address of IND Sponsor) submitted a Notice of... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  12. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  13. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  14. Open commit protocols tolerating commission failures

    SciTech Connect

    Rothermel, K.; Pappe, S. )

    1993-06-01

    To ensure atomicity of transactions in disturbed systems so-called 2-phase commit (2PC) protocols have been proposed. The basic assumption of these protocols is that the processing nodes involved in transactions are [open quotes]sane,[close quotes] i.e., they only fail with omission failures, and nodes eventually recover from failures. Unfortunately, this assumption is not realistic for so-called Open Distributed Systems (ODSs), in which nodes may have totally different reliability characteristics. In ODSs, nodes can be classified into trusted nodes (e.g., a banking server) and nontrusted nodes (e.g., a home PC requesting a remote banking service). While trusted nodes are assumed to be sane, nontrusted nodes may fail permanently and even cause commission failures to occur. In this paper, we propose a family of 2PC protocols that tolerate any number of omission failures at trusted nodes and any number of commission and omission failures at nontrusted nodes. The proposed protocols ensure that (at least) the trusted nodes participating in a transaction eventually terminate the transaction in a consistent manner. Unlike Byzantine commit protocols, our protocols do not incorporate mechanisms for achieving Byzantine agreement, which has advantages in terms of complexity: Our protocols have the same or only a slightly higher message complexity than traditional 2PC protocols. 31 refs., 10 figs., 3 tabs.

  15. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  16. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food... duration of the project. (v) Location where the research will be conducted. (vi) Statement of the security... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  17. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food... duration of the project. (v) Location where the research will be conducted. (vi) Statement of the security... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to,...

  18. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  19. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  20. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  1. Massive transfusion and massive transfusion protocol.

    PubMed

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-09-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion.

  2. Baisse du HDL-cholestérol indicateur du stress oxydatif dans le diabète de type 2

    PubMed Central

    Kabamba, Arsène Tshikongo; Bakari, Salvius Amuri; Longanga, Albert Otshudi; Lukumwena, Zet Kalala

    2014-01-01

    L'hypercholestérolémie est étroitement liée au stress oxydatif. Lorsqu'il y a trop de cholestérol qui circule dans le sang, il n'est pas utilisé en totalité par les cellules et il risque de s'accumuler dans les vaisseaux sanguins. Cela peut entrainer la formation des plaques d'athérosclérose qui gênent la circulation sanguine et provoquent des accidents cardiovasculaires. Le stress oxydatif apparait très tôt dans l'histoire des complications du diabète de type 2, et est lié à l'oxydation du glucose mais aussi à la peroxydation lipidique. Le cholestérol-HDL est un marqueur important du stress oxydatif par sa capacité à faciliter la métabolisation du cholestérol, sa baisse est souvent considérée comme la source de beaucoup d'inquiétudes. L'objectif est l’évaluation de la variation du taux de cholestérol-HDL, marqueur du stress oxydatif, chez les patients diabétiques de type 2 dans la population congolaise. Nous avons inclus dans cette étude prospective des cas témoins des patients diabétiques de type 2 reconnus et diagnostiqués, et des témoins non diabétiques appariés selon l’âge et le sexe. Parallèlement au bilan biologique classique, une analyse d'un des facteurs de risque du stress oxydatif a été réalisée: baisse de HDL-Cholestérol. L’âge moyen des 30 patients diabétiques (47,77±10,78 ans) était comparable à celui des 30 témoins (48,83±10,73 ans). Une baisse significative du cholestérol-HDL dans le sang était observée chez 100% des diabétiques et 50% des témoins (p=0,0000). L'augmentation du HDL cholestérol permet d’éliminer le mauvais cholestérol en excès en nettoyant les tissus et en ramenant le cholestérol vers le foie. Lors du diabète de type 2 on constate une baisse sanguine sensible du taux de HDL-cholestérol, qui est signe indicateur du stress oxydatif. PMID:25767660

  3. Influence du chrome et du niobium sur l'équilibre α-γ dans les aluminiures de titane

    NASA Astrophysics Data System (ADS)

    Daloz, D.; Hazotte, A.; Lacaze, J.; Charpentier, M.

    2004-12-01

    L’influence du chrome et du niobium sur les transformations et équilibres de phases des aluminiures de titane dans le domaine biphasé a/g est étudiée par analyse thermique différentielle, dilatomètrie, et métallographie quantitative après traitements thermiques suivis de trempe. Les compositions et les taux de phases à l’équilibre sont déterminés pour différentes températures du domaine biphasé a/g. Les résultats sont comparés aux calculs thermodynamiques réalisés à l’aide d’une banque de données relative aux intermétalliques de base Ti-Al.

  4. [Major advances in oncology in 2014: the editorial board of the Bulletin du Cancer point of view].

    PubMed

    Massard, Christophe; Bay, Jacques-Olivier; André, Thierry; Blay, Jean-Yves; Goncalves, Anthony; Orbach, Daniel; Wislez, Marie; Thariat, Juliette; Magné, Nicolas; Vignot, Stéphane

    2015-01-01

    Results of many clinical trials are presented each year during the American Society of Clinical Oncology meeting, ESMO meeting and other international major meetings. This article is proposed by the editorial board of the Bulletin du Cancer as a synthesis of new important results in clinical trials concerning cancer patients treated for hematology cancer or solid tumors. The goal of this review is to highlight the main results that may have an immediate impact on our clinical practices for physicians and patients.

  5. Ocean fertilization, carbon credits and the Kyoto Protocol

    NASA Astrophysics Data System (ADS)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  6. Fiber Laser Component Testing for Space Qualification Protocol Development

    NASA Astrophysics Data System (ADS)

    Falvey, S.; Buelow, M.; Nelson, B.; Starcher, Y.; Thienel, L.; Rhodes, C.; Tull, Jackson; Drape, T.; Westfall, C.

    qualification of each of these all the way to the system level. As a result of the current effort, a validated protocol was developed for the space qualification of DPFLs, where validation via selected tests was mostly limited to the component level. It was the mission of this effort to validate selected aspects of the protocol with the limited set of tests proposed. The results of the environmental testing as well as lessons learned for space qualification of DPFL components are presented in this paper.

  7. Accuracy of NHANES periodontal examination protocols.

    PubMed

    Eke, P I; Thornton-Evans, G O; Wei, L; Borgnakke, W S; Dye, B A

    2010-11-01

    This study evaluates the accuracy of periodontitis prevalence determined by the National Health and Nutrition Examination Survey (NHANES) partial-mouth periodontal examination protocols. True periodontitis prevalence was determined in a new convenience sample of 454 adults ≥ 35 years old, by a full-mouth "gold standard" periodontal examination. This actual prevalence was compared with prevalence resulting from analysis of the data according to the protocols of NHANES III and NHANES 2001-2004, respectively. Both NHANES protocols substantially underestimated the prevalence of periodontitis by 50% or more, depending on the periodontitis case definition used, and thus performed below threshold levels for moderate-to-high levels of validity for surveillance. Adding measurements from lingual or interproximal sites to the NHANES 2001-2004 protocol did not improve the accuracy sufficiently to reach acceptable sensitivity thresholds. These findings suggest that NHANES protocols produce high levels of misclassification of periodontitis cases and thus have low validity for surveillance and research.

  8. Security Weaknesses in Arbitrated Quantum Signature Protocols

    NASA Astrophysics Data System (ADS)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  9. The EXACT description of biomedical protocols

    PubMed Central

    Soldatova, Larisa N.; Aubrey, Wayne; King, Ross D.; Clare, Amanda

    2008-01-01

    Motivation: Many published manuscripts contain experiment protocols which are poorly described or deficient in information. This means that the published results are very hard or impossible to repeat. This problem is being made worse by the increasing complexity of high-throughput/automated methods. There is therefore a growing need to represent experiment protocols in an efficient and unambiguous way. Results: We have developed the Experiment ACTions (EXACT) ontology as the basis of a method of representing biological laboratory protocols. We provide example protocols that have been formalized using EXACT, and demonstrate the advantages and opportunities created by using this formalization. We argue that the use of EXACT will result in the publication of protocols with increased clarity and usefulness to the scientific community. Availability: The ontology, examples and code can be downloaded from http://www.aber.ac.uk/compsci/Research/bio/dss/EXACT/ Contact: Larisa Soldatova lss@aber.ac.uk PMID:18586727

  10. Le traitement conservateur du cancer du sein: expérience d'une équipe tunisienne

    PubMed Central

    Dimassi, Kaouther; Gharsa, Anissa; Chanoufi, Mohammed Badis; Sfar, Ezzeddine; Chelli, Dalenda

    2014-01-01

    En Tunisie, le cancer du sein touche des femmes jeunes avec une taille moyenne au moment du diagnostic à 5 cm. Ces particularités font que la chirurgie radicale reste prédominante. Nous présentons dans ce travail l'expérience de notre équipe en matière de chirurgie conservatrice du cancer du sein. Le but de ce travail est d’évaluer les résultats de ce traitement. Etude rétrospective longitudinale, sur une période de 75 mois. Nous avons inclus toutes les patientes ayant bénéficié d'un traitement conservateur pour une tumeur maligne du sein. Ont été analysés: les caractéristiques épidémiologiques, les aspects radiologiques et histologiques. Le suivi des malades s'est basé sur la détection des récidives. Nous avons évalué le résultat esthétique à la fin de la radiothérapie. Le traitement conservateur a été réalisé dans 23.8% des cas. Le taux de récidives locales était de 6.8% avec une corrélation significative pour une taille tumorale > 30 mm (p= 0.009), l'association d'une composante intracanalaire (p= 0.035), le statut triple négatif (p= 0.003) et des marges d'exérèse < 5mm sans recoupes per-opératoires (p = 0.045). Les facteurs suivants étaient significativement liés au risque de survenue de métastases à distance: le statut triple négatif (p= 0.003), taille tumorale > 30mm (p = 0.006) et l'atteinte ganglionnaire (p = 0.001). Le résultat esthétique était satisfaisant dans 90% des cas. L'augmentation du nombre de patientes pouvant bénéficier d'une chirurgie conservatrice, doit passer impérativement par le développement et la promotion du diagnostic précoce et du dépistage par la mammographie. PMID:25810795

  11. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  12. Protocol for sampling environmental sites for legionellae

    SciTech Connect

    Barbaree, J.M.; Gorman, G.W.; Martin, W.T.; Fields, B.S.; Morrill, W.E.

    1987-07-01

    A protocol for sampling environmental sites was developed and used to identify possible sources of Legionella species in support of epidemiologic investigations at two hospitals. In hospital A, legionellae were isolated from 43 of 106 (40%) different sites. Three separate Legionella pneumophila serotypes and a previously unrecognized species were present in different combinations in the positive samples. Two of five cooling towers contained the same L. pneumophila serogroup 1 monoclonal type (1,2,4,5) as was isolated from patients. The same monoclonal type was also isolated from make-up water for the two cooling towers, a hot water tank, water separators in four main air compressor systems for respiratory therapy, and cold and hot water faucets. In hospital B, 13 of 37 (38%) sample sites contained legionellae, all of which were L. pneumophila serogroup 1. The monoclonal type matching isolates from patients (1,2,4,5) was found at the highest concentration in a hot water tank, but it was also present at four other sample sites. Since legionellae not related to disease may be found in many of the sites sampled, an epidemiologic association with the probable source should be established before intervention methods, such as disinfection, are undertaken.

  13. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  14. Physiological responses to simulated firefighter exercise protocols in varying environments.

    PubMed

    Horn, Gavin P; Kesler, Richard M; Motl, Robert W; Hsiao-Wecksler, Elizabeth T; Klaren, Rachel E; Ensari, Ipek; Petrucci, Matthew N; Fernhall, Bo; Rosengren, Karl S

    2015-01-01

    For decades, research to quantify the effects of firefighting activities and personal protective equipment on physiology and biomechanics has been conducted in a variety of testing environments. It is unknown if these different environments provide similar information and comparable responses. A novel Firefighting Activities Station, which simulates four common fireground tasks, is presented for use with an environmental chamber in a controlled laboratory setting. Nineteen firefighters completed three different exercise protocols following common research practices. Simulated firefighting activities conducted in an environmental chamber or live-fire structures elicited similar physiological responses (max heart rate: 190.1 vs 188.0 bpm, core temperature response: 0.047°C/min vs 0.043°C/min) and accelerometry counts. However, the response to a treadmill protocol commonly used in laboratory settings resulted in significantly lower heart rate (178.4 vs 188.0 bpm), core temperature response (0.037°C/min vs 0.043°C/min) and physical activity counts compared with firefighting activities in the burn building. Practitioner Summary: We introduce a new approach for simulating realistic firefighting activities in a controlled laboratory environment for ergonomics assessment of fire service equipment and personnel. Physiological responses to this proposed protocol more closely replicate those from live-fire activities than a traditional treadmill protocol and are simple to replicate and standardise.

  15. Testing warning messages on smokers’ cigarette packages: A standardized protocol

    PubMed Central

    Brewer, Noel T.; Hall, Marissa G.; Lee, Joseph G. L.; Peebles, Kathryn; Noar, Seth M.; Ribisl, Kurt M.

    2015-01-01

    Purpose Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers’ own packs. Methods We tested a cigarette pack labeling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers’ cigarette packs. Results Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<.05). Conclusion Our findings suggest a feasible pack labeling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers’ cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomized controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labeling policy. PMID:25564282

  16. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    PubMed Central

    Sigilião, Lara Carvalho Freitas; Marquezan, Mariana; Elias, Carlos Nelson; Ruellas, Antônio Carlos; Sant'Anna, Eduardo Franzotti

    2015-01-01

    Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding. Methods: A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L), 12-blade bur at high speed (G12H), 30-blade bur at low speed (G30L), DU10CO ORTHO polisher (GDU), Renew System (GR) and Diagloss polisher (GD). Mean roughness (Ra) and mean roughness depth (Rz) of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz) were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM). Results: In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05) was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz); Ra and (∆Ra, ∆Rz); Rz (r = - 0.445, r = - 0.475, p < 0.01). Conclusion: All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness. PMID:26560825

  17. Évolution nycthémérale des composantes biochimiques du phytoplancton de la retenue du barrage Idriss premier (Fès, Maroc)

    NASA Astrophysics Data System (ADS)

    Bahhou, J.; Alaoui Mhamdi, M.

    1999-03-01

    The diel changes of the biochemical composition of the phytoplankton were studied in the Idriss first reservoir (located on the Inaouen river at thirty Km from the city of Fes, Morrocco) during September 1994. Several biomass and metabolic indicators (proteins, carbohydrates, lipids, chlorophyll a and primary production) were assessed every fourth hour over tow days (7, 8 and 9 September). Since the Protein/Carbohydrates ratio (P/C) is largely recognised as a good integrator of the metabolic functions of the cells, we examined its distribution pattern concomitantly with aforementioned parameters. The results demonstrated enhanced P/C ratios clearly indicating that nutrients were sufficiently available for growth. In addition, this index showed a diel significant variation with levels higher in the night than in the day. Moreover, these results suggest that phytoplankton species during the night used the day-synthesised carbohydrates to insure the cell metabolic functioning. The P/C presents relatively high values in proposition to the ones that have been recorded in temperate regions, and seems to be related to azotic inputs of the Inaouen river. Dans le but de parfaire nos connaissances sur le fonctionnement du sous écosystème phytoplancton, nous nous sommes intéressés à étudier son cycle nycthéméral et son métabolisme cellulaire dans la retenue du barrage Idriss premier. Cette dernière, construite sur l'Oued Inaouène, est située à une trentaine de Km de la ville de Fès. Au cours de ce cycle, les prélèvements ont été effectués selon une séquence temporelle de 4 heures pendant 48 heures, les 7, 8 et 9 septembre 1994. L'étude de l'évolution des composantes biochimiques des cellules phytoplanctoniques à savoir les protéines, les glucides et les lipides a permis de mettre en évidence des variations nycthémérales importantes. Ces variations sont d'autant plus importantes que les variations spatiales observées entre les profondeurs. De plus

  18. Evolution des quasiparticules nodales du cuprate supraconducteur YBa2Cu3Oy en conductivite thermique

    NASA Astrophysics Data System (ADS)

    Rene de Cotret, Samuel

    Ce memoire presente des mesures de conductivite thermique sur les supraconducteurs YBCO et Tl-2201 afin de statuer sur la presence possible d'un point critique quantique (QCP) dans le diagramme de phase de cuprates. Ce point critique quantique serait a l'origine de la reconstruction de la surface de Fermi, d'un large cylindre de trous en de petites poches de trous et d'electrons. La conductivite thermique dans le regime T → 0 permet d'extraire une quantite purement electronique liee aux vitesses de Fermi et du gap, au noeud. Une discontinuite dans cette quantite pourrait signaler la traversee du dopage critique qui reconstruit la surface de Fermi. Plusieurs sondes experimentales distinguent une transition de phase ou un crossover a T* a temperature finie. D'autres sondes mettent en evidence une transition de phase sous l'effet d'un champ magnetique. La presence ou non de cet ordre, a temperature et champ magnetique nul questionne la communaute depuis plusieurs annees. Dans cette etude, nous detectons une variation brusque de kappa0/T a p = 0.18 dans YBCO et a p = 0.20 dans Tl-2201. Ces sauts sont interpretes comme un signe de la transition a temperature nulle et sont en faveur d'un QCP. Le manque de donnees d'un meme materiau a ces dopages ne permet pas de valider hors de tout doute l'existence d'un point critique quantique. Le modele theorique YRZ decrit aussi bien les donnees de conductivite thermique. Des pistes de travaux experimentaux a poursuivre sont proposees pour determiner la presence ou non du QCP de facon franche. Mots-cles : Supraconducteurs, cuprates, conductivite thermique, point critique quantique.

  19. Consonants in Cri du Chat Syndrome: A Case Study

    ERIC Educational Resources Information Center

    Kristoffersen, Kristian Emil

    2008-01-01

    This article reports on a longitudinal case study of consonant productions in one Norwegian girl with Cri du chat syndrome from age 4;6 to age 9;4. It was shown that she had many articulation errors throughout the period of observation. Furthermore, these errors were shown to fall into three main categories: (1) errors of differentiation and…

  20. College of DuPage Administrative Internship Program.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL.

    This paper describes the objectives, policies, and procedures of the College of DuPage's Administrative Internship Program, whereby faculty members can gain broad administrative experience in key administrative areas of the college. The program seeks not only to broaden the experience of the individual intern, but to promote empathy among faculty…

  1. W. E. B. Du Bois: Reform, Will, and the Veil

    ERIC Educational Resources Information Center

    England, Lynn; Warner, W. Keith

    2013-01-01

    While W. E. B. Du Bois is widely recognized for his contributions to the sociology of race, his contributions to the foundations of sociology are largely ignored. His sociology is based on African American reformism, a version of pragmatism, and a contingent historicism. The basic view of sociology is one that emphasizes the role of chance and…

  2. The first Pic du Midi photographs of Mars, 1909

    NASA Astrophysics Data System (ADS)

    Dollfus, A.

    2010-08-01

    This short paper comprises an English translation of the article '1909; Premieres photographies de Mars au Pic du Midi', by Audouin Dollfus, published in l'Astronomie, 2009 November, pp. 27-30, and printed here with the assistance of the Director of the BAA Mars Section, Dr Richard McKim.

  3. College of DuPage Institutional Portrait, 1999-2000.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL. Office of Research and Planning.

    This report profiles the College of DuPage (Illinois) and provides a quick reference regarding the institution. It contains information on facilities and land, finance, staff, college/student services, the Library, athletics, academic calendars, maps, and instructional programs. This report reflects the college structure as of September 1999 and…

  4. Per-packet reservation MAC protocols

    NASA Astrophysics Data System (ADS)

    Hrasnica, Halid

    2006-10-01

    Recent and future communications networks have to provide QoS guarantees for a rapidly growing number of various telecommunications services. Therefore, various communications systems, such as wireless and fixed access networks, apply reservation MAC protocols, providing a good network utilization, which is particularly important access networks with typically limited data rates, and ensuring realization of different QoS guarantees for various telecommunications services. This is important because of a hard competition among communications technologies applied in the access area. The considered MAC protocols apply a per-packet reservation method to avoid the transmission gaps caused by per-burst reservation, and accordingly to achieve a better network utilization. However, the per-packet reservation increases the network load caused by the signaling, which calls for an efficient resource sharing strategy in the signaling channel. There are two basic solutions for capacity sharing in the signaling channel: random access, usually using slotted ALOHA, and dedicated access, realized by a polling method. Performance improvement of basic protocols can be carried out in different ways; by protocol extensions, a combination of different protocol solutions, and the application of adaptive protocols providing a change of access parameters according to the current network status. The best network performance is achieved by application of two-step reservation protocol, which combined with additional features, such as appropriate signaling procedure, priority and fairness mechanisms, and combined reservation domains, can fulfill requirements of services with high QoS demands.

  5. New logistics protocols for distributed interactive simulation

    NASA Astrophysics Data System (ADS)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  6. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  7. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  8. DuSable High School Internet Project and its influence in connecting Chicago Public Schools to the Internet

    NASA Astrophysics Data System (ADS)

    York, D. G.; Mac Low, M. M.; Brown, B.; Franco, L. M.; Rebull, L. M.; Graziani, C.; Lauroesch, J.

    1998-05-01

    Jean Baptiste Point DuSable High School is a public school in inner city Chicago with a 100% African American student population, over 90% of which live below the poverty limit. In 1995, in partnership with the University of Chicago they applied to NASA's IDEAS program for seed money to bring the Internet to the school via a dedicated T1 connection. We will present the detailed successes and failures of this project. While several aspects did not work out as well as expected, in the long term the project did provide important guidance for a more sucessful involvement in 12 additional public schools in the same social situation. In these more recent involvements we have been able to provide more consistent and continued support than was possible at DuSable High School.

  9. Performance evaluation of TCP over ABT protocols

    NASA Astrophysics Data System (ADS)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  10. La genèse du concept de champ quantique

    NASA Astrophysics Data System (ADS)

    Darrigol, O.

    This is a historical study of the roots of a concept which has proved to be essential in modern particle physics : the concept of quantum field. The first steps were accomplished by two young theoreticians : Pascual Jordan quantized the free electromagnetic field in 1925 by means of the formal rules of the just discovered matrix mechanics, and Paul Dirac quantized the whole system charges + field in 1927. Using Dirac's equation for electrons (1928) and Jordan's idea of quantized matter waves (second quantization), Werner Heisenberg and Wolfgang Pauli provided in 1929-1930 an extension of Dirac's radiation theory and the proof of its relativistic invariance. Meanwhile Enrico Fermi discovered independently a more elegant and pedagogical formulation. To appreciate the degree of historical necessity of the quantization of fields, and the value of contemporaneous critics to this approach, it was necessary to investigate some of the history of the old radiation theory. We present the various arguments however provisional or naïve or wrong they could be in retrospect. So we hope to contribute to a more vivid picture of notions which, once deprived of their historical setting, might seem abstruse to the modern user. Nous présentons une étude historique des origines d'un concept devenu essentiel dans la physique moderne des particules : le concept de champ quantique. Deux jeunes théoriciens franchirent les premières étapes : Pascual Jordan quantifia le champ électromagnétique en 1925 grâce aux règles formelles de la mécanique des matrices naissante, et Paul Dirac quantifia le système complet charges + champ en 1927. Au moyen de l'équation de l'électron de Dirac (1928) et de l'idée de Jordan d'ondes de matière quantifiées (deuxième quantification), Werner Heisenberg et Wolfgang Pauli donnèrent en 1929-1930 une extension de la théorie du rayonnement de Dirac et la preuve de son invariance relativiste. Pendant ce temps Enrico Fermi découvrit ind

  11. Mandible condylar hyperplasia: a review of diagnosis and treatment protocol.

    PubMed

    Olate, Sergio; Netto, Henrique Duque; Rodriguez-Chessa, Jaime; Alister, Juan Pablo; de Albergaria-Barbosa, Jose; de Moraes, Márcio

    2013-01-01

    Condylar hyperplasia (CH) is a bone disease characterized by the increased development of one mandibular condyle. It regularly presents as an active growth with facial asymmetry generally without pain. Statistically it affects more women in adolescence, although it does not discriminate by age or gender. Its best-known consequence is asymmetric facial deformity (AFD), which combined with alteration of the dental occlusion with unilateral crossbite or open bite. It is not known when CH begins and how long it lasts; diagnostic examinations are described and are efficient in some research about diagnosis. Protocol treatment is not well studie and depends on the criteria described in this paper. The aim of this research is to provide up-to-date information about the diagnosis of this disease and to analyze the treatment protocol, visualizing the CH and AFD presented. PMID:24179565

  12. Mandible condylar hyperplasia: a review of diagnosis and treatment protocol

    PubMed Central

    Olate, Sergio; Netto, Henrique Duque; Rodriguez-Chessa, Jaime; Alister, Juan Pablo; de Albergaria-Barbosa, Jose; de Moraes, Márcio

    2013-01-01

    Condylar hyperplasia (CH) is a bone disease characterized by the increased development of one mandibular condyle. It regularly presents as an active growth with facial asymmetry generally without pain. Statistically it affects more women in adolescence, although it does not discriminate by age or gender. Its best-known consequence is asymmetric facial deformity (AFD), which combined with alteration of the dental occlusion with unilateral crossbite or open bite. It is not known when CH begins and how long it lasts; diagnostic examinations are described and are efficient in some research about diagnosis. Protocol treatment is not well studie and depends on the criteria described in this paper. The aim of this research is to provide up-to-date information about the diagnosis of this disease and to analyze the treatment protocol, visualizing the CH and AFD presented. PMID:24179565

  13. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  14. Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks

    NASA Astrophysics Data System (ADS)

    Wu, Tsu-Yang; Tseng, Yuh-Min

    In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.

  15. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  16. [MRI of the prostate: optimization of imaging protocols].

    PubMed

    Rouvière, O

    2006-02-01

    This article details the imaging protocols for prostate MRI and the influence on image quality of each particular setting: type of coils to be used (endorectal or external phased-array coils?), patient preparation, type of sequences, spatial resolution parameters. The principle and technical constraints of dynamic contrast-enhanced MRI are also presented, as well as the predictable changes due to the introduction of high-field strength (3T) scanners.

  17. Achieving the Holevo bound via a bisection decoding protocol

    NASA Astrophysics Data System (ADS)

    Rosati, Matteo; Giovannetti, Vittorio

    2016-06-01

    We present a new decoding protocol to realize transmission of classical information through a quantum channel at asymptotically maximum capacity, achieving the Holevo bound and thus the optimal communication rate. At variance with previous proposals, our scheme recovers the message bit by bit, making use of a series of "yes-no" measurements, organized in bisection fashion, thus determining which codeword was sent in log2 N steps, N being the number of codewords.

  18. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    PubMed

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure

  19. The role of additional pulses in electropermeabilization protocols.

    PubMed

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  20. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    PubMed

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure

  1. The Role of Additional Pulses in Electropermeabilization Protocols

    PubMed Central

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  2. The role of additional pulses in electropermeabilization protocols.

    PubMed

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  3. Verification of a Byzantine-Fault-Tolerant Self-stabilizing Protocol for Clock Synchronization

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2008-01-01

    This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.

  4. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  5. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  6. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property. PMID:26112322

  7. Protocol dependence of the jamming transition

    NASA Astrophysics Data System (ADS)

    Bertrand, Thibault; Behringer, Robert P.; Chakraborty, Bulbul; O'Hern, Corey S.; Shattuck, Mark D.

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics.

  8. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  9. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  10. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  11. Oncotherapy: A System for Requesting Chemotherapy Protocols.

    PubMed

    Righi, Laura Vera

    2015-01-01

    A clinical decision support system is able to provide oncologists with suitable treatment options at the moment of decision making regarding which chemotherapy protocol is the best to apply to a particular oncological case. The National Cancer Institute has created a Guidelines Committee that establishes therapeutical options for each clinical case. The Health Informatics Department has developed Oncotherapy, a knowledge database that incorporates information provided by the Guidelines Committee. Oncotherapy includes a tailored information repository to provide oncologists in the public health system with the chemotherapy protocols available given three types of data: clinical diagnosis, clinical stage and therapy criteria. The protocol selected by the treating oncologist is sent back to Oncotherapy, which may create new knowledge that can be incorporated into the knowledge database. In this way, the system supports making the best decision according to the chemotherapy protocol options available. Furthermore, it can warn of errors that could result from mistakenly chosen therapies. PMID:26262420

  12. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., body weight range, sex, source of supply, species, strain, substrain, and age of the test system. (5... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  13. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  14. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  15. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  16. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  17. Protocol dependence of the jamming transition.

    PubMed

    Bertrand, Thibault; Behringer, Robert P; Chakraborty, Bulbul; O'Hern, Corey S; Shattuck, Mark D

    2016-01-01

    We propose a theoretical framework for predicting the protocol dependence of the jamming transition for frictionless spherical particles that interact via repulsive contact forces. We study isostatic jammed disk packings obtained via two protocols: isotropic compression and simple shear. We show that for frictionless systems, all jammed packings can be obtained via either protocol. However, the probability to obtain a particular jammed packing depends on the packing-generation protocol. We predict the average shear strain required to jam initially unjammed isotropically compressed packings from the density of jammed packings, shape of their basins of attraction, and path traversed in configuration space. We compare our predictions to simulations of shear strain-induced jamming and find quantitative agreement. We also show that the packing fraction range, over which shear strain-induced jamming occurs, tends to zero in the large system limit for frictionless packings with overdamped dynamics. PMID:26871137

  18. Reconstruction de la surface de Fermi dans l'etat normal d'un supraconducteur a haute Tc: Une etude du transport electrique en champ magnetique intense

    NASA Astrophysics Data System (ADS)

    Le Boeuf, David

    Des mesures de resistance longitudinale et de resistance de Hall en champ magnetique intense transverse (perpendiculaire aux plans CuO2) ont ete effectuees au sein de monocristaux de YBa2Cu3Oy (YBCO) demacles, ordonnes et de grande purete, afin d'etudier l'etat fondamental des supraconducteurs a haute Tc dans le regime sous-dope. Cette etude a ete realisee en fonction du dopage et de l'orientation du courant d'excitation J par rapport a l'axe orthorhombique b de la structure cristalline. Les mesures en champ magnetique intense revelent par suppression de la supraconductivite des oscillations magnetiques des resistances longitudinale et de Hall dans YBa2Cu 3O6.51 et YBa2Cu4O8. La conformite du comportement de ces oscillations quantiques au formalisme de Lifshitz-Kosevich, apporte la preuve de l'existence d'une surface de Fermi fermee a caractere quasi-2D, abritant des quasiparticules coherentes respectant la statistique de Fermi-Dirac, dans la phase pseudogap d'YBCO. La faible frequence des oscillations quantiques, combinee avec l'etude de la partie monotone de la resistance de Hall en fonction de la temperature indique que la surface de Fermi d'YBCO sous-dope comprend une petite poche de Fermi occupee par des porteurs de charge negative. Cette particularite de la surface de Fermi dans le regime sous-dope incompatible avec les calculs de structure de bande est en fort contraste avec la structure electronique presente dans le regime surdope. Cette observation implique ainsi l'existence d'un point critique quantique dans le diagramme de phase d'YBCO, au voisinage duquel la surface de Fermi doit subir une reconstruction induite par l'etablissement d'une brisure de la symetrie de translation du reseau cristallin sous-jacent. Enfin, l'etude en fonction du dopage de la resistance de Hall et de la resistance longitudinale en champ magnetique intense suggere qu'un ordre du type onde de densite (DW) est responsable de la reconstruction de la surface de Fermi. L'analogie de

  19. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  20. Broadening and Simplifying the First SETI Protocol

    NASA Astrophysics Data System (ADS)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  1. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  2. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  3. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  4. The Variable Rate Intravenous Insulin Infusion Protocol.

    PubMed

    Collard, Benjamin; Sturgeon, Jonathan; Patel, Natasha; Asharia, Shabbar

    2014-01-01

    Insulin use among inpatients is high and associated with severe and regular medication errors. An initial baseline audit showed a wide variation in the prescription of intravenous insulin within the trust. These included variation in the choice of fluid prescribed, electrolyte levels not consistently checked, handwritten illegible prescriptions, and varying parameters set for adjustment of the prescription. A Variable Rate Intravenous Insulin Infusion protocol (VRIII)) was introduced to standardize intravenous insulin prescription throughout the trust by all members of the clinical team. We looked at and measured uptake and effects of the VRIII protocol in improving standardization of insulin prescription for inpatients on insulin at St George's NHS trust. The protocol was uploaded to the intranet to allow access 24 hours a day and the staff educated about it. The VRIII protocol was routinely used successfully throughout the trust. Any initial problems were addressed through education of clinical staff. The protocol has shown decreased prescribing and administrative errors, whilst demonstrating good glucose and electrolyte control. Use of a standardized protocol helps reduce medication errors and demonstrates good glycaemic control. Regular and continued education of clinical staff is necessary to maintain its efficacy. PMID:26734228

  5. [The image of animal magnetism in fictional literature: the cases of Poe, Doyle and Du Maurier].

    PubMed

    Bonet Safont, Juan Marcos

    2014-01-01

    In this article, we focus on the social image of the phenomenon known as mesmerism, or animal magnetism, through analysis of the works: The Facts in the Case of M. Valdemar (1845) by Edgar Allan Poe, The Great Keinplatz Experiment (1885) by Conan Doyle and Trilby (1894) by George Du Maurier. We describe the stereotype of the mesmerist and the uses of mesmerism observed. We pay attention to the spaces and actors of the mesmeric transcript presented in the stories. We consider the reception of these stories by the public and the relationship of the authors with mesmeric and hypnotic knowledge. Nowadays, academic researchers in the discipline of psychology publish articles and books on popular myths about hypnosis in attempts to depict the distorted images related to this phenomenon. This distorted image of the hypnotic process and the hypnotist derives from "circus" hypnotism shows (stage hypnosis), the cinema, television and fictional literature. Works of fiction represent a unique and invaluable source of information, ideas, speculations, concerns and opportunities around animal magnetism and hypnosis, and the exploration and analysis of this literature is an essential chapter in any historical study of this topic. We see how the literary use of mesmerism by Poe, Doyle and Du Maurier is not chance or peripheral, with all three being intellectually interested in and stimulated by these ideas.

  6. [The image of animal magnetism in fictional literature: the cases of Poe, Doyle and Du Maurier].

    PubMed

    Bonet Safont, Juan Marcos

    2014-01-01

    In this article, we focus on the social image of the phenomenon known as mesmerism, or animal magnetism, through analysis of the works: The Facts in the Case of M. Valdemar (1845) by Edgar Allan Poe, The Great Keinplatz Experiment (1885) by Conan Doyle and Trilby (1894) by George Du Maurier. We describe the stereotype of the mesmerist and the uses of mesmerism observed. We pay attention to the spaces and actors of the mesmeric transcript presented in the stories. We consider the reception of these stories by the public and the relationship of the authors with mesmeric and hypnotic knowledge. Nowadays, academic researchers in the discipline of psychology publish articles and books on popular myths about hypnosis in attempts to depict the distorted images related to this phenomenon. This distorted image of the hypnotic process and the hypnotist derives from "circus" hypnotism shows (stage hypnosis), the cinema, television and fictional literature. Works of fiction represent a unique and invaluable source of information, ideas, speculations, concerns and opportunities around animal magnetism and hypnosis, and the exploration and analysis of this literature is an essential chapter in any historical study of this topic. We see how the literary use of mesmerism by Poe, Doyle and Du Maurier is not chance or peripheral, with all three being intellectually interested in and stimulated by these ideas. PMID:25481969

  7. [The image of animal magnetism in fictional literature: the cases of Poe, Doyle and Du Maurier].

    PubMed

    Bonet Safont, Juan Marcos

    2014-01-01

    In this article, we focus on the social image of the phenomenon known as mesmerism, or animal magnetism, through analysis of the works: The Facts in the Case of M. Valdemar (1845) by Edgar Allan Poe, The Great Keinplatz Experiment (1885) by Conan Doyle and Trilby (1894) by George Du Maurier. We describe the stereotype of the mesmerist and the uses of mesmerism observed. We pay attention to the spaces and actors of the mesmeric transcript presented in the stories. We consider the reception of these stories by the public and the relationship of the authors with mesmeric and hypnotic knowledge. Nowadays, academic researchers in the discipline of psychology publish articles and books on popular myths about hypnosis in attempts to depict the distorted images related to this phenomenon. This distorted image of the hypnotic process and the hypnotist derives from "circus" hypnotism shows (stage hypnosis), the cinema, television and fictional literature. Works of fiction represent a unique and invaluable source of information, ideas, speculations, concerns and opportunities around animal magnetism and hypnosis, and the exploration and analysis of this literature is an essential chapter in any historical study of this topic. We see how the literary use of mesmerism by Poe, Doyle and Du Maurier is not chance or peripheral, with all three being intellectually interested in and stimulated by these ideas. PMID:25508821

  8. O'Connell effect in early-type contact binaries: du Boo and AG Vir

    NASA Astrophysics Data System (ADS)

    Pribulla, T.; Vaňko, M.; Chochol, D.; Hambálek, Ľ.; Parimucha, Š.

    2011-07-01

    The paper presents new photoelectric observations of the eclipsing binary systems DU Boo and AG Vir. The systems are somewhat similar - both are A-type contact binaries with the maximum following the primary minimum being the brighter one. This light curve asymmetry is extremely temporally stable. The phase dependence of the color indices is unexpectedly small for the observed amplitude of the O'Connell effect, amounting to about 0.1 mag in the optical wavelength range which indicates a very large heated area with a temperature contrast of {Δ T ≈} 1000-1500 K. The broadening functions (BFs) of the systems do not show any dark solar-type photospheric spots. On the other hand, there are significant differences of BFs between the quadratures (surprisingly similar in both systems) indicative of stream of matter or bright region causing additional emission seen between the components around the phase 0.25. Absolute parameters of the components slightly depend on the adopted model. Long orbital period of both contact binaries combined with late spectral type indicate that the primary components of either of the systems (but particularly in case of DU Boo) already evolved off the main sequence. Based on spectroscopic data from the David Dunlap Observatory, University of Toronto

  9. Wetlands of Argonne National Laboratory-East DuPage County, Illinois

    SciTech Connect

    Van Lonkhuyzen, R.A.; LaGory, K.E.

    1994-03-01

    Jurisdictional wetlands of the Argonne National Laboratory-East (ANL-E) site in DuPage County, Illinois, were delineated in the summer and autumn of 1993 in accordance with the 1987 US Army Corps of Engineers methodology. Potential wetland sites with an area greater than 500 m{sup 2} (0.05 ha [0.124 acre]) were identified for delineation on the basis of aerial photographs, the DuPage County soil survey, and reconnaissance-level field studies. To qualify as a jurisdictional wetland, an area had to support a predominance of hydrophytic vegetation as well as have hydric soil and wetland hydrology. Thirty-five individual jurisdictional wetlands were delineated at ANL-E, totaling 180,604 m{sup 2} (18.1 ha [44.6 acres]). These wetlands were digitized onto the ANL-E site map for use in project planning. Characteristics of each wetland are presented -- including size, dominant plant species and their indicator status, hydrologic characteristics (including water source), and soil characteristics.

  10. Les inconvénients de perdre du poids

    PubMed Central

    Bosomworth, N. John

    2012-01-01

    Résumé Objectif Explorer les raisons pour lesquelles la perte de poids à long terme échoue la plupart du temps et évaluer les conséquences de diverses trajectoires pondérales, y compris la stabilité, la perte et le gain. Source des données Les études qui évaluent les paramètres pondéraux dans la population sont en majorité observationnelles. Des données probantes de niveau I ont été publiées pour évaluer l’influence des interventions relatives au poids sur la mortalité et la qualité de vie. Message principal Seulement un petit pourcentage des personnes qui désirent perdre du poids réussissent à le faire de manière durable. La mortalité est la plus faible chez les personnes se situant dans la catégorie de poids élevé-normal et surpoids. La trajectoire pondérale la plus sécuritaire est la stabilité du poids avec une optimisation de la condition physique et métabolique. Il est démontré que la mortalité est plus faible chez les personnes ayant des comorbidités reliées à l’obésité si elles perdent du poids. Il est aussi établi que la qualité de vie sur le plan de la santé est meilleure chez les personnes obèses qui perdent du poids. Par contre, la perte de poids chez une personne obèse autrement en santé est associée à une mortalité accrue. Conclusion La perte de poids est recommandable seulement chez les personnes qui ont des comorbidités reliées à l’obésité. Les personnes obèses en santé qui veulent perdre du poids devraient être informées qu’il peut y avoir des risques à le faire. Une stratégie qui se traduit par un indice de masse corporelle stable avec une condition physique et métabolique optimisée, peu importe le poids, est l’option d’intervention la plus sécuritaire en ce qui concerne le poids.

  11. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  12. Participation des médecins généralistes de la province de Benimellal (Maroc) dans le dépistage du cancer du col

    PubMed Central

    Nani, Samira; Benallal, Mohamed; Hassoune, Samira; Kissi, Dounia; Maaroufi, Abderrahmane

    2013-01-01

    Introduction Au Maroc, chaque année il y aurait environ 2000 nouveaux cas de cancer du col et les 2/3 des cas sont pris en charge à un stade très avancé. Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Méthodes Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Résultats Le niveau de connaissance était relativement modeste, 22 médecins généraliste avaient répondu à la question sur l'incidence du cancer du col au Maroc, Parmi eux (81,8%) avaient donné une réponse incorrecte. L'Herpes Papilloma virus comme facteur de risque du cancer du col a été identifié par seulement 21% des médecins généralistes. La participation au dépistage était également défaillante, 92,8% n'avaient jamais pratiqué le FCV chez leurs patientes à cause principalement du manque de formation (95,5%). Conclusion Les résultats montrent la nécessité d'améliorer les connaissances théoriques et pratique des médecins généralistes concernant le dépistage du cancer du col. PMID:23785557

  13. Making your presentation fun: creative presentation techniques

    SciTech Connect

    KEENEN,MARTHA JANE

    2000-05-18

    What possesses someone to volunteer and go through hoops and red tape to make a presentation at a conference? For that matter, why does anyone ever present anything to anyone? Actually, presentations are a fact of life and there are many reasons for doing a presentation and doing it well. New and existing staff need training and orientation to the way things are done here. Handing all of them a manual and hoping they read it is pretty much a waste of paper. On the other hand, an effective, entertaining and upbeat presentation on the relevant topics is more likely to stick with those people. They will even have a name and face to remember and seek out when they have an issue on or with that topic. This can be a very effective beginning for networking with new peers. The presenter is seen as knowledgeable, as a source of information on company topics and possibly evaluated as a potential mentor or future manager. Project staff and/or peers benefit from clear, concise, presentations of topical knowledge. This is one way that a group working on various aspects of the same project or program can stay in touch and in step with each other. Most importantly, presentations may be the best or only door into the minds (and budgets) of management and customers. These presentations are a wonderful opportunity to address legal and compliance issues, budget, staffing, and services. Here is a chance, maybe the only one, to demonstrate and explain the wonderfulness of a program and the benefit they get by using the services offered most effectively. An interactive presentation on legal and compliance issues can be an effective tool in helping customers and/or management make good risk management decisions.

  14. Rupture simultanée du ligament croisé antérieur et du ligament patellaire: à propos d'un cas

    PubMed Central

    Achkoun, Abdessalam; Houjairi, Khalid; Quahtan, Omar; Hassoun, Jalal; Arssi, Mohamed; Rahmi, Mohamed; Garch, Abdelhak

    2016-01-01

    La rupture simultanée du tendon rotulien et du ligament croisé antérieur est une lésion relativement rare. Son diagnostic peut facilement manquer lors de l'examen initial. Les options de traitement incluent la réparation immédiate du tendon rotulien avec soit la reconstruction simultanée ou différée de ligament croisé antérieur. Nous rapportons le cas d'une rupture combinée du tendon rotulien et du ligament croisé antérieur chez un jeune footballeur de 22 ans. Une approche de traitement en deux temps a été effectuée avec un excellent résultat fonctionnel. PMID:27366288

  15. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  16. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  17. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  18. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  19. Innovative therapies: general aspects and ethical criteria for evaluating protocols.

    PubMed

    Petrini, C

    2013-01-01

    There are many ways of interpreting the notion of "innovation" with reference to therapeutics. The term is generally given a wide meaning, encompassing anything that brings something new. From the ethical point of view the definition of "innovation" is of key importance, for example when dealing with a major problem such as the evaluation of protocols that propose "innovative" therapies. There is currently debate as to whether this should be accomplished using the same procedures typically applied to experimental research protocols, or by following quite different procedures when "innovation" is involved. The present article offers an overview of the notion of "innovation" in the context of biomedical research, together with some considerations and proposals for evaluating it from the ethical viewpoint.

  20. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  1. [An update of the obstetrics hemorrhage treatment protocol].

    PubMed

    Morillas-Ramírez, F; Ortiz-Gómez, J R; Palacio-Abizanda, F J; Fornet-Ruiz, I; Pérez-Lucas, R; Bermejo-Albares, L

    2014-04-01

    Obstetric hemorrhage is still a major cause of maternal and fetal morbimortality in developed countries. This is an underestimated problem, which usually appears unpredictably. A high proportion of the morbidity of obstetric hemorrhage is considered to be preventable if adequately managed. The major international clinical guidelines recommend producing consensus management protocols, adapted to local characteristics and keep them updated in the light of experience and new scientific publications. We present a protocol updated, according to the latest recommendations, and our own experience, in order to be used as a basis for those anesthesiologists who wish to use and adapt it locally to their daily work. This last aspect is very important to be effective, and is a task to be performed at each center, according to the availability of resources, personnel and architectural features. PMID:24560060

  2. Direct Cellular Lysis/Protein Extraction Protocol for Soil Metaproteomics

    SciTech Connect

    Chourey, Karuna; Jansson, Janet; Verberkmoes, Nathan C; Shah, Manesh B; Chavarria, Krystle L.; Tom, Lauren M; Brodie, Eoin L.; Hettich, Robert {Bob} L

    2010-01-01

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  3. Reliable multicast protocol specifications flow control and NACK policy

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    This appendix presents the flow and congestion control schemes recommended for RMP and a NACK policy based on the whiteboard tool. Because RMP uses a primarily NACK based error detection scheme, there is no direct feedback path through which receivers can signal losses through low buffer space or congestion. Reliable multicast protocols also suffer from the fact that throughput for a multicast group must be divided among the members of the group. This division is usually very dynamic in nature and therefore does not lend itself well to a priori determination. These facts have led the flow and congestion control schemes of RMP to be made completely orthogonal to the protocol specification. This allows several differing schemes to be used in different environments to produce the best results. As a default, a modified sliding window scheme based on previous algorithms are suggested and described below.

  4. [An update of the obstetrics hemorrhage treatment protocol].

    PubMed

    Morillas-Ramírez, F; Ortiz-Gómez, J R; Palacio-Abizanda, F J; Fornet-Ruiz, I; Pérez-Lucas, R; Bermejo-Albares, L

    2014-04-01

    Obstetric hemorrhage is still a major cause of maternal and fetal morbimortality in developed countries. This is an underestimated problem, which usually appears unpredictably. A high proportion of the morbidity of obstetric hemorrhage is considered to be preventable if adequately managed. The major international clinical guidelines recommend producing consensus management protocols, adapted to local characteristics and keep them updated in the light of experience and new scientific publications. We present a protocol updated, according to the latest recommendations, and our own experience, in order to be used as a basis for those anesthesiologists who wish to use and adapt it locally to their daily work. This last aspect is very important to be effective, and is a task to be performed at each center, according to the availability of resources, personnel and architectural features.

  5. Development and evaluation of multispecies test protocols for assessing chemical toxicity

    SciTech Connect

    Garten, C.T. Jr.; Suter, G.W. II; Blaylock, B.G.

    1985-06-01

    Toxicity testing is a well-recognized tool to assist in evaluating the hazards of chemicals to individual biological species. Multispecies toxicity tests, however, are now well developed. Three test systems were examined: the legume-Rhizobium symbiosis for N-fixation, soil microbial populations, and algal multispecies interactions. Test protocols were to be developed and tested using several different chemicals. Test protocols for the legume-Rhizobium and soil microorganisms systems were developed and are presented. The algal multispecies system will require more research, and thus no protocol was recommended at this time. Separate abstracts were prepared for each test system. (ACR)

  6. Evaluation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Array

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Liddicoat, Albert; Ralston, Jesse; Pingree, Paula

    2006-01-01

    The current implementation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays (TRIGA) is equipped with CFDP protocol and CCSDS Telemetry and Telecommand framing schemes to replace the CPU intensive software counterpart implementation for reliable deep space communication. We present the hardware/software co-design methodology used to accomplish high data rate throughput. The hardware CFDP protocol stack implementation is then compared against the two recent flight implementations. The results from our experiments show that TRIGA offers more than 3 orders of magnitude throughput improvement with less than one-tenth of the power consumption.

  7. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  8. A Draft Test Protocol for Detecting Possible Biohazards in Martian Samples Returned to Earth

    NASA Technical Reports Server (NTRS)

    Rummel, John D.; Race, Margaret S.; DeVinenzi, Donald L.; Schad, P. Jackson; Stabekis, Pericles D.; Viso, Michel; Acevedo, Sara E.

    2002-01-01

    This document presents the first complete draft of a protocol for detecting possible biohazards in Mars samples returned to Earth; it is the final product of the Mars Sample Handling Protocol Workshop Series, convened in 2000-2001 by NASA's Planetary Protection Officer. The goal of the five-workshop Series vas to develop a comprehensive protocol by which returned martian sample materials could be assessed for the presence of any biological hazard(s) while safeguarding the purity of the samples from possible terrestrial contamination The reference numbers for the proceedings from the five individual Workshops.

  9. Optimizing local protocols for implementing bipartite nonlocal unitary gates using prior entanglement and classical communication

    SciTech Connect

    Cohen, Scott M.

    2010-06-15

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and they are deterministic while also being 'one-shot', in that they use only one copy of an entangled resource state. The optimization minimizes the amount of entanglement needed, and also the amount of classical communication, and it is often the case that less of each of these resources is needed than with an alternative protocol using two-way teleportation.

  10. DuPont cuts energy consumption 8% -- for starters

    SciTech Connect

    Wiseman, K.

    1998-07-01

    DuPont`s Corporate Energy Leadership Team (CELT) faced a difficult challenge at its inception in 1991--reducing the industry giant`s $900 million annual domestic energy bill. Seven years later, DuPont`s annual energy costs are down to $800 million, and energy consumption has shrunk by more than 8%. The team is on track toward future reduction goals. Key to persuading the company was the team`s 1992 Jump Start commitment to reduce out-of-pocket energy expenditures immediately. Over a four-month period, the goal was to save $6 million out-of-pocket on energy costs. The company actually ended up doubling that, saving over $12 million. The greatest savings--26% of the total--came from shutting down spare or unneeded equipment. Equipment tune-ups to improve performance and renegotiation of fuel contracts also lowered energy costs. The paper discusses how it was done.

  11. A Conversation with Lee Alvin DuBridge - Part I

    NASA Astrophysics Data System (ADS)

    Goodstein, Judith R.

    Physicist Lee A. DuBridge became president of the California Institute of Technology in 1946. In this interview he recalls the immediate problems he faced, including his dealings with Robert A. Millikan, whom he replaced as chief administrator of the institute; institute financing and inadequate salaries. DuBridge also talks about the advent of federal support for peacetime science and Millikan's distaste for it; his close working relationship with Robert F. Bacher, who came to the institute in 1949 as chairman of the Division of Physics, Mathematics, and Astronomy; his recollections of the meteorologist Irving P. Krick, the physicist Alexander Goetz, and the chemist Linus Pauling; and his attempts to build up the Humanities Division.

  12. Katimavik Out-Trip Protocol.

    ERIC Educational Resources Information Center

    OPCAN, Montreal (Quebec).

    A supplement to the active leisure learning student manual for Katimavik (the 9-month volunteer community service and experiential learning program for 17-21 year old Canadians) provides in greater detail the procedure for preparing and implementing the Outdoor Wilderness Trip. Sections presented are definition of terms, national training,…

  13. Du Pont Classifications of 2 ASAS-SN Supernovae

    NASA Astrophysics Data System (ADS)

    Shappee, Benjamin J.; Prieto, J. L.; Rich, J.; Madore, B.; Poetrodjojo, Henry; D'Agostino, Joshua

    2016-09-01

    We report optical spectroscopy (range 370-910 nm) of two supernovae discovered by the All-Sky Automated Survey for Supernovae (ASAS-SN; Shappee et al. 2014, ApJ, 788, 48) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on Aug. 30 and Sep. 1 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  14. Du Pont Classifications of 4 ASAS-SN Supernovae

    NASA Astrophysics Data System (ADS)

    Morrell, N.; Shappee, Benjamin J.

    2016-08-01

    We report optical spectroscopy (range 370-910 nm) of four supernovae discovered by the All-Sky Automated Survey for Supernovae (ASAS-SN; Shappee et al. 2014, ApJ, 788, 48) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on July 31 and Aug. 01 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  15. DuPage County chilled water storage project

    SciTech Connect

    Grumman, D.L.

    1998-10-01

    Between 1992 and 1995, the DuPage County Governmental Center in Wheaton, Illinois, commissioned a detailed analysis of its chilled water plant and distribution system, as well as its future needs and options for meeting those needs. The result was a 10,000 ton-hour (35,170 kWh) chilled water storage tank with associated components and controls. This paper describes that process and the system that resulted.

  16. Bulk transfer protocols on satellite link - Study within the OSI reference model

    NASA Astrophysics Data System (ADS)

    Valet, I.

    Since satellite systems, such as TELECOM1 in France, are available for data transmission, new protocols need to be designed to fit the requirements of satellite communication systems and to offer specific facilities to the users. The main features of these new transmission protocols, as they have been specified by NADIR studies, are described. Next, the reasons for choosing to study these protocols within the OSI Reference Model are explained. A detailed study about introducing the protocol mechanisms described above in the OSI Reference model layers is then presented. Different approaches are presented, and the solutions studied are appraised in terms of efficiency, and of conformity to the OSI Reference Model. Finally, the experiments planned by NADIR are mentionned.

  17. Etude des defauts microscopiques et des proprietes optiques, electroniques et magnetiques du compose neodyme cerium oxyde de cuivre

    NASA Astrophysics Data System (ADS)

    Richard, Pierre

    La presente these, qui combine des mesures de diffusion Raman, de transmission infrarouge, de conductivite hyperfrequence et d'interferometrie ultrasonore sur les composes Nd 2-xCexCuO 4, traite des defauts d'oxygene, ainsi que des proprietes optiques, electroniques et magnetiques de ces materiaux. Les resultats experimentaux obtenus sont correles avec plusieurs donnees experimentales disponibles dans la litterature. D'abord, la caracterisation des modes Raman et des niveaux d'energie de champ cristallin de l'ion Nd3+ au moyen de techniques optiques, en fonction du dopage en cerium et du contenu en oxygene, permettent de conclure a la presence de defauts lies a une non-stoechiometrie en oxygene dans ces composes. En effet, des excitations de champ cristallin assignees a des ions Nd3+ en sites irreguliers sont observees, en plus des bandes d'absorption associees aux ions Nd3+ en site regulier, dans les spectres correspondant aux multiplets 4I11/2, 4I13/2 et 4I 15/2 de l'ion Nd3+. Les resultats experimentaux indiquent que, contrairement a la croyance largement repandue, les oxygenes apicaux, bien que presents dans les echantillons dopes, ne sont pas enleves lors du processus de reduction des echantillons necessaire pour faire apparaitre la supraconductivite dans cette famille de cuprates. Au contraire, des lacunes d'oxygene, dont le type varie en fonction du dopage, sont creees lors de ce processus. En particulier, il est montre dans ce travail que la reduction des echantillons dopes de maniere optimale conduit a la creation de lacunes d'oxygene dans les plans CuO2. Les consequences de telles lacunes sont largement discutees. En outre, il est suggere que de telles lacunes sont responsables de la perte de l'ordre antiferromagnetique a longue portee des ions Cu2+. Finalement, l'interaction d'echange anisotrope Nd3+-Cu 2+ dans le compose nondope est caracterisee au moyen de la transmission infrarouge sous champ magnetique. L'eclatement des doublets de Kramers mesure

  18. DuOx2 Promoter Regulation by Hormones, Transcriptional Factors and the Coactivator TAZ.

    PubMed

    Cardoso-Weide, L C; Cardoso-Penha, R C; Costa, M W; Ferreira, A C F; Carvalho, D P; Santisteban, P S

    2015-03-01

    The production of H2O2, which is essential to thyroid hormone synthesis, involves two NADPH oxidases: dual oxidases 1 and 2 (DuOx1 and DuOx2). A functional study with human DuOx genes and their 5'-flanking regions showed that DuOx1 and -2 promoters are different from thyroid-specific gene promoters. Furthermore, their transcriptional activities are not restricted to thyroid cells. While regulation of Tg (thyroglobulin) and TPO (thyroperoxidase) expression have been extensively studied, DuOx2 promoter regulation by hormones and transcriptional factors need to be more explored. Herein we investigated the role of TSH, insulin and insulin-like growth factor 1 (IGF-1), as well as the cAMP effect on DuOx2 promoter (ptx41) activity in transfected rat thyroid cell lines (PCCL3). We also assessed DuOx2 promoter activity in the presence of transcriptional factors crucial to thyroid development such as TTF-1 (thyroid transcription factor 1), PAX8, CREB, DREAM, Nkx2.5 and the coactivator TAZ in HeLa and HEK 293T-transfected cells. Our results show that TSH and forskolin, which increase cAMP in thyroid cells, stimulated DuOx2 promoter activity. IGF-1 led to pronounced stimulation, while insulin induction was not statistically different from DuOx2 promoter basal activity. All transcriptional factors selected for this work and coactivator TAZ, except DREAM, stimulated DuOx2 promoter activity. Moreover, Nkx2.5 and TAZ synergistically increased DuOx2 promoter activity. In conclusion, we show that DuOx2 expression is regulated by hormones and transcription factors involved in thyroid organogenesis and carcinogenesis, reinforcing the importance of the control of H2O2 generation in the thyroid. PMID:25960956

  19. Une cause rare de plexopathie brachiale: une metastase d'un cancer du sein

    PubMed Central

    Maâroufi, Mustapha; Kamaoui, Imane; Boubbou, Meriem; Sqalli, Nadia; Tizniti, Siham

    2014-01-01

    Nous rapportons le cas d'une patiente de 50 ans ayant une histoire de cancer du sein et qui accuse une symptomatologie d'atteinte du plexus brachial. L'IRM montre une masse qui envahie le plexus brachial compatible avec une métastase. L'IRM est très utile pour le diagnostic et l'orientation thérapeutique des plexopathies brachiales chez les femmes présentant un cancer du sein PMID:25360196

  20. The Space Communications Protocol Standards Program

    NASA Astrophysics Data System (ADS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-11-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  1. Collaborative patient care protocols: a development process.

    PubMed

    Blaufuss, J; Wynn, J; Hujcs, M

    1993-01-01

    Computerization of these protocols is in progress. This project is funded for one year with projected completion in January 1994. This study will form a framework in which further research can be completed. Utilizing protocols will allow the measurement of nursing decision making by testing relationships between parameters and interventions and by identifying rules for decision making. For example, questions that may be answered include which physiologic parameters do clinicians treat and in what order or priority, as well as what is the impact on patient outcomes in regard to cost of care and complications. Computerized patient care protocols can be further developed to meet patient-specific needs. A computerized data base will facilitate managing large amounts of patient data and tailoring instructions to these patients. One of the goals of this project was to measure the feasibility of developing computerized patient care protocols and implementing them in a critical care setting. Eventually, this experience will facilitate implementing computerized protocols at other sites. An additional benefit is the ability to implement continuous quality improvement strategies in a prospective manner rather than by retrospective review. PMID:10171735

  2. Sensitive localized surface plasmon resonance multiplexing protocols.

    PubMed

    Jia, Kun; Bijeon, Jean L; Adam, Pierre M; Ionescu, Rodica E

    2012-09-18

    Herein are reported two new protocols to obtain different zones of localized surface plasmon resonance (LSPR) gold nanostructures on single glass substrate by using a vacuum evaporation technique followed by a high-temperature annealing (550 °C). The thickness of the gold film, considered as the essential parameter to determine specific LSPR properties, is successfully modulated. In the first protocol, a metal mask is integrated onto the glass substrate during vacuum evaporation to vary the gold film thickness by a "shadowing effect", while in the second protocol several evaporation cycles (up to four cycles) at predefined areas onto the single substrate are performed. The resulting gold-modified samples are characterized using a transmission UV-vis extinction optical setup and scanning electron microscopy (SEM). The size distribution histograms of nanoparticles are also acquired. By employing the first protocol, thanks to the presence of different zones of gold nanoparticles on a single substrate, optimized LSPR responses to different (bio)functionalization zones are rapidly screened. Independently, the second protocol exhibited an excellent correlation between the nominative evaporated gold film thickness, gold nanoparticle sizes, and plasmonic properties (resonant wavelength and peak amplitude). Such substrates are further used in the construction of LSPR immunosensors for the detection of atrazine herbicide.

  3. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  4. Une forme exceptionnelle de la luxation perilunaire du carpe

    PubMed Central

    Elouakili, Issam; Ouchrif, Younes; Najib, Abdeljaouad; Ouakrim, Redouane; Lamrani, Omar; Kharmaz, Mohammed; Ismael, Farid; Lahlou, Abdo; Elouadghiri, Mohammed; El Bardouni, Ahmed; Mahfoud, Mustapha; Berrada, Mohammed Saleh; El Yaccoubi, Mouradh

    2014-01-01

    Les luxations périlunaires (LPL) du carpe sont des lésions extrêmement rares, qui peuvent passer inaperçue en raison d'un tableau clinique souvent trompeur, des radiographies en profil non strict ou d'interprétation difficile. Nous rapportons l'observation d'une luxation périlunaire stade III selon la classification de Witvoët et Allieu chez un patient de 32 ans, il s'agit d'une forme encore plus rare voire exceptionnelle et qui peut induire de sérieux problèmes en raison de la sévérité des dommages ligamentaires et du risque de nécrose du semilunaire plus important dans ce type de lésions. Le traitement est toujours chirurgical et doit être réalisé dans les plus brefs délais afin d’éviter les complications. PMID:25404968

  5. Flow cytometric analysis of the Rh1 (Rho, D) antigen activity on red cells: various Rh blood group phenotypes including Du variants.

    PubMed

    Ota, M; Hasekura, H; Fukushima, H; Yonemura, I

    1989-04-01

    Rh1 (Rho, D) antigen activity has been analyzed by the use of the indirect immunofluorescence flow cytometry (FCM), and the Rh blood group genotypes were able to be successfully determined from the intensity of fluorescence detected in flow cytometry using the anti-D IgG that was fractionated in a Protein A Sepharose CL-4B column as the primary antibody. The relative amount of the fluorescein isothiocyanate (FITC) bound to the D (R1R1, CDe/CDe), the high grade Du (R2r',cDE/Cde), the low grade Du (K1r, CDue/cde), and the d (rr, cde/cde) red cells was estimated from the mean fluorescent intensity. The FITC-binding activity of the high grade Du and low grade Du was 83% and 21% that of D. The antigen-antibody complex density profile was analyzed by using the FITC-conjugated protein-A in place of the second antibody. Compared with the found results using anti-human globulin as the second antibody, this method was less sensitive but it still was able to demonstrate the different degrees of fluorescence according to the Rh genotypes. The present FCM method is both simple and useful for (1) measuring the relative amount of antigens, (2) for detecting the dosage effect and (3) for deferminins the blood group genotypes.

  6. Exploratory drilling in the Prairie du Chien group of the Wisconsin zinc-lead districts by the U.S. Geological Survey in 1949-1950

    USGS Publications Warehouse

    Heyl, Allen Van; Lyons, Erwin J.; Agnew, Allen F.

    1951-01-01

    The U. S. Geological Survey in cooperation with the Wisconsin Geological and Natural History Survey explored the Prairie du Chien group in the main productive area of the Wisconsin zinc-lead district during 1949-50. Eight properties--Crow Branch diggings, Leix, Harris, Spitzbarth, Kennedy, James, Raisbeck and Vinegar Hill Roaster--were explored using both diamond and churn drills. Twenty holes were drilled that totaled 8,582 feet in depth. The objectives of the exploration were to determine if the Prairie du Chien and other formations below the principal ore-bearing strata (Galena, Decorah, and Platteville formations) of the district are favorable for ore deposits, and to determine the type of ore deposits, if present. Lean deposits of sphalerite, marcasite, and pyrite were found in the Prairie du Chien on five properties--Crow Branch, Leix, Harris, Spitzbarth, and Vinegar Hill 1%ouster-and also in the Franconia sandstone on the Leix property. In the drilled area the sulfides in the Prairie du Chien group occur in certain more brittle or soluble dolomite beds that contain cavities formed by brecciation or solution.

  7. Flow cytometric analysis of the Rh1 (Rho, D) antigen activity on red cells: various Rh blood group phenotypes including Du variants.

    PubMed

    Ota, M; Hasekura, H; Fukushima, H; Yonemura, I

    1989-04-01

    Rh1 (Rho, D) antigen activity has been analyzed by the use of the indirect immunofluorescence flow cytometry (FCM), and the Rh blood group genotypes were able to be successfully determined from the intensity of fluorescence detected in flow cytometry using the anti-D IgG that was fractionated in a Protein A Sepharose CL-4B column as the primary antibody. The relative amount of the fluorescein isothiocyanate (FITC) bound to the D (R1R1, CDe/CDe), the high grade Du (R2r',cDE/Cde), the low grade Du (K1r, CDue/cde), and the d (rr, cde/cde) red cells was estimated from the mean fluorescent intensity. The FITC-binding activity of the high grade Du and low grade Du was 83% and 21% that of D. The antigen-antibody complex density profile was analyzed by using the FITC-conjugated protein-A in place of the second antibody. Compared with the found results using anti-human globulin as the second antibody, this method was less sensitive but it still was able to demonstrate the different degrees of fluorescence according to the Rh genotypes. The present FCM method is both simple and useful for (1) measuring the relative amount of antigens, (2) for detecting the dosage effect and (3) for deferminins the blood group genotypes. PMID:2509769

  8. Optical, mechanical and electronic design and integration of POMM, a polarimeter for the Observatoire du mont Mégantic

    NASA Astrophysics Data System (ADS)

    Leclerc, Melanie R.; Côté, Patrice; Duchesne, François; Bastien, Pierre; Hernandez, Olivier; Colonna d'Istria, Pierre; Demers, Mathieu; Girard, Marc; Savard, Maxime; Lemieux, Dany; Thibault, Simon; Brousseau, Denis

    2014-08-01

    A polarimeter, to observe exoplanets in the visible and infrared, was built for the "Observatoire du Mont Mégantic" (OMM) to replace an existing instrument and reach 10-6 precision, a factor 100 improvement. The optical and mechanical designs are presented, with techniques used to precisely align the optical components and rotation axes to achieve the targeted precision. A photo-elastic modulator (PEM) and a lock-in amplifier are used to measure the polarization. The typical signal is a high DC superimposed to a very faint sinusoidal oscillation. Custom electronics was developed to measure the AC and DC amplitudes, and characterization results are presented.

  9. La Carte du Ciel, histoire et actualité d'un projet scientifique international

    NASA Astrophysics Data System (ADS)

    Lamy, J.

    2008-06-01

    Cet ouvrage collectif analyse la genèse, le déploiement, l'abandon et les résurgences récentes de la Carte du Ciel. Au-delà de son échec avéré, la Carte du Ciel fut en effet le premier projet international astronomique de grande envergure, remarquable notamment par son organisation à l'échelle du globe. Bien plus que par son objet ou les techniques mobilisées pour sa réalisation, c'est par cette vision que la Carte du Ciel ouvre une nouvelle ère pour l'astronomie.

  10. Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Semantic-Enabled Marketplaces

    NASA Astrophysics Data System (ADS)

    Ragone, Azzurra; di Noia, Tommaso; di Sciascio, Eugenio; Donini, Francesco M.

    We present a semantic-based approach to multi-issue bilateral negotiation for e-commerce. We use Description Logics to model advertisements, and relations among issues as axioms in a TBox. We then introduce a logic-based alternating-offers protocol, able to handle conflicting information, that merges non-standard reasoning services in Description Logics with utility thoery to find the most suitable agreements. We illustrate and motivate the theoretical framework, the logical language, and the negotiation protocol.

  11. Conservative aesthetic enhancement of the anterior dentition using a predictable direct resin protocol.

    PubMed

    Vargas, Marcos

    2006-09-01

    Aesthetic enhancement of the maxillary dentition can be accomplished using a variety of direct and indirect methods. Composite resin procedures enable the clinician to follow a predictable, conservative, and reliable chairside protocol for improving patients' smiles. Combined with advances in adhesive materials themselves, these procedures can be used successfully in the daily practice of restorative aesthetic dentistry. This article will demonstrate the protocol used to enhance the appearance of a patient who presented with concern regarding short crown length.

  12. A test protocol to screen capacitors for radiation-induced charge loss.

    SciTech Connect

    Zarick, Thomas Andrew; Hartman, E. Frederick

    2008-09-01

    This report presents a test protocol for screening capacitors dielectrics for charge loss due to ionizing radiation. The test protocol minimizes experimental error and provides a test method that allows comparisons of different dielectric types if exposed to the same environment and if the same experimental technique is used. The test acceptance or screening method is fully described in this report. A discussion of technical issues and possible errors and uncertainties is included in this report also.

  13. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  15. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval.

  16. Optimization of transport protocols with path-length constraints in complex networks

    NASA Astrophysics Data System (ADS)

    Ramasco, José J.; de La Lama, Marta S.; López, Eduardo; Boettcher, Stefan

    2010-09-01

    We propose a protocol optimization technique that is applicable to both weighted and unweighted graphs. Our aim is to explore by how much a small variation around the shortest-path or optimal-path protocols can enhance protocol performance. Such an optimization strategy can be necessary because even though some protocols can achieve very high traffic tolerance levels, this is commonly done by enlarging the path lengths, which may jeopardize scalability. We use ideas borrowed from extremal optimization to guide our algorithm, which proves to be an effective technique. Our method exploits the degeneracy of the paths or their close-weight alternatives, which significantly improves the scalability of the protocols in comparison to shortest-path or optimal-path protocols, keeping at the same time almost intact the length or weight of the paths. This characteristic ensures that the optimized routing protocols are composed of paths that are quick to traverse, avoiding negative effects in data communication due to path-length increases that can become specially relevant when information losses are present.

  17. Differentiation of Human Induced-Pluripotent Stem Cells into Smooth-Muscle Cells: Two Novel Protocols.

    PubMed

    Yang, Libang; Geng, Zhaohui; Nickel, Thomas; Johnson, Caitlin; Gao, Lin; Dutton, James; Hou, Cody; Zhang, Jianyi

    2016-01-01

    Conventional protocols for differentiating human induced-pluripotent stem cells (hiPSCs) into smooth-muscle cells (SMCs) can be inefficient and generally fail to yield cells with a specific SMC phenotype (i.e., contractile or synthetic SMCs). Here, we present two novel hiPSC-SMC differentiation protocols that yield SMCs with predominantly contractile or synthetic phenotypes. Flow cytometry analyses of smooth-muscle actin (SMA) expression indicated that ~45% of the cells obtained with each protocol assumed an SMC phenotype, and that the populations could be purified to ~95% via metabolic selection. Assessments of cellular mRNA and/or protein levels indicated that SMA, myosin heavy chain II, collagen 1, calponin, transgelin, connexin 43, and vimentin expression in the SMCs obtained via the Contractile SMC protocol and in SMCs differentiated via a traditional protocol were similar, while SMCs produced via the Sythetic SMC protocol expressed less calponin, more collagen 1, and more connexin 43. Differences were also observed in functional assessments of the two SMC populations: the two-dimensional surface area of Contractile SMCs declined more extensively (to 12% versus 44% of original size) in response to carbachol treatment, while quantification of cell migration and proliferation were greater in Synthetic SMCs. Collectively, these data demonstrate that our novel differentiation protocols can efficiently generate SMCs from hiPSCs. PMID:26771193

  18. Automated plan-recognition of chemotherapy protocols

    PubMed Central

    Bhatia, Haresh; Levy, Mia

    2011-01-01

    Cancer patients are often treated with multiple sequential chemotherapy protocols ranging in complexity from simple to highly complex patterns of multiple repeating drugs. Clinical documentation procedures that focus on details of single drug events, however, make it difficult for providers and systems to efficiently abstract the sequence and nature of treatment protocols. We have developed a data driven method for cancer treatment plan recognition that takes as input pharmacy chemotherapy dispensing records and produces the sequence of identified chemotherapy protocols. Compared to a manually annotated gold standard, our method was 75% accurate and 80% precise for a breast cancer testing set (110 patients, 2,029 drug events), and 54% accurate and 63% precise for a lung cancer testing set (53 patients, 670 drug events). This method for cancer treatment plan recognition may provide clinicians and systems an abstracted view of the patient’s treatment history. PMID:22195061

  19. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  20. Chapter 22: Compressed Air Evaluation Protocol

    SciTech Connect

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  1. Chapter 15: Commercial New Construction Protocol

    SciTech Connect

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  2. An object-oriented communication protocol

    NASA Astrophysics Data System (ADS)

    Chapman, Lee J.

    1990-08-01

    OOC is a high-level (OSI application layer and above) controls communication protocol. While natural languages are too complex for the controls environment, computer protocols are often insufficiently expressive. OOC is an attempt to balance simplicity and expressivity, and is sufficiently flexible to express data acquisition, control requests, alarm messages and error messages in a straightforward generic way. OOC supports dynamic creation of objects. It can be used in networks, for intertask and even for intratask communication. OOC, the protocol, is supported by OOC, the code, written in portable C. The lower level of this code supports a tagged-data scheme, with tags as elementary as INTEGER and BOOLEAN and as complex as OBJECT and MESSAGE. These tagged data can be evaluated in a LISP-like way.

  3. Validation of a Ramp Running Protocol for Determination of the True VO2max in Mice.

    PubMed

    Ayachi, Mohamed; Niel, Romain; Momken, Iman; Billat, Véronique L; Mille-Hamard, Laurence

    2016-01-01

    In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i) a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii) the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice) were performed in random order: (a) an incremental protocol that begins at 10 m.min(-1) speed and increases by 3 m.min(-1) every 3 min. (b) a ramp protocol with slow acceleration (3 m.min(-2)), and (c) a ramp protocol with fast acceleration (12 m.min(-2)). Each protocol was performed with two slopes (0 and 25°). Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p < 0.05) and was highest (59.0 ml.kg (0.75).min(-1)) for the 3 m.min(-2) 0° ramp protocol. In the latter, the presence of a VO2max plateau was associated with the fulfillment of two secondary criteria (a blood lactate concentration >8 mmol.l(-1) and a respiratory exchange ratio >1). The total duration of the 3 m.min(-2) 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope. PMID:27621709

  4. Validation of a Ramp Running Protocol for Determination of the True VO2max in Mice

    PubMed Central

    Ayachi, Mohamed; Niel, Romain; Momken, Iman; Billat, Véronique L.; Mille-Hamard, Laurence

    2016-01-01

    In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i) a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii) the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice) were performed in random order: (a) an incremental protocol that begins at 10 m.min−1 speed and increases by 3 m.min−1 every 3 min. (b) a ramp protocol with slow acceleration (3 m.min−2), and (c) a ramp protocol with fast acceleration (12 m.min−2). Each protocol was performed with two slopes (0 and 25°). Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p < 0.05) and was highest (59.0 ml.kg 0.75.min−1) for the 3 m.min−2 0° ramp protocol. In the latter, the presence of a VO2max plateau was associated with the fulfillment of two secondary criteria (a blood lactate concentration >8 mmol.l−1 and a respiratory exchange ratio >1). The total duration of the 3 m.min−2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope. PMID:27621709

  5. Validation of a Ramp Running Protocol for Determination of the True VO2max in Mice.

    PubMed

    Ayachi, Mohamed; Niel, Romain; Momken, Iman; Billat, Véronique L; Mille-Hamard, Laurence

    2016-01-01

    In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i) a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii) the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice) were performed in random order: (a) an incremental protocol that begins at 10 m.min(-1) speed and increases by 3 m.min(-1) every 3 min. (b) a ramp protocol with slow acceleration (3 m.min(-2)), and (c) a ramp protocol with fast acceleration (12 m.min(-2)). Each protocol was performed with two slopes (0 and 25°). Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p < 0.05) and was highest (59.0 ml.kg (0.75).min(-1)) for the 3 m.min(-2) 0° ramp protocol. In the latter, the presence of a VO2max plateau was associated with the fulfillment of two secondary criteria (a blood lactate concentration >8 mmol.l(-1) and a respiratory exchange ratio >1). The total duration of the 3 m.min(-2) 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  6. Validation of a Ramp Running Protocol for Determination of the True VO2max in Mice

    PubMed Central

    Ayachi, Mohamed; Niel, Romain; Momken, Iman; Billat, Véronique L.; Mille-Hamard, Laurence

    2016-01-01

    In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i) a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii) the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice) were performed in random order: (a) an incremental protocol that begins at 10 m.min−1 speed and increases by 3 m.min−1 every 3 min. (b) a ramp protocol with slow acceleration (3 m.min−2), and (c) a ramp protocol with fast acceleration (12 m.min−2). Each protocol was performed with two slopes (0 and 25°). Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p < 0.05) and was highest (59.0 ml.kg 0.75.min−1) for the 3 m.min−2 0° ramp protocol. In the latter, the presence of a VO2max plateau was associated with the fulfillment of two secondary criteria (a blood lactate concentration >8 mmol.l−1 and a respiratory exchange ratio >1). The total duration of the 3 m.min−2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  7. A class-chest for deriving transport protocols

    SciTech Connect

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  8. Low Cost Time Synchronization Protocol for Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Kim, Ki-Hyeon; Hong, Won-Kee; Kim, Hie-Cheol

    A time synchronization protocol for WSN is required to compensate time discrepancy. Time discrepancy among sensor nodes inevitably happens in WSN due to several internal and external factors. In order to make WSN's own job done effectively, a time synchronization protocol should be designed to achieve low execution time and low network traffic as well as accurate synchronization. Several synchronization protocols have been proposed to provide accurate time synchronization but do not consider execution time and network traffic for time synchronization. This paper proposes MNTP; it provides rapid and accurate time synchronization in multi-hop communication range. It presents a new broadcast scheme and time stamping mechanism to achieve low execution time and low network traffic along with accurate synchronization. Evaluation results show that MNTP improves synchronization accuracy up to 22% in single-hop and 51% in multi-hop respectively. MNTP also has 67 times and 58 times lower execution time and network traffic when 300 nodes are deployed in 20 × 20m2 sensor field.

  9. Protocols for Robust Herbicide Resistance Testing in Different Weed Species.

    PubMed

    Panozzo, Silvia; Scarabel, Laura; Collavo, Alberto; Sattin, Maurizio

    2015-07-02

    Robust protocols to test putative herbicide resistant weed populations at whole plant level are essential to confirm the resistance status. The presented protocols, based on whole-plant bioassays performed in a greenhouse, can be readily adapted to a wide range of weed species and herbicides through appropriate variants. Seed samples from plants that survived a field herbicide treatment are collected and stored dry at low temperature until used. Germination methods differ according to weed species and seed dormancy type. Seedlings at similar growth stage are transplanted and maintained in the greenhouse under appropriate conditions until plants have reached the right growth stage for herbicide treatment. Accuracy is required to prepare the herbicide solution to avoid unverifiable mistakes. Other critical steps such as the application volume and spray speed are also evaluated. The advantages of this protocol, compared to others based on whole plant bioassays using one herbicide dose, are related to the higher reliability and the possibility of inferring the resistance level. Quicker and less expensive in vivo or in vitro diagnostic screening tests have been proposed (Petri dish bioassays, spectrophotometric tests), but they provide only qualitative information and their widespread use is hindered by the laborious set-up that some species may require. For routine resistance testing, the proposed whole plant bioassay can be applied at only one herbicide dose, so reducing the costs.

  10. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    NASA Astrophysics Data System (ADS)

    Fienen, Michael N.; Clemo, Tom; Kitanidis, Peter K.

    2008-12-01

    Hydraulic tomography is a powerful technique for characterizing heterogeneous hydrogeologic parameters. An explicit trade-off between characterization based on measurement misfit and subjective characterization using prior information is presented. We apply a Bayesian geostatistical inverse approach that is well suited to accommodate a flexible model with the level of complexity driven by the data and explicitly considering uncertainty. Prior information is incorporated through the selection of a parameter covariance model characterizing continuity and providing stability. Often, discontinuities in the parameter field, typically caused by geologic contacts between contrasting lithologic units, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose an interactive protocol in which zonation candidates are implied from the data and are evaluated using cross validation and expert knowledge. Uncertainty introduced by limited knowledge of dynamic regional conditions is mitigated by using drawdown rather than native head values. An adjoint state formulation of MODFLOW-2000 is used to calculate sensitivities which are used both for the solution to the inverse problem and to guide protocol decisions. The protocol is tested using synthetic two-dimensional steady state examples in which the wells are located at the edge of the region of interest.

  11. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  12. An interactive Bayesian geostatistical inverse protocol for hydraulic tomography

    USGS Publications Warehouse

    Fienen, Michael N.; Clemo, Tom; Kitanidis, Peter K.

    2008-01-01

    Hydraulic tomography is a powerful technique for characterizing heterogeneous hydrogeologic parameters. An explicit trade-off between characterization based on measurement misfit and subjective characterization using prior information is presented. We apply a Bayesian geostatistical inverse approach that is well suited to accommodate a flexible model with the level of complexity driven by the data and explicitly considering uncertainty. Prior information is incorporated through the selection of a parameter covariance model characterizing continuity and providing stability. Often, discontinuities in the parameter field, typically caused by geologic contacts between contrasting lithologic units, necessitate subdivision into zones across which there is no correlation among hydraulic parameters. We propose an interactive protocol in which zonation candidates are implied from the data and are evaluated using cross validation and expert knowledge. Uncertainty introduced by limited knowledge of dynamic regional conditions is mitigated by using drawdown rather than native head values. An adjoint state formulation of MODFLOW-2000 is used to calculate sensitivities which are used both for the solution to the inverse problem and to guide protocol decisions. The protocol is tested using synthetic two-dimensional steady state examples in which the wells are located at the edge of the region of interest.

  13. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    SciTech Connect

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or {open_quotes}dust{close_quotes}). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or {open_quotes}resuspension rate{close_quotes}.

  14. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  15. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    PubMed

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  16. Protocols for Robust Herbicide Resistance Testing in Different Weed Species.

    PubMed

    Panozzo, Silvia; Scarabel, Laura; Collavo, Alberto; Sattin, Maurizio

    2015-01-01

    Robust protocols to test putative herbicide resistant weed populations at whole plant level are essential to confirm the resistance status. The presented protocols, based on whole-plant bioassays performed in a greenhouse, can be readily adapted to a wide range of weed species and herbicides through appropriate variants. Seed samples from plants that survived a field herbicide treatment are collected and stored dry at low temperature until used. Germination methods differ according to weed species and seed dormancy type. Seedlings at similar growth stage are transplanted and maintained in the greenhouse under appropriate conditions until plants have reached the right growth stage for herbicide treatment. Accuracy is required to prepare the herbicide solution to avoid unverifiable mistakes. Other critical steps such as the application volume and spray speed are also evaluated. The advantages of this protocol, compared to others based on whole plant bioassays using one herbicide dose, are related to the higher reliability and the possibility of inferring the resistance level. Quicker and less expensive in vivo or in vitro diagnostic screening tests have been proposed (Petri dish bioassays, spectrophotometric tests), but they provide only qualitative information and their widespread use is hindered by the laborious set-up that some species may require. For routine resistance testing, the proposed whole plant bioassay can be applied at only one herbicide dose, so reducing the costs. PMID:26167668

  17. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  18. In Brief: Kyoto Protocol moves forward

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-10-01

    The Russian cabinet's 30 September endorsement of the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) likely clears the way for the treaty's ratification by that country's parliament and for its entry into force. The protocol enters into force when not less than 55 Parties to the Convention, including industrialized countries (so called ``Annex I Parties'') which accounted in total for at least 55 % of the total carbon dioxide emissions for 1990 from that group, officially have agreed to the treaty.

  19. The Parasol Protocol for computational mutagenesis.

    PubMed

    Aronica, P G A; Verma, C; Popovic, B; Leatherbarrow, R J; Gould, I R

    2016-07-01

    To aid in the discovery and development of peptides and proteins as therapeutic agents, a virtual screen can be used to predict trends and direct workflow. We have developed the Parasol Protocol, a dynamic method implemented using the AMBER MD package, for computational site-directed mutagenesis. This tool can mutate between any pair of amino acids in a computationally expedient, automated manner. To demonstrate the potential of this methodology, we have employed the protocol to investigate a test case involving stapled peptides, and have demonstrated good agreement with experiment. PMID:27255759

  20. NADA protocol: integrative acupuncture in addictions.

    PubMed

    Carter, Kenneth; Olshan-Perlmutter, Michelle

    2014-01-01

    National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.

  1. The Kyoto Protocol: A business perspective

    SciTech Connect

    Malin, C.B.

    1998-01-19

    Governments have made a tentative start in responding to climate change. In marathon negotiating sessions that extended into an extra day Dec. 1--11 in Kyoto, Japan, representatives from more than 160 governments hammered out the Kyoto Protocol to the United Nations Framework Convention on Climate Change (FCCC). The protocol calls for developed countries to reduce emissions of greenhouse gases (GHGs) on averaged by 5.2% below 1990 levels by the years 2008--2012. Developing countries have no new obligations. The paper discusses the agreement, ratification, future questions, business role, and the challenge.

  2. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-09-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  3. Towards Automatic Diabetes Case Detection and ABCS Protocol Compliance Assessment

    PubMed Central

    Mishra, Ninad K.; Son, Roderick Y.; Arnzen, James J.

    2012-01-01

    Objective According to the American Diabetes Association, the implementation of the standards of care for diabetes has been suboptimal in most clinical settings. Diabetes is a disease that had a total estimated cost of $174 billion in 2007 for an estimated diabetes-affected population of 17.5 million in the United States. With the advent of electronic medical records (EMR), tools to analyze data residing in the EMR for healthcare surveillance can help reduce the burdens experienced today. This study was primarily designed to evaluate the efficacy of employing clinical natural language processing to analyze discharge summaries for evidence indicating a presence of diabetes, as well as to assess diabetes protocol compliance and high risk factors. Methods Three sets of algorithms were developed to analyze discharge summaries for: (1) identification of diabetes, (2) protocol compliance, and (3) identification of high risk factors. The algorithms utilize a common natural language processing framework that extracts relevant discourse evidence from the medical text. Evidence utilized in one or more of the algorithms include assertion of the disease and associated findings in medical text, as well as numerical clinical measurements and prescribed medications. Results The diabetes classifier was successful at classifying reports for the presence and absence of diabetes. Evaluated against 444 discharge summaries, the classifier’s performance included macro and micro F-scores of 0.9698 and 0.9865, respectively. Furthermore, the protocol compliance and high risk factor classifiers showed promising results, with most F-measures exceeding 0.9. Conclusions The presented approach accurately identified diabetes in medical discharge summaries and showed promise with regards to assessment of protocol compliance and high risk factors. Utilizing free-text analytic techniques on medical text can complement clinical-public health decision support by identifying cases and high risk

  4. Quebec Science Education: Which Directions? Proceedings of a Symposium Sponsored by the Science Council of Canada and the Association des Professeurs de Sciences du Quebec (March 1982). P82/2.

    ERIC Educational Resources Information Center

    Souque, Jean-Pascal, Ed.; Dufour, Paul, Ed.

    Proceedings are presented of a symposium on science education in Quebec, which was sponsored by the Science Council of Canada and the Association des Professeurs de Sciences du Quebec. Papers and authors addressing the background and present state of Quebec science education are as follows: "Science Teaching at the Secondary Level: An Evaluation"…

  5. Dérives thermiques du capteur de pression capacitif microélectronique

    NASA Astrophysics Data System (ADS)

    Ettouhami, A.; Essaid, A.; Ouakrim, N.; Michel, L.; Limouri, M.

    1997-07-01

    The thermal drifts of microelectronic capacitive pressure sensor have been analysed by finite-element method. Various boundary conditions representing a wide gamut of support of sensor have been considered: sensor with free base, sensor with fixed base and sensor attached to a support of alumina. For every case, the thermal response of sensor have been determined as a function of sensor dimensions in order to push far the buckling temperature and hence reduce the thermal sensitivity. For some sensors very sensitive to pressure, this temperature is small and the thermal drifts are important. A sensor with fixed base having a diaphragm of 1000 μm of radius and 12 μm of thickness and having a 3.5 μm of plate separation presents a thermal sensitivity of -200 Pa °C^{-1} above 80 ^circC. A sensor attached to a support of alumina, having a more wide diaphragm (1800 μm of radius) presents a thermal sensitivity of 3.1 Pa °C^{-1} below -100 ^circC. Les dérives thermiques du capteur de pression capacitif microélectronique sont analysées par la méthode des éléments finis. Différentes conditions aux limites représentant une large gamme de support de capteur ont été envisagées : capteur à base libre, capteur à base fixe et capteur collé à un support d'alumine. Dans chaque cas, la réponse thermique du capteur a été déterminée en fonction des dimensions du capteur afin de repousser la température de flambage et réduire en conséquence la sensibilité thermique. Pour certains capteurs très sensibles à la pression, cette température est très faible et les dérives thermiques sont importantes. Ainsi un capteur à base fixe (membrane de rayon 1000 μm, et épaisseur 12 μm, distance entre armatures 3,5 μm) présente une sensibilité thermique de -200 Pa °C^{-1} au-dessus de 80 ^circC. Un capteur collé à un support d'alumine, de membrane plus large (rayon 1800 μm) possède une sensibilité thermique de 3,1 Pa °C^{-1} au-dessous de -100 ^circC.

  6. Therapeutic Hypothermia Protocol in a Community Emergency Department

    PubMed Central

    Kulstad, Christine E.; Holt, Shannon C.; Abrahamsen, Aaron A.; Lovell, Elise O.

    2010-01-01

    Objectives: Therapeutic hypothermia (TH) has been shown to improve survival and neurological outcome in patients resuscitated after out of hospital cardiac arrest (OHCA) from ventricular fibrillation/ventricular tachycardia (VF/VT). We evaluated the effects of using a TH protocol in a large community hospital emergency department (ED) for all patients with neurological impairment after resuscitated OHCA regardless of presenting rhythm. We hypothesized improved mortality and neurological outcomes without increased complication rates. Methods: Our TH protocol entails cooling to 33°C for 24 hours with an endovascular catheter. We studied patients treated with this protocol from November 2006 to November 2008. All non-pregnant, unresponsive adult patients resuscitated from any initial rhythm were included. Exclusion criteria were initial hypotension or temperature less than 30°C, trauma, primary intracranial event, and coagulopathy. Control patients treated during the 12 months before the institution of our TH protocol met the same inclusion and exclusion criteria. We recorded survival to hospital discharge, neurological status at discharge, and rates of bleeding, sepsis, pneumonia, renal failure, and dysrhythmias in the first 72 hours of treatment. Results: Mortality rates were 71.1% (95% CI, 56–86%) for 38 patients treated with TH and 72.3% (95% CI 59–86%) for 47 controls. In the TH group, 8% of patients (95% CI, 0–17%) had a good neurological outcome on discharge, compared to 0 (95% CI 0–8%) in the control group. In 17 patients with VF/VT treated with TH, mortality was 47% (95% CI 21–74%) and 18% (95% CI 0–38%) had good neurological outcome; in 9 control patients with VF/VT, mortality was 67% (95% CI 28–100%), and 0% (95% CI 0–30%) had good neurological outcome. The groups were well-matched with respect to sex and age. Complication rates were similar or favored the TH group. Conclusion: Instituting a TH protocol for OHCA patients with any

  7. Connaissances des médecins généralistes de Mohammedia (Maroc) concernant le dépistage du cancer du sein

    PubMed Central

    Zine, Karima; Nani, Samira; Lahmadi, Imad Ait; Maaroufi, Abderrahmane

    2016-01-01

    Introduction Le cancer du sein représente un problème de santé publique majeur au Maroc. C'est le premier cancer chez la femme. L'objectif de ce travail était d'évaluer les connaissances des médecins généralistes (MG) en matière de dépistage du cancer du sein dans la préfecture de Mohammedia Maroc. Méthodes Nous avons mené une étude transversale, descriptive, exhaustive incluant les 97 MG exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Mohammedia. Résultats Le taux de participation était de 87%. L'âge moyen des MG était de 49,6 ± 8,1. Quatre-vingt pour cent (n=55) des MG ont donné une incidence incorrecte, 77,6% (n=85) ont reconnu l'existence d'un plan national de prévention et de contrôle du cancer (PNPCC) au Maroc, et 67,1 des MG ont rapporté l'existence d'un registre du cancer au Maroc. Le secteur d'activité était associé significativement avec les connaissances des MG sur le PNPCC et sur l'existence d'un guide de détection précoce du cancer du sein avec respectivement (p=0,003 et p=0,001). Une association significative entre l'ancienneté et l'existence d'un guide de détection précoce du cancer du sein et d'un registre du cancer du sein a été retrouvée avec (respectivement p=0,005 et p=0.002). Conclusion À la lumière de ces résultats il faudra renforcer les connaissances et les pratiques des MG par la promotion de la formation initiale et continue sur le dépistage. PMID:27800098

  8. Le cancer en Mauritanie : résultats sur 10 ans du registre hospitalier de Nouakchott

    PubMed Central

    Baba, Nacer Dine Ould Mohamed; Sauvaget, Catherine

    2013-01-01

    Le fardeau du cancer reste mal connu en Mauritanie. Il n'est basé que sur des extrapolations de l'incidence des cancers des pays avoisinants. Les données du registre de l'hôpital national permettent de décrire les cas avec un diagnostic histologique. Tous les cas de cancers enregistrés par le service d'anatomo-pathologie de l'hôpital national de Nouakchott de 2000 à 2009 ont été analysés. En 10 ans, 3305 prélèvements histologiques ont été analysés (hommes:42%, femmes:58%). Chez l'homme, le cancer le plus fréquemment analysé était le cancer de la peau (218 cas au total, 189 cas en excluant mélanome), suivi de la prostate (203), des cancers digestifs (179, colorectal et ‘sophage), et des lymphomes (151). Chez la femme, un quart des biopsies était des cancers du sein (485), suivi du col utérin (344), de la sphère gynécologique (218, ovaire et corps utérin), et de la peau (114). Les cancers du foie, du poumon ou de la vessie étaient peu fréquents. Ces résultats ne reflètent pas l'incidence ni l'actuel fardeau du cancer en Mauritanie puisque de nombreux patients diagnostiqués avec un cancer ne reçoivent pas d'examen anatomopathologique. Si, comme dans les pays avoisinants du Maroc et du Mali, les cancers du col et du sein sont les pathologies les plus fréquentes chez la femme, la distribution des cancers chez l'homme dans ce registre hospitalier diffère des résultats des registres de population du Maroc et du Mali où les cancers du poumon, du foie, de la prostate et de la vessie dominent. PMID:23785554

  9. The blind protocol and its place in consciousness research.

    PubMed

    Schwartz, Stephan A

    2005-07-01

    This paper describes the development of the blind protocol, and its place in this history of consciousness research. It was first devised by Croesus, King of the Lydians (BCE 560-547) and reported by Herodotus ( approximately BCE 484 - approximately 424), and was created to protect against fraud in assessing an Anomalous Perception (AP) event; a Remote Viewing (RV) experiment little different from those conducted today. Its next use in the 17th century was to study a peasant farmer, Jacques Aymar, who solved crimes with Anomalous Perception, using dowsing. Not only was a blind protocol employed, but the rudiments of controls were introduced to assess Aymar. The next documented use of a blind protocol in consciousness research occurred in 1784, when it was explicitly employed in the interest of science, and its history as a research technique can be said to have formally begun. King Louis the XVIth created a commission to evaluate Franz Anton Mesmer's claims concerning healing through "animal magnetism," administered while people were in a trance, and asked Benjamin Franklin to be the commission's head. The paper proposes that Franklin be considered the first parapsychologist. He created the blind protocol to answer the king's question as to whether "animal magnetism" was real, and he not only introduced demographic variables and controls, but literally blindfolded people, which is why today we call it the blind protocol. Franklin's observations also present the first recorded Western description of psychosomatic illness. An unintended consequence of Franklin's Mesmer study was the loss of the idea of psychophysical self-regulation (PPSR) as a research vector, although the English surgeon John Eliotson (1791-1868) apparently saw through the failure of Mesmer's explanatory model to the deeper insight in the form of hypnosis that was Mesmer's real discovery. He seems to have avoided all attempts at explaining how it worked but conducted a considerable number of

  10. Troubles du langage (Troubles with Language).

    ERIC Educational Resources Information Center

    de Weck, Genevieve, Ed.

    1997-01-01

    Articles on communication and language disorder are presented. All but one are in French; the other is in German. They include: "Specificity of Developmental Dysphasia: Implications for Intervention" (Marc Montfort, Adoracion Juarez Sanchez); "Difficulties with Language Development and Discursive Capacity" (Genevieve de Weck); "Language Production…

  11. In Vitro Th Differentiation Protocol.

    PubMed

    Sekiya, Takashi; Yoshimura, Akihiko

    2016-01-01

    CD4(+) T cells play central roles in adaptive immunity, driving appropriate immune responses to invading pathogens of diverse types. Four major CD4(+) T cell subsets, Th1, Th2, Th17, and Treg cells are differentiated from naïve CD4(+) T cells upon ligation of their T cell receptors with antigens, depending on the cytokines they receive. Th1 cells, which are induced by IL-12 and IFN-γ, mediate host defense against intracellular pathogens by exclusively expressing IFN-γ. Th2 cells, which are induced by IL4, secrete IL-4, IL-5, and IL-13, and protect hosts from helminths. IL-6 plus TGF-β induces Th17 cells, another Th subset identified relatively recently, express IL-17 and play important roles in the eradication of extracellular bacteria and fungi. Treg cells, which play central roles in immune suppression, are composed of either thymus-derived Treg cells (tTreg cells), which are directly developed from CD4-single positive (CD4-SP) cells in the thymus, or peripherally derived Treg cells (pTreg cells), which are induced by TGF-β plus IL-2 from naïve CD4(+) T cells. Although the regulated induction of Th cells results in proper eradication of pathogens, their excess activation results in various immune-associated diseases. For example, aberrant activation of Th1 and Th17 has been implicated in autoimmune diseases, excess Th2 activity causes atopic diseases, and impaired function of Treg cells due to abrogation of Foxp3 has been shown to cause fatal inflammatory disorders both in human and in mouse. The methods for in vitro differentiation of each Th subset described above are presented here. We hope these methods will facilitate understanding of differentiation and function of CD4(+) T cells and pathogenesis of various inflammatory diseases. PMID:26520124

  12. The Pic-du-Midi 2 meter telescope - First observations of the planets

    NASA Astrophysics Data System (ADS)

    Dollfus, A.

    1982-12-01

    The Pic-du-Midi Observatory is located at 2870 m altitude on the north slope of the Pyrenees. Instrumentation has been used at the site since 1941, due to clarity of the sky at that location. A 2 m telescope has recently been installed which is intended to gain a 0.1 arcsec resolution with an enlargement of 1500. The local stellar objects have been viewed with a resolution of 0.5 arcsec, while planetary surfaces have been observed at 0.15 arcsec resolution. Difficulties in maintaining an even temperature in the instrument because of the cold at the altitude and the strong winds are described. Sample observations of the galilean satellites of Jupiter, particularly Ganymede, in addition to Uranus, Saturn, and Mars are presented, with 1000 X enlargements of the latter.

  13. From Postpartum Haemorrhage Guideline to Local Protocol: A Study of Protocol Quality.

    PubMed

    Woiski, Mallory D; van Vugt, Helena C; Dijkman, Anneke; Grol, Richard P; Marcus, Abraham; Middeldorp, Johanna M; Mol, Ben W; Mols, Femke; Oudijk, Martijn A; Porath, Martina; Scheepers, Hubertina J; Hermens, Rosella P

    2016-10-01

    Objective Postpartum hemorrhage (PPH) has a continuously rising incidence worldwide, suggesting suboptimal care. An important step in optimizing care is the translation of evidence-based guidelines into comprehensive hospital protocols. However, knowledge about the quality of these protocols is lacking. The objective of this study was to evaluate the quality of PPH-protocols on structure and content in the Netherlands. Methods We performed an observational multicenter study. Eighteen PPH-protocols from 3 University Hospitals (UH), 8 Teaching Hospitals (TH) and 7 Non-Teaching hospitals (NTH) throughout the Netherlands were acquired. The structure of the PPH-protocols was assessed using the Appraisal of Guidelines for Research and Evaluation (AGREE-II) Instrument. The content was appraised using previously developed quality indicators, based on international guidelines and Advance-Trauma-Life-Support (ATLS)-based course instructions. Results The quality of the protocols for postpartum hemorrhage for both structure and content varied widely between different hospitals, but all of them showed room for improvement. The protocols scored mainly below average on the different items of the AGREE-II instrument (8 of the 10 items scored <4 on a 1-7 scale). Regarding the content, adoption of guideline recommendations in protocols was 46 %. In addition, a timely indication of 'when to perform' a recommendation was lacking in three-fourths of the items. Conclusion This study shows that the quality of the PPH-protocols for both structure and content in the Netherlands is suboptimal. This makes adherence to the guideline and ATLS-based course instructions difficult. PMID:27395381

  14. Evaluating Computer-Tutors: A Protocol Study.

    ERIC Educational Resources Information Center

    Strickland, James

    A protocol study investigated whether computer tutors (programs that interactively guide writers while they freewrite with a word processing program) promote or hinder a richer understanding of the composing process. The analysis focused on writers' attitudes toward computer tutors in the invention process. Data were collected by tape recording a…

  15. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... results and acceptance criterion. To determine whether a surrogate multi-purpose lighter resists operation... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  16. A Bayesian approach to optimizing cryopreservation protocols.

    PubMed

    Sambu, Sammy

    2015-01-01

    Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors) as preliminary meta-data, a decision tree learning analysis (DTLA) was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents), loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC) method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  17. Protocols for growing plant symbioses; mycorrhiza.

    PubMed

    Schultze, Michael

    2013-01-01

    Arbuscular mycorrhizal symbiosis is receiving increased attention as a potential contributor to sustainable crop plant nutrition. This chapter details a set of protocols for plant growth to study the development and physiology of the arbuscular mycorrhizal symbiosis, and how to establish root organ cultures for the production of axenic inoculum.

  18. Reliable multicasting in the Xpress Transport Protocol

    SciTech Connect

    Atwood, J.W.; Catrina, O.; Fenton, J.; Strayer, W.T.

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  19. A Geographical Heuristic Routing Protocol for VANETs.

    PubMed

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  20. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a... part. Readers should note, however, that certain of the OECD recommended test standards, such as test duration and selection of test species, are less restrictive than those recommended by EPA. Therefore,...