Sample records for previously established protocols

  1. Derivation of Thymic Lymphoma T-cell Lines from Atm-/- and p53-/- Mice

    PubMed Central

    Jinadasa, Rasika; Balmus, Gabriel; Gerwitz, Lee; Roden, Jamie; Weiss, Robert; Duhamel, Gerald

    2011-01-01

    Established cell lines are a critical research tool that can reduce the use of laboratory animals in research. Certain strains of genetically modified mice, such as Atm-/- and p53-/- consistently develop thymic lymphoma early in life 1,2, and thus, can serve as a reliable source for derivation of murine T-cell lines. Here we present a detailed protocol for the development of established murine thymic lymphoma T-cell lines without the need to add interleukins as described in previous protocols 1,3. Tumors were harvested from mice aged three to six months, at the earliest indication of visible tumors based on the observation of hunched posture, labored breathing, poor grooming and wasting in a susceptible strain 1,4. We have successfully established several T-cell lines using this protocol and inbred strains ofAtm-/- [FVB/N-Atmtm1Led/J] 2 and p53-/- [129/S6-Trp53tm1Tyj/J] 5 mice. We further demonstrate that more than 90% of the established T-cell population expresses CD3, CD4 and CD8. Consistent with stably established cell lines, the T-cells generated by using the present protocol have been passaged for over a year. PMID:21490582

  2. On fixed-area plot sampling for downed coarse woody debris

    Treesearch

    Jeffrey H. Gove; Paul C. Van Deusen

    2011-01-01

    The use of fixed-area plots for sampling down coarse woody debris is reviewed. A set of clearly defined protocols for two previously described methods is established and a new method, which we call the 'sausage' method, is developed. All methods (protocols) are shown to be unbiased for volume estimation, but not necessarily for estimation of population...

  3. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  4. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  5. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  6. Entanglement-based Free Space Quantum Cryptography in Daylight

    NASA Astrophysics Data System (ADS)

    Gerhardt, Ilja; Peloso, Matthew P.; Ho, Caleb; Lamas-Linares, Antia; Kurtsiefer, Christian

    2009-05-01

    In quantum key distribution (QKD) two families of protocols are established: One, based on preparing and sending approximations of single photons, the other based on measurements on entangled photon pairs, which allow to establish a secret key using less assumptions on the size of a Hilbert space. The larger optical bandwidth of photon pairs in comparison with light used for the first family makes establishing a free space link challenging. We present a complete entanglement based QKD system following the BBM92 protocol, which generates a secure key continuously 24 hours a day between distant parties. Spectral, spatial and temporal filtering schemes were introduced to a previous setup, suppressing more than 30,B of background. We are able to establish the link during daytime, and have developed an algorithm to start and maintain time synchronization with simple crystal oscillators.

  7. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

  8. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937

  9. Programmatic assessment of a university-based implant training program using patient-reported outcomes.

    PubMed

    Al-Sabbagh, Mohanad; Jenkins, Diane W; de Leeuw, Reny; Nihill, Patricia; Robinson, Fonda G; Thomas, Mark V

    2014-11-01

    The University of Kentucky College of Dentistry (UKCD) established an implant training program that provides training in the use of a single implant system, evidence-based diagnostic and treatment protocols (standardized work practices), and a total quality management system (Implant Quality Assurance Program). The aim of this study was to assess the programmatic effectiveness of the UKCD implant training program by reporting the success and survival of implants placed, using patient-reported outcomes and comparing them to previously established benchmarks. A total of 415 patients (963 implants) were interviewed, approximately 50 percent of all qualified patients. The implant survival rate was 97 percent, and 88 percent of the implants were considered successful (as determined by patient-centric criteria). These outcomes were consistent with the program's previously established benchmarks of 90 percent. These results suggest that work standardization (in the form of specific treatment protocols) and the use of a formal, incremental learning system can result in positive patient outcomes. Clinical outcomes should be monitored in academic dental settings as part of clinical process improvement, and these outcomes can provide a means of assessing the effectiveness of the training program.

  10. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  11. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  12. Results of the 2009 ASBVd survey of avocado accessions in the national germplasm collection in Florida

    USDA-ARS?s Scientific Manuscript database

    The presence of Avocado Sunblotch Viroid (ASBVd) infection among the avocado (Persea americana Mill.) accessions in the National Germplasm Repository at Miami (NGR-Mia) was established in previous studies. An ASBVd specific reverse transcription-polymerase chain reaction (RT-PCR) protocol was used t...

  13. Considerations in establishing a post-mortem brain and tissue bank for the study of myalgic encephalomyelitis/chronic fatigue syndrome: a proposed protocol.

    PubMed

    Nacul, Luis; O'Donovan, Dominic G; Lacerda, Eliana M; Gveric, Djordje; Goldring, Kirstin; Hall, Alison; Bowman, Erinna; Pheby, Derek

    2014-06-18

    Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments.

  14. [Acceptance and commitment therapy (ACT) and improving chess performance in promising young chess-players].

    PubMed

    Ruiz, Francisco J; Luciano, Carmen

    2009-08-01

    Acceptance and Commitment Therapy (ACT) is shown to be effective in relatively distant fields from the so-called psychological disorders. One of these areas is sport performance improvement. The aim of the current study is to expand the application of brief ACT protocols to improve chess-players' performance. In a previous study, a brief protocol was applied to international-level adult chess-players that was effective. The current study aims to apply an equivalent brief ACT protocol, but in this case, applied in a group format to promising young chess-players. In addition, this brief protocol is compared to a non-intervention control condition. Results show that the ACT brief protocol improved the performance in 5 out of 7 participants, and that none of the chess-players in the control condition reached the established change criterion. The differences between the conditions in chess performance were statistically significant. The results are discussed, emphasizing the replicated impact of a brief ACT protocol on the improvement of chess-players' performance.

  15. Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison.

    PubMed

    Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram

    2013-04-16

    To compare between 2 and 4 d colon cleansing protocols. Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Rate of adequate colon preparation. A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children's age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the "gold standard" protocol for children.

  16. Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison

    PubMed Central

    Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram

    2013-01-01

    AIM: To compare between 2 and 4 d colon cleansing protocols. METHODS: Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Main outcome measurements: Rate of adequate colon preparation. RESULTS: A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children’s age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). CONCLUSION: No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the “gold standard” protocol for children. PMID:23596539

  17. Institutional review board-based recommendations for medical institutions pursuing protocol approval for facial transplantation.

    PubMed

    Siemionow, Maria Z; Gordon, Chad R

    2010-10-01

    Preliminary outcomes from the previous nine face transplants performed since 2005 have been encouraging and have therefore led to a rise in the number of medical centers interested in establishing face transplant programs worldwide. However, until now, very little literature has been published providing surgeons the necessary insight on how to (1) prepare a protocol for institutional review board approval and (2) establish a face transplant program. The authors' face transplant team's experience with the institutional review board at the Cleveland Clinic, beginning in 2002, was critically reviewed in a detailed, retrospective manner. The purpose was to identify and define certain criteria necessary for both the institutional review board approval process and face transplant program establishment. In 2002, unprecedented efforts from within the authors' plastic surgery department led to the world's first institutional review board approval for face transplantation, in 2004. As a result, 4 years later, the authors' face transplant team performed the nation's first successful near-total face and maxilla transplant. Every surgical department hoping to establish a face transplant program must realize that this endeavor requires both tremendous financial and long-term commitments by its medical institution. These transplants should be performed only within university-based medical centers capable of orchestrating a specialized, talented, multidisciplinary team. More importantly, facial composite tissue allotransplantation possesses an unmatched level of complexity and therefore requires most centers to prepare a carefully detailed protocol using these institutional review board-based guidelines.

  18. Considerations in establishing a post-mortem brain and tissue bank for the study of myalgic encephalomyelitis/chronic fatigue syndrome: a proposed protocol

    PubMed Central

    2014-01-01

    Background Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. Findings We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. Conclusion An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments. PMID:24938650

  19. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

    PubMed Central

    Jen, Shang-Ming; Laih, Chi-Sung; Kuo, Wen-Chung

    2009-01-01

    MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. PMID:22408566

  20. Desensitization protocol enabling pediatric crossmatch-positive renal transplantation: successful HLA-antibody-incompatible renal transplantation of two highly sensitized children.

    PubMed

    Adamusiak, Anna M; Stojanovic, Jelena; Shaw, Olivia; Vaughan, Robert; Sebire, Neil J; Drage, Martin; Kessaris, Nicos; Marks, Stephen D; Mamode, Nizam

    2017-02-01

    Renal transplantation improves quality of life (QoL) and survival in children requiring renal replacement therapy (RRT). Sensitization with development of a broad-spectrum of anti-HLA antibodies as a result of previous transplantation or after receiving blood products is an increasing problem. There are no published reports of desensitization protocols in children allowing renal transplantation from HLA-antibody-incompatible living donors. We adopted our well-established adult desensitization protocol for this purpose and undertook HLA antibody-incompatible living donor renal transplants in two children: a 14-year-old girl and a 13-year-old boy. After 2 and 1.5 years of follow-up, respectively, both patients have stable renal allograft function despite a rise in donor-specific antibodies in one case. HLA-incompatible transplantation should be considered in selected cases for sensitized children.

  1. Enhancer scanning to locate regulatory regions in genomic loci

    PubMed Central

    Buckley, Melissa; Gjyshi, Anxhela; Mendoza-Fandiño, Gustavo; Baskin, Rebekah; Carvalho, Renato S.; Carvalho, Marcelo A.; Woods, Nicholas T.; Monteiro, Alvaro N.A.

    2016-01-01

    The present protocol provides a rapid, streamlined and scalable strategy to systematically scan genomic regions for the presence of transcriptional regulatory regions active in a specific cell type. It creates genomic tiles spanning a region of interest that are subsequently cloned by recombination into a luciferase reporter vector containing the Simian Virus 40 promoter. Tiling clones are transfected into specific cell types to test for the presence of transcriptional regulatory regions. The protocol includes testing of different SNP (single nucleotide polymorphism) alleles to determine their effect on regulatory activity. This procedure provides a systematic framework to identify candidate functional SNPs within a locus during functional analysis of genome-wide association studies. This protocol adapts and combines previous well-established molecular biology methods to provide a streamlined strategy, based on automated primer design and recombinational cloning to rapidly go from a genomic locus to a set of candidate functional SNPs in eight weeks. PMID:26658467

  2. Preparation of Human Primary Colon Tissue-Derived Organoid Using Air Liquid Interface Culture.

    PubMed

    Usui, Tatsuya; Sakurai, Masashi; Umata, Koji; Yamawaki, Hideyuki; Ohama, Takashi; Sato, Koichi

    2018-02-21

    In vitro analysis of intestinal epithelium has been hindered by a lack of suitable culture systems useful for gastrointestinal research. To overcome the problem, an air liquid interface (ALI) method using a collagen gel was established to culture three-dimensional primary cells containing both primary epithelial and mesenchymal components from mouse gastrointestinal tissues. ALI organoids accurately recapitulate organ structures, multilineage differentiation, and physiology. Since ALI organoids from human tissues have not been produced, we modified the previous protocol for mouse ALI organoid culture to establish the culture system of ALI organoids from normal and tumor colorectal tissues of human patients. The current unit presents a protocol for preparation of the ALI organoid culture from normal and tumor colorectal tissues of human patients. ALI organoid culture from human tissues might be useful for examining not only resistance to chemotherapy in a tumor microenvironment but also toxic effects on organoids. © 2018 by John Wiley & Sons, Inc. Copyright © 2018 John Wiley & Sons, Inc.

  3. 3D spheroid culture of hESC/hiPSC-derived hepatocyte-like cells for drug toxicity testing.

    PubMed

    Takayama, Kazuo; Kawabata, Kenji; Nagamoto, Yasuhito; Kishimoto, Keisuke; Tashiro, Katsuhisa; Sakurai, Fuminori; Tachibana, Masashi; Kanda, Katsuhiro; Hayakawa, Takao; Furue, Miho Kusuda; Mizuguchi, Hiroyuki

    2013-02-01

    Although it is expected that hepatocyte-like cells differentiated from human embryonic stem (ES) cells or induced pluripotent stem (iPS) cells will be utilized in drug toxicity testing, the actual applicability of hepatocyte-like cells in this context has not been well examined so far. To generate mature hepatocyte-like cells that would be applicable for drug toxicity testing, we established a hepatocyte differentiation method that employs not only stage-specific transient overexpression of hepatocyte-related transcription factors but also a three-dimensional spheroid culture system using a Nanopillar Plate. We succeeded in establishing protocol that could generate more matured hepatocyte-like cells than our previous protocol. In addition, our hepatocyte-like cells could sensitively predict drug-induced hepatotoxicity, including reactive metabolite-mediated toxicity. In conclusion, our hepatocyte-like cells differentiated from human ES cells or iPS cells have potential to be applied in drug toxicity testing. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  5. Improvements in the order, isotropy and electron density of glypican-1 crystals by controlled dehydration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Awad, Wael; Cairo University, Cairo; Svensson Birkedal, Gabriel

    The anisotropy of crystals of glypican-1 was significantly reduced by controlled dehydration using the HC1 device, allowing the building of previously disordered parts of the structure. The use of controlled dehydration for improvement of protein crystal diffraction quality is increasing in popularity, although there are still relatively few documented examples of success. A study has been carried out to establish whether controlled dehydration could be used to improve the anisotropy of crystals of the core protein of the human proteoglycan glypican-1. Crystals were subjected to controlled dehydration using the HC1 device. The optimal protocol for dehydration was developed by carefulmore » investigation of the following parameters: dehydration rate, final relative humidity and total incubation time T{sub inc}. Of these, the most important was shown to be T{sub inc}. After dehydration using the optimal protocol the crystals showed significantly reduced anisotropy and improved electron density, allowing the building of previously disordered parts of the structure.« less

  6. Desensitization to clopidogrel: a tailor-made protocol.

    PubMed

    Barreira, P; Cadinha, S; Malheiro, D; Moreira da Silva, J P

    2014-01-01

    Clopidogrel is an antiplatelet drug widely used for treatment and prevention of a variety of cardiovascular diseases. We report a successful desensitization to clopidogrel in a 70-year-old Caucasian man with delayed hypersensitivity (HS) reaction. He developed lip, hand and foot swelling, erythematous papular non-pruritic lesions and arthralgias 2 weeks after starting treatment with clopidogrel 75 mg/d. A 3-hour desensitization protocol was started, achieving a cumulative dose of 154 mg without any reaction, and a daily dose of 75 mg was recommended. On the 4th day, the patient developed skin lesions similar to the previously described. He was treated with topical steroids and oral antihistamines, and the daily dose of clopidogrel was reduced to 20 mg. A new desensitization protocol was established, with a slow dose increment, according to the patient's response. It was only possible to achieve the dose of 75 mg/d after 2 months. Although well tolerated by most patients, HS reactions with clopidogrel may occur and desensitization is rising as a safe alternative in those patients. In delayed reactions with cutaneous lesions, a slower desensitization protocol may be necessary, as in this case.

  7. Validation of the content of the prevention protocol for early sepsis caused by Streptococcus agalactiaein newborns

    PubMed Central

    da Silva, Fabiana Alves; Vidal, Cláudia Fernanda de Lacerda; de Araújo, Ednaldo Cavalcante

    2015-01-01

    Abstract Objective: to validate the content of the prevention protocol for early sepsis caused by Streptococcus agalactiaein newborns. Method: a transversal, descriptive and methodological study, with a quantitative approach. The sample was composed of 15 judges, 8 obstetricians and 7 pediatricians. The validation occurred through the assessment of the content of the protocol by the judges that received the instrument for data collection - checklist - which contained 7 items that represent the requisites to be met by the protocol. The validation of the content was achieved by applying the Content Validity Index. Result: in the judging process, all the items that represented requirements considered by the protocol obtained concordance within the established level (Content Validity Index > 0.75). Of 7 items, 6 have obtained full concordance (Content Validity Index 1.0) and the feasibility item obtained a Content Validity Index of 0.93. The global assessment of the instruments obtained a Content Validity Index of 0.99. Conclusion: the validation of content that was done was an efficient tool for the adjustment of the protocol, according to the judgment of experienced professionals, which demonstrates the importance of conducting a previous validation of the instruments. It is expected that this study will serve as an incentive for the adoption of universal tracking by other institutions through validated protocols. PMID:26444165

  8. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically-defined format. PMID:25472549

  9. Comparison of two progressive treadmill tests in patients with peripheral arterial disease.

    PubMed

    Riebe, D; Patterson, R B; Braun, C M

    2001-11-01

    In a vascular rehabilitation program, 28% of our frail elderly patients are unable to be tested with traditional progressive exercise protocols at program entry due to the high (2.0 miles/h or 3.2 km/h) initial treadmill speeds. The purpose of this investigation was to compare a new progressive treadmill protocol which has a reduced initial speed (1.0 mile/h or 1.6 km/h) to an established protocol performed at 2.0 miles/h (3.2 km/h) to determine the comparability and reproducibility of the new protocol. Eleven patients with arterial claudication performed three symptom-limited exercise tests in random order. Two tests used the new protocol while the remaining trial used the established protocol. Claudication pain was measured using a 5-point scale. Oxygen consumption, heart rate, minute ventilation, respiratory exchange ratio and blood pressure at peak exercise were similar among the three trials. There were strong intraclass correlations for peak oxygen consumption (r = 0.97), onset of claudication (r = 0.96) and maximum walking time (r = 0.98) between the two trials using the new protocol. There was also a significant correlation between the new protocol and the established protocol for peak oxygen consumption (r = 0.90) and maximum walking time (r = 0.89). The new progressive treadmill protocol represents a valid, reliable protocol for patients with arterial claudication. This protocol may be useful for testing patients with a low functional capacity so that clinically appropriate exercise prescriptions can be established and the efficacy of treatments can be determined.

  10. An Interlaboratory Validation of the Radiation Dose Response Relationship (DRR) for H-ARS in the Rhesus Macaque.

    PubMed

    Thrall, Karla D; Love, Ruschelle; OʼDonnell, Kyle C; Farese, Ann M; Manning, Ronald; MacVittie, Thomas J

    2015-11-01

    The Medical Countermeasures against Radiological Threats (MCART) consortium has established a dose response relationship for the hematopoietic acute radiation syndrome (HARS) in the rhesus macaque conducted under an individualized supportive care protocol, including blood transfusions. Application of this animal model as a platform for demonstrating efficacy of candidate medical countermeasures is significantly strengthened when the model is independently validated at multiple institutions. The study reported here describes implementation of standard operating procedures at an institute outside the consortium in order to evaluate the ability to establish an equivalent radiation dose response relationship in a selected species. Validation of the animal model is a significant component for consideration of the model protocol as an FDA-recommended drug development tool in the context of the "Animal Rule." In the current study, 48 male rhesus macaques (4-8 kg) were exposed to total-body irradiation (TBI) using 6 MV photon energy at a dose rate of approximately 0.8 Gy min. Results show that onset and duration of the hematological response, including anemia, neutropenia, and thrombocytopenia, following TBI ranging from 6.25 to 8.75 Gy correlate well with previously reported findings. The lethality values at 60 d following TBI were estimated to be 6.88 Gy (LD30/60), 7.43 Gy (LD50/60), and 7.98 Gy (LD70/60). These values are equivalent to those published previously of 7.06 Gy (LD30/60), 7.52 Gy (LD50/60), and 7.99 Gy (LD70/60); the DRR slope (p = 0.68) and y-intercepts show agreement along the complete dose range for HARS. The ability to replicate the previously established institutional lethality profile (PROBIT) and model outcomes through careful implementation of defined procedures is a testament to the robustness of the model and highlights the need for consistency in procedures.

  11. 78 FR 11640 - Information Collection Request Submitted to OMB for Review and Approval; Comment Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... Protocol on Substances That Deplete the Ozone Layer (Protocol) and Title VI of the Clean Air Act Amendments (CAAA) established limits on total U.S. production, import, and export of class I and class II... transformed, destroyed, or exported to developing countries. The Protocol also establishes limits and...

  12. Improvements in the order, isotropy and electron density of glypican-1 crystals by controlled dehydration.

    PubMed

    Awad, Wael; Svensson Birkedal, Gabriel; Thunnissen, Marjolein M G M; Mani, Katrin; Logan, Derek T

    2013-12-01

    The use of controlled dehydration for improvement of protein crystal diffraction quality is increasing in popularity, although there are still relatively few documented examples of success. A study has been carried out to establish whether controlled dehydration could be used to improve the anisotropy of crystals of the core protein of the human proteoglycan glypican-1. Crystals were subjected to controlled dehydration using the HC1 device. The optimal protocol for dehydration was developed by careful investigation of the following parameters: dehydration rate, final relative humidity and total incubation time Tinc. Of these, the most important was shown to be Tinc. After dehydration using the optimal protocol the crystals showed significantly reduced anisotropy and improved electron density, allowing the building of previously disordered parts of the structure.

  13. Venous Thoracic Outlet Compression and the Paget-Schroetter Syndrome: A Review and Recommendations for Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thompson, J. F., E-mail: j.f.thompson@exeter.ac.uk; Winterborn, R. J.; Bays, S.

    2011-10-15

    Paget Schroetter syndrome, or effort thrombosis of the axillosubclavian venous system, is distinct from other forms of upper limb deep vein thrombosis. It occurs in younger patients and often is secondary to competitive sport, music, or strenuous occupation. If untreated, there is a higher incidence of disabling venous hypertension than was previously appreciated. Anticoagulation alone or in combination with thrombolysis leads to a high rate of rethrombosis. We have established a multidisciplinary protocol over 15 years, based on careful patient selection and a combination of lysis, decompressive surgery, and postoperative percutaneous venoplasty. During the past 10 years, a total ofmore » 232 decompression procedures have been performed. This article reviews the literature and presents the Exeter Protocol along with practical recommendations for management.« less

  14. Site Fidelity, Associations and Long-Term Bonds of Short-Finned Pilot Whales off the Island of Hawai’i

    DTIC Science & Technology

    2012-01-01

    matching was done visually using ACDSee 8.0 and 10 Photo Manager Software. Photographic encounters were processed using previously established protocols...1-4 (1=poor, 2=fair, 3=good, 4=excellent) using several criteria such as the focal clarity, size of animal in the frame, image contrast, and angle...the image needed to be of good to excellent focal clarity, positioned squarely with respect to 31 the photographer, etc. Similarly, the

  15. A Department-of-Anesthesiology-based management protocol for perioperative corneal abrasions

    PubMed Central

    Lichter, Jessica R; Marr, Lawrence B; Schilling, Dennis E; Hudson, Mark E; Boretsky, Robert H; Barad, Roxana F; Chelly, Jacques E

    2015-01-01

    Introduction Corneal abrasions (CAs) are the most prevalent ocular injuries in the perioperative period. Previously, patients at our community hospital would wait for an ophthalmologist to be available to manage these minor injuries. To decrease this waiting period – and thereby increase patient satisfaction – we developed an anesthesiology-based protocol to manage minor CAs arising in the recovery room. The current study sought to assess this protocol’s efficacy as well as further establish the incidence and some risk factors of CA. Methods This was a hospital-based, observational study. As per protocol, anesthesiologists saw and diagnosed any patient exhibiting symptoms of CA, after which they initiated a preestablished treatment regimen. To examine the efficacy of this protocol between March 2007 and December 2011, the number of CAs anesthesiologists managed and time to treatment were recorded. Additionally, the frequency of CAs was established along with some of their risk factors. Results Throughout the study period, there were 91,064 surgical cases, with 118 CAs (0.13% incidence). Anesthesiology alone managed 110 (93.22%) of these cases. The median time between the end of anesthesia to the time of prescribed ophthalmic medication was 156 minutes (first–third interquartile range: 108–219). All patients experienced resolution of symptoms by the morning following their complaint. Compared to the general surgical population, CA patients were older (P<0.01) and underwent longer surgeries (P<0.01). Conclusion Minor CAs can be safely and effectively managed using an anesthesiology-based approach. Advanced age and longer surgery are confirmed as risk factors for these injuries. PMID:26392749

  16. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2017-05-01

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  17. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

    PubMed

    Leverrier, Anthony

    2017-05-19

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual de Finetti theorems), and by introducing generalized SU(2,2) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  18. Effects of Withdrawal from Chronic Intermittent Ethanol Vapor on the Level and Circadian Periodicity of Running-Wheel Activity in C57BL/6J and C3H/HeJ Mice

    PubMed Central

    Logan, Ryan W.; McCulley, Walter D.; Seggio, Joseph A.; Rosenwasser, Alan M.

    2011-01-01

    Background Alcohol withdrawal is associated with behavioral and chronobiological disturbances that may persist during protracted abstinence. We previously reported that C57BL/6J (B6) mice show marked but temporary reductions in running-wheel activity, and normal free-running circadian rhythms, following a 4-day chronic intermittent ethanol vapor (CIE) exposure (16 hours of ethanol vapor exposure alternating with 8 hours of withdrawal). In the present experiments, we extend these observations in two ways: (1) by examining post-CIE locomotor activity in C3H/HeJ (C3H) mice, an inbred strain characterized by high sensitivity to ethanol withdrawal, and (2) by directly comparing the responses of B6 and C3H mice to a longer-duration CIE protocol. Methods In Experiment 1, C3H mice were exposed to the same 4-day CIE protocol used in our previous study with B6 mice (referred to here as the 1-cycle CIE protocol). In Experiment 2, C3H and B6 mice were exposed to three successive 4-day CIE cycles, each separated by 2 days of withdrawal (the 3-cycle CIE protocol). Running-wheel activity was monitored prior to and following CIE, and post-CIE activity was recorded in constant darkness to allow assessment of free-running circadian period and phase. Results C3H mice displayed pronounced reductions in running-wheel activity that persisted for the duration of the recording period (up to 30 days) following both 1-cycle (Experiment 1) and 3-cycle (Experiment 2) CIE protocols. In contrast, B6 mice showed reductions in locomotor activity that persisted for about one week following the 3-cycle CIE protocol, similar to the results of our previous study using a 1-cycle protocol in this strain. Additionally, C3H mice showed significant shortening of free-running period following the 3-cycle, but not the 1-cycle, CIE protocol, while B6 mice showed normal free-running rhythms. Conclusions These results reveal genetic differences in the persistence of ethanol withdrawal-induced hypo-locomotion. In addition, chronobiological alterations during extended abstinence may depend on both genetic susceptibility and an extended prior withdrawal history. The present data establish a novel experimental model for long-term behavioral and circadian disruptions associated with ethanol withdrawal. PMID:22013893

  19. The introduction of a protocol for the use of biobrane for facial burns in children.

    PubMed

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  20. Long-term effects of controllability or the lack of it on coping abilities and stress resilience in the rat.

    PubMed

    Lucas, Morgan; Ilin, Yana; Anunu, Rachel; Kehat, Orli; Xu, Lin; Desmedt, Aline; Richter-Levin, Gal

    2014-09-01

    Findings suggest that stress-induced impaired learning and coping abilities may be attributed more to the psychological nature of the stressor, rather than its physical properties. It has been proposed that establishing controllability over stressors can ameliorate some of its effects on cognition and behavior. Gaining controllability was suggested to be associated with the development of stress resilience. Based on repeated exposure to the two-way shuttle avoidance task, we previously developed and validated a behavioral task that leads to a strict dissociation between gaining controllability (to the level that the associated fear is significantly reduced) and a fearful state of uncontrollability. Employing this protocol, we investigated here the impact of gaining or failing to gain emotional controllability on indices of anxiety and depression and on subsequent abilities to cope with positively or negatively reinforcing learning experiences. In agreement with previous studies, rats exposed to the uncontrollable protocol demonstrated high concentration of sera corticosterone, increased immobility, reduced duration of struggling in the forced swim test and impaired ability to acquire subsequent learning tasks. Achieving emotional controllability resulted in resilience to stress as was indicated by longer duration of struggling in the forced swim test, and enhanced learning abilities. Our prolonged training protocol, with the demonstrated ability of rats to gain emotional controllability, is proposed as a useful tool to study the neurobiological mechanisms of stress resilience.

  1. Rapid Quantification of Abscisic Acid by GC-MS/MS for Studies of Abiotic Stress Response.

    PubMed

    Verslues, Paul E

    2017-01-01

    Drought and low water potential induce large increases in Abscisic Acid (ABA ) content of plant tissue. This increased ABA content is essential to regulate downstream stress resistance responses; however, the mechanisms regulating ABA accumulation are incompletely known. Thus, the ability to accurately quantify ABA at high throughput and low cost is important for plant stress research. We have combined and modified several previously published protocols to establish a rapid ABA analysis protocol using gas chromatography-tandem mass spectrometry (GC-MS/MS). Derivatization of ABA is performed with (trimethylsilyl)-diazomethane rather than the harder to prepare diazomethane. Sensitivity of the analysis is sufficient that small samples of low water potential treated Arabidopsis thaliana seedlings can be routinely analyzed in reverse genetic studies of putative stress regulators as well as studies of natural variation in ABA accumulation.

  2. Establishment of a multidisciplinary concussion program: impact of standardization on patient care and resource utilization.

    PubMed

    Wilkins, Sara Anne; Shannon, Chevis N; Brown, Steven T; Vance, E Haley; Ferguson, Drew; Gran, Kimberly; Crowther, Marshall; Wellons, John C; Johnston, James M

    2014-01-01

    Recent legislation and media coverage have heightened awareness of concussion in youth sports. Previous work by the authors' group defined significant variation of care in management of children with concussion. To address this variation, a multidisciplinary concussion program was established based on a uniform management protocol, with emphasis on community outreach via traditional media sources and the Internet. This retrospective study evaluates the impact of standardization of concussion care and resource utilization before and after standardization in a large regional pediatric hospital center. This retrospective study included all patients younger than 18 years of age evaluated for sports-related concussion between January 1, 2007, and December 31, 2011. Emergency department, sports medicine, and neurosurgery records were reviewed. Data collected included demographics, injury details, clinical course, Sports Concussion Assessment Tool-2 (SCAT2) scores, imaging, discharge instructions, and referral for specialty care. The cohort was analyzed comparing patients evaluated before and after standardization of care. Five hundred eighty-nine patients were identified, including 270 before standardization (2007-2011) and 319 after standardization (2011-2012). Statistically significant differences (p < 0.0001) were observed between the 2 groups for multiple variables: there were more girls, more first-time concussions, fewer initial presentations to the emergency department, more consistent administration of the SCAT2, and more consistent supervision of return to play and return to think after adoption of the protocol. A combination of increased public awareness and legislation has led to a 5-fold increase in the number of youth athletes presenting for concussion evaluation at the authors' center. Establishment of a multidisciplinary clinic with a standardized protocol resulted in significantly decreased institutional resource utilization and more consistent concussion care for this growing patient population.

  3. Comparative marker analysis after isolation and culture of testicular cells from the immature marmoset.

    PubMed

    Albert, Silvia; Wistuba, Joachim; Eildermann, Katja; Ehmcke, Jens; Schlatt, Stefan; Gromoll, Joerg; Kossack, Nina

    2012-01-01

    The marmoset monkey is a valuable model in reproductive medicine. While previous studies have evaluated germ cell dynamics in the postnatal marmoset, the features of testicular somatic cells remain largely unknown. Therefore, the aim of this study was to establish marmoset-specific markers for Sertoli and peritubular cells (PTCs) and to compare protocols for the enrichment and culture of testicular cell types. Immunohistochemistry of Sertoli and PTC-specific markers - anti-müllerian hormone (AMH), vimentin (VIM), α-smooth muscle actin (SMA) - was performed and corresponding RNA expression profiles were established by quantitative PCR analysis (SOX9,AMH, FSHR,VIM, and SMA). For these analyses, testicular tissue from newborn (n = 4), 8-week-old (n = 4) and adult (n = 3) marmoset monkeys was used. Protocols for the enrichment and culture of testicular cell fractions from the 8-week-old marmoset monkeys (n = 3) were evaluated and cells were analyzed using germ cell- and somatic cell-specific markers. The expression of AMH, VIM and SMA reflects the proportion and differentiation status of Sertoli and PTCs at the RNA and the protein levels. While applied protocols did not support the propagation of germ cells in vitro, our analyses revealed that PTCs maintain their proliferative potential and constitute the dominant cell type after short- and long-term culture. Expression of functionally meaningful testicular somatic markers is similar in the human and the marmoset monkey, indicating that this primate can indeed be used as model for human testicular development. The PTC culture system established in this study will facilitate the identification of factors influencing male sex differentiation and spermatogenesis. Copyright © 2012 S. Karger AG, Basel.

  4. Establishing treatment protocols for clinical mastitis.

    PubMed

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  5. Young investigator challenge: Validation and optimization of immunohistochemistry protocols for use on cellient cell block specimens.

    PubMed

    Sauter, Jennifer L; Grogg, Karen L; Vrana, Julie A; Law, Mark E; Halvorson, Jennifer L; Henry, Michael R

    2016-02-01

    The objective of the current study was to establish a process for validating immunohistochemistry (IHC) protocols for use on the Cellient cell block (CCB) system. Thirty antibodies were initially tested on CCBs using IHC protocols previously validated on formalin-fixed, paraffin-embedded tissue (FFPE). Cytology samples were split to generate thrombin cell blocks (TCB) and CCBs. IHC was performed in parallel. Antibody immunoreactivity was scored, and concordance or discordance in immunoreactivity between the TCBs and CCBs for each sample was determined. Criteria for validation of an antibody were defined as concordant staining in expected positive and negative cells, in at least 5 samples each, and concordance in at least 90% of the samples total. Antibodies that failed initial validation were retested after alterations in IHC conditions. Thirteen of the 30 antibodies (43%) did not meet initial validation criteria. Of those, 8 antibodies (calretinin, clusters of differentiation [CD] 3, CD20, CDX2, cytokeratin 20, estrogen receptor, MOC-31, and p16) were optimized for CCBs and subsequently validated. Despite several alterations in conditions, 3 antibodies (Ber-EP4, D2-40, and paired box gene 8 [PAX8]) were not successfully validated. Nearly one-half of the antibodies tested in the current study failed initial validation using IHC conditions that were established in the study laboratory for FFPE material. Although some antibodies subsequently met validation criteria after optimization of conditions, a few continued to demonstrate inadequate immunoreactivity. These findings emphasize the importance of validating IHC protocols for methanol-fixed tissue before clinical use and suggest that optimization for alcohol fixation may be needed to obtain adequate immunoreactivity on CCBs. © 2016 American Cancer Society.

  6. Apomorphine conditioning and sensitization: the paired/unpaired treatment order as a new major determinant of drug conditioned and sensitization effects.

    PubMed

    de Matos, Liana Wermelinger; Carey, Robert J; Carrera, Marinete Pinheiro

    2010-09-01

    Repeated treatments with psychostimulant drugs generate behavioral sensitization. In the present study we employed a paired/unpaired protocol to assess the effects of repeated apomorphine (2.0 mg/kg) treatments upon locomotion behavior. In the first experiment we assessed the effects of conditioning upon apomorphine sensitization. Neither the extinction of the conditioned response nor a counter-conditioning procedure in which we paired an inhibitory treatment (apomorphine 0.05 mg/kg) with the previously established conditioned stimulus modified the sensitization response. In the second experiment, we administered the paired/unpaired protocol in two phases. In the second phase, we reversed the paired/unpaired protocol. Following the first phase, the paired group alone exhibited conditioned locomotion in the vehicle test and a sensitization response. In the second phase, the initial unpaired group which received 5 paired apomorphine trials during the reversal phase did not develop a conditioned response but developed a potentiated sensitization response. This disassociation of the conditioned response from the sensitization response is attributed to an apomorphine anti-habituation effect that can generate a false positive Pavlovian conditioned response effect. The potentiated sensitization response induced by the treatment reversal protocol points to an important role for the sequential experience of the paired/unpaired protocol in behavioral sensitization. 2010 Elsevier Inc. All rights reserved.

  7. “Early Trigger” Intravenous Vitamin K

    PubMed Central

    Diament, Marina; MacLeod, Kirsty; O’Hare, Jonathan; Tate, Anne

    2015-01-01

    Best practice tariff (BPT) was introduced as a financial incentive model to improve compliance with evidence-based care, such as operation for hip fracture within 36 hours of admission. We previously evaluated the impact of warfarin on patients with hip fracture, revealing significant delay to operation and subsequent loss of revenue. As a result of this, an “early trigger” intravenous vitamin K (IVK) pathway was introduced and the service reaudited a year later. The first cycle was a retrospective audit of all cases with hip fracture against BPT standards over a 32-month period. Subsequent protocol change resulted in all warfarinised cases being given 2 mg IVK in the emergency department prior to blood testing. This protocol was reaudited against the same BPT standards 12 months later. An intention-to-treat approach was used, despite breaches of protocol and other reasons for patients not progressing to theater. The data were analyzed with parametric tools to establish true clinical and statistical impact of the introduction of the protocol. In the first cycle, 80 patients were admitted on warfarin with a mean time to theater of 53.71 hours. Of these patients, 79% breached BPT due to anticoagulation. Twelve months following protocol introduction, 42 patients had a mean time to theater of 37.61 hours. Of these patients, 34% breached BPT due to anticoagulation. These data are both clinically and statistically significant (P < .001). No adverse events occurred. We have shown for the first time that “early-trigger” IVK can reduce delay to theater and maximize tariff payments in warfarinised patients with hip fracture. This is in addition to other established benefits associated with early surgery such as decreasing risk of pressure lesions and pneumonia. It affords high-quality patient-centered care while ensuring trauma units achieve maximal financial reimbursement through pay for improved performance and supports a culture of change behavior. PMID:26623160

  8. Implant Rehabilitation Planning Protocol for the Edentulous Patient According to Denture Space, Lip Support, and Smile Line.

    PubMed

    Lago, Laura; Rilo, Benito; Fernández-Formoso, Noelia; DaSilva, Luis

    2017-08-01

    Rehabilitation with implants is a challenge. Having previous evaluation criteria is key to establishing the best treatment for the patient. In addition to clinical and radiological aspects, the prosthetic parameters must be taken into account in the initial workup, since they allow discrimination between fixed and removable rehabilitation. We present a study protocol that analyzes three basic prosthetic aspects. First, denture space defines the need to replace teeth, tissue, or both. Second, lip support focuses on whether or not to include a flange. Third, the smile line warns of potential risks in esthetic rehabilitation. Combining these parameters allows us to make a decision as to the most suitable type of prosthesis. The proposed protocol is useful for assessing the prosthetic parameters that influence decision making as to the best-suited type of restoration. From this point of view, we think it is appropriate for the initial approach to the patient. In any case, other considerations of study may amend the proposal. © 2016 by the American College of Prosthodontists.

  9. Elucidation of several neglected reactions in the GC-MS identification of sialic acids as heptafluorobutyrates calls for an urgent reassessment of previous claims.

    PubMed

    Rota, Paola; Anastasia, Luigi; Allevi, Pietro

    2015-05-07

    The current analytical protocol used for the GC-MS determination of free or 1,7-lactonized natural sialic acids (Sias), as heptafluorobutyrates, overlooks several transformations. Using authentic reference standards and by combining GC-MS and NMR analyses, flaws in the analytical protocol were pinpointed and elucidated, thus establishing the scope and limitations of the method. It was demonstrated that (a) Sias 1,7-lactones, even if present in biological samples, decompose under the acidic hydrolysis conditions used for their release; (b) Sias 1,7-lactones are unpredicted artifacts, accidentally generated from their parent acids; (c) the N-acetyl group is quantitatively exchanged with that of the derivatizing perfluorinated anhydride; (d) the partial or complete failure of the Sias esterification-step with diazomethane leads to the incorrect quantification and structure attribution of all free Sias. While these findings prompt an urgent correction and improvement of the current analytical protocol, they could be instrumental for a critical revision of many incorrect claims reported in the literature.

  10. 77 FR 36281 - Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ...] Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol AGENCY... Register notice informs the public that OIG: (1) Intends to update the Provider Self-Disclosure Protocol... Provider Self-Disclosure Protocol (the Protocol) to establish a process for health care providers to...

  11. Enhanced protein electrophoresis technique for separating human skeletal muscle myosin heavy chain isoforms

    NASA Technical Reports Server (NTRS)

    Bamman, M. M.; Clarke, M. S.; Talmadge, R. J.; Feeback, D. L.

    1999-01-01

    Talmadge and Roy (J. Appl. Physiol. 1993, 75, 2337-2340) previously established a sodium dodecyl sulfate - polyacrylamide gel electrophoresis (SDS-PAGE) protocol for separating all four rat skeletal muscle myosin heavy chain (MHC) isoforms (MHC I, IIa, IIx, IIb); however, when applied to human muscle, the type II MHC isoforms (Ila, IIx) are not clearly distinguished. In this brief paper we describe a modification of the SDS-PAGE protocol which yields distinct and consistent separation of all three adult human MHC isoforms (MHC I, IIa, IIx) in a minigel system. MHC specificity of each band was confirmed by Western blot using three monoclonal IgG antibodies (mAbs) immunoreactive against MHCI (mAb MHCs, Novacastra Laboratories), MHCI+IIa (mAb BF-35), and MHCIIa+IIx (mAb SC-71). Results provide a valuable SDS-PAGE minigel technique for separating MHC isoforms in human muscle without the difficult task of casting gradient gels.

  12. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    PubMed Central

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  13. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    PubMed

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  14. Short-Term PTEN Inhibition Improves In Vitro Activation of Primordial Follicles, Preserves Follicular Viability, and Restores AMH Levels in Cryopreserved Ovarian Tissue From Cancer Patients.

    PubMed

    Novella-Maestre, Edurne; Herraiz, Sonia; Rodríguez-Iglesias, Beatriz; Díaz-García, César; Pellicer, Antonio

    2015-01-01

    In vitro activation and growth of primordial dormant follicles to produce fertilizable oocytes would provide a useful instrument for fertility preservation. The employment of Phosphatase and TENsin homolog (PTEN) inhibitors, in combination with Protein kinase B (Akt) stimulating molecules, has been previously employed to increase follicular activation through the stimulation of the PTEN-Akt pathway. We aim to establish improved in vitro activation also for cancer patients whose ovarian tissue has already been cryopreserved. Fresh and previously cryopreserved human ovarian cortex were exposed to short-term, low-concentration and ovary-specific treatment with only a PTEN inhibitor. Our in vitro activation protocol enhances the activation mechanisms of primordial follicles in both fresh and cryopreserved samples, and enlarges growing populations without inducing apoptosis in either follicles or the surrounding stroma. Treatment augments estradiol secretion and restores the expression levels of the previously diminished Anti-Müllerian hormone by means of cryopreservation procedures. Genomic modulation of the relative expression of PTEN pathway genes was found in treated samples. The in vitro activation protocol offers new alternatives for patients with cryopreserved tissue as it increases the pool of viable activated follicles available for in vitro growth procedures. The combination of ovarian tissue cryopreservation and in vitro activation of primordial follicles, the main ovarian reserve component, will be a major advancement in fertility preservation.

  15. Quantum cryptography without switching.

    PubMed

    Weedbrook, Christian; Lance, Andrew M; Bowen, Warwick P; Symul, Thomas; Ralph, Timothy C; Lam, Ping Koy

    2004-10-22

    We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.

  16. Londrina Activities of Daily Living Protocol: Reproducibility, Validity, and Reference Values in Physically Independent Adults Age 50 Years and Older.

    PubMed

    Paes, Thaís; Belo, Letícia Fernandes; da Silva, Diego Rodrigues; Morita, Andrea Akemi; Donária, Leila; Furlanetto, Karina Couto; Sant'Anna, Thaís; Pitta, Fabio; Hernandes, Nidia Aparecida

    2017-03-01

    It is important to assess activities of daily living (ADL) in older adults due to impairment of independence and quality of life. However, there is no objective and standardized protocol available to assess this outcome. Thus, the aim of this study was to verify the reproducibility and validity of a new protocol for ADL assessment applied in physically independent adults age ≥50 y, the Londrina ADL protocol, and to establish an equation to predict reference values of the Londrina ADL protocol. Ninety-three physically independent adults age ≥50 y had their performance in ADL evaluated by registering the time spent to conclude the protocol. The protocol was performed twice. The 6-min walk test, which assesses functional exercise capacity, was used as a validation criterion. A multiple linear regression model was applied, including anthropometric and demographic variables that correlated with the protocol, to establish an equation to predict the protocol's reference values. In general, the protocol was reproducible (intraclass correlation coefficient 0.91). The average difference between the first and second protocol was 5.3%. The new protocol was valid to assess ADL performance in the studied subjects, presenting a moderate correlation with the 6-min walk test (r = -0.53). The time spent to perform the protocol correlated significantly with age (r = 0.45) but neither with weight (r = -0.17) nor with height (r = -0.17). A model of stepwise multiple regression including sex and age showed that age was the only determinant factor to the Londrina ADL protocol, explaining 21% ( P < .001) of its variability. The derived reference equation was: Londrina ADL protocol pred (s) = 135.618 + (3.102 × age [y]). The Londrina ADL protocol was reproducible and valid in physically independent adults age ≥50 y. A reference equation for the protocol was established including only age as an independent variable (r 2 = 0.21), allowing a better interpretation of the protocol's results in clinical practice. Copyright © 2017 by Daedalus Enterprises.

  17. New Protocol Based on UHPLC-MS/MS for Quantitation of Metabolites in Xylose-Fermenting Yeasts

    NASA Astrophysics Data System (ADS)

    Campos, Christiane Gonçalves; Veras, Henrique César Teixeira; de Aquino Ribeiro, José Antônio; Costa, Patrícia Pinto Kalil Gonçalves; Araújo, Katiúscia Pereira; Rodrigues, Clenilson Martins; de Almeida, João Ricardo Moreira; Abdelnur, Patrícia Verardi

    2017-12-01

    Xylose fermentation is a bottleneck in second-generation ethanol production. As such, a comprehensive understanding of xylose metabolism in naturally xylose-fermenting yeasts is essential for prospection and construction of recombinant yeast strains. The objective of the current study was to establish a reliable metabolomics protocol for quantification of key metabolites of xylose catabolism pathways in yeast, and to apply this protocol to Spathaspora arborariae. Ultra-high performance liquid chromatography coupled to tandem mass spectrometry (UHPLC-MS/MS) was used to quantify metabolites, and afterwards, sample preparation was optimized to examine yeast intracellular metabolites. S. arborariae was cultivated using xylose as a carbon source under aerobic and oxygen-limited conditions. Ion pair chromatography (IPC) and hydrophilic interaction liquid chromatography-tandem mass spectrometry (HILIC-MS/MS) were shown to efficiently quantify 14 and 5 metabolites, respectively, in a more rapid chromatographic protocol than previously described. Thirteen and eleven metabolites were quantified in S. arborariae under aerobic and oxygen-limited conditions, respectively. This targeted metabolomics protocol is shown here to quantify a total of 19 metabolites, including sugars, phosphates, coenzymes, monosaccharides, and alcohols, from xylose catabolism pathways (glycolysis, pentose phosphate pathway, and tricarboxylic acid cycle) in yeast. Furthermore, to our knowledge, this is the first time that intracellular metabolites have been quantified in S. arborariae after xylose consumption. The results indicated that fine control of oxygen levels during fermentation is necessary to optimize ethanol production by S. arborariae. The protocol presented here may be applied to other yeast species and could support yeast genetic engineering to improve second generation ethanol production. [Figure not available: see fulltext.

  18. Long-Term Functional Side-Effects of Stimulants and Sedatives in Drosophila melanogaster

    PubMed Central

    Matsagas, Kennedy; Lim, David B.; Horwitz, Marc; Rizza, Cristina L.; Mueller, Laurence D.; Villeponteau, Bryant; Rose, Michael R.

    2009-01-01

    Background Small invertebrate animals, such as nematodes and fruit flies, are increasingly being used to test candidate drugs both for specific therapeutic purposes and for long-term health effects. Some of the protocols used in these experiments feature such experimental design features as lifelong virginity and very low densities. By contrast, the ability of both fruit flies and nematodes to resist stress is frequently correlated with their longevity and other functional measures, suggesting that low-stress assays are not necessarily the only useful protocol for testing the long-term effects of drugs. Methodology/Principal Findings Here we report an alternative protocol for fruit fly drug-testing that maximizes reproductive opportunities and other types of interaction, with moderately high population densities. We validate this protocol using two types of experimental tests: 1. We show that this protocol detects previously well-established genetic differences between outbred fruit fly populations. 2. We show that this protocol is able to distinguish among the long-term effects of similar types of drugs within two broad categories, stimulants and tranquilizers. Conclusions Large-scale fly drug testing can be conducted using mixed-sex high-density cage assays. We find that the commonly-used stimulants caffeine and theobromine differ dramatically in their chronic functional effects, theobromine being more benign. Likewise, we find that two generic pharmaceutical tranquilizers, lithium carbonate and valproic acid, differ dramatically in their chronic effects, lithium being more benign. However, these findings do not necessarily apply to human subjects, and we thus do not recommend the use of any one substance over any other. PMID:19668379

  19. A case series of re-establishment of neuromuscular block with rocuronium after sugammadex reversal.

    PubMed

    Iwasaki, Hajime; Sasakawa, Tomoki; Takahoko, Kenichi; Takagi, Shunichi; Nakatsuka, Hideki; Suzuki, Takahiro; Iwasaki, Hiroshi

    2016-06-01

    We report the use of rocuronium to re-establish neuromuscular block after reversal with sugammadex. The aim of this study was to investigate the relationship between the dose of rocuronium needed to re-establish neuromuscular block and the time interval between sugammadex administration and re-administration of rocuronium. Patients who required re-establishment of neuromuscular block within 12 h after the reversal of rocuronium-induced neuromuscular block with sugammadex were included. After inducing general anesthesia and placing the neuromuscular monitor, the protocol to re-establish neuromuscular block was as follows. An initial rocuronium dose of 0.6 mg/kg was followed by additional 0.3 mg/kg doses every 2 min until train-of-four responses were abolished. A total of 11 patients were enrolled in this study. Intervals between sugammadex and second rocuronium were 12-465 min. Total dose of rocuronium needed to re-establish neuromuscular block was 0.6-1.2 mg/kg. 0.6 mg/kg rocuronium re-established neuromuscular block in all patients who received initial sugammadex more than 3 h previously. However, when the interval between sugammadex and second rocuronium was less than 2 h, more than 0.6 mg/kg rocuronium was necessary to re-establish neuromuscular block.

  20. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  1. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  2. Secure alignment of coordinate systems using quantum correlation

    NASA Astrophysics Data System (ADS)

    Rezazadeh, F.; Mani, A.; Karimipour, V.

    2017-08-01

    We show that two parties far apart can use shared entangled states and classical communication to align their coordinate systems with a very high fidelity. Moreover, compared with previous methods proposed for such a task, i.e., sending parallel or antiparallel pairs or groups of spin states, our method has the extra advantages of using single-qubit measurements and also being secure, so that third parties do not extract any information about the aligned coordinate system established between the two parties. The latter property is important in many other quantum information protocols in which measurements inevitably play a significant role.

  3. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  4. Establishing the first institutional animal care and use committee in Egypt.

    PubMed

    Fahmy, Sohair R; Gaafar, Khadiga

    2016-04-09

    Although animal research ethics committees (AREC) are well established in Western countries, this field is weakly developed and its concept is poorly understood in the Middle East and North Africa region. Our main objective was to introduce the concept and requirements of ethical approaches in dealing with experimental animal in research and teaching in Egypt. Due to its very recent inception, Cairo University, Faculty of Science IACUC decided to operate in accordance with Guide for the Care and Use of Laboratory Animals 8th Edition 2011 (the Guide) since Egypt has not yet compiled its own guide. Fifty protocols were reviewed in 2013-2014. Only ten protocols were reviewed in 2013, but in 2014, forty protocols were reviewed. In 2013 all protocols were approved and in 2014, number of approvals were 35, the number of deferrals were 4, and one refused protocol. Master's theses (MSc) research protocols constituted the majority of the total reviewed protocols. This is attributed to the decision of the Board of the Faculty of Science, Cairo University in September, 2013 that the approval of the IACUC is mandatory before conducting any research involving animals or theses registration. The first IACUC was established in the Cairo University, Faculty of Science, since 2012. The challenges encountered by the committee were diverse, such as the absence of laws that control the use of animal models in scientific research, lack of guidelines (protocols for experimental animals in research) and, mandatory ethical approval for any experimental animal research.

  5. Rhipicephalus microplus infected by Metarhizium: unveiling hemocyte quantification, GFP-fungi virulence, and ovary infection.

    PubMed

    de Paulo, Jéssica Fiorotti; Camargo, Mariana Guedes; Coutinho-Rodrigues, Caio Junior Balduino; Marciano, Allan Felipe; de Freitas, Maria Clemente; da Silva, Emily Mesquita; Gôlo, Patrícia Silva; Morena, Diva Denelle Spadacci; da Costa Angelo, Isabele; Bittencourt, Vânia Rita Elias Pinheiro

    2018-06-01

    Hemocytes, cells present in the hemocoel, are involved in the immune response of arthropods challenged with entomopathogens. The present study established the best methodology for harvesting hemocytes from Rhipicephalus microplus and evaluated the number of hemocytes in addition to histological analysis from ovaries of fungus-infected females and tested the virulence of GFP-fungi transformants. Different centrifugation protocols were tested, and the one in which presented fewer disrupted cells and higher cell recovery was applied for evaluating the effect of Metarhizium spp. on hemocytes against R. microplus. After processing, protocol number 1 (i.e., hemolymph samples were centrifuged at 500×g for 3 min at 4 °C) was considered more efficient, with two isolates used (Metarhizium robertsii ARSEF 2575 and Metarhizium anisopliae ARSEF 549), both wild types and GFP, to assess their virulence. In the biological assays, the GFP-fungi were as virulent as wild types, showing no significant differences. Subsequently, hemocyte quantifications were performed after inoculation, which exhibited notable changes in the number of hemocytes, reducing by approximately 80% in females previously treated with Metarhizium isolates in comparison to non-treated females. Complementarily, 48 h after inoculation, in which hemolymph could not be obtained, histological analysis showed the high competence of these fungi to colonize ovary from ticks. Here, for the first time, the best protocol (i.e., very low cell disruption and high cell recovery) for R. microplus hemocyte obtaining was established aiming to guide directions to other studies that involves cellular responses from ticks to fungi infection.

  6. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  7. An in vivo investigative protocol for HDR prostate brachytherapy using urethral and rectal thermoluminescence dosimetry.

    PubMed

    Toye, Warren; Das, Ram; Kron, Tomas; Franich, Rick; Johnston, Peter; Duchesne, Gillian

    2009-05-01

    To develop an in vivo dosimetry based investigative action level relevant for a corrective protocol for HDR brachytherapy boost treatment. The dose delivered to points within the urethra and rectum was measured using TLD in vivo dosimetry in 56 patients. Comparisons between the urethral and rectal measurements and TPS calculations showed differences, which are related to the relative position of the implant and TLD trains, and allowed shifts of implant position relative to the prostate to be estimated. Analysis of rectal dose measurements is consistent with implant movement, which was previously only identified with the urethral data. Shift corrected doses were compared with results from the TPS. Comparison of peak doses to the urethra and rectum has been assessed against the proposed corrective protocol to limit overdosing these critical structures. An initial investigative level of 20% difference between measured and TPS peak dose was established, which corresponds to 1/3 of patients which was practical for the caseload. These patients were assessed resulting in corrective action being applied for one patient. Multiple triggering for selective investigative action is outlined. The use of a single in vivo measurement in the first fraction optimizes patient benefit at acceptable cost.

  8. Calcium dependent current recordings in Xenopus laevis oocytes in microgravity

    NASA Astrophysics Data System (ADS)

    Wuest, Simon L.; Roesch, Christian; Ille, Fabian; Egli, Marcel

    2017-12-01

    Mechanical unloading by microgravity (or weightlessness) conditions triggers profound adaptation processes at the cellular and organ levels. Among other mechanisms, mechanosensitive ion channels are thought to play a key role in allowing cells to transduce mechanical forces. Previous experiments performed under microgravity have shown that gravity affects the gating properties of ion channels. Here, a method is described to record a calcium-dependent current in native Xenopus laevis oocytes under microgravity conditions during a parabolic flight. A 3-voltage-step protocol was applied to provoke a calcium-dependent current. This current increased with extracellular calcium concentration and could be reduced by applying extracellular gadolinium. The custom-made ;OoClamp; hardware was validated by comparing the results of the 3-voltage-step protocol to results obtained with a well-established two-electrode voltage clamp (TEVC). In the context of the 2nd Swiss Parabolic Flight Campaign, we tested the OoClamp and the method. The setup and experiment protocol worked well in parabolic flight. A tendency that the calcium-dependent current was smaller under microgravity than under 1 g condition could be observed. However, a conclusive statement was not possible due to the small size of the data base that could be gathered.

  9. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  10. Architectural Methodology Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    The establishment of conventions between two communicating entities in the end systems is essential for communications. Examples of the kind of decisions that need to be made in establishing a protocol convention include the nature of the data representation, the for-mat and the speed of the date representation over the communications path, and the sequence of control messages (if any) which are sent. One of the main functions of a protocol is to establish a standard path between the communicating entities. This is necessary to create a virtual communications medium with certain desirable characteristics. In essence, it is the function of the protocol to transform the characteristics of the physical communications environment into a more useful virtual communications model. The final function of a protocol is to establish standard data elements for communications over the path; that is, the protocol serves to create a virtual data element for exchange. Other systems may be constructed in which the transferred element is a program or a job. Finally, there are special purpose applications in which the element to be transferred may be a complex structure such as all or part of a graphic display. NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to describe the methodologies used in developing a protocol architecture for an in-space Internet node. The node would support NASA:s four mission areas: Earth Science; Space Science; Human Exploration and Development of Space (HEDS); Aerospace Technology. This report presents the methodology for developing the protocol architecture. The methodology addresses the architecture for a computer communications environment. It does not address an analog voice architecture.

  11. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  12. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  13. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  14. An optimized immunohistochemistry protocol for detecting the guidance cue Netrin-1 in neural tissue.

    PubMed

    Salameh, Samer; Nouel, Dominique; Flores, Cecilia; Hoops, Daniel

    2018-01-01

    Netrin-1, an axon guidance protein, is difficult to detect using immunohistochemistry. We performed a multi-step, blinded, and controlled protocol optimization procedure to establish an efficient and effective fluorescent immunohistochemistry protocol for characterizing Netrin-1 expression. Coronal mouse brain sections were used to test numerous antigen retrieval methods and combinations thereof in order to optimize the stain quality of a commercially available Netrin-1 antibody. Stain quality was evaluated by experienced neuroanatomists for two criteria: signal intensity and signal-to-noise ratio. After five rounds of testing protocol variants, we established a modified immunohistochemistry protocol that produced a Netrin-1 signal with good signal intensity and a high signal-to-noise ratio. The key protocol modifications are as follows: •Use phosphate buffer (PB) as the blocking solution solvent.•Use 1% sodium dodecyl sulfate (SDS) treatment for antigen retrieval. The original protocol was optimized for use with the Netrin-1 antibody produced by Novus Biologicals. However, we subsequently further modified the protocol to work with the antibody produced by Abcam. The Abcam protocol uses PBS as the blocking solution solvent and adds a citrate buffer antigen retrieval step.

  15. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  16. Introducing Clicker Training as a Cognitive Enrichment for Laboratory Mice.

    PubMed

    Leidinger, Charlotte; Herrmann, Felix; Thöne-Reineke, Christa; Baumgart, Nadine; Baumgart, Jan

    2017-03-06

    Establishing new refinement strategies in laboratory animal science is a central goal in fulfilling the requirements of Directive 2010/63/EU. Previous research determined a profound impact of gentle handling protocols on the well-being of laboratory mice. By introducing clicker training to the keeping of mice, not only do we promote the amicable treatment of mice, but we also enable them to experience cognitive enrichment. Clicker training is a form of positive reinforcement training using a conditioned secondary reinforcer, the "click" sound of a clicker, which serves as a time bridge between the strengthened behavior and an upcoming reward. The effective implementation of the clicker training protocol with a cohort of 12 BALB/c inbred mice of each sex proved to be uncomplicated. The mice learned rather quickly when challenged with tasks of the clicker training protocol, and almost all trained mice overcame the challenges they were given (100% of female mice and 83% of male mice). This study has identified that clicker training for mice strongly correlates with reduced fear in the mice during human-mice interactions, as shown by reduced anxiety-related behaviors (e.g., defecation, vocalization, and urination) and fewer depression-like behaviors (e.g., floating). By developing a reliable protocol that can be easily integrated into the daily routine of the keeping of laboratory mice, the lifetime experience of welfare in the mice can be improved substantially.

  17. Mapping Anterior Temporal Lobe Language Areas with FMRI: A Multi-Center Normative Study

    PubMed Central

    Binder, Jeffrey R.; Gross, William L.; Allendorfer, Jane B.; Bonilha, Leonardo; Chapin, Jessica; Edwards, Jonathan C.; Grabowski, Thomas J.; Langfitt, John T.; Loring, David W.; Lowe, Mark J.; Koenig, Katherine; Morgan, Paul S.; Ojemann, Jeffrey G.; Rorden, Christopher; Szaflarski, Jerzy P.; Tivarus, Madalina E.; Weaver, Kurt E.

    2010-01-01

    Removal of the anterior temporal lobe (ATL) is an effective surgical treatment for intractable temporal lobe epilepsy but carries a risk of language and verbal memory deficits. Preoperative localization of functional zones in the ATL might help reduce these risks, yet fMRI protocols in current widespread use produce very little activation in this region. Based on recent evidence suggesting a role for the ATL in semantic integration, we designed an fMRI protocol comparing comprehension of brief narratives (Story task) with a semantically shallow control task involving serial arithmetic (Math task). The Story > Math contrast elicited strong activation throughout the ATL, lateral temporal lobe, and medial temporal lobe bilaterally in an initial cohort of 18 healthy participants. The task protocol was then implemented at 6 other imaging centers using identical methods. Data from a second cohort of participants scanned at these centers closely replicated the results from the initial cohort. The Story-Math protocol provides a reliable method for activation of surgical regions of interest in the ATL. The bilateral activation supports previous claims that conceptual processing involves both temporal lobes. Used in combination with language lateralization measures, reliable ATL activation maps may be useful for predicting cognitive outcome in ATL surgery, though the validity of this approach needs to be established in a prospective surgical series. PMID:20884358

  18. Efficient and stable transformation of hop (Humulus lupulus L.) var. Eroica by particle bombardment.

    PubMed

    Batista, Dora; Fonseca, Sandra; Serrazina, Susana; Figueiredo, Andreia; Pais, Maria Salomé

    2008-07-01

    To the best of our knowledge, this is the first accurate and reliable protocol for hop (Humulus lupulus L.) genetic transformation using particle bombardment. Based on the highly productive regeneration system previously developed by us for hop var. Eroica, two efficient transformation protocols were established using petioles and green organogenic nodular clusters (GONCs) bombarded with gusA reporter and hpt selectable genes. A total of 36 hygromycin B-resistant (hyg(r)) plants obtained upon continuous selection were successfully transferred to the greenhouse, and a first generation group of transplanted plants was followed after spending a complete vegetative cycle. PCR analysis showed the presence of one of both transgenes in 25 plants, corresponding to an integration frequency of 69.4% and an overall transformation efficiency of 7.5%. Although all final transformants were GUS negative, the integration frequency of gusA gene was higher than that of hpt gene. Petiole-derived transgenic plants showed a higher co-integration rate of 76.9%. Real-time PCR analysis confirmed co-integration in 86% of the plants tested and its stability until the first generation, and identified positive plants amongst those previously assessed as hpt (+) only by conventional PCR. Our results suggest that the integration frequencies presented here, as well as those of others, may have been underestimated, and that PCR results should be taken with precaution not only for false positives, but also for false negatives. The protocols here described could be very useful for future introduction of metabolic or resistance traits in hop cultivars even if slight modifications for other genotypes are needed.

  19. High throughput film dosimetry in homogeneous and heterogeneous media for a small animal irradiator

    PubMed Central

    Wack, L.; Ngwa, W.; Tryggestad, E.; Tsiamas, P.; Berbeco, R.; Ng, S.K.; Hesser, J.

    2013-01-01

    Purpose We have established a high-throughput Gafchromic film dosimetry protocol for narrow kilo-voltage beams in homogeneous and heterogeneous media for small-animal radiotherapy applications. The kV beam characterization is based on extensive Gafchromic film dosimetry data acquired in homogeneous and heterogeneous media. An empirical model is used for parameterization of depth and off-axis dependence of measured data. Methods We have modified previously published methods of film dosimetry to suit the specific tasks of the study. Unlike film protocols used in previous studies, our protocol employs simultaneous multichannel scanning and analysis of up to nine Gafchromic films per scan. A scanner and background correction were implemented to improve accuracy of the measurements. Measurements were taken in homogeneous and inhomogeneous phantoms at 220 kVp and a field size of 5 × 5 mm2. The results were compared against Monte Carlo simulations. Results Dose differences caused by variations in background signal were effectively removed by the corrections applied. Measurements in homogeneous phantoms were used to empirically characterize beam data in homogeneous and heterogeneous media. Film measurements in inhomogeneous phantoms and their empirical parameterization differed by about 2%–3%. The model differed from MC by about 1% (water, lung) to 7% (bone). Good agreement was found for measured and modelled off-axis ratios. Conclusions EBT2 films are a valuable tool for characterization of narrow kV beams, though care must be taken to eliminate disturbances caused by varying background signals. The usefulness of the empirical beam model in interpretation and parameterization of film data was demonstrated. PMID:23510532

  20. T2* Mapping Provides Information That Is Statistically Comparable to an Arthroscopic Evaluation of Acetabular Cartilage.

    PubMed

    Morgan, Patrick; Nissi, Mikko J; Hughes, John; Mortazavi, Shabnam; Ellerman, Jutta

    2017-07-01

    Objectives The purpose of this study was to validate T2* mapping as an objective, noninvasive method for the prediction of acetabular cartilage damage. Methods This is the second step in the validation of T2*. In a previous study, we established a quantitative predictive model for identifying and grading acetabular cartilage damage. In this study, the model was applied to a second cohort of 27 consecutive hips to validate the model. A clinical 3.0-T imaging protocol with T2* mapping was used. Acetabular regions of interest (ROI) were identified on magnetic resonance and graded using the previously established model. Each ROI was then graded in a blinded fashion by arthroscopy. Accurate surgical location of ROIs was facilitated with a 2-dimensional map projection of the acetabulum. A total of 459 ROIs were studied. Results When T2* mapping and arthroscopic assessment were compared, 82% of ROIs were within 1 Beck group (of a total 6 possible) and 32% of ROIs were classified identically. Disease prediction based on receiver operating characteristic curve analysis demonstrated a sensitivity of 0.713 and a specificity of 0.804. Model stability evaluation required no significant changes to the predictive model produced in the initial study. Conclusions These results validate that T2* mapping provides statistically comparable information regarding acetabular cartilage when compared to arthroscopy. In contrast to arthroscopy, T2* mapping is quantitative, noninvasive, and can be used in follow-up. Unlike research quantitative magnetic resonance protocols, T2* takes little time and does not require a contrast agent. This may facilitate its use in the clinical sphere.

  1. Short-Term PTEN Inhibition Improves In Vitro Activation of Primordial Follicles, Preserves Follicular Viability, and Restores AMH Levels in Cryopreserved Ovarian Tissue From Cancer Patients

    PubMed Central

    Novella-Maestre, Edurne; Herraiz, Sonia; Rodríguez-Iglesias, Beatriz; Díaz-García, César; Pellicer, Antonio

    2015-01-01

    Introduction In vitro activation and growth of primordial dormant follicles to produce fertilizable oocytes would provide a useful instrument for fertility preservation. The employment of Phosphatase and TENsin homolog (PTEN) inhibitors, in combination with Protein kinase B (Akt) stimulating molecules, has been previously employed to increase follicular activation through the stimulation of the PTEN-Akt pathway. Methods We aim to establish improved in vitro activation also for cancer patients whose ovarian tissue has already been cryopreserved. Fresh and previously cryopreserved human ovarian cortex were exposed to short-term, low-concentration and ovary-specific treatment with only a PTEN inhibitor. Results Our in vitro activation protocol enhances the activation mechanisms of primordial follicles in both fresh and cryopreserved samples, and enlarges growing populations without inducing apoptosis in either follicles or the surrounding stroma. Treatment augments estradiol secretion and restores the expression levels of the previously diminished Anti-Müllerian hormone by means of cryopreservation procedures. Genomic modulation of the relative expression of PTEN pathway genes was found in treated samples. Conclusion The in vitro activation protocol offers new alternatives for patients with cryopreserved tissue as it increases the pool of viable activated follicles available for in vitro growth procedures. The combination of ovarian tissue cryopreservation and in vitro activation of primordial follicles, the main ovarian reserve component, will be a major advancement in fertility preservation. PMID:26024525

  2. Electrophysiological study for comparing the effect of biological activity between type A botulinum toxins in rat gastrocnemius muscle.

    PubMed

    Kim, C-S; Jang, W S; Son, I P; Nam, S H; Kim, Y I; Park, K Y; Kim, B J; Kim, M N

    2013-09-01

    New cosmetic applications and products based on the effects of botulinum toxin (BTX) treatment have stimulated demand for this class of natural compounds. This demand generates the need for appropriate standardized protocols to test and compare the effectiveness of new BTX preparations. Based on the previously described electrophysiological methods, we measured and compared the inhibitory effects of two BTX type A (BTX-A) preparations on neuromuscular transmission through split-body test. The effectiveness was evaluated in terms of the compound muscle action potential (CMAP) and conduction velocity after BTX-A injection. We used a split-body method to compare two different BTX-As in the rat. Based on the changes in the CMAP, the two different BTX-As induced paralytic effect on the rat tibialis anterior muscle. However, the two different BTX-A preparations did not differ significantly in effectiveness and did not induce a delay in conduction velocity. The new BTX-A preparation used in this electrophysiological study had similar effect compared with the previously marketed BTX-A.[AQ: Please approve the edits made to the sentence "The new BTX-A preparation…") We propose that a split-body electrophysiological protocol will be useful in establishing the comparative effectiveness of new BTX products.

  3. 75 FR 35973 - Trademark Technical and Conforming Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Madrid Protocol (``Madrid Protocol registrants'') to file Affidavits or Declarations of Use or Excusable... to maintain a registration. Specifically, the legislation gives Madrid Protocol registrants the... the name of the owner of the registration. Previously, the statute did not provide Madrid Protocol...

  4. Protocols for treating patients with end-stage renal disease: a survey of undergraduate dental programs.

    PubMed

    Sturgill, Jeremiah; Howell, Scott; Perry, Maureen Munnelly; Kothari, Hemali

    2016-11-01

    Approximately 14% of Americans are living with chronic kidney disease (CKD). The prevalence of end-stage renal disease (ESRD), the result of progressing CKD continues to rise by 21,000 per year. There are no updated, evidence-based antibiotic prophylaxis guidelines for patients with renal disease undergoing dental treatment. The most recent was a scientific statement from the American Heart Association (AHA) in 2003. Presented in three parts, the goal of the first part of this study is to determine the current protocol being used to treat renal patients at U.S. dental schools. A 21 multiple-choice question survey was e-mailed to 58 clinic deans of accredited dental schools in the United States regarding renal treatment protocol details including antibiotic prophylaxis. Fifty-two percent of programs report having no established renal patient treatment protocol. For programs with a protocol, when using prophylactic antibiotics, 54% followed AHA protocol, whereas 62% used a modified protocol. There is a lack of consistent, established protocols among undergraduate dental programs. It is suggested that evidence-based guidelines for the safe treatment of patients be developed. © 2016 Special Care Dentistry Association and Wiley Periodicals, Inc.

  5. All-in-One CRISPR-Cas9/FokI-dCas9 Vector-Mediated Multiplex Genome Engineering in Cultured Cells.

    PubMed

    Sakuma, Tetsushi; Sakamoto, Takuya; Yamamoto, Takashi

    2017-01-01

    CRISPR-Cas9 enables highly convenient multiplex genome engineering in cultured cells, because it utilizes generic Cas9 nuclease and an easily customizable single-guide RNA (sgRNA) for site-specific DNA double-strand break induction. We previously established a multiplex CRISPR-Cas9 assembly system for constructing an all-in-one vector simultaneously expressing multiple sgRNAs and Cas9 nuclease or other Cas9 variants including FokI-dCas9, which supersedes the wild-type Cas9 with regard to high specificity. In this chapter, we describe a streamlined protocol to design and construct multiplex CRISPR-Cas9 or FokI-dCas9 vectors, to introduce them into cultured cells by lipofection or electroporation, to enrich the genomically edited cells with a transient puromycin selection, to validate the mutation efficiency by Surveyor nuclease assay, and to perform off-target analyses. We show that our protocol enables highly efficient multiplex genome engineering even in hard-to-transfect HepG2 cells.

  6. Detecting many-body-localization lengths with cold atoms

    NASA Astrophysics Data System (ADS)

    Guo, Xuefei; Li, Xiaopeng

    2018-03-01

    Considering ultracold atoms in optical lattices, we propose experimental protocols to study many-body-localization (MBL) length and criticality in quench dynamics. Through numerical simulations with exact diagonalization, we show that in the MBL phase the perturbed density profile following a local quench remains exponentially localized in postquench dynamics. The size of this density profile after long-time-dynamics defines a localization length, which tends to diverge at the MBL-to-ergodic transition as we increase the system size. The determined localization transition point agrees with previous exact diagonalization calculations using other diagnostics. Our numerical results provide evidence for violation of the Harris-Chayes bound for the MBL criticality. The critical exponent ν can be extracted from our proposed dynamical procedure, which can then be used directly in experiments to determine whether the Harris-Chayes-bound holds for the MBL transition. These proposed protocols to detect localization criticality are justified by benchmarking to the well-established results for the noninteracting three-dimensional Anderson localization.

  7. Digital pathology in nephrology clinical trials, research, and pathology practice.

    PubMed

    Barisoni, Laura; Hodgin, Jeffrey B

    2017-11-01

    In this review, we will discuss (i) how the recent advancements in digital technology and computational engineering are currently applied to nephropathology in the setting of clinical research, trials, and practice; (ii) the benefits of the new digital environment; (iii) how recognizing its challenges provides opportunities for transformation; and (iv) nephropathology in the upcoming era of kidney precision and predictive medicine. Recent studies highlighted how new standardized protocols facilitate the harmonization of digital pathology database infrastructure and morphologic, morphometric, and computer-aided quantitative analyses. Digital pathology enables robust protocols for clinical trials and research, with the potential to identify previously underused or unrecognized clinically useful parameters. The integration of digital pathology with molecular signatures is leading the way to establishing clinically relevant morpho-omic taxonomies of renal diseases. The introduction of digital pathology in clinical research and trials, and the progressive implementation of the modern software ecosystem, opens opportunities for the development of new predictive diagnostic paradigms and computer-aided algorithms, transforming the practice of renal disease into a modern computational science.

  8. Evaluation of the University of Florida lomustine, vincristine, procarbazine, and prednisone chemotherapy protocol for the treatment of relapsed lymphoma in dogs: 33 cases (2003-2009).

    PubMed

    Fahey, Christine E; Milner, Rowan J; Barabas, Karri; Lurie, David; Kow, Kelvin; Parfitt, Shannon; Lyles, Sarah; Clemente, Monica

    2011-07-15

    To evaluate the toxicity and efficacy of a modification of a previously evaluated combination of lomustine, vincristine, procarbazine, and prednisone (LOPP) as a rescue protocol for refractory lymphoma in dogs. Retrospective case series. Animals-33 dogs with a cytologic or histologic diagnosis of lymphoma that developed resistance to their induction chemotherapy protocol. Lomustine was administered on day 0 of the protocol. Vincristine was administered on day 0 and again 1 time on day 14. Procarbazine and prednisone were administered on days 0 through 13 of the protocol. This cycle was repeated every 28 days. Median time from initiation to discontinuation of the University of Florida LOPP protocol was 84 days (range, 10 to 308 days). Overall median survival time was 290 days (range, 51 to 762 days). Overall response rate with this protocol was 61% (20/33), with 36% (12) having a complete response and 24% (8) having a partial response. Toxicosis rates were lower than for the previously published LOPP protocol. The University of Florida LOPP protocol may be an acceptable alternative to the mechlorethamine, vincristine, procarbazine, and prednisone protocol as a rescue protocol for dogs with lymphoma.

  9. Oral rehabilitation and psychosocial evaluation of a patient with bulimia nervosa following Teeth in a Day® immediate loading protocol.

    PubMed

    Balshi, Thomas J; Wolfinger, Glenn J; Alfano, Stephen G; Croce, J Neil Della; Balshi, Stephen F

    2015-04-01

    The purpose of this patient report is to accurately portray the clinical experience of treating an active bulimic patient by employing an immediately loaded dental implant protocol to provide the patient with an expedited esthetic and functional result. Implementation of a psychometric component statistically quantifies the psychological effects of the oral rehabilitation. A 34-year-old woman presented with severe dental perimolysis (erosion) resulting from a 28-year history of bulimic behaviors. Clinical and radiographic evaluation of the existing dentition indicated advanced dental erosion and previous restoration attempts in a state of failure. The patient's existing teeth were extracted and treated with full maxillary and mandibular implant-supported prostheses, following the Teeth in a Day® (TIAD) immediate functional loading protocol. Psychometric assessment was conducted through administration of a 20-item questionnaire, as seen in previous literature. Radiographic and clinical analysis suggested all implant fixtures to be viable and accompanied by normal levels of alveolar bone 7 months into treatment. Questionnaire results at the new-patient presentation (T1) resulted in a composite score of 4.0 (SD = 2.9; P = 0.004), indicating severe body-image dysphoria. At 3 months postoperative (T2), the questionnaire score was 0.4 (SD = -1.7; P = 0.09). The final psychometric questionnaire at 7 months (T3) resulted in a score of 0.5 (SD = -1.5; P = 0.12). The patient was followed for a total of 7 years following implant placement. In this patient report, oral rehabilitation using the TIAD protocol provided an expedited and predictable alternative method for restoring functional abilities, esthetics, and self-esteem to a severely depressed bulimic patient. Psychometrically, at the postoperative (T2) and final testing period (T3), the patient's body image profile was no longer considered to be significantly different from established normative values.

  10. Use of a Novel Cell Adhesion Method and Digital Measurement to Show Stimulus-dependent Variation in Somatic and Oral Ciliary Beat Frequency in Paramecium

    PubMed Central

    Bell, Wade E.; Hallworth, Richard; Wyatt, Todd A.; Sisson, Joseph H.

    2015-01-01

    When Paramecium encounters positive stimuli, the membrane hyperpolarizes and ciliary beat frequency increases. We adapted an established immobilization protocol using a biological adhesive and a novel digital analysis system to quantify beat frequency in immobilized Paramecium. Cells showed low mortality and demonstrated beat frequencies consistent with previous studies. Chemoattractant molecules, reduction in external potassium, and posterior stimulation all increased somatic beat frequency. In all cases, the oral groove cilia maintained a higher beat frequency than mid-body cilia, but only oral cilia from cells stimulated with chemoattactants showed an increase from basal levels. PMID:25066640

  11. Cone photopigment variations in Cebus apella monkeys evidenced by electroretinogram measurements and genetic analysis

    PubMed Central

    Soares, Juliana G.M.; Fiorani, Mario; Araujo, Eduardo A.; Zana, Yossi; Bonci, Daniela M.O.; Neitz, Maureen; Ventura, Dora F.; Gattass, Ricardo

    2011-01-01

    We investigated the color vision pattern in male and female Cebus apella monkeys by means of electroretinogram measurements and genetic analysis. Our objective was to establish a simple, fast and efficient protocol in order to determine the chromatic vision pattern in Cebus monkeys. We found five among ten possible different phenotypes, two trichromats and three dichromats. We also found that Cebus present a new allele with spectral peak near 552 nm, with the amino acid combination SFT at positions 180, 277 and 285 of the opsin gene, in addition to the previously described SYT, AFT and AFA alleles. PMID:19883678

  12. Induced Pluripotent Stem Cells from Nonhuman Primates.

    PubMed

    Mishra, Anuja; Qiu, Zhifang; Farnsworth, Steven L; Hemmi, Jacob J; Li, Miao; Pickering, Alexander V; Hornsby, Peter J

    2016-01-01

    Induced pluripotent stem cells from nonhuman primates (NHPs) have unique roles in cell biology and regenerative medicine. Because of the relatedness of NHPs to humans, NHP iPS cells can serve as a source of differentiated derivatives that can be used to address important questions in the comparative biology of primates. Additionally, when used as a source of cells for regenerative medicine, NHP iPS cells serve an invaluable role in translational experiments in cell therapy. Reprogramming of NHP somatic cells requires the same conditions as previously established for human cells. However, throughout the process, a variety of modifications to the human cell protocols must be made to accommodate significant species differences.

  13. Preeclampsia: A review of the pathogenesis and possible management strategies based on its pathophysiological derangements.

    PubMed

    El-Sayed, Amel A F

    2017-10-01

    This review is divided into three parts. The first part briefly describes the pathogenesis of preeclampsia. This is followed by reviewing previously reported management strategies of the disease based on its pathophysiological derangements. Finally, the author defines the safe and acceptable methods/medications that may be used to 'prevent' preeclampsia (in high risk patients) and those that may be used to 'treat' preeclampsia (meant to prolong the pregnancy in patients with established preeclampsia). The review concludes that multi-center trials are required to include multiple drugs in the same management protocol. Copyright © 2017. Published by Elsevier B.V.

  14. Evaluation of results obtained with corifollitropin alfa after poor ovarian response in previous cycle using recombinant follicular stimulating hormone in the long-term protocol.

    PubMed

    Salgueiro, Lister L; Rolim, Juliana R; Moura, Bernardo R L; Machado, Suelen P P; Haddad, Carolina

    2016-08-01

    This study evaluated the use of Corifollitropin alfa in patients with previous poor response to recombinant follicle stimulating hormone in long-term protocols using gonadotropin-releasing hormone. Twenty-seven poor responders to previous treatment with the long term protocol using the recombinant follicle stimulating hormone (Group 1) were selected and then submitted to a second attempt using the same long term protocol with Corifollitropin alfa instead of the recombinant follicle stimulating hormone (Group 2).Ovarian down-regulation was achieved using subcutaneous administration of Leuprolide Acetate. Ovarian stimulation was performed with recombinant follicle stimulating hormone until the administration of human chorionic gonadotropin, followed by follicular aspiration (Group 1). Group 2 was submitted to this same protocol using Corifollitropin alfa instead of recombinant follicle stimulating hormone. There were significant differences in the number of aspirated oocytes, percentage of mature oocytes, amount of injected oocytes and transferred embryos - with all of these parameters being increased in the Corifollitropin alfa group. In addition, the rates of pregnancy and ongoing pregnancy were also significantly higher in the Corifollitropin alfa group. The present study demonstrated that the use of Corifollitropin alfa in the long-term protocol could be a highly effective alternative for patients with poor ovarian response, who were unsuccessful in a previous treatment with In Vitro Fertilization - Intracytoplasmic Sperm Injection.

  15. Is There Room in the Graduate Curriculum to Learn How to Be a Grad Student? An Approach Using a Graduate-Level Biochemical Engineering Course

    ERIC Educational Resources Information Center

    Aucoin, Marc G.; Jolicoeur, Mario

    2009-01-01

    Undergraduate and graduate engineering training differ significantly. The former looks to established protocols and formulas to design and control processes while the latter often involves questioning established protocols and formulas to better suit and describe phenomena. Although we do not dispute the benefits of practical hands-on approaches,…

  16. Whole-mount in situ hybridization in the rotifer Brachionus plicatilis representing a basal branch of lophotrochozoans.

    PubMed

    Boell, Louis A; Bucher, Gregor

    2008-08-01

    In order to broaden the comparative scope of evolutionary developmental biology and to refine our picture of animal macroevolution, it is necessary to establish new model organisms, especially from previously underrepresented groups, like the Lophotrochozoa. We have established the culture and protocols for molecular developmental biology in the rotifer species Brachionus plicatilis Müller (Rotifera, Monogononta). Rotifers are nonsegmented animals with enigmatic basal position within the lophotrochozoans and marked by several evolutionary novelties like the wheel organ (corona), the median eye, and the nonpaired posterior foot. The expression of Bp-Pax-6 is shown using whole-mount in situ hybridization. The inexpensive easy culture and experimental tractability of Brachionus as well as the range of interesting questions to which it holds the key make it a promising addition to the "zoo" of evo-devo model organisms.

  17. Rater Drift and Time Trends in Classroom Observations

    ERIC Educational Resources Information Center

    Casabianca, Jodi M.; Lockwood, J. R.

    2013-01-01

    Classroom observation protocols, in which observers rate multiple dimensions of teaching according to established protocols (either live in the classroom, or post-hoc from lesson videos), are increasingly being used in both research and policy contexts. However, scores generated from these protocols have many sources of error. Day to day variation…

  18. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  19. Establishing a comprehensive genetic diagnosis strategy for hemophilia B and its application in Chinese population.

    PubMed

    Lin, X Y; Wang, J; Xiao, X; Xu, Y W; Yan, Q J; Jiang, W Y

    2018-04-01

    To reduce the incidence of hemophilia B (HB) which with no complete cure currently, prenatal diagnosis and preimplantation genetic diagnosis (PGD) are effective and feasible means. However, previous studies about genetic diagnosis in HB mostly just focused on the detection of patients and carriers. Here, we established a comprehensive genetic diagnosis strategy for HB and worked it out in Chinese population. The strategy includes the detection of patients and carriers, prenatal diagnosis, and PGD. Seven unrelated HB families from Chinese population involved in this study. Firstly, probands and available members were carried out coagulation laboratory assays, and the clinical information has been recorded. Secondly, we used DNA direct sequencing to screen the whole FIX gene of them. The pathogenicity of novel mutations was verified according to 2015 ACMG-AM guidelines. For prenatal diagnosis, a mix of DNA direct sequencing and STR linkage analysis was employed. To explore a better PGD protocol, Karyomapping was first applied in PGD of HB, comparing with conventional PCR-based methods. Six different pathogenic mutations including 1 novel duplication (c.660_661dup ATCA) were identified. The results of prenatal diagnosis were consistent with birth outcomes. In the PGD case, 4 of 11 embryos were confirmed to be normal and one of them was transferred and led to a healthy birth. The established genetic diagnosis strategy for HB in our study was comprehensive and well applied in clinic practice. Besides, we recommended that DNA direct sequencing combined with Karyomapping was a better PGD protocol. © 2017 John Wiley & Sons Ltd.

  20. Treatment of pediatric patients and young adults with particle therapy at the Heidelberg Ion Therapy Center (HIT): establishment of workflow and initial clinical data

    PubMed Central

    2012-01-01

    Background To report on establishment of workflow and clinical results of particle therapy at the Heidelberg Ion Therapy Center. Materials and methods We treated 36 pediatric patients (aged 21 or younger) with particle therapy at HIT. Median age was 12 years (range 2-21 years), five patients (14%) were younger than 5 years of age. Indications included pilocytic astrocytoma, parameningeal and orbital rhabdomyosarcoma, skull base and cervical chordoma, osteosarcoma and adenoid-cystic carcinoma (ACC), as well as one patient with an angiofibroma of the nasopharynx. For the treatment of small children, an anesthesia unit at HIT was established in cooperation with the Department of Anesthesiology. Results Treatment concepts depended on tumor type, staging, age of the patient, as well as availability of specific study protocols. In all patients, particle radiotherapy was well tolerated and no interruptions due to toxicity had to be undertaken. During follow-up, only mild toxicites were observed. Only one patient died of tumor progression: Carbon ion radiotherapy was performed as an individual treatment approach in a child with a skull base recurrence of the previously irradiated rhabdomyosarcoma. Besides this patient, tumor recurrence was observed in two additional patients. Conclusion Clinical protocols have been generated to evaluate the real potential of particle therapy, also with respect to carbon ions in distinct pediatric patient populations. The strong cooperation between the pediatric department and the department of radiation oncology enable an interdisciplinary treatment and stream-lined workflow and acceptance of the treatment for the patients and their parents. PMID:23072718

  1. Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication

    PubMed Central

    Seo, Hwajeong; Kim, Hyunjin; Park, Taehwan; Lee, Yeoncheol; Liu, Zhe; Kim, Howon

    2013-01-01

    Elliptic curve cryptography (ECC) is one of the most promising public-key techniques in terms of short key size and various crypto protocols. For this reason, many studies on the implementation of ECC on resource-constrained devices within a practical execution time have been conducted. To this end, we must focus on scalar multiplication, which is the most expensive operation in ECC. A number of studies have proposed pre-computation and advanced scalar multiplication using a non-adjacent form (NAF) representation, and more sophisticated approaches have employed a width-w NAF representation and a modified pre-computation table. In this paper, we propose a new pre-computation method in which zero occurrences are much more frequent than in previous methods. This method can be applied to ordinary group scalar multiplication, but it requires large pre-computation table, so we combined the previous method with ours for practical purposes. This novel structure establishes a new feature that adjusts speed performance and table size finely, so we can customize the pre-computation table for our own purposes. Finally, we can establish a customized look-up table for embedded microprocessors. PMID:23881143

  2. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally tractable and lead to simplifications for any simulated or analytical performance evaluations of the cross-layer designs.

  3. Tolerance - One Transplant for Life

    PubMed Central

    Kawai, Tatsuo; Leventhal, Joseph; Madsen, Joren C.; Strober, Samuel; Turka, Laurence A.; Wood, Kathryn J.

    2014-01-01

    A recent TTS workshop was convened to address the question: “What do we need to have in place to make tolerance induction protocols a “standard of care” for organ transplant recipients over the next decade?” In a productive two day meeting there was wide-ranging discussion on a broad series of topics resulting in five consensus recommendations: (1) Establish a registry of results for patients enrolled in tolerance trials; (2) Establish standardized protocols for sample collection and storage; (3) Establish standardized biomarkers and assays; (4) Include children aged 12 and older in protocols that have been validated in adults; (5) a task force to engage third party payers in discussions of how to fund tolerance trials. Future planned workshops will focus on progress in implementing these recommendations and identifying other steps that the community needs to take. PMID:24926829

  4. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    PubMed

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG<0.8), medium (MRG) and high (HRG>1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified according to protocol BFM-90 for moderate risk group (IR) constitute a mixed group in the ALL-IC 2002 classification. Part of the children was moved to the standard risk group (SR), part to high risk group (HR), and the rest remains in the intermediate risk category (IR). 3. Further studies are needed on stratification validity according to ALL-IL 2002 and on the need of further modification (eg assessment of additional factors) in order to decide on the best treatment, adequate to severity of disease.

  5. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  6. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  7. Gastric metastasis 14 years after mastectomy for breast lobular carcinoma: case report and literature review.

    PubMed

    Aurello, Paolo; D'Angelo, Francesco; Cosenza, Giulia; Petrocca, Sergio; Stoppacciaro, Antonella; Ramacciato, Giovanni; Ziparo, Vincenzo

    2006-05-01

    In planning treatment of a gastric neoplasm in a patient previously treated for lobular breast carcinoma, it is important to differentiate a primary gastrointestinal tract tumor from a metastatic form. We report a case of a breast lobular carcinoma metastatic to the stomach. The patient underwent a subtotal gastrectomy for symptomatic disease. Although gastric symptoms appeared 14 years after the breast carcinoma, immunohistochemical analysis of the surgical specimen helped to establish that the gastric lesion, thought to be primary, was effectively a metastatic repetition of the breast neoplasm. To better define treatment in a gastric neoplasm patient previously treated for breast carcinoma, the preoperative diagnosis should rule out a metastatic disease. The patient described received an adjuvant chemotherapy according to breast cancer protocol after gastric resection for symptomatic disease. The patient is still alive and undergoing chemotherapy for peritoneal carcinosis.

  8. Immortalized prairie vole-derived fibroblasts (VMF-K4DTs) can be transformed into pluripotent stem cells and provide a useful tool with which to determine optimal reprogramming conditions

    PubMed Central

    KATAYAMA, Masafumi; HIRAYAMA, Takashi; KIYONO, Tohru; ONUMA, Manabu; TANI, Tetsuya; TAKEDA, Satoru; NISHIMORI, Katsuhiko; FUKUDA, Tomokazu

    2017-01-01

    The cellular conditions required to establish induced pluripotent stem cells (iPSCs), such as the number of reprogramming factors and/or promoter selection, differ among species. The establishment of iPSCs derived from cells of previously unstudied species therefore requires the extensive optimization of programming conditions, including promoter selection and the optimal number of reprogramming factors, through a trial-and-error approach. While the four Yamanaka factors Oct3/4, Sox2, Klf4, and c-Myc are sufficient for iPSC establishment in mice, we reported previously that six reprogramming factors were necessary for the creation of iPSCs from primary prairie vole-derived cells. Further to this study, we now show detailed data describing the optimization protocol we developed in order to obtain iPSCs from immortalized prairie vole-derived fibroblasts. Immortalized cells can be very useful tools in the optimization of cellular reprogramming conditions, as cellular senescence is known to dramatically decrease the efficiency of iPSC establishment. The immortalized prairie vole cells used in this optimization were designated K4DT cells as they contained mutant forms of CDK4, cyclin D, and telomerase reverse transcriptase (TERT). We show that iPSCs derived from these immortalized cells exhibit the transcriptional silencing of exogenous reprogramming factors while maintaining pluripotent cell morphology. There were no observed differences between the iPSCs derived from primary and immortalized prairie vole fibroblasts. Our data suggest that cells that are immortalized with mutant CDK4, cyclin D, and TERT provide a useful tool for the determination of the optimal conditions for iPSC establishment. PMID:28331164

  9. Immortalized prairie vole-derived fibroblasts (VMF-K4DTs) can be transformed into pluripotent stem cells and provide a useful tool with which to determine optimal reprogramming conditions.

    PubMed

    Katayama, Masafumi; Hirayama, Takashi; Kiyono, Tohru; Onuma, Manabu; Tani, Tetsuya; Takeda, Satoru; Nishimori, Katsuhiko; Fukuda, Tomokazu

    2017-06-21

    The cellular conditions required to establish induced pluripotent stem cells (iPSCs), such as the number of reprogramming factors and/or promoter selection, differ among species. The establishment of iPSCs derived from cells of previously unstudied species therefore requires the extensive optimization of programming conditions, including promoter selection and the optimal number of reprogramming factors, through a trial-and-error approach. While the four Yamanaka factors Oct3/4, Sox2, Klf4, and c-Myc are sufficient for iPSC establishment in mice, we reported previously that six reprogramming factors were necessary for the creation of iPSCs from primary prairie vole-derived cells. Further to this study, we now show detailed data describing the optimization protocol we developed in order to obtain iPSCs from immortalized prairie vole-derived fibroblasts. Immortalized cells can be very useful tools in the optimization of cellular reprogramming conditions, as cellular senescence is known to dramatically decrease the efficiency of iPSC establishment. The immortalized prairie vole cells used in this optimization were designated K4DT cells as they contained mutant forms of CDK4, cyclin D, and telomerase reverse transcriptase (TERT). We show that iPSCs derived from these immortalized cells exhibit the transcriptional silencing of exogenous reprogramming factors while maintaining pluripotent cell morphology. There were no observed differences between the iPSCs derived from primary and immortalized prairie vole fibroblasts. Our data suggest that cells that are immortalized with mutant CDK4, cyclin D, and TERT provide a useful tool for the determination of the optimal conditions for iPSC establishment.

  10. Improving the consistency in cervical esophageal target volume definition by special training.

    PubMed

    Tai, Patricia; Van Dyk, Jake; Battista, Jerry; Yu, Edward; Stitt, Larry; Tonita, Jon; Agboola, Olusegun; Brierley, James; Dar, Rashid; Leighton, Christopher; Malone, Shawn; Strang, Barbara; Truong, Pauline; Videtic, Gregory; Wong, C Shun; Wong, Rebecca; Youssef, Youssef

    2002-07-01

    Three-dimensional conformal radiation therapy requires the precise definition of the target volume. Its potential benefits could be offset by the inconsistency in target definition by radiation oncologists. In a previous survey of radiation oncologists, a large degree of variation in target volume definition of cervical esophageal cancer was noted for the boost phase of radiotherapy. The present study evaluated whether special training could improve the consistency in target volume definitions. A pre-training survey was performed to establish baseline values. This was followed by a special one-on-one training session on treatment planning based on the RTOG 94-05 protocol to 12 radiation oncologists. Target volumes were redrawn immediately and at 1-2 months later. Post-training vs. pre-training target volumes were compared. There was less variability in the longitudinal positions of the target volumes post-training compared to pre-training (p < 0.05 in 5 of 6 comparisons). One case had more variability due to the lack of a visible gross tumor on CT scans. Transverse contours of target volumes did not show any significant difference pre- or post-training. For cervical esophageal cancer, this study suggests that special training on protocol guidelines may improve consistency in target volume definition. Explicit protocol directions are required for situations where the gross tumor is not easily visible on CT scans. This may be particularly important for multicenter clinical trials, to reduce the occurrences of protocol violations.

  11. Current management of hyperglycemia in acute coronary syndromes: a national Dutch survey.

    PubMed

    de Mulder, Maarten; Oemrawsingh, Rohit M; Stam, Frank; Boersma, Eric; Umans, Victor A W M

    2009-06-01

    Hyperglycemia is common among patients admitted with acute coronary syndromes (ACS) and is associated with less favorable clinical outcomes. Guidelines for the treatment of hyperglycemia in myocardial infarction are confusing, partly because of lack of sufficient evidence. Neither do we know what the everyday practice on hyperglycemia in ACS is. Therefore the aim of our study is to describe current glucose management in ACS patients in The Netherlands. We designed a multiple-choice questionnaire that was emailed to all 94 independent cardiology departments of each of the 114 hospitals within The Netherlands. We interviewed cardiologists about their specific hospital setting, the presence, content, and actual use of a dedicated hyperglycemia protocol in the setting of ACS. Ninety-four questionnaires were returned (response rate 100%). Only 32% of the respondents reported to have a routinely applied, dedicated hyperglycemia protocol in the setting of ACS. An admission glucose of 13.0 mmol/L is considered a stress value by 60% of respondents. Treatment of hyperglycemia is postponed until after the acute phase (ie, after >6 hours) in 41% of the cardiology departments and in 76% HbA1c is not routinely measured before discharge. Only a minority of Dutch cardiology departments have a routinely applied, dedicated hyperglycemia protocol for patients admitted with ACS. Different views exist on the interpretation of admission hyperglycemia in patients without previously diagnosed diabetes. Dedicated protocols with well-established treatment goals allow early treatment and are mandatory to improve timely metabolic regulation.

  12. SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  13. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Development of a Research Reactor Protocol for Neutron Multiplication Measurements

    DOE PAGES

    Arthur, Jennifer Ann; Bahran, Rian Mustafa; Hutchinson, Jesson D.; ...

    2018-03-20

    A new series of subcritical measurements has been conducted at the zero-power Walthousen Reactor Critical Facility (RCF) at Rensselaer Polytechnic Institute (RPI) using a 3He neutron multiplicity detector. The Critical and Subcritical 0-Power Experiment at Rensselaer (CaSPER) campaign establishes a protocol for advanced subcritical neutron multiplication measurements involving research reactors for validation of neutron multiplication inference techniques, Monte Carlo codes, and associated nuclear data. There has been increased attention and expanded efforts related to subcritical measurements and analyses, and this work provides yet another data set at known reactivity states that can be used in the validation of state-of-the-art Montemore » Carlo computer simulation tools. The diverse (mass, spatial, spectral) subcritical measurement configurations have been analyzed to produce parameters of interest such as singles rates, doubles rates, and leakage multiplication. MCNP ®6.2 was used to simulate the experiment and the resulting simulated data has been compared to the measured results. Comparison of the simulated and measured observables (singles rates, doubles rates, and leakage multiplication) show good agreement. This work builds upon the previous years of collaborative subcritical experiments and outlines a protocol for future subcritical neutron multiplication inference and subcriticality monitoring measurements on pool-type reactor systems.« less

  15. A method for meta-analysis of epidemiological studies.

    PubMed

    Einarson, T R; Leeder, J S; Koren, G

    1988-10-01

    This article presents a stepwise approach for conducting a meta-analysis of epidemiological studies based on proposed guidelines. This systematic method is recommended for practitioners evaluating epidemiological studies in the literature to arrive at an overall quantitative estimate of the impact of a treatment. Bendectin is used as an illustrative example. Meta-analysts should establish a priori the purpose of the analysis and a complete protocol. This protocol should be adhered to, and all steps performed should be recorded in detail. To aid in developing such a protocol, we present methods the researcher can use to perform each of 22 steps in six major areas. The illustrative meta-analysis confirmed previous traditional narrative literature reviews that Bendectin is not related to teratogenic outcomes in humans. The overall summary odds ratio was 1.01 (chi 2 = 0.05, p = 0.815) with a 95 percent confidence interval of 0.66-1.55. When the studies were separated according to study type, the summary odds ratio for cohort studies was 0.95 with a 95 percent confidence interval of 0.62-1.45. For case-control studies, the summary odds ratio was 1.27 with a 95 percent confidence interval of 0.83-1.94. The corresponding chi-square values were not statistically significant at the p = 0.05 level.

  16. Development of a Research Reactor Protocol for Neutron Multiplication Measurements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arthur, Jennifer Ann; Bahran, Rian Mustafa; Hutchinson, Jesson D.

    A new series of subcritical measurements has been conducted at the zero-power Walthousen Reactor Critical Facility (RCF) at Rensselaer Polytechnic Institute (RPI) using a 3He neutron multiplicity detector. The Critical and Subcritical 0-Power Experiment at Rensselaer (CaSPER) campaign establishes a protocol for advanced subcritical neutron multiplication measurements involving research reactors for validation of neutron multiplication inference techniques, Monte Carlo codes, and associated nuclear data. There has been increased attention and expanded efforts related to subcritical measurements and analyses, and this work provides yet another data set at known reactivity states that can be used in the validation of state-of-the-art Montemore » Carlo computer simulation tools. The diverse (mass, spatial, spectral) subcritical measurement configurations have been analyzed to produce parameters of interest such as singles rates, doubles rates, and leakage multiplication. MCNP ®6.2 was used to simulate the experiment and the resulting simulated data has been compared to the measured results. Comparison of the simulated and measured observables (singles rates, doubles rates, and leakage multiplication) show good agreement. This work builds upon the previous years of collaborative subcritical experiments and outlines a protocol for future subcritical neutron multiplication inference and subcriticality monitoring measurements on pool-type reactor systems.« less

  17. Quantum cryptography as a retrodiction problem.

    PubMed

    Werner, A H; Franz, T; Werner, R F

    2009-11-27

    We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and key distribution.

  18. Effects of chlorophyll and chlorophyllin on low-dose aflatoxin B1 pharmacokinetics in human volunteers: A pilot study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jubert, C; Mata, J; Bench, G

    Chlorophyll (Chla) and chlorophyllin (CHL) were shown previously to reduce carcinogen bioavailability, biomarker damage, and tumorigenicity in trout and rats. These findings were partially extended to humans (Proc Natl Acad Sci USA 98, 14601-14606 (2001)), where CHL reduced excretion of aflatoxin B{sub 1} (AFB{sub 1})-DNA repair products in Chinese unavoidably exposed to dietary AFB{sub 1}. However, neither AFB{sub 1} pharmacokinetics nor Chla effects were examined. We conducted a small unblinded crossover study to establish AFB{sub 1} pharmacokinetic parameters in human volunteers, and to explore possible effects of CHL or Chla co-treatment on those parameters. For protocol 1, fasted subjects receivedmore » an IRB-approved dose of 14C-AFB{sub 1} (30 ng, 5 nCi) by capsule with 100 ml water, followed by normal eating and drinking after hr 2. Blood and cumulative urine samples were collected over 72 hr, and {sup 14}C-AFB{sub 1} equivalents were determined by Accelerator Mass Spectrometry. Protocols 2 and 3 were similar except capsules also contained 150 mg of purified Chla, or CHL, respectively. All protocols were repeated 3 times for each of three volunteers. The study revealed rapid human AFB{sub 1} uptake (plasma ka 5.05 {+-} 1.10 hr-1, Tmax 1.0 hr) and urinary elimination (95% complete by 24 hr) kinetics. Chla and CHL treatment each significantly impeded AFB{sub 1} absorption and reduced Cmax and AUC's (plasma and urine) in one or more subjects. These initial results provide AFB{sub 1} pharmacokinetic parameters previously unavailable for humans, and suggest that Chla or CHL co-consumption may limit the bioavailability of ingested aflatoxin in humans, as they do in animal models.« less

  19. Asynchronous reference frame agreement in a quantum network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Wehner, Stephanie

    2016-03-01

    An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.

  20. Guidelines for experimental design protocol and validation procedure for the measurement of heat resistance of microorganisms in milk.

    PubMed

    Condron, Robin; Farrokh, Choreh; Jordan, Kieran; McClure, Peter; Ross, Tom; Cerf, Olivier

    2015-01-02

    Studies on the heat resistance of dairy pathogens are a vital part of assessing the safety of dairy products. However, harmonized methodology for the study of heat resistance of food pathogens is lacking, even though there is a need for such harmonized experimental design protocols and for harmonized validation procedures for heat treatment studies. Such an approach is of particular importance to allow international agreement on appropriate risk management of emerging potential hazards for human and animal health. This paper is working toward establishment of a harmonized protocol for the study of the heat resistance of pathogens, identifying critical issues for establishment of internationally agreed protocols, including a harmonized framework for reporting and interpretation of heat inactivation studies of potentially pathogenic microorganisms. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    NASA Astrophysics Data System (ADS)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  2. Establishment of Protocols for Global Metabolomics by LC-MS for Biomarker Discovery.

    PubMed

    Saigusa, Daisuke; Okamura, Yasunobu; Motoike, Ikuko N; Katoh, Yasutake; Kurosawa, Yasuhiro; Saijyo, Reina; Koshiba, Seizo; Yasuda, Jun; Motohashi, Hozumi; Sugawara, Junichi; Tanabe, Osamu; Kinoshita, Kengo; Yamamoto, Masayuki

    2016-01-01

    Metabolomics is a promising avenue for biomarker discovery. Although the quality of metabolomic analyses, especially global metabolomics (G-Met) using mass spectrometry (MS), largely depends on the instrumentation, potential bottlenecks still exist at several basic levels in the metabolomics workflow. Therefore, we established a precise protocol initially for the G-Met analyses of human blood plasma to overcome some these difficulties. In our protocol, samples are deproteinized in a 96-well plate using an automated liquid-handling system, and conducted either using a UHPLC-QTOF/MS system equipped with a reverse phase column or a LC-FTMS system equipped with a normal phase column. A normalization protocol of G-Met data was also developed to compensate for intra- and inter-batch differences, and the variations were significantly reduced along with our normalization, especially for the UHPLC-QTOF/MS data with a C18 reverse-phase column for positive ions. Secondly, we examined the changes in metabolomic profiles caused by the storage of EDTA-blood specimens to identify quality markers for the evaluation of the specimens' pre-analytical conditions. Forty quality markers, including lysophospholipids, dipeptides, fatty acids, succinic acid, amino acids, glucose, and uric acid were identified by G-Met for the evaluation of plasma sample quality and established the equation of calculating the quality score. We applied our quality markers to a small-scale study to evaluate the quality of clinical samples. The G-Met protocols and quality markers established here should prove useful for the discovery and development of biomarkers for a wider range of diseases.

  3. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    ERIC Educational Resources Information Center

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  4. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  5. Fast Entanglement Establishment via Local Dynamics for Quantum Repeater Networks

    NASA Astrophysics Data System (ADS)

    Gyongyosi, Laszlo; Imre, Sandor

    Quantum entanglement is a necessity for future quantum communication networks, quantum internet, and long-distance quantum key distribution. The current approaches of entanglement distribution require high-delay entanglement transmission, entanglement swapping to extend the range of entanglement, high-cost entanglement purification, and long-lived quantum memories. We introduce a fundamental protocol for establishing entanglement in quantum communication networks. The proposed scheme does not require entanglement transmission between the nodes, high-cost entanglement swapping, entanglement purification, or long-lived quantum memories. The protocol reliably establishes a maximally entangled system between the remote nodes via dynamics generated by local Hamiltonians. The method eliminates the main drawbacks of current schemes allowing fast entanglement establishment with a minimized delay. Our solution provides a fundamental method for future long-distance quantum key distribution, quantum repeater networks, quantum internet, and quantum-networking protocols. This work was partially supported by the GOP-1.1.1-11-2012-0092 project sponsored by the EU and European Structural Fund, by the Hungarian Scientific Research Fund - OTKA K-112125, and by the COST Action MP1006.

  6. Flight related tuberculosis contact investigations in the United States: comparative risk and economic analysis of alternate protocols.

    PubMed

    Marienau, Karen J; Cramer, Elaine H; Coleman, Margaret S; Marano, Nina; Cetron, Martin S

    2014-01-01

    In-flight transmission risk of Mycobacterium tuberculosis is not well defined, although studies suggest it is low. The impact of flight-related tuberculosis (TB) contact investigations (TBCIs) on TB prevention and control is not well established, and they compete for resources with activities with established benefits. We sought to determine the risks and cost-benefits of using more restrictive criteria in comparison to the Centers for Disease Control and Prevention (CDC) 2008 protocol for TBCIs. The risk-benefits of a modified CDC protocol were analyzed in comparison to the 2008 CDC protocol using data from flight-related TBCIs conducted in the United States from 2007 through 2009. We predicted the numbers and characteristics of case-travelers that would be identified using each protocol's criteria, and results of the associated passenger-contacts' TB screening tests. The economic analysis compared the costs of TBCIs to avoided costs of TB treatment and mortality using a Return on Investment model. The estimated in-flight transmission risk using a modified CDC protocol was 1.4%-19% versus 1.1%-24% for the 2008 protocol. Numbers of TBCIs and immediate costs to health departments were reduced by half. Long-term cost-benefits were comparable. CDC's modified protocol appears to be a feasible alternative that will conserve public health resources without jeopardizing the public's health. Published by Elsevier Ltd.

  7. New targets for expedient detection of viruses within shellfish

    USDA-ARS?s Scientific Manuscript database

    Previously our laboratory developed an expedient method for extraction of viral RNA from food-borne virus contaminated bivalve shellfish, termed the GPTT protocol. This protocol utilizes either whole shellfish or dissected digestive diverticula. This four step protocol utilizes a high pH glycine or...

  8. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  9. Protocols for treating patients with end-stage renal disease: a survey of nephrology fellowships.

    PubMed

    Perry, Maureen Munnelly; Howell, Scott; Patel, Nipa

    2017-03-01

    Approximately 14% of Americans are living with chronic kidney disease (CKD). The prevalence of end-stage renal disease (ESRD), the result of progressing CKD continues to rise by 21,000 per year. Currently, the only antibiotic prophylaxis guidelines for patients with ESRD undergoing dental treatment were published by the AHA in 2003. Presented in three parts, the first and second parts of this study found no consistent protocols amongst U.S. dental schools and U.S. GPRs and AEGDs, respectively. The goal of the third part of the project was to determine the current protocol being used to treat ESRD patients at U.S. nephrology fellowship programs. An 18 multiple-choice question survey was e-mailed to 130 directors of nephrology fellowships within the U.S. regarding renal treatment protocol details and antibiotic prophylaxis for patients with renal disease. Note that, 34.6% of respondents reported having an established renal treatment protocol. For programs with a protocol, 69% of programs reported following AHA guidelines. There is a lack of consistent, established protocols amongst U.S. nephrology fellowships. It is suggested that updated and evidence based guidelines for the safe treatment of patients be developed. © 2016 Special Care Dentistry Association and Wiley Periodicals, Inc.

  10. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    PubMed

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  11. Mn/ROAD testing protocols : vol. 1

    DOT National Transportation Integrated Search

    1997-12-01

    This report presents a series of testing protocols used at the Minnesota Road Research Project (Mn/ROAD), the Minnesota Department of Transportation's (Mn/DOT) pavement testing facility. This report helps establish a history of the tests conducted an...

  12. National Airspace System (NAS) open system architecture and protocols

    DOT National Transportation Integrated Search

    2003-08-14

    This standard establishes the open systems data communications architecture and authorized protocol standards for the National Airspace System (NAS). The NAS will consist of various types of processors and communications networks procured from a vari...

  13. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    PubMed

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  14. Alloreactive Regulatory T Cells Allow the Generation of Mixed Chimerism and Transplant Tolerance.

    PubMed

    Ruiz, Paulina; Maldonado, Paula; Hidalgo, Yessia; Sauma, Daniela; Rosemblatt, Mario; Bono, Maria Rosa

    2015-01-01

    The induction of donor-specific transplant tolerance is one of the main goals of modern immunology. Establishment of a mixed chimerism state in the transplant recipient has proven to be a suitable strategy for the induction of long-term allograft tolerance; however, current experimental recipient preconditioning protocols have many side effects, and are not feasible for use in future therapies. In order to improve the current mixed chimerism induction protocols, we developed a non-myeloablative bone-marrow transplant (NM-BMT) protocol using retinoic acid (RA)-induced alloantigen-specific Tregs, clinically available immunosuppressive drugs, and lower doses of irradiation. We demonstrate that RA-induced alloantigen-specific Tregs in addition to a NM-BMT protocol generates stable mixed chimerism and induces tolerance to allogeneic secondary skin allografts in mice. Therefore, the establishment of mixed chimerism through the use of donor-specific Tregs rather than non-specific immunosuppression could have a potential use in organ transplantation.

  15. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  16. Validity of the modified back-saver sit-and-reach test: a comparison with other protocols.

    PubMed

    Hui, S S; Yuen, P Y

    2000-09-01

    Studies have shown that the classical sit-and-reach (CSR) test, the modified sit-and-reach (MSR), and the newly developed back-saver sit-and-reach (BS) test have poor criterion-related validity in estimating low-back flexibility but yielded moderate criterion-related validity in hamstring flexibility. The V sit-and-reach (VSR) test was found to be practical but the validity has not been established. The purpose of this study was to propose a modified back-saver sit-and-reach (MBS) test, which incorporated all advantages of the various protocols, and to compare the criterion-related validity and reliability of all these tests. 158 college students (F = 96, and M = 62; age = 20.77 +/- 2.51) performed CSR, VSR, BS (left and right leg), and MBS (left and right leg) tests in a randomized order. Scores from each test were then correlated with the criterion measures. For all sit-reach tests, intraclass reliability (single trial) was very high (r = 0.89-0.98). MBS yielded significant and highest r with low-back and hamstring criterion for men (r = 0.47-0.67) and women (r = 0.23-0.54). The low-back and right hamstring validity of MBS for men were significantly (P < 0.01) higher than those from BS and CSR, whereas no differences in criterion-related validity were found between the MBS and other protocols in women. The ratings of perceived comfort among the sit-and-reach protocols were significantly different (P < 0.001) from each other. The rating for MBS was observed the most comfortable test as compared with other protocols. The MBS test is not only a reliable test for hamstring and low-back flexibility, it is also a more practical with improved validity for hamstring and low-back flexibility in men than previous protocols.

  17. Patient and professional user experiences of simple telehealth for hypertension, medication reminders and smoking cessation: a service evaluation

    PubMed Central

    Cottrell, Elizabeth; Cox, Tracey; O'Connell, Phil; Chambers, Ruth

    2015-01-01

    Objectives To establish patient and professional user satisfaction with the Advice & Interactive Messaging (AIM) for Health programme delivered using a mobile phone-based, simple telehealth intervention, ‘Florence’. Design A service evaluation using data extracted from Florence and from a professional user electronic survey. Setting 425 primary care practices across 31 Clinical Commissioning Groups in England. Participants 3381 patients registered on 1 of 10 AIM protocols between March 2013 and January 2014 and 77 professional users. Intervention The AIM programme offered 10 clinical protocols, in three broad groups: (1) hypertension diagnosis/monitoring, (2) medication reminders and (3) smoking cessation. Florence sent patients prompts to submit clinical information, educational messages and user satisfaction questions. Patient responses were reviewed by their primary healthcare providers. Primary outcome measures Patients and professional user experiences of using AIM, and within this, Florence. Results Patient activity using Florence was generally good at month 1 for the hypertension protocols (71–80%), but reduced over 2–3 months (31–60%). For the other protocols, patient activity was 0–39% at 3 months. Minimum target days of texting were met for half the hypertension protocols. 1707/2304 (74%) patients sent evaluative texts responded at least once. Among responders, agreement with the adapted friends and family statement generally exceeded preproject aspirations. Professional responders were generally positive or equivocal about the programme. Conclusions Satisfaction with AIM appeared optimal when patients were carefully selected for the protocol; professional users were familiar with the system, the programme addressed a problem with the previous service delivery that was identified by users and users took an active approach to achieve clinical goals. However, there was a significant decrease in patients’ use of Florence over time. Future applications may be optimised by identifying and addressing reasons for the waning use of the service and enhancing support during implementation of the service. PMID:25795698

  18. Optimization of a human IgG B-cell ELISpot assay for the analysis of vaccine-induced B-cell responses.

    PubMed

    Jahnmatz, Maja; Kesa, Gun; Netterlid, Eva; Buisman, Anne-Marie; Thorstensson, Rigmor; Ahlborg, Niklas

    2013-05-31

    B-cell responses after infection or vaccination are often measured as serum titers of antigen-specific antibodies. Since this does not address the aspect of memory B-cell activity, it may not give a complete picture of the B-cell response. Analysis of memory B cells by ELISpot is therefore an important complement to conventional serology. B-cell ELISpot was developed more than 25 years ago and many assay protocols/reagents would benefit from optimization. We therefore aimed at developing an optimized B-cell ELISpot for the analysis of vaccine-induced human IgG-secreting memory B cells. A protocol was developed based on new monoclonal antibodies to human IgG and biotin-avidin amplification to increase the sensitivity. After comparison of various compounds commonly used to in vitro-activate memory B cells for ELISpot analysis, the TLR agonist R848 plus interleukin (IL)-2 was selected as the most efficient activator combination. The new protocol was subsequently compared to an established protocol, previously used in vaccine studies, based on polyclonal antibodies without biotin avidin amplification and activation of memory B-cells using a mix of antigen, CpG, IL-2 and IL-10. The new protocol displayed significantly better detection sensitivity, shortened the incubation time needed for the activation of memory B cells and reduced the amount of antigen required for the assay. The functionality of the new protocol was confirmed by analyzing specific memory B cells to five different antigens, induced in a limited number of subjects vaccinated against tetanus, diphtheria and pertussis. The limited number of subjects did not allow for a direct comparison with other vaccine studies. Optimization of the B-cell ELISpot will facilitate an improved analysis of IgG-secreting B cells in vaccine studies. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Authentication and Key Establishment in Dynamic Wireless Sensor Networks

    PubMed Central

    Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier

    2010-01-01

    When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321

  20. Sizing Single Cantilever Beam Specimens for Characterizing Facesheet/Core Peel Debonding in Sandwich Structure

    NASA Technical Reports Server (NTRS)

    Ratcliffe, James G.

    2010-01-01

    This technical publication details part of an effort focused on the development of a standardized facesheet/core peel debonding test procedure. The purpose of the test is to characterize facesheet/core peel in sandwich structure, accomplished through the measurement of the critical strain energy release rate associated with the debonding process. Following an examination of previously developed tests and a recent evaluation of a selection of these methods, a single cantilever beam (SCB) specimen was identified as being a promising candidate for establishing such a standardized test procedure. The objective of the work described here was to begin development of a protocol for conducting a SCB test that will render the procedure suitable for standardization. To this end, a sizing methodology was developed to ensure appropriate SCB specimen dimensions are selected for a given sandwich system. Application of this method to actual sandwich systems yielded SCB specimen dimensions that would be practical for use. This study resulted in the development of a practical SCB specimen sizing method, which should be well-suited for incorporation into a standardized testing protocol.

  1. Staphylococcus aureus, Staphylococcus epidermidis and Staphylococcus haemolyticus: methicillin-resistant isolates are detected directly in blood cultures by multiplex PCR.

    PubMed

    Pereira, Eliezer M; Schuenck, Ricardo P; Malvar, Karoline L; Iorio, Natalia L P; Matos, Pricilla D M; Olendzki, André N; Oelemann, Walter M R; dos Santos, Kátia R N

    2010-03-31

    In this study, we standardized and evaluated a multiplex-PCR methodology using specific primers to identify Staphylococcus aureus, Staphylococcus epidermidis and Staphylococcus haemolyticus and their methicillin-resistance directly from blood cultures. Staphylococci clinical isolates (149) and control strains (16) previously identified by conventional methods were used to establish the multiplex PCR protocol. Subsequently, this methodology was evaluated using a fast and cheap DNA extraction protocol from 25 staphylococci positive blood cultures. A wash step of the pellet with 0.1% bovine serum albumin (BSA) solution was performed to reduce PCR inhibitors. Amplicons of 154bp (mecA gene), 271bp (S. haemolyticus mvaA gene) and 108 and 124bp (S. aureus and S. epidermidis species-specific fragments, respectively) were observed. Reliable results were obtained for 100% of the evaluated strains, suggesting that this new multiplex-PCR combined with an appropriate DNA-extraction method could be useful in the laboratory for fast and accurate identification of three staphylococci species and simultaneously their methicillin resistance directly in blood cultures.

  2. On the verification of intransitive noninterference in mulitlevel security.

    PubMed

    Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez

    2005-10-01

    We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.

  3. Constrained synaptic connectivity in functional mammalian neuronal networks grown on patterned surfaces.

    PubMed

    Wyart, Claire; Ybert, Christophe; Bourdieu, Laurent; Herr, Catherine; Prinz, Christelle; Chatenay, Didier

    2002-06-30

    The use of ordered neuronal networks in vitro is a promising approach to study the development and the activity of small neuronal assemblies. However, in previous attempts, sufficient growth control and physiological maturation of neurons could not be achieved. Here we describe an original protocol in which polylysine patterns confine the adhesion of cellular bodies to prescribed spots and the neuritic growth to thin lines. Hippocampal neurons in these networks are maintained healthy in serum free medium up to 5 weeks in vitro. Electrophysiology and immunochemistry show that neurons exhibit mature excitatory and inhibitory synapses and calcium imaging reveals spontaneous activity of neurons in isolated networks. We demonstrate that neurons in these geometrical networks form functional synapses preferentially to their first neighbors. We have, therefore, established a simple and robust protocol to constrain both the location of neuronal cell bodies and their pattern of connectivity. Moreover, the long term maintenance of the geometry and the physiology of the networks raises the possibility of new applications for systematic screening of pharmacological agents and for electronic to neuron devices.

  4. Optimisation of recovery protocols for double-base smokeless powder residues analysed by total vaporisation (TV) SPME/GC-MS.

    PubMed

    Sauzier, Georgina; Bors, Dana; Ash, Jordan; Goodpaster, John V; Lewis, Simon W

    2016-09-01

    The investigation of explosive events requires appropriate evidential protocols to recover and preserve residues from the scene. In this study, a central composite design was used to determine statistically validated optimum recovery parameters for double-base smokeless powder residues on steel, analysed using total vaporisation (TV) SPME/GC-MS. It was found that maximum recovery was obtained using isopropanol-wetted swabs stored under refrigerated conditions, then extracted for 15min into acetone on the same day as sample collection. These parameters were applied to the recovery of post-blast residues deposited on steel witness surfaces following a PVC pipe bomb detonation, resulting in detection of all target components across the majority of samples. Higher overall recoveries were obtained from plates facing the sides of the device, consistent with the point of first failure occurring in the pipe body as observed in previous studies. The methodology employed here may be readily applied to a variety of other explosive compounds, and thus assist in establishing 'best practice' procedures for explosive investigations. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Current Status of EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas reference standards are needed to calibrate and audit continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensur...

  6. Xrootd in dCache - design and experiences

    NASA Astrophysics Data System (ADS)

    Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas

    2011-12-01

    dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.

  7. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  8. Bidirectional teleportation of a pure EPR state by using GHZ states

    NASA Astrophysics Data System (ADS)

    Hassanpour, Shima; Houshmand, Monireh

    2016-02-01

    In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.

  9. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  10. High-throughput DNA extraction of forensic adhesive tapes.

    PubMed

    Forsberg, Christina; Jansson, Linda; Ansell, Ricky; Hedman, Johannes

    2016-09-01

    Tape-lifting has since its introduction in the early 2000's become a well-established sampling method in forensic DNA analysis. Sampling is quick and straightforward while the following DNA extraction is more challenging due to the "stickiness", rigidity and size of the tape. We have developed, validated and implemented a simple and efficient direct lysis DNA extraction protocol for adhesive tapes that requires limited manual labour. The method uses Chelex beads and is applied with SceneSafe FAST tape. This direct lysis protocol provided higher mean DNA yields than PrepFiler Express BTA on Automate Express, although the differences were not significant when using clothes worn in a controlled fashion as reference material (p=0.13 and p=0.34 for T-shirts and button-down shirts, respectively). Through in-house validation we show that the method is fit-for-purpose for application in casework, as it provides high DNA yields and amplifiability, as well as good reproducibility and DNA extract stability. After implementation in casework, the proportion of extracts with DNA concentrations above 0.01ng/μL increased from 71% to 76%. Apart from providing higher DNA yields compared with the previous method, the introduction of the developed direct lysis protocol also reduced the amount of manual labour by half and doubled the potential throughput for tapes at the laboratory. Generally, simplified manual protocols can serve as a cost-effective alternative to sophisticated automation solutions when the aim is to enable high-throughput DNA extraction of complex crime scene samples. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  11. CURRENT STATUS OF THE EPA PROTOCOL GAS PROGRAM

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. EPA has published a protocol to establish the traceability of these standards to national refer...

  12. Current Status of EPA Verification Program for EPA Protocol Gases

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  13. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  14. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  15. Comparison of Different Protein Extraction Methods for Gel-Based Proteomic Analysis of Ganoderma spp.

    PubMed

    Al-Obaidi, Jameel R; Saidi, Noor Baity; Usuldin, Siti Rokhiyah Ahmad; Hussin, Siti Nahdatul Isnaini Said; Yusoff, Noornabeela Md; Idris, Abu Seman

    2016-04-01

    Ganoderma species are a group of fungi that have the ability to degrade lignin polymers and cause severe diseases such as stem and root rot and can infect economically important plants and perennial crops such as oil palm, especially in tropical countries such as Malaysia. Unfortunately, very little is known about the complex interplay between oil palm and Ganoderma in the pathogenesis of the diseases. Proteomic technologies are simple yet powerful tools in comparing protein profile and have been widely used to study plant-fungus interaction. A critical step to perform a good proteome research is to establish a method that gives the best quality and a wide coverage of total proteins. Despite the availability of various protein extraction protocols from pathogenic fungi in the literature, no single extraction method was found suitable for all types of pathogenic fungi. To develop an optimized protein extraction protocol for 2-DE gel analysis of Ganoderma spp., three previously reported protein extraction protocols were compared: trichloroacetic acid, sucrose and phenol/ammonium acetate in methanol. The third method was found to give the most reproducible gels and highest protein concentration. Using the later method, a total of 10 protein spots (5 from each species) were successfully identified. Hence, the results from this study propose phenol/ammonium acetate in methanol as the most effective protein extraction method for 2-DE proteomic studies of Ganoderma spp.

  16. Whole-mount in situ hybridization in the Rotifer Brachionus plicatilis representing a basal branch of lophotrochozoans

    PubMed Central

    Boell, Louis A.

    2008-01-01

    In order to broaden the comparative scope of evolutionary developmental biology and to refine our picture of animal macroevolution, it is necessary to establish new model organisms, especially from previously underrepresented groups, like the Lophotrochozoa. We have established the culture and protocols for molecular developmental biology in the rotifer species Brachionus plicatilis Müller (Rotifera, Monogononta). Rotifers are nonsegmented animals with enigmatic basal position within the lophotrochozoans and marked by several evolutionary novelties like the wheel organ (corona), the median eye, and the nonpaired posterior foot. The expression of Bp-Pax-6 is shown using whole-mount in situ hybridization. The inexpensive easy culture and experimental tractability of Brachionus as well as the range of interesting questions to which it holds the key make it a promising addition to the “zoo” of evo-devo model organisms. Electronic supplementary material The online version of this article (doi:10.1007/s00427-008-0234-z) contains supplementary material, which is available to authorized users. PMID:18594859

  17. Validation of the ERS standard citric acid cough challenge in healthy adult volunteers

    PubMed Central

    2010-01-01

    Protocols measuring cough sensitivity can vary in terms of nebuliser, tussive agent, single and dose response. A definitive method for measuring cough sensitivity needs to be established. The ERS guidelines recommend the KoKo DigiDoser (KD) delivery system. Study aim, was to compare the reproducibility of this citric acid (CA) cough challenge and previously established Mefar dosimeter (MD) protocol. 39 (female 26) volunteers mean age (40.4 yrs) were randomised to either KD or MD. Intra-day and inter-day reproducibility was compared. We calculated the concentration of citric acid evoking 2 coughs (C2). The geometric mean C2 (95%CI) was similar for both KD and MD, of 263 (200,339) mM and 209 (151,288) mM respectively. The mean KD C2 was not significantly different. (F = 0.807, p = 0.93) from baseline over 1, 2, and 4 hrs however, the MD demonstrated significant variability (F = 7.85, P < 0.001) Measuring mean log C2 at baseline and at 2 weeks, the KD demonstrated a stronger intraclass correlation of log C2 at baseline with 2 week log C2, ICC = 0.70 than was shown with the Mefar, ICC = 0.41 Administering CA from KD offers a reproducible cough challenge in healthy volunteers. The results correlate well with the MD challenge but offer greater intra-day and inter-day reproducibility. Trial Registration Current controlled trials ISRCTN98385033 PMID:20698995

  18. A comparative study of routing protocols of heterogeneous wireless sensor networks.

    PubMed

    Han, Guangjie; Jiang, Xu; Qian, Aihua; Rodrigues, Joel J P C; Cheng, Long

    2014-01-01

    Recently, heterogeneous wireless sensor network (HWSN) routing protocols have drawn more and more attention. Various HWSN routing protocols have been proposed to improve the performance of HWSNs. Among these protocols, hierarchical HWSN routing protocols can improve the performance of the network significantly. In this paper, we will evaluate three hierarchical HWSN protocols proposed recently--EDFCM, MCR, and EEPCA--together with two previous classical routing protocols--LEACH and SEP. We mainly focus on the round of the first node dies (also called the stable period) and the number of packets sent to sink, which is an important aspect to evaluate the monitoring ability of a protocol. We conduct a lot of experiments and simulations on Matlab to analyze the performance of the five routing protocols.

  19. 17 CFR 49.10 - Acceptance of data.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... technological protocols established by a swap data repository shall provide for the receipt of swap creation data, swap continuation data, real-time public reporting data, and all other data and information... swap data repository shall adopt policies and procedures, including technological protocols, which...

  20. USE OF BROMOERGOCRYPTINE IN THE VALIDATION OF PROTOCOLS FOR THE ASSESSMENT OF MECHANISMS OF EARLY PREGNANCY LOSS IN THE RAT

    EPA Science Inventory

    Validated protocols for evaluating maternally mediated mechanisms of early pregnancy failure in rodents are needed for use in the risk assessment process. To supplement previous efforts in the validation of a panel of protocols assembled for this purpose, bromoergocryptine (BEC) ...

  1. Native grass hydroseed development : establishment protocols for three native Hawaiian plants on roadside areas.

    DOT National Transportation Integrated Search

    2012-08-01

    The biggest mistake with using native plants on Hawaiis roadways is to assume that native plants do not require : nutrient enhancement or supplemental water to establish on these sites. The establishment of native plants will : require a detailed ...

  2. The [Un]Spoken Challenges of Administrator Collaboration: An Exploration of One District Leadership Team's Use of Protocols to Promote Reflection and Shared Theories of Action

    ERIC Educational Resources Information Center

    Szczesiul, Stacy Agee

    2014-01-01

    This article explores the use of protocol-structured dialogue in promoting reflective practices and shared theories of action within a district leadership team. Protocols have been used to make individuals' theories of action visible and subject to evaluation. This is important for leaders trying to establish coherence across a system; in…

  3. A Protocol-Based Decision for Choosing a Proper Surgical Treatment Option for Carotid Artery Stenosis.

    PubMed

    Jang, E-Wook; Chung, Joonho; Seo, Kwon-Duk; Suh, Sang Hyun; Kim, Yong Bae; Lee, Kyung-Yul

    2015-06-01

    There are two established surgical treatment options for carotid artery stenosis. Carotid endarterectomy (CEA) has been accepted as a gold standard for surgical treatment while carotid artery stenting (CAS) has recently become an alternative option. Each treatment option has advantages and disadvantages for the treatment outcomes. We propose a protocol for selection of a proper surgical treatment option for carotid artery stenosis. A total of 192 published articles on management of carotid artery stenosis were reviewed. Preoperatively considerable factors which had been repeatedly noted in those articles for the risk/benefits of CEA or CAS were selected. According to those factors, a protocol with four categories was established. CEA or CAS is indicated when the patient has a symptomatic stenosis ≥ 50%, or when the patient has an asymptomatic stenosis ≥ 80%. Each treatment option has absolute indications and favorable indications. Each absolute indication is scored with three points, and each favorable indication, one point. Based on the highest scores, a proper treatment option (CEA or CAS) is selected. We have been treating patients according to this protocol and evaluating the outcomes of our protocol-based decision because this protocol might be helpful in assessment of risk/benefit for selection of a proper surgical treatment option in patients with carotid artery stenosis.

  4. Use of a novel cell adhesion method and digital measurement to show stimulus-dependent variation in somatic and oral ciliary beat frequency in Paramecium.

    PubMed

    Bell, Wade E; Hallworth, Richard; Wyatt, Todd A; Sisson, Joseph H

    2015-01-01

    When Paramecium encounters positive stimuli, the membrane hyperpolarizes and ciliary beat frequency increases. We adapted an established immobilization protocol using a biological adhesive and a novel digital analysis system to quantify beat frequency in immobilized Paramecium. Cells showed low mortality and demonstrated beat frequencies consistent with previous studies. Chemoattractant molecules, reduction in external potassium, and posterior stimulation all increased somatic beat frequency. In all cases, the oral groove cilia maintained a higher beat frequency than mid-body cilia, but only oral cilia from cells stimulated with chemoattactants showed an increase from basal levels. © 2014 The Author(s) Journal of Eukaryotic Microbiology © 2014 International Society of Protistologists.

  5. EXAFS analysis of a human Cu,Zn SOD isoform focused using non-denaturing gel electrophoresis

    NASA Astrophysics Data System (ADS)

    Chevreux, Sylviane; Solari, Pier Lorenzo; Roudeau, Stéphane; Deves, Guillaume; Alliot, Isabelle; Testemale, Denis; Hazemann, Jean Louis; Ortega, Richard

    2009-11-01

    Isoelectric point isoforms of a metalloprotein, copper-zinc superoxide dismutase (CuZnSOD), separated on electrophoresis gels were analyzed using X-ray Absorption Spectroscopy. Mutations of this protein are involved in familial cases of amyotrophic lateral sclerosis. The toxicity of mutants could be relied to defects in the metallation state. Our purpose is to establish analytical protocols to study metallation state of protein isoforms such as those from CuZnSOD. We previously highlighted differences in the copper oxidation state between CuZnSOD isoforms using XANES. Here, we present the first results for EXAFS analyses performed at Cu and Zn K-edge on the majoritary expressed isoform of human CuZnSOD separated on electrophoresis gels.

  6. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  7. Resting-state functional connectivity assessed with two diffuse optical tomographic systems.

    PubMed

    Niu, Haijing; Khadka, Sabin; Tian, Fenghua; Lin, Zi-Jing; Lu, Chunming; Zhu, Chaozhe; Liu, Hanli

    2011-04-01

    Functional near-infrared spectroscopy (fNIRS) is recently utilized as a new approach to assess resting-state functional connectivity (RSFC) in the human brain. For any new technique or new methodology, it is necessary to be able to replicate similar experiments using different instruments in order to establish its liability and reproducibility. We apply two different diffuse optical tomographic (DOT) systems (i.e., DYNOT and CW5), with various probe arrangements to evaluate RSFC in the sensorimotor cortex by utilizing a previously published experimental protocol and seed-based correlation analysis. Our results exhibit similar spatial patterns and strengths in RSFC between the bilateral motor cortexes. The consistent observations are obtained from both DYNOT and CW5 systems, and are also in good agreement with the previous fNIRS study. Overall, we demonstrate that the fNIRS-based RSFC is reproducible by various DOT imaging systems among different research groups, enhancing the confidence of neuroscience researchers and clinicians to utilize fNIRS for future applications.

  8. Two protocols to treat thin endometrium with granulocyte colony-stimulating factor during frozen embryo transfer cycles.

    PubMed

    Xu, Bin; Zhang, Qiong; Hao, Jie; Xu, Dabao; Li, Yanping

    2015-04-01

    The efficacy of two granulocyte colony-stimulating factor (G-CSF) protocols for thin endometrium were investigated. Eighty-two patients were diagnosed with thin endometrium (<7 mm). Thirty patients with previously cancelled embryo transfers received intrauterine G-CSF in subsequent frozen embryo transfer (FET) cycles. Patients were divided into the G-CSF only and G-CSF with endometrial scratch subgroups. Compared with previous cycles, endometrial thickness increased from 5.7 ± 0.7 mm to 8.1 ± 2.1 mm after G-CSF treatment (P < 0.001). Endometrial thickness increases were not significantly different between the two subgroups. The G-CSF with endometrial scratch subgroup established nominally higher though non-significant clinical pregnancy and live birth rates than the G-CSF only subgroup (53.8 % versus 42.9% and 38.5% versus 28.6%, respectively). Fifty-two patients underwent FET despite edometrial thickness less than 7 mm, and were included as controls. Significantly higher embryo implantation and clinical pregnancy rates were observed in the G-CSF group compared with the control group (31.5% versus 13.9%; P < 0.01; 48.1% versus 25.0%; P = 0.038, respectively). Endometrial scracth did not impair G-CSF treatment for thin endometrium and favoured pregnancy and live birth rates. For patients with thin endometrium, embryo transfer cancellation and G-CSF treatment in subsequent FET cycles is beneficial. Copyright © 2014 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  9. 17 CFR 49.10 - Acceptance of data.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... protocols established by a swap data repository shall provide for the receipt of swap creation data, swap continuation data, real-time public reporting data, and all other data and information required to be reported... repository shall adopt policies and procedures, including technological protocols, which provide for...

  10. 17 CFR 49.10 - Acceptance of data.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... protocols established by a swap data repository shall provide for the receipt of swap creation data, swap continuation data, real-time public reporting data, and all other data and information required to be reported... repository shall adopt policies and procedures, including technological protocols, which provide for...

  11. Establishment of immortalized human erythroid progenitor cell lines able to produce enucleated red blood cells.

    PubMed

    Kurita, Ryo; Suda, Noriko; Sudo, Kazuhiro; Miharada, Kenichi; Hiroyama, Takashi; Miyoshi, Hiroyuki; Tani, Kenzaburo; Nakamura, Yukio

    2013-01-01

    Transfusion of red blood cells (RBCs) is a standard and indispensable therapy in current clinical practice. In vitro production of RBCs offers a potential means to overcome a shortage of transfusable RBCs in some clinical situations and also to provide a source of cells free from possible infection or contamination by microorganisms. Thus, in vitro production of RBCs may become a standard procedure in the future. We previously reported the successful establishment of immortalized mouse erythroid progenitor cell lines that were able to produce mature RBCs very efficiently. Here, we have developed a reliable protocol for establishing immortalized human erythroid progenitor cell lines that are able to produce enucleated RBCs. These immortalized cell lines produce functional hemoglobin and express erythroid-specific markers, and these markers are upregulated following induction of differentiation in vitro. Most importantly, these immortalized cell lines all produce enucleated RBCs after induction of differentiation in vitro, although the efficiency of producing enucleated RBCs remains to be improved further. To the best of our knowledge, this is the first demonstration of the feasibility of using immortalized human erythroid progenitor cell lines as an ex vivo source for production of enucleated RBCs.

  12. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Nicely, Lucas D; Zhang, Haibin

    Modern large-scale networks require the ability to withstand arbitrary failures (i.e., Byzantine failures). Byzantine reliable broadcast algorithms can be used to reliably disseminate information in the presence of Byzantine failures. We design a novel Byzantine reliable broadcast protocol for loosely connected and synchronous networks. While previous such protocols all assume correct senders, our protocol is the first to handle Byzantine senders. To achieve this goal, we have developed new techniques for fault detection and fault tolerance. Our protocol is efficient, and under normal circumstances, no expensive public-key cryptographic operations are used. We implement and evaluate our protocol, demonstrating that ourmore » protocol has high throughput and is superior to the existing protocols in uncivil executions.« less

  14. Comparison of the efficiency of rat papillary muscles during afterloaded isotonic contractions and contractions with sinusoidal length changes.

    PubMed

    Mellors, L J; Gibbs, C L; Barclay, C J

    2001-05-01

    The results of previous studies suggest that the maximum mechanical efficiency of rat papillary muscles is lower during a contraction protocol involving sinusoidal length changes than during one involving afterloaded isotonic contractions. The aim of this study was to compare directly the efficiency of isolated rat papillary muscle preparations in isotonic and sinusoidal contraction protocols. Experiments were performed in vitro (27 degrees C) using left ventricular papillary muscles from adult rats. Each preparation performed three contraction protocols: (i) low-frequency afterloaded isotonic contractions (10 twitches at 0.2 Hz), (ii) sinusoidal length change contractions with phasic stimulation (40 twitches at 2 Hz) and (iii) high-frequency afterloaded isotonic contractions (40 twitches at 2 Hz). The first two protocols resembled those used in previous studies and the third combined the characteristics of the first two. The parameters for each protocol were adjusted to those that gave maximum efficiency. For the afterloaded isotonic protocols, the afterload was set to 0.3 of the maximum developed force. The sinusoidal length change protocol incorporated a cycle amplitude of +/-5% resting length and a stimulus phase of -10 degrees. Measurements of force output, muscle length change and muscle temperature change were used to calculate the work and heat produced during and after each protocol. Net mechanical efficiency was defined as the proportion of the energy (enthalpy) liberated by the muscle that appeared as work. The efficiency in the low-frequency, isotonic contraction protocol was 21.1+/-1.4% (mean +/- s.e.m., N=6) and that in the sinusoidal protocol was 13.2+/-0.7%, consistent with previous results. This difference was not due to the higher frequency or greater number of twitches because efficiency in the high-frequency, isotonic protocol was 21.5+/-1.0%. Although these results apparently confirm that efficiency is protocol-dependent, additional experiments designed to measure work output unambiguously indicated that the method used to calculate work output in isotonic contractions overestimated actual work output. When net work output, which excludes work done by parallel elastic elements, rather than total work output was used to determine efficiency in afterloaded isotonic contractions, efficiency was similar to that for sinusoidal contractions. The maximum net mechanical efficiency of rat papillary muscles performing afterloaded isotonic or sinusoidal length change contractions was between 10 and 15%.

  15. Return of Postural Control to Baseline After Anaerobic and Aerobic Exercise Protocols

    PubMed Central

    Fox, Zachary G; Mihalik, Jason P; Blackburn, J Troy; Battaglini, Claudio L; Guskiewicz, Kevin M

    2008-01-01

    Context: With regard to sideline concussion testing, the effect of fatigue associated with different types of exercise on postural control is unknown. Objective: To evaluate the effects of fatigue on postural control in healthy college-aged athletes performing anaerobic and aerobic exercise protocols and to establish an immediate recovery time course from each exercise protocol for postural control measures to return to baseline status. Design: Counterbalanced, repeated measures. Setting: Research laboratory. Patients Or Other Participants: Thirty-six collegiate athletes (18 males, 18 females; age  =  19.00 ± 1.01 years, height  =  172.44 ± 10.47 cm, mass  =  69.72 ± 12.84 kg). Intervention(s): Participants completed 2 counterbalanced sessions within 7 days. Each session consisted of 1 exercise protocol followed by postexercise measures of postural control taken at 3-, 8-, 13-, and 18-minute time intervals. Baseline measures were established during the first session, before the specified exertion protocol was performed. Main Outcome Measure(s): Balance Error Scoring System (BESS) results, sway velocity, and elliptical sway area. Results: We found a decrease in postural control after each exercise protocol for all dependent measures. An interaction was noted between exercise protocol and time for total BESS score (P  =  .002). For both exercise protocols, all measures of postural control returned to baseline within 13 minutes. Conclusions: Postural control was negatively affected after anaerobic and aerobic exercise protocols as measured by total BESS score, elliptical sway area, and sway velocity. The effect of exertion lasted up to 13 minutes after each exercise was completed. Certified athletic trainers and clinicians should be aware of these effects and their recovery time course when determining an appropriate time to administer sideline assessments of postural control after a suspected mild traumatic brain injury. PMID:18833307

  16. Return of postural control to baseline after anaerobic and aerobic exercise protocols.

    PubMed

    Fox, Zachary G; Mihalik, Jason P; Blackburn, J Troy; Battaglini, Claudio L; Guskiewicz, Kevin M

    2008-01-01

    With regard to sideline concussion testing, the effect of fatigue associated with different types of exercise on postural control is unknown. To evaluate the effects of fatigue on postural control in healthy college-aged athletes performing anaerobic and aerobic exercise protocols and to establish an immediate recovery time course from each exercise protocol for postural control measures to return to baseline status. Counterbalanced, repeated measures. Research laboratory. Thirty-six collegiate athletes (18 males, 18 females; age = 19.00 +/- 1.01 years, height = 172.44 +/- 10.47 cm, mass = 69.72 +/- 12.84 kg). Participants completed 2 counterbalanced sessions within 7 days. Each session consisted of 1 exercise protocol followed by postexercise measures of postural control taken at 3-, 8-, 13-, and 18-minute time intervals. Baseline measures were established during the first session, before the specified exertion protocol was performed. Balance Error Scoring System (BESS) results, sway velocity, and elliptical sway area. We found a decrease in postural control after each exercise protocol for all dependent measures. An interaction was noted between exercise protocol and time for total BESS score (P = .002). For both exercise protocols, all measures of postural control returned to baseline within 13 minutes. Postural control was negatively affected after anaerobic and aerobic exercise protocols as measured by total BESS score, elliptical sway area, and sway velocity. The effect of exertion lasted up to 13 minutes after each exercise was completed. Certified athletic trainers and clinicians should be aware of these effects and their recovery time course when determining an appropriate time to administer sideline assessments of postural control after a suspected mild traumatic brain injury.

  17. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  18. Portable ultrasonography in mass casualty incidents: The CAVEAT examination.

    PubMed

    Stawicki, Stanislaw Peter; Howard, James M; Pryor, John P; Bahner, David P; Whitmill, Melissa L; Dean, Anthony J

    2010-11-18

    Ultrasonography used by practicing clinicians has been shown to be of utility in the evaluation of time-sensitive and critical illnesses in a range of environments, including pre-hospital triage, emergency department, and critical care settings. The increasing availability of light-weight, robust, user-friendly, and low-cost portable ultrasound equipment is particularly suited for use in the physically and temporally challenging environment of a multiple casualty incident (MCI). Currently established ultrasound applications used to identify potentially lethal thoracic or abdominal conditions offer a base upon which rapid, focused protocols using hand-carried emergency ultrasonography could be developed. Following a detailed review of the current use of portable ultrasonography in military and civilian MCI settings, we propose a protocol for sonographic evaluation of the chest, abdomen, vena cava, and extremities for acute triage. The protocol is two-tiered, based on the urgency and technical difficulty of the sonographic examination. In addition to utilization of well-established bedside abdominal and thoracic sonography applications, this protocol incorporates extremity assessment for long-bone fractures. Studies of the proposed protocol will need to be conducted to determine its utility in simulated and actual MCI settings.

  19. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  1. Simultaneous Transplantation of Hematopoietic Stem Cells and a Vascularized Composite Allograft Leads to Tolerance

    PubMed Central

    Mathes, David W.; Chang, Jeff; Hwang, Billanna; Graves, Scott S.; Storer, Barry E.; Butts-Miwongtum, Tiffany; Sale, George E.; Storb, Rainer

    2014-01-01

    Background We have previously demonstrated that tolerance to a vascularized composite allograft (VCA) can be achieved after the establishment of mixed chimerism. Here, we test the hypothesis that tolerance to a VCA in our dog leukocyte antigen (DLA)-matched canine model is not dependent on the previous establishment of mixed chimerism and can be induced coincident with hematopoietic cell transplantation (HCT). Methods Eight DLA-matched, minor antigen mismatched dogs received 200 cGy of radiation and a VCA transplant. Four dogs received donor bone marrow at the time of VCA transplantation (group 1) while a second group of 4 dogs did not (group 2). All recipients received a limited course of post-grafting immunosuppression. All dogs that received HCT and VCA were given donor, third party and autologous skin grafts. Results All group 1 recipients were tolerant to their VCA (> 62 weeks). Three of the four dogs in group 2 rejected their VCA transplants after the cessation of immunosuppression. Biopsies obtained from muscle and skin of VCA from group 1 showed few infiltrating cells compared to extensive infiltrates in biopsies of VCA from group 2. Compared to autologous skin and muscle, elevated levels of CD3+ FoxP3+ T-regulatory cells were found in skin and muscle obtained from VCA of HCT recipients. All group 1 animals were tolerant to their donor skin graft and promptly rejected the third-part skin grafts. Conclusion These data demonstrated donor specific tolerance to all components of the VCA can be established through simultaneous nonmyeloablative allogeneic HCT and VCA transplant protocol. PMID:24918616

  2. Automation of a Nile red staining assay enables high throughput quantification of microalgal lipid production.

    PubMed

    Morschett, Holger; Wiechert, Wolfgang; Oldiges, Marco

    2016-02-09

    Within the context of microalgal lipid production for biofuels and bulk chemical applications, specialized higher throughput devices for small scale parallelized cultivation are expected to boost the time efficiency of phototrophic bioprocess development. However, the increasing number of possible experiments is directly coupled to the demand for lipid quantification protocols that enable reliably measuring large sets of samples within short time and that can deal with the reduced sample volume typically generated at screening scale. To meet these demands, a dye based assay was established using a liquid handling robot to provide reproducible high throughput quantification of lipids with minimized hands-on-time. Lipid production was monitored using the fluorescent dye Nile red with dimethyl sulfoxide as solvent facilitating dye permeation. The staining kinetics of cells at different concentrations and physiological states were investigated to successfully down-scale the assay to 96 well microtiter plates. Gravimetric calibration against a well-established extractive protocol enabled absolute quantification of intracellular lipids improving precision from ±8 to ±2 % on average. Implementation into an automated liquid handling platform allows for measuring up to 48 samples within 6.5 h, reducing hands-on-time to a third compared to manual operation. Moreover, it was shown that automation enhances accuracy and precision compared to manual preparation. It was revealed that established protocols relying on optical density or cell number for biomass adjustion prior to staining may suffer from errors due to significant changes of the cells' optical and physiological properties during cultivation. Alternatively, the biovolume was used as a measure for biomass concentration so that errors from morphological changes can be excluded. The newly established assay proved to be applicable for absolute quantification of algal lipids avoiding limitations of currently established protocols, namely biomass adjustment and limited throughput. Automation was shown to improve data reliability, as well as experimental throughput simultaneously minimizing the needed hands-on-time to a third. Thereby, the presented protocol meets the demands for the analysis of samples generated by the upcoming generation of devices for higher throughput phototrophic cultivation and thereby contributes to boosting the time efficiency for setting up algae lipid production processes.

  3. Mitochondrial Respiration in Insulin-Producing β-Cells: General Characteristics and Adaptive Effects of Hypoxia

    PubMed Central

    Ma, Zuheng; Scholz, Hanne; Björklund, Anneli; Grill, Valdemar

    2015-01-01

    Objective To provide novel insights on mitochondrial respiration in β-cells and the adaptive effects of hypoxia. Methods and Design Insulin-producing INS-1 832/13 cells were exposed to 18 hours of hypoxia followed by 20–22 hours re-oxygenation. Mitochondrial respiration was measured by high-resolution respirometry in both intact and permeabilized cells, in the latter after establishing three functional substrate-uncoupler-inhibitor titration (SUIT) protocols. Concomitant measurements included proteins of mitochondrial complexes (Western blotting), ATP and insulin secretion. Results Intact cells exhibited a high degree of intrinsic uncoupling, comprising about 50% of oxygen consumption in the basal respiratory state. Hypoxia followed by re-oxygenation increased maximal overall respiration. Exploratory experiments in peremabilized cells could not show induction of respiration by malate or pyruvate as reducing substrates, thus glutamate and succinate were used as mitochondrial substrates in SUIT protocols. Permeabilized cells displayed a high capacity for oxidative phosphorylation for both complex I- and II-linked substrates in relation to maximum capacity of electron transfer. Previous hypoxia decreased phosphorylation control of complex I-linked respiration, but not in complex II-linked respiration. Coupling control ratios showed increased coupling efficiency for both complex I- and II-linked substrates in hypoxia-exposed cells. Respiratory rates overall were increased. Also previous hypoxia increased proteins of mitochondrial complexes I and II (Western blotting) in INS-1 cells as well as in rat and human islets. Mitochondrial effects were accompanied by unchanged levels of ATP, increased basal and preserved glucose-induced insulin secretion. Conclusions Exposure of INS-1 832/13 cells to hypoxia, followed by a re-oxygenation period increases substrate-stimulated respiratory capacity and coupling efficiency. Such effects are accompanied by up-regulation of mitochondrial complexes also in pancreatic islets, highlighting adaptive capacities of possible importance in an islet transplantation setting. Results also indicate idiosyncrasies of β-cells that do not respire in response to a standard inclusion of malate in SUIT protocols. PMID:26401848

  4. Mitochondrial Respiration in Insulin-Producing β-Cells: General Characteristics and Adaptive Effects of Hypoxia.

    PubMed

    Hals, Ingrid K; Bruerberg, Simon Gustafson; Ma, Zuheng; Scholz, Hanne; Björklund, Anneli; Grill, Valdemar

    2015-01-01

    To provide novel insights on mitochondrial respiration in β-cells and the adaptive effects of hypoxia. Insulin-producing INS-1 832/13 cells were exposed to 18 hours of hypoxia followed by 20-22 hours re-oxygenation. Mitochondrial respiration was measured by high-resolution respirometry in both intact and permeabilized cells, in the latter after establishing three functional substrate-uncoupler-inhibitor titration (SUIT) protocols. Concomitant measurements included proteins of mitochondrial complexes (Western blotting), ATP and insulin secretion. Intact cells exhibited a high degree of intrinsic uncoupling, comprising about 50% of oxygen consumption in the basal respiratory state. Hypoxia followed by re-oxygenation increased maximal overall respiration. Exploratory experiments in peremabilized cells could not show induction of respiration by malate or pyruvate as reducing substrates, thus glutamate and succinate were used as mitochondrial substrates in SUIT protocols. Permeabilized cells displayed a high capacity for oxidative phosphorylation for both complex I- and II-linked substrates in relation to maximum capacity of electron transfer. Previous hypoxia decreased phosphorylation control of complex I-linked respiration, but not in complex II-linked respiration. Coupling control ratios showed increased coupling efficiency for both complex I- and II-linked substrates in hypoxia-exposed cells. Respiratory rates overall were increased. Also previous hypoxia increased proteins of mitochondrial complexes I and II (Western blotting) in INS-1 cells as well as in rat and human islets. Mitochondrial effects were accompanied by unchanged levels of ATP, increased basal and preserved glucose-induced insulin secretion. Exposure of INS-1 832/13 cells to hypoxia, followed by a re-oxygenation period increases substrate-stimulated respiratory capacity and coupling efficiency. Such effects are accompanied by up-regulation of mitochondrial complexes also in pancreatic islets, highlighting adaptive capacities of possible importance in an islet transplantation setting. Results also indicate idiosyncrasies of β-cells that do not respire in response to a standard inclusion of malate in SUIT protocols.

  5. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  6. Nondestructive Methods for Monitoring Cell Removal During Rat Liver Decellularization.

    PubMed

    Geerts, Sharon; Ozer, Sinan; Jaramillo, Maria; Yarmush, Martin L; Uygun, Basak E

    2016-07-01

    Whole liver engineering holds the promise to create transplantable liver grafts that may serve as substitutes for donor organs, addressing the donor shortage in liver transplantation. While decellularization and recellularization of livers in animal models have been successfully achieved, scale up to human livers has been slow. There are a number of donor human livers that are discarded because they are not found suitable for transplantation, but are available for engineering liver grafts. These livers are rejected due to a variety of reasons, which in turn may affect the decellularization outcome. Hence, a one-size-fit-for all decellularization protocol may not result in scaffolds with consistent matrix quality, subsequently influencing downstream recellularization and transplantation outcomes. There is a need for a noninvasive monitoring method to evaluate the extent of cell removal, while ensuring preservation of matrix components during decellularization. In this study, we decellularized rat livers using a protocol previously established by our group, and we monitored decellularization through traditional destructive techniques, including evaluation of DNA, collagen, and glycosaminoglycan (GAG) content in decellularized scaffolds, as well as histology. In addition, we used computed tomography and perfusate analysis as alternative nondestructive decellularization monitoring methods. We found that DNA removal correlates well with the Hounsfield unit of the liver, and perfusate analysis revealed that significant amount of GAG is removed during perfusion with 0.1% sodium dodecyl sulfate. This allowed for optimization of our decellularization protocol leading to scaffolds that have significantly higher GAG content, while maintaining appropriate removal of cellular contents. The significance of this is the creation of a nondestructive monitoring strategy that can be used for optimization of decellularization protocols for individual human livers available for liver engineering.

  7. Multicenter evaluation of a new closed system drug-transfer device in reducing surface contamination by antineoplastic hazardous drugs.

    PubMed

    Bartel, Sylvia B; Tyler, Timothy G; Power, Luci A

    2018-02-15

    Results of a study to evaluate the effectiveness of a recently introduced closed system drug-transfer device (CSTD) in reducing surface contamination during compounding and simulated administration of antineoplastic hazardous drugs (AHDs) are reported. Wipe samples were collected from 6 predetermined surfaces in compounding and infusion areas of 13 U.S. cancer centers to establish preexisting levels of surface contamination by 2 marker AHDs (cyclophosphamide and fluorouracil). Stainless steel templates were placed over the 6 previously sampled surfaces, and the marker drugs were compounded and infused per a specific protocol using all components of the CSTD. Wipe samples were collected from the templates after completion of tasks and analyzed for both marker AHDs. Aggregated results of wipe sampling to detect preexisting contamination at the 13 study sites showed that overall, 66.7% of samples (104 of 156) had detectable levels of at least 1 marker AHD; subsequent testing after CSTD use per protocol found a sample contamination rate of 5.8% (9 of 156 samples). In the administration areas alone, the rate of preexisting contamination was 78% (61 of 78 samples); with use of the CSTD protocol, the contamination rate was 2.6%. Twenty-six participants rated the CSTD for ease of use, with 100% indicating that they were satisfied or extremely satisfied. A study involving a rigorous protocol and 13 cancer centers across the United States demonstrated that the CSTD reduced surface contamination by cyclophosphamide and fluorouracil during compounding and simulated administration. Participants reported that the CSTD was easy to use. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  8. Nondestructive Methods for Monitoring Cell Removal During Rat Liver Decellularization

    PubMed Central

    Geerts, Sharon; Ozer, Sinan; Jaramillo, Maria; Yarmush, Martin L.

    2016-01-01

    Whole liver engineering holds the promise to create transplantable liver grafts that may serve as substitutes for donor organs, addressing the donor shortage in liver transplantation. While decellularization and recellularization of livers in animal models have been successfully achieved, scale up to human livers has been slow. There are a number of donor human livers that are discarded because they are not found suitable for transplantation, but are available for engineering liver grafts. These livers are rejected due to a variety of reasons, which in turn may affect the decellularization outcome. Hence, a one-size-fit-for all decellularization protocol may not result in scaffolds with consistent matrix quality, subsequently influencing downstream recellularization and transplantation outcomes. There is a need for a noninvasive monitoring method to evaluate the extent of cell removal, while ensuring preservation of matrix components during decellularization. In this study, we decellularized rat livers using a protocol previously established by our group, and we monitored decellularization through traditional destructive techniques, including evaluation of DNA, collagen, and glycosaminoglycan (GAG) content in decellularized scaffolds, as well as histology. In addition, we used computed tomography and perfusate analysis as alternative nondestructive decellularization monitoring methods. We found that DNA removal correlates well with the Hounsfield unit of the liver, and perfusate analysis revealed that significant amount of GAG is removed during perfusion with 0.1% sodium dodecyl sulfate. This allowed for optimization of our decellularization protocol leading to scaffolds that have significantly higher GAG content, while maintaining appropriate removal of cellular contents. The significance of this is the creation of a nondestructive monitoring strategy that can be used for optimization of decellularization protocols for individual human livers available for liver engineering. PMID:27169332

  9. Application of Metagenomic Sequencing to Food Safety: Detection of Shiga Toxin-Producing Escherichia coli on Fresh Bagged Spinach

    PubMed Central

    Leonard, Susan R.; Mammel, Mark K.; Lacher, David W.

    2015-01-01

    Culture-independent diagnostics reduce the reliance on traditional (and slower) culture-based methodologies. Here we capitalize on advances in next-generation sequencing (NGS) to apply this approach to food pathogen detection utilizing NGS as an analytical tool. In this study, spiking spinach with Shiga toxin-producing Escherichia coli (STEC) following an established FDA culture-based protocol was used in conjunction with shotgun metagenomic sequencing to determine the limits of detection, sensitivity, and specificity levels and to obtain information on the microbiology of the protocol. We show that an expected level of contamination (∼10 CFU/100 g) could be adequately detected (including key virulence determinants and strain-level specificity) within 8 h of enrichment at a sequencing depth of 10,000,000 reads. We also rationalize the relative benefit of static versus shaking culture conditions and the addition of selected antimicrobial agents, thereby validating the long-standing culture-based parameters behind such protocols. Moreover, the shotgun metagenomic approach was informative regarding the dynamics of microbial communities during the enrichment process, including initial surveys of the microbial loads associated with bagged spinach; the microbes found included key genera such as Pseudomonas, Pantoea, and Exiguobacterium. Collectively, our metagenomic study highlights and considers various parameters required for transitioning to such sequencing-based diagnostics for food safety and the potential to develop better enrichment processes in a high-throughput manner not previously possible. Future studies will investigate new species-specific DNA signature target regimens, rational design of medium components in concert with judicious use of additives, such as antibiotics, and alterations in the sample processing protocol to enhance detection. PMID:26386062

  10. 76 FR 24862 - Proposed Information Collection; Comment Request; Protocol for Access to Tissue Specimen Samples...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...

  11. Agrobacterium-mediated transformation of two Serbian potato cultivars (Solanum tuberosum L. cv. Dragacevka and cv. Jelica)

    USDA-ARS?s Scientific Manuscript database

    An efficient protocol for Agrobacterium-mediated transformation of Serbian potato cultivars Dragacevka and Jelica, enabling the introduction of oryzacystatin genes OCI and OCII, was established. Starting with leaf explants a two-stage transformation protocol combining procedures of Webb and Wenzler...

  12. On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Herbauts, I. M.; Bettelli, S.; Hã¼bel, H.; Peev, M.

    2008-02-01

    Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).

  13. Acute Pain Service and multimodal therapy for postsurgical pain control: evaluation of protocol efficacy.

    PubMed

    Moizo, E; Berti, M; Marchetti, C; Deni, F; Albertin, A; Muzzolon, F; Antonino, A

    2004-11-01

    The institution of a postoperative Acute Pain Control Service is mandatory to improve the control of pain induced by surgical injury. Treatment of postoperative pain may be achieved using a combination of analgesic agents and techniques, reducing the incidence of side effects owing to the lower doses of the individual drugs. In 1997 we established an Acute Pain Service (APS) at the San Raffaele Hospital in Milan. The aim of this study was to assess the efficacy and safety of our APS both in terms of treatment protocols and organisational issues. In this prospective observational study we included 592 patients undergoing abdominal, gynecological, or orthopedic surgery with severe expected pain. According to general guidelines on pain treatment, the patients were assigned to different treatment protocols based on the kind of operation. All protocols were based on the multimodal therapy, with the association of nonsteroidal anti-inflammatory drugs (NSAIDS), opioids and regional anesthesia techniques. During the first 48 h of the postoperative period we recorded vital signs, level of pain and occurrence of any side effect. Our analgesic protocols proved to be effective and safe (low incidence of side effects) for every surgery. The incidence of postoperative nausea and vomiting was higher in patients receiving patient-controlled morphine than that with continuous epidural or nerve block. After lower abdominal surgery, pain at movement at 24 h was significantly lower in the epidural group than in the Patient Control Analgesia group. Nausea and vomiting, numbness and paresthesias at the lower limbs were higher in gynecological patients. A larger percentage of orthopedic patients in the epidural group reported numbness and paresthesias at the lower limbs in comparison with patients receiving continuous peripheral nerve block. In agreement with previous literature, this study confirmed that a multimodal approach to pain treatment provides an adequate control of postoperative pain, minimizing side effects.

  14. An orthopedist's guide to shoulder ultrasound: a systematic review of examination protocols.

    PubMed

    Amoo-Achampong, Kelms; Nwachukwu, Benedict U; McCormick, Frank

    2016-11-01

    The utilization of musculoskeletal ultrasound has expanded within the setting of the orthopedic clinic as a cost-effective, point-of-care diagnostic tool for shoulder pathology. In experienced hands, ultrasound exhibits capabilities equivalent to that of magnetic resonance imaging in the diagnosis of many shoulder diseases including full-thickness and partial-thickness rotator cuff tears. Although similarly effective in identifying additional shoulder disease processes, major obstacles to its widespread use include user dependence and intrinsic limitation to extra-articular diagnosis. The purpose of this review is to present a step-by-step guide of how to perform a comprehensive shoulder examination and to discuss the appropriate use, economic benefit and implementation of ultrasound within the clinic. A systematic search (June 2016) of PubMed, Scopus, and EMBASE databases was conducted according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines for literature presenting shoulder ultrasound examination protocols. Included studies were peer-reviewed articles or academic society endorsed protocols presenting comprehensive sonographic examinations of the adult shoulder. Papers with limited or single structure examination descriptions, non-English language, and publication dates before 1980 were excluded. Final papers meeting criteria were secondarily screened for publication after 2005 to reflect the current state of ultrasound imaging. The search yielded 1,725 unique articles with 17 studies meeting final selection criteria. Information from identified studies was summarized to formulate a 4-part shoulder examination protocol, including steps most pertinent to orthopedic in-office diagnoses. In agreement with previous studies, the inexperienced orthopedic surgeon can be quickly trained to expert level proficiency in shoulder ultrasound diagnosis. Using an established protocol, a comprehensive, yet effective shoulder ultrasound examination can be performed within ten minutes. Further, ultrasound provides opportunity to off-set costs through the engagement of revenue generating activity for the orthopedic practice.

  15. Review of the Medical Research Ethics Committee (MREC), National Research Center of Egypt, 2003-2011.

    PubMed

    Abdel-Aal, Wafaa; Ghaffar, Esmat Abdel; El Shabrawy, Osama

    2013-10-01

    Globally, ethical issues in research are becoming of major importance, being well established in developed countries with little information about research ethics committees (RECs) in Africa to assess whether these committees are actually improving the protection of human research participants. To describe the establishment, structure, function, operations and outcome of the Medical Research Ethics Committee (MREC) of the National Research Center (NRC) of Egypt from 2003 to 2011. The committee established its regulatory rules for human and animal research ethics based on the Declaration of Helsinki 2000-2008 and WHO regulations 2000-2011. There were 974 protocols revised in the 7 years (2005-2011). The outcome of the committee discussions was to clear 262 of the protocols without conditions. A full 556 were cleared conditionally upon completion of modifications. Another 118 were deferred pending action and further consideration at a subsequent meeting. And 16 researchers did not reply, while 22 protocols were rejected. Since 2005, the MREC in NRC Egypt has built up considerable experience of evaluating the ethical issues arising within the field of medical research.

  16. Protocols for Late Maxillary Protraction in Cleft Lip and Palate Patients at Childrens Hospital Los Angeles

    PubMed Central

    Yen, Stephen L-K

    2011-01-01

    This paper describes the protocols used at Childrens Hospital Los Angeles (CHLA) to protract the maxilla during early adolescence. It is a modification of techniques introduced by Eric Liou with his Alternate Rapid Maxillary Expansion and Constriction (ALT-RAMEC) technique. The main differences between the CHLA protocol and previous maxillary protraction protocols are the age the protraction is attempted, the sutural loosening by alternating weekly expansion with constriction and the use of Class III elastics to support and redirect the protraction by nightly facemask wear. The CHLA protocol entirely depends on patient compliance and must be carefully taught and monitored. In a cooperative patient, the technique can correct a Class III malocclusion that previously would have been treated with LeFort 1 maxillary advancement surgery. Thus, it is not appropriate for patients requiring 2 jaw surgeries to correct mandibular prognathism, occlusal cants or facial asymmetry. The maxillary protraction appears to work by a combination of skeletal advancement, dental compensation and rotation of the occlusal planes. Microscrew/microimplant/temporary anchorage devices have been used with these maxillary protraction protocols to assist in expanding the maxilla, increasing skeletal anchorage during protraction, limiting dental compensations and reducing skeletal relapse. PMID:21765629

  17. The impact of protocol on nurses' role stress: a longitudinal perspective.

    PubMed

    Dodd-McCue, Diane; Tartaglia, Alexander; Veazey, Kenneth W; Streetman, Pamela S

    2005-04-01

    The study examined the impact of a protocol directed at increasing organ donation on the role stress and work attitudes of critical care nurses involved in potential organ donation cases. The research examined whether the protocol could positively affect nurses' perceptions of role stress, and if so, could the work environment improvements be sustained over time. The Family Communication Coordinator (FCC) protocol promotes effective communication during potential organ donation cases using a multidisciplinary team approach. Previous research found it associated with improved donation outcomes and with improved perceptions of role stress by critical care nurses. However, the previous study lacked methodological rigor necessary to determine causality and sustainability over time. The study used a quasi-experimental prospective longitudinal design. The sample included critical care nurses who had experience with potential organ donation cases with the protocol. Survey data were collected at 4 points over 2 years. Surveys used previously validated and reliable measures of role stress (role ambiguity, role conflict, role overload) and work attitudes (commitment, satisfaction). Interviews supplemented these data. The nurses' perceptions of role stress associated with potential organ donation cases dramatically dropped after the protocol was implemented. All measures of role stress, particularly role ambiguity and role conflict, showed statistically significant and sustained improvement. Nurses' professional, unit, and hospital commitment and satisfaction reflect an increasingly positive workplace. The results demonstrate that the FCC protocol positively influenced the workplace through its impact on role stress over the first 2 years following its implementation. The findings suggest that similar protocols may be appropriate in improving the critical care environment by reducing the stress and uncertainty of professionals involved in other end-of-life situations. However, the most striking implication relates to the reality of the workplace: meeting the goals of improved patient care outcomes and those of improving the healthcare work environment are not mutually exclusive and may be mutually essential.

  18. Evaluation of an adult insulin infusion protocol at an academic medical center.

    PubMed

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P < 0.001), probably because of the narrower target range in the revised protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of severe hypoglycemia were low (2.6%) with the original protocol. Patients' blood glucose levels were within the target range for a shorter time with the new protocol. Fewer episodes of hypoglycemia were recorded with the new protocol, but rates of severe hypoglycemia were similar with both protocols.

  19. One-year results of the use of endovenous radiofrequency ablation utilising an optimised radiofrequency-induced thermotherapy protocol for the treatment of truncal superficial venous reflux.

    PubMed

    Badham, George E; Dos Santos, Scott J; Lloyd, Lucinda Ba; Holdstock, Judy M; Whiteley, Mark S

    2018-06-01

    Background In previous in vitro and ex vivo studies, we have shown increased thermal spread can be achieved with radiofrequency-induced thermotherapy when using a low power and slower, discontinuous pullback. We aimed to determine the clinical success rate of radiofrequency-induced thermotherapy using this optimised protocol for the treatment of superficial venous reflux in truncal veins. Methods Sixty-three patients were treated with radiofrequency-induced thermotherapy using the optimised protocol and were followed up after one year (mean 16.3 months). Thirty-five patients returned for audit, giving a response rate of 56%. Duplex ultrasonography was employed to check for truncal reflux and compared to initial scans. Results In the 35 patients studied, there were 48 legs, with 64 truncal veins treated by radiofrequency-induced thermotherapy (34 great saphenous, 15 small saphenous and 15 anterior accessory saphenous veins). One year post-treatment, complete closure of all previously refluxing truncal veins was demonstrated on ultrasound, giving a success rate of 100%. Conclusions Using a previously reported optimised, low power/slow pullback radiofrequency-induced thermotherapy protocol, we have shown it is possible to achieve a 100% ablation at one year. This compares favourably with results reported at one year post-procedure using the high power/fast pullback protocols that are currently recommended for this device.

  20. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    NASA Astrophysics Data System (ADS)

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  1. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  2. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  3. Light-induced retinal damage using different light sources, protocols and rat strains reveals LED phototoxicity.

    PubMed

    Krigel, A; Berdugo, M; Picard, E; Levy-Boukris, R; Jaadane, I; Jonet, L; Dernigoghossian, M; Andrieu-Soler, C; Torriglia, A; Behar-Cohen, F

    2016-12-17

    To save energy, the European directives from the Eco-design of Energy Using Products (2005/32/CE) have recommended the replacement of incandescent lamps by more economic devices such as Light Emitting Diodes (LEDs). However, the emission spectrum of these devices is enriched in blue radiations, known to be potentially dangerous to the retina. Recent studies showed that light exposure contributes to the onset of early stages of age-related macular degeneration (AMD). Here, we investigate, in albinos and pigmented rats, the effects of different exposure protocols. Twenty-four hours exposure at high luminance was compared to a cyclic (dark/light) exposure at domestic levels for 1week and 1month, using different LEDs (Cold-white, blue and green), as well as fluorocompact bulbs and fluorescent tubes. The data suggest that the blue component of the white-LED may cause retinal toxicity at occupational domestic illuminance and not only in extreme experimental conditions, as previously reported. It is important to note that the current regulations and standards have been established on the basis of acute light exposure and do not take into account the effects of repeated exposure. Copyright © 2016 IBRO. Published by Elsevier Ltd. All rights reserved.

  4. From Chaos to Content: An Integrated Approach to Government Web Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demuth, Nora H.; Knudson, Christa K.

    2005-01-03

    The web development team of the Environmental Technology Directorate (ETD) at the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) redesigned the ETD website as a database-driven system, powered by the newly designed ETD Common Information System (ETD-CIS). The ETD website was redesigned in response to an analysis that showed the previous ETD websites were inefficient, costly, and lacking in a consistent focus. Redesigned and newly created websites based on a new ETD template provide a consistent image, meet or exceed accessibility standards, and are linked through a common database. The protocols used in developing the ETD website supportmore » integration of further organizational sites and facilitate internal use by staff and training on ETD website development and maintenance. Other PNNL organizations have approached the ETD web development team with an interest in applying the methods established by the ETD system. The ETD system protocol could potentially be used by other DOE laboratories to improve their website efficiency and content focus. “The tools by which we share science information must be as extraordinary as the information itself.[ ]” – DOE Science Director Raymond Orbach« less

  5. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  6. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  7. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  8. Why You Should Establish a Connection to the Internet.

    ERIC Educational Resources Information Center

    Hill, Judy A.; Misic, Mark M.

    1996-01-01

    Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…

  9. Automated saliva processing for LC-MS/MS: Improving laboratory efficiency in cortisol and cortisone testing.

    PubMed

    Antonelli, Giorgia; Padoan, Andrea; Artusi, Carlo; Marinova, Mariela; Zaninotto, Martina; Plebani, Mario

    2016-04-01

    The aim of this study was to implement in our routine practice an automated saliva preparation protocol for quantification of cortisol (F) and cortisone (E) by LC-MS/MS using a liquid handling platform, maintaining the previously defined reference intervals with the manual preparation. Addition of internal standard solution to saliva samples and calibrators and SPE on μ-elution 96-well plate were performed by liquid handling platform. After extraction, the eluates were submitted to LC-MS/MS analysis. The manual steps within the entire process were to transfer saliva samples in suitable tubes, to put the cap mat and transfer of the collection plate to the LC auto sampler. Transference of the reference intervals from the manual to the automated procedure was established by Passing Bablok regression on 120 saliva samples analyzed simultaneously with the two procedures. Calibration curves were linear throughout the selected ranges. The imprecision ranged from 2 to 10%, with recoveries from 95 to 116%. Passing Bablok regression demonstrated no significant bias. The liquid handling platform translates the manual steps into automated operations allowing for saving hands-on time, while maintaining assay reproducibility and ensuring reliability of results, making it implementable in our routine with the previous established reference intervals. Copyright © 2015 The Canadian Society of Clinical Chemists. Published by Elsevier Inc. All rights reserved.

  10. Deconstructing white matter connectivity of human amygdala nuclei with thalamus and cortex subdivisions in vivo.

    PubMed

    Abivardi, Aslan; Bach, Dominik R

    2017-08-01

    Structural alterations in long-range amygdala connections are proposed to crucially underlie several neuropsychiatric disorders. While progress has been made in elucidating the function of these connections, our understanding of their structure in humans remains sparse and non-systematic. Harnessing diffusion-weighted imaging and probabilistic tractography in humans, we investigate connections between two main amygdala nucleus groups, thalamic nuclei, and cortex. We first parcellated amygdala into deep (basolateral) and superficial (centrocortical) nucleus groups, and thalamus into six subregions, using previously established protocols based on connectivity. Cortex was parcellated based on T1-weighted images. We found substantial amygdala connections to thalamus, with different patterns for the two amygdala nuclei. Crucially, we describe direct subcortical connections between amygdala and paraventricular thalamus. Different from rodents but similar to non-human primates, these are more pronounced for basolateral than centrocortical amygdala. Substantial white-matter connectivity between amygdala and visual pulvinar is also more pronounced for basolateral amygdala. Furthermore, we establish detailed connectivity profiles for basolateral and centrocortical amygdala to cortical regions. These exhibit cascadic connections with sensory cortices as suggested previously based on tracer methods in non-human animals. We propose that the quantitative connectivity profiles provided here may guide future work on normal and pathological function of human amygdala. Hum Brain Mapp 38:3927-3940, 2017. © 2017 Wiley Periodicals, Inc. © 2017 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.

  11. Deconstructing white matter connectivity of human amygdala nuclei with thalamus and cortex subdivisions in vivo

    PubMed Central

    2017-01-01

    Abstract Structural alterations in long‐range amygdala connections are proposed to crucially underlie several neuropsychiatric disorders. While progress has been made in elucidating the function of these connections, our understanding of their structure in humans remains sparse and non‐systematic. Harnessing diffusion‐weighted imaging and probabilistic tractography in humans, we investigate connections between two main amygdala nucleus groups, thalamic nuclei, and cortex. We first parcellated amygdala into deep (basolateral) and superficial (centrocortical) nucleus groups, and thalamus into six subregions, using previously established protocols based on connectivity. Cortex was parcellated based on T1‐weighted images. We found substantial amygdala connections to thalamus, with different patterns for the two amygdala nuclei. Crucially, we describe direct subcortical connections between amygdala and paraventricular thalamus. Different from rodents but similar to non‐human primates, these are more pronounced for basolateral than centrocortical amygdala. Substantial white‐matter connectivity between amygdala and visual pulvinar is also more pronounced for basolateral amygdala. Furthermore, we establish detailed connectivity profiles for basolateral and centrocortical amygdala to cortical regions. These exhibit cascadic connections with sensory cortices as suggested previously based on tracer methods in non‐human animals. We propose that the quantitative connectivity profiles provided here may guide future work on normal and pathological function of human amygdala. Hum Brain Mapp 38:3927–3940, 2017. © 2017 Wiley Periodicals, Inc. PMID:28512761

  12. Setup of a Protocol of Molecular Diagnosis of β-Thalassemia Mutations in Tunisia using Denaturing High-Performance Liquid Chromatography (DHPLC).

    PubMed

    Sahli, Chaima Abdelhafidh; Ben Salem, Ikbel; Jouini, Latifa; Laouini, Naouel; Dabboubi, Rym; Hadj Fredj, Sondes; Siala, Hajer; Othmeni, Rym; Dakhlaoui, Boutheina; Fattoum, Slaheddine; Bibi, Amina; Messaoud, Taieb

    2016-09-01

    β-Thalassemia is one of the most prevalent worldwide autosomal recessive disorders. It presents a great molecular heterogeneity resulting from more than 200 causative mutations in the β-globin gene. In Tunisia, β-thalassemia represents the most prevalent monogenic hemoglobin disorder with 2.21% of carriers. Efficient and reliable mutation-screening methods are essential in order to establish appropriate prevention programs for at risk couples. The aim of the present study is to develop an efficient method based on the denaturing high-performance liquid chromatography (DHPLC) in which the whole β-globin gene (HBB) is screened for mutations covering about 90% of the spectrum. We have performed the validation of a DHPLC assay for direct genotyping of 11 known β-thalassemia mutations in the Tunisian population. DHPLC assay was established based on the analysis of 62 archival β-thalassemia samples previously genotyped then validated with full concordance on 50 tests with blind randomized samples previously genotyped with DNA sequencing and with 96% of consistency on 40 samples as a prospective study. Compared to other genotyping techniques, the DHPLC method can meet the requirements of direct genotyping of known β-thalassemia mutations in Tunisia and to be applied as a powerful tool for the genetic screening of prenatal and postnatal individuals. © 2016 Wiley Periodicals, Inc.

  13. Biobanking of patient and patient-derived xenograft ovarian tumour tissue: efficient preservation with low and high fetal calf serum based methods.

    PubMed

    Alkema, Nicolette G; Tomar, Tushar; Duiker, Evelien W; Jan Meersma, Gert; Klip, Harry; van der Zee, Ate G J; Wisman, G Bea A; de Jong, Steven

    2015-10-06

    Using patient-derived xenografts (PDXs) for preclinical cancer research demands proper storage of tumour material to facilitate logistics and to reduce the number of animals needed. We successfully established 45 subcutaneous ovarian cancer PDXs, reflecting all histological subtypes, with an overall take rate of 68%. Corresponding cells from mouse replaced human tumour stromal and endothelial cells in second generation PDXs as demonstrated with mouse-specific vimentin and CD31 immunohistochemical staining. For biobanking purposes two cryopreservation methods, a fetal calf serum (FCS)-based (95%v/v) "FCS/DMSO" protocol and a low serum-based (10%v/v) "vitrification" protocol were tested. After primary cryopreservation, tumour take rates were 38% and 67% using either the vitrification or FCS/DMSO-based cryopreservation protocol, respectively. Cryopreserved tumour tissue of established PDXs achieved take rates of 67% and 94%, respectively compared to 91% using fresh PDX tumour tissue. Genotyping analysis showed that no changes in copy number alterations were introduced by any of the biobanking methods. Our results indicate that both protocols can be used for biobanking of ovarian tumour and PDX tissues. However, FCS/DMSO-based cryopreservation is more successful. Moreover, primary engraftment of fresh patient-derived tumours in mice followed by freezing tissue of successfully established PDXs is the preferred way of efficient ovarian cancer PDX biobanking.

  14. Entanglement percolation on a quantum internet with scale-free and clustering characters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu Liang; Zhu Shiqun

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  15. Entanglement percolation on a quantum internet with scale-free and clustering characters

    NASA Astrophysics Data System (ADS)

    Wu, Liang; Zhu, Shiqun

    2011-11-01

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  16. Pharmacodynamics of cytarabine induced leucopenia: a retrospective cohort study

    PubMed Central

    Shepshelovich, Daniel; Edel, Yonatan; Goldvaser, Hadar; Dujovny, Tal; Wolach, Ofir; Raanani, Pia

    2015-01-01

    AIMS Cytarabine is a pyrimidine analogue used to treat a variety of haematological malignancies. There are few data regarding the pharmacodynamics of cytarabine. The only publications regarding this issue cite a biphasic pattern of decline in white blood cell (WBC) counts following low and intermediate doses, in patients with various malignancies, most of them non-haematological. Our purpose was to establish the pharmacodynamics of cytarabine induced leucopenia in acute myeloid leukaemia (AML) patients treated with contemporary cytarabine containing protocols. METHODS We conducted a retrospective cohort study, including 56 patients with AML in complete remission who had received 89 cycles of intermediate or high dose cytarabine. Daily counts for WBCs and neutrophils (ANC) were collected during the first 15 days after the initiation of cytarabine administration and pharmacodynamics were analyzed. Further analysis was carried out to correlate between WBC and ANC pharmacodynamics and different cytarabine protocols [high dose cytarabine (HiDAC) vs. intermediate dose cytarabine (IDAC)]. RESULTS Analysis of blood counts demonstrated a monophasic decline of WBCs and ANCs, unlike a previous depiction of a biphasic pattern. HiDAC was associated with a significantly sharper decline of WBCs than IDAC. CONCLUSIONS Our data support a monophasic decline pattern of WBCs and ANCs following contemporary cytarabine protocols. The decline rate is steeper for patients receiving HiDAC than for those receiving IDAC. These results might help form evidence based guidelines regarding patient monitoring intensity, timing of prophylactic antibacterial and antifungal treatment as well as growth factors' support following cytarabine based consolidation for AML. PMID:25303309

  17. Pharmacodynamics of cytarabine induced leucopenia: a retrospective cohort study.

    PubMed

    Shepshelovich, Daniel; Edel, Yonatan; Goldvaser, Hadar; Dujovny, Tal; Wolach, Ofir; Raanani, Pia

    2015-04-01

    Cytarabine is a pyrimidine analogue used to treat a variety of haematological malignancies. There are few data regarding the pharmacodynamics of cytarabine. The only publications regarding this issue cite a biphasic pattern of decline in white blood cell (WBC) counts following low and intermediate doses, in patients with various malignancies, most of them non-haematological. Our purpose was to establish the pharmacodynamics of cytarabine induced leucopenia in acute myeloid leukaemia (AML) patients treated with contemporary cytarabine containing protocols. We conducted a retrospective cohort study, including 56 patients with AML in complete remission who had received 89 cycles of intermediate or high dose cytarabine. Daily counts for WBCs and neutrophils (ANC) were collected during the first 15 days after the initiation of cytarabine administration and pharmacodynamics were analyzed. Further analysis was carried out to correlate between WBC and ANC pharmacodynamics and different cytarabine protocols [high dose cytarabine (HiDAC) vs. intermediate dose cytarabine (IDAC)]. Analysis of blood counts demonstrated a monophasic decline of WBCs and ANCs, unlike a previous depiction of a biphasic pattern. HiDAC was associated with a significantly sharper decline of WBCs than IDAC. Our data support a monophasic decline pattern of WBCs and ANCs following contemporary cytarabine protocols. The decline rate is steeper for patients receiving HiDAC than for those receiving IDAC. These results might help form evidence based guidelines regarding patient monitoring intensity, timing of prophylactic antibacterial and antifungal treatment as well as growth factors' support following cytarabine based consolidation for AML. © 2014 The British Pharmacological Society.

  18. New Insights into the in situ Microscopic Visualization and Quantification of Inorganic Polyphosphate Stores by 4’,6-Diamidino-2-Phenylindole (DAPI)-Staining

    PubMed Central

    Gomes, F.M.; Ramos, I.B.; Wendt, C.; Girard-Dias, W.; De Souza, W.; Machado, E.A.; K. Miranda, E.A.

    2013-01-01

    Inorganic polyphosphate (PolyP) is a biological polymer that plays important roles in the cell physiology of both prokaryotic and eukaryotic organisms. Among the available methods for PolyP localization and quantification, a 4’,6-diamidino-2-phenylindole(DAPI)-based assay has been used for visualization of PolyP-rich organelles. Due to differences in DAPI permeability to different compartments and/or PolyP retention after fixation, a general protocol for DAPI-PolyP staining has not yet been established. Here, we tested different protocols for DAPI-PolyP detection in a range of samples with different levels of DAPI permeability, including subcellular fractions, free-living cells and cryosections of fixed tissues. Subcellular fractions of PolyP-rich organelles yielded DAPI-PolyP fluorescence, although those with a complex external layer usually required longer incubation times, previous aldehyde fixation and/or detergent permeabilization. DAPI-PolyP was also detected in cryosections of OCT-embedded tissues analyzed by multiphoton microscopy. In addition, a semi-quantitative fluorimetric analysis of DAPI-stained fractions showed PolyP mobilization in a similar fashion to what has been demonstrated with the use of enzyme-based quantitative protocols. Taken together, our results support the use of DAPI for both PolyP visualization and quantification, although specific steps are suggested as a general guideline for DAPI-PolyP staining in biological samples with different degrees of DAPI and PolyP permeability. PMID:24441187

  19. Design of the multicenter standardized supervised exercise training intervention for the claudication: exercise vs endoluminal revascularization (CLEVER) study.

    PubMed

    Bronas, Ulf G; Hirsch, Alan T; Murphy, Timothy; Badenhop, Dalynn; Collins, Tracie C; Ehrman, Jonathan K; Ershow, Abby G; Lewis, Beth; Treat-Jacobson, Diane J; Walsh, M Eileen; Oldenburg, Niki; Regensteiner, Judith G

    2009-11-01

    The CLaudication: Exercise Vs Endoluminal Revascularization (CLEVER) study is the first randomized, controlled, clinical, multicenter trial that is evaluating a supervised exercise program compared with revascularization procedures to treat claudication. In this report, the methods and dissemination techniques of the supervised exercise training intervention are described. A total of 217 participants are being recruited and randomized to one of three arms: (1) optimal medical care; (2) aortoiliac revascularization with stent; or (3) supervised exercise training. Of the enrolled patients, 84 will receive supervised exercise therapy. Supervised exercise will be administered according to a protocol designed by a central CLEVER exercise training committee based on validated methods previously used in single center randomized control trials. The protocol will be implemented at each site by an exercise committee member using training methods developed and standardized by the exercise training committee. The exercise training committee reviews progress and compliance with the protocol of each participant weekly. In conclusion, a multicenter approach to disseminate the supervised exercise training technique and to evaluate its efficacy, safety and cost-effectiveness for patients with claudication due to peripheral arterial disease (PAD) is being evaluated for the first time in CLEVER. The CLEVER study will further establish the role of supervised exercise training in the treatment of claudication resulting from PAD and provide standardized methods for use of supervised exercise training in future PAD clinical trials as well as in clinical practice.

  20. Evaluation of the low-level laser therapy application parameters for skin burn treatment in experimental model: a systematic review.

    PubMed

    Brassolatti, Patricia; de Andrade, Ana Laura Martins; Bossini, Paulo Sérgio; Otterço, Albaiza Nicoletti; Parizotto, Nivaldo Antônio

    2018-05-05

    Burn is defined as a traumatic injury of thermal origin, which affects the organic tissue. Low-level laser therapy (LLLT) has gained great prominence as a treatment in this type of injury; however, the application parameters are still controversial in the literature. The aims of this study were to review the literature studies that use LLLT as a treatment in burns conducted in an experimental model, discuss the main parameters used, and highlight the benefits found in order to choose an appropriate therapeutic window to be applied in this type of injury. The selection of the studies related to the theme was carried out in the main databases (PubMed, Cochrane Library, LILACS, Web of Science, and Scopus in the period from 2001 to 2017). Subsequently, the articles were then chosen that fell within the inclusion criteria previously established. In the end, 22 were evaluated, and the main parameters were presented. The analyzed studies presented both LLLT use in continuous and pulsed mode. Differences between the parameters used (power, fluence, and total energy) were observed. In addition, the protocols are distinct as to the type of injury and the number of treatment sessions. Among the results obtained by the authors are the improvements in the local microcirculation and cellular proliferation; however, a study reported no effects with LLLT as a treatment. LLLT is effective in accelerating the healing process. However, there is immense difficulty in establishing the most adequate protocol, due to the great discrepancy found in the applied dosimetry values.

  1. Implementation of a 5-Minute Magnetic Resonance Imaging Screening Protocol for Prostate Cancer in Men With Elevated Prostate-Specific Antigen Before Biopsy.

    PubMed

    Weiss, Jakob; Martirosian, Petros; Notohamiprodjo, Mike; Kaufmann, Sascha; Othman, Ahmed E; Grosse, Ulrich; Nikolaou, Konstantin; Gatidis, Sergios

    2018-03-01

    The aims of this study were to establish a 5-minute magnetic resonance (MR) screening protocol for prostate cancer in men before biopsy and to evaluate effects on Prostate Imaging Reporting and Data System (PI-RADS) V2 scoring in comparison to a conventional, fully diagnostic multiparametric MR imaging (mpMRI) approach. Fifty-two patients with elevated prostate-specific antigen levels and without prior biopsy were prospectively included in this institutional review board-approved study. In all patients, an mpMRI protocol according to the PI-RADS recommendations was acquired on a 3 T MRI system. In addition, an accelerated diffusion-weighted imaging sequence was acquired using simultaneous multislice technique (DW-EPISMS). Two readers independently evaluated the images for the presence/absence of prostate cancer according to the PI-RADS criteria and for additional findings. In a first reading session, only the screening protocol consisting of axial T2-weighted and DW-EPISMS images was made available. In a subsequent reading session, the mpMRI protocol was assessed blinded to the results of the first reading, serving as reference standard. Both readers successfully established a final diagnosis according to the PI-RADS criteria in the screening and mpMRI protocol. Mean lesion size was 1.2 cm in the screening and 1.4 cm in the mpMRI protocol (P = 0.4) with 35% (18/52) of PI-RADS IV/V lesions. Diagnostic performance of the screening protocol was excellent with a sensitivity and specificity of 100% for both readers with no significant differences in comparison to the mpMRI standard (P = 1.0). In 3 patients, suspicious lymph nodes were reported as additional finding, which were equally detectable in the screening and mpMRI protocol. A 5-minute MR screening protocol for prostate cancer in men with elevated prostate-specific antigen levels before biopsy is applicable for clinical routine with similar diagnostic performance as the full diagnostic mpMRI approach.

  2. Orthodontic informed consent considering information load and serial position effect.

    PubMed

    Pawlak, Caroline E; Fields, Henry W; Beck, F Michael; Firestone, Allen R

    2015-03-01

    Previous research has demonstrated that current methods of informed consent are relatively ineffective as shown by poor recall and comprehension by adolescent patients and their parents. The purpose of this study was to determine whether adding a short videotape presentation reiterating the issues related to informed consent to a modified informed consent document that emphasizes a limited number of core and patient-specific custom "chunks" at the beginning of an informed consent presentation improved the recall and comprehension of the risks, benefits, and alternatives of orthodontic treatment. A second objective was to evaluate the current related data for recommendable practices. Seventy patient-parent pairs were randomly divided into 2 groups. The intervention group (group A) patients and parents together reviewed a customized slide show and a short videotape presentation describing the key risks of orthodontic treatment. Group B followed the same protocol without viewing the videotape. All patients and parents were interviewed independently by research assistants using an established measurement tool with open-ended questions. Interviews were transcribed and scored for the appropriateness of responses using a previously established codebook. Lastly, the patients and parents were given 2 reading literacy tests, 1 related to health and 1 with general content followed by the self-administered demographic and psychological state questionnaires. There were no significant differences between the groups for sociodemographic variables. There were no significant differences between the groups for overall recall and comprehension; recall and comprehension for the domains of treatment, risk, and responsibility; and recall and comprehension for core, general, and custom items. The positional effects were limited in impact. When compared with previous studies, these data further demonstrate the benefit of improved readability and audiovisual supplementation with the addition of "chunking." There is no benefit to adding a short video to the previously established improved readability and audiovisual supplementation. There is a significant benefit of improved readability and audiovisual slide supplementation with the addition of "chunking" over traditional informed consent methods in terms of patient improvement in overall comprehension, treatment recall, and treatment comprehension. The treatment domain is the most affected. Copyright © 2015 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  3. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  4. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  5. Using the modified Delphi method to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy.

    PubMed

    Zang, Lei; Fan, Ning; Hai, Yong; Lu, S B; Su, Q J; Yang, J C; Du, Peng; Gao, Y J

    2015-06-01

    Although cervical radiculopathy is very common, there is no standard treatment for this condition, with little high-level evidence available to guide the treatment choice. Thus, this study aimed to review the current data on the management of cervical radiculopathy; and, further, to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy using the Delphi method. First, a systematic review of the previously established treatment guidelines and of articles related to cervical radiculopathy was conducted to establish a protocol for the clinical consensus of the treatment for cervical radiculopathy. Second, from February 2012 to June 2014, we performed a modified Delphi survey in which the current professional opinions from 30 experienced experts, representing almost all of the Chinese provinces, were gathered. Three rounds were performed, and consensus was defined as ≥70% agreement. Consensus of the treatments for cervical radiculopathy was reached on seven aspects, including the proportion of patients requiring only non-surgical therapies; the effectiveness of neck immobilization, physiotherapy, pharmacologic treatment; surgical indications; contraindications; surgery. The modified Delphi study conducted herein reached a consensus concerning several treatment issues for cervical radiculopathy. In the absence of high-level evidence, at present, these expert opinion findings will help guide health care providers to define the appropriate treatment in their regions. Items with no consensus provide excellent areas for future research.

  6. Coping with Pain in the Motivational Context of Values: Comparison between an Acceptance-Based and a Cognitive Control-Based Protocol

    ERIC Educational Resources Information Center

    Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose

    2008-01-01

    This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…

  7. A new real-time PCR protocol for detection of avian haemosporidians.

    PubMed

    Bell, Jeffrey A; Weckstein, Jason D; Fecchio, Alan; Tkach, Vasyl V

    2015-07-19

    Birds possess the most diverse assemblage of haemosporidian parasites; including three genera, Plasmodium, Haemoproteus, and Leucocytozoon. Currently there are over 200 morphologically identified avian haemosporidian species, although true species richness is unknown due to great genetic diversity and insufficient sampling in highly diverse regions. Studies aimed at surveying haemosporidian diversity involve collecting and screening samples from hundreds to thousands of individuals. Currently, screening relies on microscopy and/or single or nested standard PCR. Although effective, these methods are time and resource consuming, and in the case of microscopy require substantial expertise. Here we report a newly developed real-time PCR protocol designed to quickly and reliably detect all three genera of avian haemosporidians in a single biochemical reaction. Using available DNA sequences from avian haemosporidians we designed primers R330F and R480RL, which flank a 182 base pair fragment of mitochondrial conserved rDNA. These primers were initially tested using real-time PCR on samples from Malawi, Africa, previously screened for avian haemosporidians using traditional nested PCR. Our real time protocol was further tested on 94 samples from the Cerrado biome of Brazil, previously screened using a single PCR assay for haemosporidian parasites. These samples were also amplified using modified nested PCR protocols, allowing for comparisons between the three different screening methods (single PCR, nested PCR, real-time PCR). The real-time PCR protocol successfully identified all three genera of avian haemosporidians from both single and mixed infections previously detected from Malawi. There was no significant difference between the three different screening protocols used for the 94 samples from the Brazilian Cerrado (χ(2) = 0.3429, df = 2, P = 0.842). After proving effective, the real-time protocol was used to screen 2113 Brazilian samples, identifying 693 positive samples. Our real-time PCR assay proved as effective as two widely used molecular screening techniques, single PCR and nested PCR. However, the real-time protocol has the distinct advantage of detecting all three genera in a single reaction, which significantly increases efficiency by greatly decreasing screening time and cost. Our real-time PCR protocol is therefore a valuable tool in the quickly expanding field of avian haemosporidian research.

  8. Forest Soil Disturbance Monitoring Protocol: Volume II: Supplementary methods, statistics, and data collection

    Treesearch

    Deborah S. Page-Dumroese; Ann M. Abbott; Thomas M. Rice

    2009-01-01

    Volume I and volume II of the Forest Soil Disturbance Monitoring Protocol (FSDMP) provide information for a wide range of users, including technicians, field crew leaders, private landowners, land managers, forest professionals, and researchers. Volume I: Rapid Assessment includes the basic methods for establishing forest soil monitoring transects and consistently...

  9. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  10. Endodermal differentiation of human pluripotent stem cells to insulin-producing cells in 3D culture

    PubMed Central

    Takeuchi, Hiroki; Nakatsuji, Norio; Suemori, Hirofumi

    2014-01-01

    Insulin-producing cells (IPCs) derived from human pluripotent stem cells (hPSCs) may be useful in cell therapy and drug discovery for diabetes. Here, we examined various growth factors and small molecules including those previously reported to develop a robust differentiation method for induction of mature IPCs from hPSCs. We established a protocol that induced PDX1-positive pancreatic progenitor cells at high efficiency, and further induced mature IPCs by treatment with forskolin, dexamethasone, Alk5 inhibitor II and nicotinamide in 3D culture. The cells that differentiated into INSULIN-positive and C-PEPTIDE-positive cells secreted insulin in response to glucose stimulation, indicating a functional IPC phenotype. We also found that this method was applicable to different types of hPSCs. PMID:24671046

  11. Disruptive technology in the treatment of thoracic trauma.

    PubMed

    Smith, R Stephen

    2013-12-01

    The care of patients with thoracic injuries has undergone monumental change over the past 25 years. Advances in technology have driven improvements in care, with obvious benefits to patients. In many instances, new or "disruptive" technologies have unexpectedly displaced previously established standards for the diagnosis and treatment of these potentially devastating injuries. Examples of disruptive technology include the use of ultrasound technology for the diagnosis of cardiac tamponade and pneumothorax; thoracoscopic techniques instead of thoracotomy, pulmonary tractotomy, and stapled lung resection; endovascular repair of thoracic aortic injury; operative fixation of flail chest; and the enhanced availability of extracorporeal lung support for severe respiratory failure. Surgeons must be prepared to recognize the benefits, and limits, of novel technologies and incorporate these methods into day-to-day treatment protocols. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. Assembly of transcriptionally inactive chromatin in vitro.

    PubMed

    Shanahan, M M; Kmiec, E B

    1989-07-01

    We have successfully uncoupled the previously interlocked activities of chromatin assembly and in vitro transcription promoted by the Xenopus oocyte S-150 cell-free extract. Our isolated fraction catalyzes extensive chromatin assembly measured both by changes in DNA topology and Micrococcal nuclease digestions. The assembly of chromatin is slowed by the exogenous addition of ATP. In the absence of exogenously added ATP, the fraction forms a chromatin template that is transcriptionally inert. Addition of small amounts of the HeLa cell extract (S-100) converts these templates into transcriptionally active ones without disrupting the chromatin structure. Our protocol defines a method for the isolation of a fraction from the Xenopus cell free extract that catalyzes the assembly of transcriptionally inactive chromatin. We characterize this reaction and establish conditions for the transcriptional activation of these inactive minichromosomes.

  13. Colon cleansing protocol in children: research conditions vs. clinical practice.

    PubMed

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  14. Establishing rational networking using the DL04 quantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin

    2018-06-01

    The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.

  15. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  16. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  17. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  18. A Combinatorial Auction among Versatile Experts and Amateurs

    NASA Astrophysics Data System (ADS)

    Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo

    Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.

  19. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.

    PubMed

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker

    2013-12-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.

  20. Cost effectiveness of a protocol using palivizumab in preterm infants.

    PubMed

    Hernández-Gago, Yolanda; Lombardero-Pin, Marina; Ortega de la Cruz, Casilda; Maciuniak, Pablo A; Díez Del Pino, Alicia

    2017-03-01

    The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. The study period was 4 seasons with the expanded protocol (retrospective data) versus 2 with restricted or agreed protocol (prospective data). The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65) for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost-effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial) and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14) are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at risk, while many of them have associated risk factors you vary as have school-age siblings, rural residence, parental smoking, poor educational background of parents, lack of artificial feeding and family history of allergy. The consensus protocol has not been a significant increase in hospitalization rates in preterm infants <32 weeks gestational age patients. In those <35 has been observed a higher rate of hospitalization, with a very unfavorable cost-effectiveness for all clinical scenarios valued relationship. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  1. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  2. Cryptography in the Bounded-Quantum-Storage Model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2007-09-01

    This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.

  3. Natural prevalence of resistance-associated variants in hepatitis C virus NS5A in genotype 3a-infected people who inject drugs in Germany.

    PubMed

    Walker, Andreas; Siemann, Holger; Groten, Svenja; Ross, R Stefan; Scherbaum, Norbert; Timm, Jörg

    2015-09-01

    People who inject drugs (PWID) are the most important risk group for incident Hepatitis C virus (HCV) infection. In PWID in Europe HCV genotype 3a is highly prevalent. Unfortunately, many of the recently developed directly acting antiviral drugs against HCV (DAAs) are suboptimal for treatment of this genotype. Detection of resistance-associated variants (RAV) in genotype 3a may help to optimize treatment decisions, however, robust protocols for amplification and sequencing of HCV NS5A as an important target for treatment of genotype 3a are currently lacking. The aim of this study was to establish a protocol for sequencing of HCV NS5A in genotype 3a and to determine the frequency of RAVs in treatment-naïve PWID living in Germany. The full NS5A region was amplified and sequenced from 110 HCV genotype 3a infected PWID using an in-house PCR protocol. With the established protocol the complete NS5A region was successfully amplified and sequenced from 110 out of 112 (98.2%) genotype 3a infected PWID. Phylogenetic analysis of sequences from PWID together with unrelated genotype 3a sequences from a public database showed a scattered distribution without geographic clustering. Viral polymorphisms A30K and Y93H known to confer resistance in a GT3a replication model were present in 8 subjects (7.2%). A protocol for amplification of nearly all GT3a samples was successfully established. Substitutions conferring resistance to NS5A inhibitors were detected in a few treatment-naive PWID. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Using time reversal to detect entanglement and spreading of quantum information

    NASA Astrophysics Data System (ADS)

    Gaerttner, Martin

    2017-04-01

    Characterizing and understanding the states of interacting quantum systems and their non-equilibrium dynamics is the goal of quantum simulation. For this it is crucial to find experimentally feasible means for quantifying how entanglement and correlation build up and spread. The ability of analog quantum simulators to reverse the unitary dynamics of quantum many-body systems provides new tools in this quest. One such tool is the multiple-quantum coherence (MQC) spectrum previously used in NMR spectroscopy which can now be studied in so far inaccessible parameter regimes near zero temperature in highly controllable environments. I present recent progress in relating the MQC spectrum to established entanglement witnesses such as quantum Fisher information. Recognizing the MQC as out-of-time-order correlation functions, which quantify the spreading, or scrambling, of quantum information, allows us to establish a connection between these quantities and multi-partite entanglement. I will show recent experimental results obtained with a trapped ion quantum simulator and a spinor BEC illustrating the power of time reversal protocols. Supported by: JILA-NSF-PFC-1125844, NSF-PHY-1521080, ARO, AFOSR, AFOSR-MURI, DARPA, NIST.

  5. The QKD network: model and routing scheme

    NASA Astrophysics Data System (ADS)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  6. Comparison of the cognitive palatability assessment protocol and the two-pan test for use in assessing palatability of two similar foods in dogs.

    PubMed

    Araujo, Joseph A; Studzinski, Christa M; Larson, Brian T; Milgram, Norton W

    2004-11-01

    To compare preferences of dogs for 2 similar foods by use of 2 distinct methods (the cognitive palatability assessment protocol [CPAP] and the 2-pan test). 13 Beagles. 6 dogs were trained in a 3-choice object-discrimination-learning task in which their nonpreferred objects were associated with a reward of a lamb-based or chicken-based food. The number of choices for each object was used to determine food preferences. Preference of the same foods was also assessed by use of a 2-pan test in which all 13 dogs were provided the 2 foods in identical bowls. The amount of each food consumed in 10 minutes was used to determine food preference. All dogs had a noticeable preference for the chicken-based food during the CPAP. Once established, preferences remained consistent and were not affected by satiety. The 2-pan test identified a preference for the chicken-based food in dogs with previous exposure to the food but only a weak and nonsignificant preference for the same food in dogs without previous exposure. Food preferences in the 2-pan test varied considerably. Total food consumption and the ability to detect a preference were reduced when dogs were fed prior to testing. The CPAP provides a reliable measure of food preference that requires few test subjects. The 2-pan test reveals similar preferences but with variability in data that requires larger numbers of subjects and is susceptible to effects from prior exposure and feeding of the test foods to the subjects.

  7. Secure multiparty computation of a comparison problem.

    PubMed

    Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang

    2016-01-01

    Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.

  8. Continuous-variable quantum key distribution protocols over noisy channels.

    PubMed

    García-Patrón, Raúl; Cerf, Nicolas J

    2009-04-03

    A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other one-way Gaussian protocol. This increased resistance to channel noise can be understood as resulting from purposely adding noise to the signal that is converted into the secret key. This notion of noise-enhanced tolerance to noise also provides a better physical insight into the poorly understood discrepancies between the previously defined families of Gaussian protocols.

  9. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    DTIC Science & Technology

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  10. Slow histidine H/D exchange protocol for thermodynamic analysis of protein folding and stability using mass spectrometry.

    PubMed

    Tran, Duc T; Banerjee, Sambuddha; Alayash, Abdu I; Crumbliss, Alvin L; Fitzgerald, Michael C

    2012-02-07

    Described here is a mass spectrometry-based protocol to study the thermodynamic stability of proteins and protein-ligand complexes using the chemical denaturant dependence of the slow H/D exchange reaction of the imidazole C(2) proton in histidine side chains. The protocol is developed using several model protein systems including: ribonuclease (Rnase) A, myoglobin, bovine carbonic anhydrase (BCA) II, hemoglobin (Hb), and the hemoglobin-haptoglobin (Hb-Hp) protein complex. Folding free energies consistent with those previously determined by other more conventional techniques were obtained for the two-state folding proteins, Rnase A and myoglobin. The protocol successfully detected a previously observed partially unfolded intermediate stabilized in the BCA II folding/unfolding reaction, and it could be used to generate a K(d) value of 0.24 nM for the Hb-Hp complex. The compatibility of the protocol with conventional mass spectrometry-based proteomic sample preparation and analysis methods was also demonstrated in an experiment in which the protocol was used to detect the binding of zinc to superoxide dismutase in the yeast cell lysate sample. The yeast cell sample analyses also helped define the scope of the technique, which requires the presence of globally protected histidine residues in a protein's three-dimensional structure for successful application. © 2011 American Chemical Society

  11. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  12. Impact on delay times and characteristics of patients undergoing primary percutaneous coronary intervention in the southern metropolitan area of Barcelona after implementation of the infarction code program.

    PubMed

    Gómez-Hospital, Joan Antoni; Dallaglio, Paolo Domenico; Sánchez-Salado, Jose Carlos; Ariza, Albert; Homs, Silvia; Lorente, Victoria; Ferreiro, Jose Luis; Gomez-Lara, Josep; Romaguera, Rafael; Salazar-Mendiguchía, Joel; Teruel, Luis; Cequier, Ángel

    2012-10-01

    A standardized protocol of emergent transfer for primary percutaneous coronary intervention for patients with ST elevation myocardial infarction, defined as the Infarction Code, was implemented in June 2009 in the Catalan regional health system. The objective of this study was to evaluate the impact of the new protocol on delay times, number of procedures and clinical characteristics compared with the previous period in the population of patients referred to our hospital. All consecutive patients undergoing primary percutaneous coronary intervention in our hospital were prospectively registered. The clinical characteristics, delay times and mortality in the follow-up of the protocol implementation period (June 2009-May 2010) were analyzed and compared with the previous year (June 2008-May 2009). During the protocol period, 514 patients were included, compared with 241 in the previous year. Age, cardiovascular risk factors, anterior myocardial infarction and procedure characteristics were similar in the 2 groups. The first medical contact to balloon time was lower in the protocol period (median time 120 min vs 88 min; P<.001). Patients in the protocol period showed a trend toward less severe disease (Killip III, rescue angioplasty). The multivariate regression analysis showed a significant association between 1-year mortality and age, Killip class ≥ III at admission, anterior infarction and 3-vessel disease. The introduction of the Infarction Code program increased the number of patients treated by primary percutaneous coronary intervention with a reduction in delay times and better clinical characteristics at presentation. Full English text available from:www.revespcardiol.org. Copyright © 2012 Sociedad Española de Cardiología. Published by Elsevier Espana. All rights reserved.

  13. Tracheal decannulation protocol in patients affected by traumatic brain injury.

    PubMed

    Zanata, Isabel de Lima; Santos, Rosane Sampaio; Hirata, Gisela Carmona

    2014-04-01

    Introduction The frequency of tracheostomy in patients with traumatic brain injury (TBI) contrasts with the lack of objective criteria for its management. The study arose from the need for a protocol in the decision to remove the tracheal tube. Objective To evaluate the applicability of a protocol for tracheal decannulation. Methods A prospective study with 20 patients, ranging between 21 and 85 years of age (average 33.55), 4 of whom were women (20%) and 16 were men (80%). All patients had been diagnosed by a neurologist as having TBI, and the anatomical region of the lesion was known. Patients were evaluated following criteria for tracheal decannulation through a clinical evaluation protocol developed by the authors. Results Decannulation was performed in 12 (60%) patients. Fourteen (70%) had a score greater than 8 on the Glasgow Coma Scale and only 2 (14%) of these were not able to undergo decannulation. Twelve (60%) patients maintained the breathing pattern with occlusion of the tube and were successfully decannulated. Of the 20 patients evaluated, 11 (55%) showed no signs suggestive of tracheal aspiration, and of these, 9 (82%) began training on occlusion of the cannula. The protocol was relevant to establish the beginning of the decannulation process. The clinical assessment should focus on the patient's condition to achieve early tracheal decannulation. Conclusion This study allowed, with the protocol, to establish six criteria for tracheal decannulation: level of consciousness, respiration, tracheal secretion, phonation, swallowing, and coughing.

  14. Tracheal Decannulation Protocol in Patients Affected by Traumatic Brain Injury

    PubMed Central

    Zanata, Isabel de Lima; Santos, Rosane Sampaio; Hirata, Gisela Carmona

    2014-01-01

    Introduction The frequency of tracheostomy in patients with traumatic brain injury (TBI) contrasts with the lack of objective criteria for its management. The study arose from the need for a protocol in the decision to remove the tracheal tube. Objective To evaluate the applicability of a protocol for tracheal decannulation. Methods A prospective study with 20 patients, ranging between 21 and 85 years of age (average 33.55), 4 of whom were women (20%) and 16 were men (80%). All patients had been diagnosed by a neurologist as having TBI, and the anatomical region of the lesion was known. Patients were evaluated following criteria for tracheal decannulation through a clinical evaluation protocol developed by the authors. Results Decannulation was performed in 12 (60%) patients. Fourteen (70%) had a score greater than 8 on the Glasgow Coma Scale and only 2 (14%) of these were not able to undergo decannulation. Twelve (60%) patients maintained the breathing pattern with occlusion of the tube and were successfully decannulated. Of the 20 patients evaluated, 11 (55%) showed no signs suggestive of tracheal aspiration, and of these, 9 (82%) began training on occlusion of the cannula. The protocol was relevant to establish the beginning of the decannulation process. The clinical assessment should focus on the patient's condition to achieve early tracheal decannulation. Conclusion This study allowed, with the protocol, to establish six criteria for tracheal decannulation: level of consciousness, respiration, tracheal secretion, phonation, swallowing, and coughing. PMID:25992074

  15. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined.more » A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'« less

  16. Communication and protocol compliance and their relation to the quality of cardiopulmonary resuscitation (CPR): A mixed-methods study of simulated telephone-assisted CPR.

    PubMed

    Nord-Ljungquist, Helena; Brännström, Margareta; Bohm, Katarina

    2015-07-01

    In the event of a cardiac arrest, emergency medical dispatchers (EMDs) play a critical role by providing telephone-assisted cardiopulmonary resuscitation (T-CPR) to laypersons. The aim of our investigation was to describe compliance with the T-CPR protocol, the performance of the laypersons in a simulated T-CPR situation, and the communication between laypersons and EMDs during these actions. We conducted a retrospective observational study by analysing 20 recorded video and audio files. In a simulation, EMDs provided laypersons with instructions following T-CPR protocols. These were then analysed using a mixed method with convergent parallel design. If the EMDs complied with the T-CPR protocol, the laypersons performed the correct procedures in 71% of the actions. The single most challenging instruction of the T-CPR protocol, for both EMDs and laypersons, was airway control. Mean values for compression depth and frequency did not reach established guideline goals for CPR. Proper application of T-CPR protocols by EMDs resulted in better performance by laypersons in CPR. The most problematic task for EMDs as well for laypersons was airway management. The study results did not establish that the quality of communication between EMDs and laypersons performing CPR in a cardiac arrest situation led to statistically different outcomes, as measured by the quality and effectiveness of the CPR delivered. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. A comparative study of the retention and lethality of the first and second generation arthropod protein markers

    USDA-ARS?s Scientific Manuscript database

    A greenhouse study was conducted that compared the protein mark retention time of a well established rabbit IgG protein detection protocol with those of three newer, less expensive protein detection protocols designed to detect casein in bovine milk, egg albumin in chicken egg whites, and soy tryp...

  18. Electronic protocol of respiratory physical therapy in patients with idiopathic adolescent scoliosis.

    PubMed

    Cano, Danila Vieira Baldini; Malafaia, Osvaldo; Alves, Vera Lúcia dos Santos; Avanzi, Osmar; Pinto, José Simão de Paula

    2011-01-01

    To create a clinical database of respiratory function in patients with adolescent idiopathic scoliosis; computerize and store this clinical data through the use of a software; incorporate this electronic protocol to the SINPE© (Integrated Electronic Protocols System) and analyze a pilot project with interpretation of results. From the literature review a computerized data bank of clinical data of postural deviations was set up (master protocol). Upon completion of the master protocol a specific protocol of respiratory function in patients with adolescent idiopathic scoliosis was designed and a pilot project was conducted to collect and analyze data from ten patients. It was possible to create the master protocol of postural deviations and the specific protocol of respiratory function in patients with adolescent idiopathic scoliosis. The data collected in the pilot project was processed by the SINPE ANALYZER©, generating charts and statistics. The establishment of the clinical database of adolescent idiopathic scoliosis was possible. Computerization and storage of clinical data using the software were viable. The electronic protocol of adolescent idiopathic scoliosis could be incorporated into the SINPE© and its use in the pilot project was successful.

  19. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    PubMed

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  20. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    PubMed Central

    2012-01-01

    Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©). Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a) establishing an advisory knowledge user team in each of three targeted settings; (b) assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c) adapting protocols for local use, ensuring fidelity of the content; (d) selecting intervention strategies to overcome known barriers and implementing the protocols; (e) conducting think-aloud usability testing; (f) evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g) assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing with comparisons across settings. Discussion Given the importance of patient safety, patient-centered care, and delivery of quality services, learning how to effectively implement evidence-informed symptom protocols in oncology healthcare services is essential for ensuring safe, consistent, and effective care for individuals with cancer. This study is likely to have a significant contribution to the delivery of remote oncology services, as well as influence symptom management by patients at home. PMID:23164244

  1. Stem cell-derived kidney cells and organoids: Recent breakthroughs and emerging applications.

    PubMed

    Chuah, Jacqueline Kai Chin; Zink, Daniele

    The global rise in the numbers of kidney patients and the shortage in transplantable organs have led to an increasing interest in kidney-specific regenerative therapies, renal disease modelling and bioartificial kidneys. Sources for large quantities of high-quality renal cells and tissues would be required, also for applications in in vitro platforms for compound safety and efficacy screening. Stem cell-based approaches for the generation of renal-like cells and tissues would be most attractive, but such methods were not available until recently. This situation has drastically changed since 2013, and various protocols for the generation of renal-like cells and precursors from pluripotent stem cells (PSC) have been established. The most recent breakthroughs were related to the establishment of various protocols for the generation of PSC-derived kidney organoids. In combination with recent advances in genome editing, bioprinting and the establishment of predictive renal screening platforms this results in exciting new possibilities. This review will give a comprehensive overview over current PSC-based protocols for the generation of renal-like cells, precursors and organoids, and their current and potential applications in regenerative medicine, compound screening, disease modelling and bioartificial organs. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Prospective Evaluation of a Matrix-Assisted Laser Desorption Ionization–Time of Flight Mass Spectrometry System in a Hospital Clinical Microbiology Laboratory for Identification of Bacteria and Yeasts: a Bench-by-Bench Study for Assessing the Impact on Time to Identification and Cost-Effectiveness

    PubMed Central

    Tan, K. E.; Ellis, B. C.; Lee, R.; Stamper, P. D.; Zhang, S. X.

    2012-01-01

    Matrix-assisted laser desorption ionization–time of flight mass spectrometry (MALDI-TOF MS) has been found to be an accurate, rapid, and inexpensive method for the identification of bacteria and yeasts. Previous evaluations have compared the accuracy, time to identification, and costs of the MALDI-TOF MS method against standard identification systems or commercial panels. In this prospective study, we compared a protocol incorporating MALDI-TOF MS (MALDI protocol) with the current standard identification protocols (standard protocol) to determine the performance in actual practice using a specimen-based, bench-by-bench approach. The potential impact on time to identification (TTI) and costs had MALDI-TOF MS been the first-line identification method was quantitated. The MALDI protocol includes supplementary tests, notably for Streptococcus pneumoniae and Shigella, and indications for repeat MALDI-TOF MS attempts, often not measured in previous studies. A total of 952 isolates (824 bacterial isolates and 128 yeast isolates) recovered from 2,214 specimens were assessed using the MALDI protocol. Compared with standard protocols, the MALDI protocol provided identifications 1.45 days earlier on average (P < 0.001). In our laboratory, we anticipate that the incorporation of the MALDI protocol can reduce reagent and labor costs of identification by $102,424 or 56.9% within 12 months. The model included the fixed annual costs of the MALDI-TOF MS, such as the cost of protein standards and instrument maintenance, and the annual prevalence of organisms encountered in our laboratory. This comprehensive cost analysis model can be generalized to other moderate- to high-volume laboratories. PMID:22855510

  3. ANDRO-IVF: a novel protocol for poor responders to IVF controlled ovarian stimulation

    PubMed Central

    Bercaire, Ludmila; Nogueira, Sara MB; Lima, Priscila CM; Alves, Vanessa R; Donadio, Nilka; Dzik, Artur; Cavagna, Mario; Fanchin, Renato

    2018-01-01

    Objective This study aimed to assess a novel protocol designed to improve poor ovarian response through intra-ovarian androgenization. The endpoints were: number of oocytes and mature oocytes retrieved, fertilization, cancellation and pregnancy rates. Methods This prospective crossover study enrolled poor responders from previous ovarian stimulation cycles submitted to a novel protocol called ANDRO-IVF. The protocol included pretreatment with transdermal AndroGel(r) (Besins) 25 mg, oral letrozole 2.5 mg and subcutaneous hCG 2500 IU; cycle control was performed with estradiol valerate and micronized progesterone; ovarian stimulation was attained with gonadotropins FSH/LH 450 IU, GnRH antagonist and hCG 5000 IU. Results Fourteen poor responders were enrolled. One patient did not meet the inclusion criteria. Thirteen patients previously summited to the standard protocol were offered the ANDRO-IVF Protocol.-Standard Protocol: Mean age: 35.30 years; cancellation rate: 61.53%; mean number of MII oocytes retrieved per patient: 1.8; fertilization rate: 33.33%. Only two patients had embryo transfers, and none got pregnant.-ANDRO-IVF Protocol: Mean age: 35.83 years; cancellation rate: 7.69%; mean number of oocytes retrieved per patient: 5.58, MII oocytes: 3.91. ICSI was performed in 84.61% of the patients and a mean of 1.5 embryos were transferred per patient. Fertilization rate: 62.5%; cumulative pregnancy rate: 16.66%; mean duration of stimulation: 9.77 days. Conclusion ANDRO-IVF allows intra-ovarian androgenization by increasing serum and intra-follicular androgen levels and preventing androgen aromatization. This protocol apparently improved clinical outcomes of poor responders in parameters such as number of oocytes retrieved and clinical pregnancy rates. Further randomized controlled trials are needed to confirm these findings. PMID:29303236

  4. Prospective evaluation of a matrix-assisted laser desorption ionization-time of flight mass spectrometry system in a hospital clinical microbiology laboratory for identification of bacteria and yeasts: a bench-by-bench study for assessing the impact on time to identification and cost-effectiveness.

    PubMed

    Tan, K E; Ellis, B C; Lee, R; Stamper, P D; Zhang, S X; Carroll, K C

    2012-10-01

    Matrix-assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF MS) has been found to be an accurate, rapid, and inexpensive method for the identification of bacteria and yeasts. Previous evaluations have compared the accuracy, time to identification, and costs of the MALDI-TOF MS method against standard identification systems or commercial panels. In this prospective study, we compared a protocol incorporating MALDI-TOF MS (MALDI protocol) with the current standard identification protocols (standard protocol) to determine the performance in actual practice using a specimen-based, bench-by-bench approach. The potential impact on time to identification (TTI) and costs had MALDI-TOF MS been the first-line identification method was quantitated. The MALDI protocol includes supplementary tests, notably for Streptococcus pneumoniae and Shigella, and indications for repeat MALDI-TOF MS attempts, often not measured in previous studies. A total of 952 isolates (824 bacterial isolates and 128 yeast isolates) recovered from 2,214 specimens were assessed using the MALDI protocol. Compared with standard protocols, the MALDI protocol provided identifications 1.45 days earlier on average (P < 0.001). In our laboratory, we anticipate that the incorporation of the MALDI protocol can reduce reagent and labor costs of identification by $102,424 or 56.9% within 12 months. The model included the fixed annual costs of the MALDI-TOF MS, such as the cost of protein standards and instrument maintenance, and the annual prevalence of organisms encountered in our laboratory. This comprehensive cost analysis model can be generalized to other moderate- to high-volume laboratories.

  5. Systematic analysis of esophageal pressure topography in high-resolution manometry of 68 normal volunteers.

    PubMed

    Niebisch, S; Wilshire, C L; Peters, J H

    2013-01-01

    The introduction of high-resolution manometry (HRM) has been a significant advance in esophageal diagnostics. Normative values however are currently based upon a single set of published reference values, and multiple new metrics have been added over the past several years. Our goal was to provide a second set of 'normal-values' and to include all current metrics suggested by the 2012 Chicago classification. Sixty-eight subjects without foregut symptoms or previous surgery (median age 25.5 years, ranging from 20-58 years, 53% female) underwent esophageal motility assessment via an established standardized protocol. Normative thresholds were calculated for esophago-gastric junction (EGJ) characteristics (resting, relaxation, intrabolus pressure, and lengths) as well as for esophageal body strength (contraction amplitudes at multiple levels, distal contractile integral, integrity of peristalsis) and wave propagation (contractile front velocity, distal latency). Overall, our findings where strikingly similar to the previously described metrics derived from 75 control subjects of the Northwestern group. This suggests a high degree of reproducibility of HRM. © 2013 Wiley Periodicals, Inc. and the International Society for Diseases of the Esophagus.

  6. Fractional, biodegradable and spectral characteristics of extracted and fractionated sludge extracellular polymeric substances.

    PubMed

    Wei, Liang-Liang; Wang, Kun; Zhao, Qing-Liang; Jiang, Jun-Qiu; Kong, Xiang-Juan; Lee, Duu-Jong

    2012-09-15

    Correlation between fractional, biodegradable and spectral characteristics of sludge extracellular polymeric substances (EPS) by different protocols has not been well established. This work extracted sludge EPS using alkaline extractants (NH₄OH and formaldehyde + NaOH) and physical protocols (ultrasonication, heating at 80 °C or cation exchange resin (CER)) and then fractionated the extracts using XAD-8/XAD-4 resins. The alkaline extractants yielded more sludge EPS than the physical protocols. However, the physical protocols extracted principally the hydrophilic components which were readily biodegradable by microorganisms. The alkaline extractants dissolved additional humic-like substances from sludge solids which were refractory in nature. Different extraction protocols preferably extracted EPS with distinct fractional, biodegradable and spectral characteristics which could be applied in specific usages. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Establishing fungal entomopathogens as endophytes: towards endophytic biological control

    USDA-ARS?s Scientific Manuscript database

    Beauveria basssiana is a fungal entomopathogen with the ability to colonize plants endophytically. As an endophyte, B. bassiana may play a role in protecting plants from herbivory and disease. This protocol demonstrates two inoculation methods to establish B. bassiana endophytically in the common be...

  8. Position paper: Rationale for the treatment of Wilms tumour in the UMBRELLA SIOP-RTSG 2016 protocol.

    PubMed

    van den Heuvel-Eibrink, Marry M; Hol, Janna A; Pritchard-Jones, Kathy; van Tinteren, Harm; Furtwängler, Rhoikos; Verschuur, Arnauld C; Vujanic, Gordan M; Leuschner, Ivo; Brok, Jesper; Rübe, Christian; Smets, Anne M; Janssens, Geert O; Godzinski, Jan; Ramírez-Villar, Gema L; de Camargo, Beatriz; Segers, Heidi; Collini, Paola; Gessler, Manfred; Bergeron, Christophe; Spreafico, Filippo; Graf, Norbert

    2017-12-01

    The Renal Tumour Study Group of the International Society of Paediatric Oncology (SIOP-RTSG) has developed a new protocol for the diagnosis and treatment of childhood renal tumours, the UMBRELLA SIOP-RTSG 2016 (the UMBRELLA protocol), to continue international collaboration in the treatment of childhood renal tumours. This protocol will support integrated biomarker and imaging research, focussing on assessing the independent prognostic value of genomic changes within the tumour and the volume of the blastemal component that survives preoperative chemotherapy. Treatment guidelines for Wilms tumours in the UMBRELLA protocol include recommendations for localized, metastatic, and bilateral disease, for all age groups, and for relapsed disease. These recommendations have been established by a multidisciplinary panel of leading experts on renal tumours within the SIOP-RTSG. The UMBRELLA protocol should promote international collaboration and research and serve as the SIOP-RTSG best available treatment standard.

  9. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  10. Optimisation of pharmacy content in clinical cancer research protocols: Experience of the United Kingdom Chemotherapy and Pharmacy Advisory Service.

    PubMed

    Debruyne, Philip R; Johnson, Philip J; Pottel, Lies; Daniels, Susanna; Greer, Rachel; Hodgkinson, Elizabeth; Kelly, Stephen; Lycke, Michelle; Samol, Jens; Mason, Julie; Kimber, Donna; Loucaides, Eileen; Parmar, Mahesh Kb; Harvey, Sally

    2015-06-01

    Clarity and accuracy of the pharmacy aspects of cancer clinical trial protocols is essential. Inconsistencies and ambiguities in such protocols have the potential to delay research and jeopardise both patient safety and collection of credible data. The Chemotherapy and Pharmacy Advisory Service was established by the UK National Cancer Research Network, currently known as National Institute for Health Research Clinical Research Network, to improve the quality of pharmacy-related content in cancer clinical research protocols. This article reports the scope of Chemotherapy and Pharmacy Advisory Service, its methodology of mandated protocol review and pharmacy-related guidance initiatives and its current impact. Over a 6-year period (2008-2013) since the inception of Chemotherapy and Pharmacy Advisory Service, cancer clinical trial protocols were reviewed by the service, prior to implementation at clinical trial sites. A customised Review Checklist was developed and used by a panel of experts to standardise the review process and report back queries and inconsistencies to chief investigators. Based on common queries, a Standard Protocol Template comprising specific guidance on drug-related content and a Pharmacy Manual Template were developed. In addition, a guidance framework was established to address 'ad hoc' pharmacy-related queries. The most common remarks made at protocol review have been summarised and categorised through retrospective analysis. In order to evaluate the impact of the service, chief investigators were asked to respond to queries made at protocol review and make appropriate changes to their protocols. Responses from chief investigators have been collated and acceptance rates determined. A total of 176 protocols were reviewed. The median number of remarks per protocol was 26, of which 20 were deemed clinically relevant and mainly concerned the drug regimen, support medication, frequency and type of monitoring and drug supply aspects. Further analysis revealed that 62% of chief investigators responded to the review. All responses were positive with an overall acceptance rate of 89% of the proposed protocol changes. Review of pharmacy content of cancer clinical trial protocols is feasible and exposes many undetected clinically relevant issues that could hinder efficient trial conduct. Our service audit revealed that the majority of suggestions were effectively incorporated in the final protocols. The refinement of existing and development of new pharmacy-related guidance documents by Chemotherapy and Pharmacy Advisory Service might aid in better and safer clinical research. © The Author(s) 2015.

  11. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  12. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  13. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  14. A habitat-based point-count protocol for terrestrial birds, emphasizing Washington and Oregon.

    Treesearch

    Mark H. Huff; Kelly A. Bettinger; Howard L. Ferguson; Martin J. Brown; Bob. Altman

    2000-01-01

    We describe a protocol and provide a summary for point-count monitoring of landbirds that is designed for habitat-based objectives. Presentation is in four steps: preparation and planning, selecting monitoring sites, establishing monitoring stations, and conducting point counts. We describe the basis for doing habitat-based point counts, how they are organized, and how...

  15. The Aging of lignin rich papers upon exposure to light : its quantification and prediction

    Treesearch

    James S. Bond; Rajai H. Atalla; Agarwal Umesh P.; Chris G. Hunt

    1999-01-01

    A program was undertaken at the Forest Products Laboratory in conjunction with the American Society for Testing and Materials (ASTM) to develop guidelines for a credible accelerated photoaging protocol for printing and writing papers. In support of this, indepth studies of photodegredation were undertaken in sufficient detail to establish the validity of the protocol....

  16. Building a Multi-Discipline Digital Library Through Extending the Dienst Protocol

    NASA Technical Reports Server (NTRS)

    Nelson, Michael L.; Maly, Kurt; Shen, Stewart N. T.

    1997-01-01

    The purpose of this project is to establish multi-discipline capability for a unified, canonical digital library service for scientific and technical information (STI). This is accomplished by extending the Dienst Protocol to be aware of subject classification of a servers holdings. We propose a hierarchical, general, and extendible subject classification that can encapsulate existing classification systems.

  17. Economical impact associated with a biological therapy prioritization protocol in patients with rheumatoid arthritis in the Hospital of Sagunto.

    PubMed

    Borrás-Blasco, Joaquín; Casterá, M Dolores-Elvira; Cortes, Xavier; Rosique-Robles, J Dolores; Abad, F Javier

    2014-11-01

    Until 2010 the cost of biological treatments in Rheumatoid Arthritis (RA) was increasing annually by 15% in our hospital. In 1st January 2011, a Hospital Commission of Biological Therapies involving rheumatology and pharmacy services was created to improve the management of biological drugs and a biological therapy prioritization protocol in RA patients was also established to improve the efficient usage of biological drugs in RA. To evaluate the economic impact associated with a biological therapy prioritization protocol for RA patients in the Hospital of Sagunto. Observational, ambispective study comparing the associated cost of RA patients treated with biological drugs in the pre-protocol (2009 - 2010) versus post-protocol periods (2011 - 2012). RA patients treated with Abatacept (ABA), Adalimumab (ADA), Etanercept (ETN) or Infliximab (IFX) for at least 6 months during the study period (2009 - 2012) were included. In 2012, Tocilizumab (TCZ) was also included in the prioritization protocol. Prioritization protocol was established based on both clinical and economical aspects and supervised case by case by our Commission. Cost savings and economic impact were calculated using Spanish official prices. In the pre-protocol period (2009 - 2010), total expenses were increasing by €110,000, up to €1,761,000 in 2010 (€11,362 pat/year). After protocol implementation, total expenses decreased by 53,676€ on the 2010 - 2011 period, and 149,200€ on the 2011 - 2012 period. On the 2010 - 2011 period the cost of biological therapy per patient-year decreased 355€ (11,007€ pat/year) and additional 653€ (up to 10,354€ pat/year) by 2012, with a cumulative effect of the protocol implementation of 1,008€ per patient-year. In the pre-protocol period (2009), the annual cost/patient was 10.812€ with ETN, 10.942€ with IFX, 12.961€ with ADA and 12.739€ with ABA. By 1st January 2013, the annual cost per patient was 9,469€ with ETN, 10,579€ with IFX, 11,117€ with ADA, 13,540€ with ABA and 14,932€ with TCZ. The creation of our Commission of Biological Therapies is key to rational management of RA patients and optimization of resources, allowing us to save 200,000€ after 2-year efficiency protocol implementation.

  18. Dynamic Hierarchical Energy-Efficient Method Based on Combinatorial Optimization for Wireless Sensor Networks.

    PubMed

    Chang, Yuchao; Tang, Hongying; Cheng, Yongbo; Zhao, Qin; Yuan, Baoqing Li andXiaobing

    2017-07-19

    Routing protocols based on topology control are significantly important for improving network longevity in wireless sensor networks (WSNs). Traditionally, some WSN routing protocols distribute uneven network traffic load to sensor nodes, which is not optimal for improving network longevity. Differently to conventional WSN routing protocols, we propose a dynamic hierarchical protocol based on combinatorial optimization (DHCO) to balance energy consumption of sensor nodes and to improve WSN longevity. For each sensor node, the DHCO algorithm obtains the optimal route by establishing a feasible routing set instead of selecting the cluster head or the next hop node. The process of obtaining the optimal route can be formulated as a combinatorial optimization problem. Specifically, the DHCO algorithm is carried out by the following procedures. It employs a hierarchy-based connection mechanism to construct a hierarchical network structure in which each sensor node is assigned to a special hierarchical subset; it utilizes the combinatorial optimization theory to establish the feasible routing set for each sensor node, and takes advantage of the maximum-minimum criterion to obtain their optimal routes to the base station. Various results of simulation experiments show effectiveness and superiority of the DHCO algorithm in comparison with state-of-the-art WSN routing algorithms, including low-energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering (HEED), genetic protocol-based self-organizing network clustering (GASONeC), and double cost function-based routing (DCFR) algorithms.

  19. Comparison of the Liaison® Calprotectin kit with a well established point of care test (Quantum Blue - Bühlmann-Alere®) in terms of analytical performances and ability to detect relapses amongst a Crohn population in follow-up.

    PubMed

    Delefortrie, Quentin; Schatt, Patricia; Grimmelprez, Alexandre; Gohy, Patrick; Deltour, Didier; Collard, Geneviève; Vankerkhoven, Patrick

    2016-02-01

    Although colonoscopy associated with histopathological sampling remains the gold standard in the diagnostic and follow-up of inflammatory bowel disease (IBD), calprotectin is becoming an essential biomarker in gastroenterology. The aim of this work is to compare a newly developed kit (Liaison® Calprotectin - Diasorin®) and its two distinct extraction protocols (weighing and extraction device protocol) with a well established point of care test (Quantum Blue® - Bühlmann-Alere®) in terms of analytical performances and ability to detect relapses amongst a Crohn's population in follow-up. Stool specimens were collected over a six month period and were composed of control and Crohn's patients. Amongst the Crohn's population disease activity (active vs quiescent) was evaluated by gastroenterologists. A significant difference was found between all three procedures in terms of calprotectin measurements (weighing protocol=30.3μg/g (median); stool extraction device protocol=36.9μg/g (median); Quantum Blue® (median)=63; Friedman test, P value=0.05). However, a good correlation was found between both extraction methods coupled with the Liaison® analyzer and between the Quantum Blue® (weighing protocol/extraction device protocol Rs=0.844, P=0.01; Quantum Blue®/extraction device protocol Rs=0.708, P=0.01; Quantum Blue®/weighing protocol, Rs=0.808, P=0.01). Finally, optimal cut-offs (and associated negative predictive values - NPV) for detecting relapses were in accordance with above results (Quantum Blue® 183.5μg/g and NPV of 100%>extraction device protocol+Liaison® analyzer 124.5μg/g and NPV of 93.5%>weighing protocol+Liaison® analyzer 106.5μg/g and NPV of 95%). Although all three methods correlated well and had relatively good NPV in terms of detecting relapses amongst a Crohn's population in follow-up, the lack of any international standard is the origin of different optimal cut-offs between the three procedures. Copyright © 2015 The Canadian Society of Clinical Chemists. Published by Elsevier Inc. All rights reserved.

  20. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  1. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  2. SU-E-I-32: Benchmarking Head CT Doses: A Pooled Vs. Protocol Specific Analysis of Radiation Doses in Adult Head CT Examinations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fujii, K; UCLA School of Medicine, Los Angeles, CA; Bostani, M

    Purpose: The aim of this study was to collect CT dose index data from adult head exams to establish benchmarks based on either: (a) values pooled from all head exams or (b) values for specific protocols. One part of this was to investigate differences in scan frequency and CT dose index data for inpatients versus outpatients. Methods: We collected CT dose index data (CTDIvol) from adult head CT examinations performed at our medical facilities from Jan 1st to Dec 31th, 2014. Four of these scanners were used for inpatients, the other five were used for outpatients. All scanners used Tubemore » Current Modulation. We used X-ray dose management software to mine dose index data and evaluate CTDIvol for 15807 inpatients and 4263 outpatients undergoing Routine Brain, Sinus, Facial/Mandible, Temporal Bone, CTA Brain and CTA Brain-Neck protocols, and combined across all protocols. Results: For inpatients, Routine Brain series represented 84% of total scans performed. For outpatients, Sinus scans represented the largest fraction (36%). The CTDIvol (mean ± SD) across all head protocols was 39 ± 30 mGy (min-max: 3.3–540 mGy). The CTDIvol for Routine Brain was 51 ± 6.2 mGy (min-max: 36–84 mGy). The values for Sinus were 24 ± 3.2 mGy (min-max: 13–44 mGy) and for Facial/Mandible were 22 ± 4.3 mGy (min-max: 14–46 mGy). The mean CTDIvol for inpatients and outpatients was similar across protocols with one exception (CTA Brain-Neck). Conclusion: There is substantial dose variation when results from all protocols are pooled together; this is primarily a function of the differences in technical factors of the protocols themselves. When protocols are analyzed separately, there is much less variability. While analyzing pooled data affords some utility, reviewing protocols segregated by clinical indication provides greater opportunity for optimization and establishing useful benchmarks.« less

  3. ECS: efficient communication scheduling for underwater sensor networks.

    PubMed

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  4. A Proposal of an Effective Platelet-rich Plasma Protocol for the Treatment of Androgenetic Alopecia

    PubMed Central

    Ferrando, Juan; García-García, Sandra Cecilia; González-de-Cossío, Ana Cecilia; Bou, Lola; Navarra, Esperanza

    2017-01-01

    Background: Platelet-rich plasma (PRP) has emerged as a promising treatment for androgenetic alopecia (AGA). In spite of the several studies previously reported, to date, a standardized protocol for PRP preparation and application, as well as a standard method for evaluating results has not been established. Aims: The aim of this study is to propose a standardized method for preparation and application of PRP for male AGA (MAGA) and female AGA (FAGA) and assess its safety and efficacy as a co-adjuvant therapy. Materials and Methods: Seventy-eight patients, 19 men and 59 women with AGA Grades II–IV in Ebling's scale, currently on treatment with topical minoxidil and/or oral finasteride for more than a year without improvement, were included in this study. PRP was prepared using a single spin method, and injected in affected areas for 3 monthly sessions, followed by 3 bimonthly sessions. A decrease of at least one grade in Ebling's scale was considered a successful result. Results: After the 6° session, 71.4% of MAGA and 73.4% of FAGA patients reached a successful outcome while 21.4% and 16.3%, respectively, remained without changes. Only 7.1% of MAGA and 10.2% of FAGA presented worsening of their condition. Conclusions: PRP together with a periodical application protocol can be considered effective as a coadjuvant therapy in patients who no longer respond to pharmacological treatments. Ebling's scale was a practical and reliable parameter to allow a better evaluation in both MAGA and FAGA. PMID:29118521

  5. Optimization of high grade glioma cell culture from surgical specimens for use in clinically relevant animal models and 3D immunochemistry.

    PubMed

    Hasselbach, Laura A; Irtenkauf, Susan M; Lemke, Nancy W; Nelson, Kevin K; Berezovsky, Artem D; Carlton, Enoch T; Transou, Andrea D; Mikkelsen, Tom; deCarvalho, Ana C

    2014-01-07

    Glioblastomas, the most common and aggressive form of astrocytoma, are refractory to therapy, and molecularly heterogeneous. The ability to establish cell cultures that preserve the genomic profile of the parental tumors, for use in patient specific in vitro and in vivo models, has the potential to revolutionize the preclinical development of new treatments for glioblastoma tailored to the molecular characteristics of each tumor. Starting with fresh high grade astrocytoma tumors dissociated into single cells, we use the neurosphere assay as an enrichment method for cells presenting cancer stem cell phenotype, including expression of neural stem cell markers, long term self-renewal in vitro, and the ability to form orthotopic xenograft tumors. This method has been previously proposed, and is now in use by several investigators. Based on our experience of dissociating and culturing 125 glioblastoma specimens, we arrived at the detailed protocol we present here, suitable for routine neurosphere culturing of high grade astrocytomas and large scale expansion of tumorigenic cells for preclinical studies. We report on the efficiency of successful long term cultures using this protocol and suggest affordable alternatives for culturing dissociated glioblastoma cells that fail to grow as neurospheres. We also describe in detail a protocol for preserving the neurospheres 3D architecture for immunohistochemistry. Cell cultures enriched in CSCs, capable of generating orthotopic xenograft models that preserve the molecular signatures and heterogeneity of GBMs, are becoming increasingly popular for the study of the biology of GBMs and for the improved design of preclinical testing of potential therapies.

  6. Optimization of High Grade Glioma Cell Culture from Surgical Specimens for Use in Clinically Relevant Animal Models and 3D Immunochemistry

    PubMed Central

    Hasselbach, Laura A.; Irtenkauf, Susan M.; Lemke, Nancy W.; Nelson, Kevin K.; Berezovsky, Artem D.; Carlton, Enoch T.; Transou, Andrea D.; Mikkelsen, Tom; deCarvalho, Ana C.

    2014-01-01

    Glioblastomas, the most common and aggressive form of astrocytoma, are refractory to therapy, and molecularly heterogeneous. The ability to establish cell cultures that preserve the genomic profile of the parental tumors, for use in patient specific in vitro and in vivo models, has the potential to revolutionize the preclinical development of new treatments for glioblastoma tailored to the molecular characteristics of each tumor. Starting with fresh high grade astrocytoma tumors dissociated into single cells, we use the neurosphere assay as an enrichment method for cells presenting cancer stem cell phenotype, including expression of neural stem cell markers, long term self-renewal in vitro, and the ability to form orthotopic xenograft tumors. This method has been previously proposed, and is now in use by several investigators. Based on our experience of dissociating and culturing 125 glioblastoma specimens, we arrived at the detailed protocol we present here, suitable for routine neurosphere culturing of high grade astrocytomas and large scale expansion of tumorigenic cells for preclinical studies. We report on the efficiency of successful long term cultures using this protocol and suggest affordable alternatives for culturing dissociated glioblastoma cells that fail to grow as neurospheres. We also describe in detail a protocol for preserving the neurospheres 3D architecture for immunohistochemistry. Cell cultures enriched in CSCs, capable of generating orthotopic xenograft models that preserve the molecular signatures and heterogeneity of GBMs, are becoming increasingly popular for the study of the biology of GBMs and for the improved design of preclinical testing of potential therapies. PMID:24429465

  7. DXA in the assessment of subchondral bone mineral density in knee osteoarthritis--A semi-standardized protocol after systematic review.

    PubMed

    Sepriano, Alexandre; Roman-Blas, Jorge A; Little, Robert D; Pimentel-Santos, Fernando; Arribas, Jose María; Largo, Raquel; Branco, Jaime C; Herrero-Beaumont, Gabriel

    2015-12-01

    Subchondral bone mineral density (sBMD) contributes to the initiation and progression of knee osteoarthritis (OA). Reliable methods to assess sBMD status may predict the response of specific OA phenotypes to targeted therapies. While dual-energy X-ray absorptiometry (DXA) of the knee can determine sBMD, no consensus exists regarding its methodology. Construct a semi-standardized protocol for knee DXA to measure sBMD in patients with OA of the knee by evaluating the varying methodologies present in existing literature. We performed a systematic review of original papers published in PubMed and Web of Science from their inception to July 2014 using the following search terms: subchondral bone, osteoarthritis, and bone mineral density. DXA of the knee can be performed with similar reproducibility values to those proposed by the International Society for Clinical Densitometry for the hip and spine. We identified acquisition view, hip rotation, knee positioning and stabilization, ROI location and definition, and the type of analysis software as important sources of variation. A proposed knee DXA protocol was constructed taking into consideration the results of the review. DXA of the knee can be reliably performed in patients with knee OA. Nevertheless, we found substantial methodological variation across previous studies. Methodological standardization may provide a foundation from which to establish DXA of the knee as a valid tool for identification of SB changes and as an outcome measure in clinical trials of disease modifying osteoarthritic drugs. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. The Role of Plasma and Urine Metabolomics in Identifying New Biomarkers in Severe Newborn Asphyxia: A Study of Asphyxiated Newborn Pigs following Cardiopulmonary Resuscitation.

    PubMed

    Sachse, Daniel; Solevåg, Anne Lee; Berg, Jens Petter; Nakstad, Britt

    2016-01-01

    Optimizing resuscitation is important to prevent morbidity and mortality from perinatal asphyxia. The metabolism of cells and tissues is severely disturbed during asphyxia and resuscitation, and metabolomic analyses provide a snapshot of many small molecular weight metabolites in body fluids or tissues. In this study metabolomics profiles were studied in newborn pigs that were asphyxiated and resuscitated using different protocols to identify biomarkers for subject characterization, intervention effects and possibly prognosis. A total of 125 newborn Noroc pigs were anesthetized, mechanically ventilated and inflicted progressive asphyxia until asystole. Pigs were randomized to resuscitation with a FiO2 0.21 or 1.0, different duration of ventilation before initiation of chest compressions (CC), and different CC to ventilation ratios. Plasma and urine samples were obtained at baseline, and 2 h and 4 h after return of spontaneous circulation (ROSC, heart rate > = 100 bpm). Metabolomics profiles of the samples were analyzed by nuclear magnetic resonance spectroscopy. Plasma and urine showed severe metabolic alterations consistent with hypoxia and acidosis 2 h and 4 h after ROSC. Baseline plasma hypoxanthine and lipoprotein concentrations were inversely correlated to the duration of hypoxia sustained before asystole occurred, but there was no evidence for a differential metabolic response to the different resuscitation protocols or in terms of survival. Metabolic profiles of asphyxiated newborn pigs showed severe metabolic alterations. Consistent with previously published reports, we found no evidence of differences between established and alternative resuscitation protocols. Lactate and pyruvate may have a prognostic value, but have to be independently confirmed.

  9. Minimally cultured or selected autologous tumor-infiltrating lymphocytes after a lympho-depleting chemotherapy regimen in metastatic melanoma patients.

    PubMed

    Besser, Michal J; Shapira-Frommer, Ronnie; Treves, Avraham J; Zippel, Dov; Itzhaki, Orit; Schallmach, Ester; Kubi, Adva; Shalmon, Bruria; Hardan, Izhar; Catane, Raphael; Segal, Eran; Markel, Gal; Apter, Sara; Nun, Alon Ben; Kuchuk, Iryna; Shimoni, Avichai; Nagler, Arnon; Schachter, Jacob

    2009-05-01

    Adoptive cell therapy with autologous tumor-infiltrating lymphocytes (TIL) and high-dose interleukin-2 (IL-2), after nonmyeloablative chemotherapy, has been shown to result in tumor regression in half of refractory metastatic melanoma patients. In the present study, we describe 2 separate clinical protocols. Twelve patients were treated with "Selected"-TIL, as previously reported and 8 patients with the modified version of "Young"-TIL. Selected-TIL protocol required the establishment of multiple T-cell cultures from 1 patient and in vitro selection of cultures secreting interferon-gamma upon antigenic stimulation. In contrast, Young-TIL are minimally cultured T cells with superior in vitro features that do not require further selection. Two of 12 Selected-TIL patients experienced objective clinical responses (1 complete response, 1 partial response). Out of 8 treated Young-TIL patients, 1 experienced complete response, 2 partial response, and 4 patients had disease stabilization. Twenty-one of 33 enrolled Selected-TIL patients were excluded from the protocol, mainly as cultures failed the interferon-gamma selection criteria or due to clinical deterioration, compared with only 3 Young-TIL patients. Expected bone marrow suppression and high-dose IL-2 toxicity were transient. There was no treatment-related mortality. This study vindicates the feasibility and effectiveness of TIL technology and calls for further efforts to implement and enhance this modality. The use of minimally cultured, unselected Young-TIL enables the treatment of most enrolled patients. Although the cohort of Young-TIL patients treated so far is rather small and the follow-up short, the response rate is encouraging.

  10. Central excitability contributes to supramaximal volitional contractions in human incomplete spinal cord injury

    PubMed Central

    Thompson, Christopher K; Lewek, Michael D; Jayaraman, Arun; Hornby, T George

    2011-01-01

    Abstract Despite greater muscle fatigue in individuals with spinal cord injury (SCI) when compared to neurologically intact subjects using neuromuscular electrical stimulation (NMES) protocols, few studies have investigated the extent of volitional fatigue in motor incomplete SCI. Using an established protocol of 20 repeated, intermittent, maximal volitional effort (MVE) contractions, we previously demonstrated that subjects with incomplete SCI unexpectedly demonstrated a 15% increase in peak knee extensor torques within the first five MVEs with minimal evidence of fatigue after 20 contraction. In the present study, we investigated potential segmental mechanisms underlying this supramaximal torque generation. Changes in twitch properties and maximum compound muscle action potentials (M-waves) were assessed prior to and following one, three and five MVEs, revealing a significant 17% increase only in maximum twitch torques after a single MVE. Despite this post-activation potentiation of the muscle, use of conventional NMES protocols to elicit repeated muscular contractions resulted in a significant decrease in evoked torque generation, suggesting limited the muscular contributions to the observed phenomenon. To evaluate potential central mechanisms underlying the augmented torques, non-linear responses to wide-pulse width (1 ms), low-intensity, variable-frequency (25–100 Hz) NMES were also tested prior to and following repeated MVEs. When variable-frequency NMES was applied following the repeated MVEs, augmented and prolonged torques were observed and accompanied by sustained quadriceps electromyographic activity often lasting >2s after stimulus termination. Such data suggest a potential contribution of elevated spinal excitability to the reserve in volitional force generation in incomplete SCI. PMID:21610138

  11. A rapid echocardiographic screening protocol for rheumatic heart disease in Samoa: a high prevalence of advanced disease.

    PubMed

    Allen, Marvin; Allen, John; Naseri, Take; Gardner, Rebecca; Tolley, Dennis; Allen, Lori

    2017-10-01

    Echocardiography has been proposed as a method to screen children for rheumatic heart disease. The World Heart Federation has established guidelines for echocardiographic screening. In this study, we describe a rapid echocardiogram screening protocol according to the World Heart Federation guidelines in Samoa, endemic for rheumatic heart disease. We performed echocardiogram screening in schoolchildren in Samoa between 2013 and 2015. A brief screening echocardiogram was performed on all students. Children with predefined criteria suspicious for rheumatic hear diseases were referred for a more comprehensive echocardiogram. Complete echocardiograms were classified according to the World Heart Federation guidelines and severity of valve disease. Echocardiographic screening was performed on 11,434 children, with a mean age of 10.2 years; 51% of them were females. A total of 558 (4.8%) children underwent comprehensive echocardiography, including 49 students who were randomly selected as controls. Definite rheumatic heart disease was observed in 115 students (10.0 per 1000): 92 students were classified as borderline (8.0 per 1000) and 23 with CHD. Advanced disease was identified in 50 students (4.4 per 1000): 15 with severe mitral regurgitation, five with severe aortic regurgitation, 11 with mitral stenoses, and 19 with mitral and aortic valve disease. We successfully applied a rapid echocardiographic screening protocol to a large number of students over a short time period - 28 days of screening over a 3-year time period - to identify a high prevalence of rheumatic heart disease. We also reported a significantly higher rate of advanced disease compared with previously published echocardiographic screening programmes.

  12. The natural history of conducting and reporting clinical trials: interviews with trialists.

    PubMed

    Smyth, Rebecca M D; Jacoby, Ann; Altman, Douglas G; Gamble, Carrol; Williamson, Paula R

    2015-01-26

    To investigate the nature of the research process as a whole, factors that might influence the way in which research is carried out, and how researchers ultimately report their findings. Semi-structured qualitative telephone interviews with authors of trials, identified from two sources: trials published since 2002 included in Cochrane systematic reviews selected for the ORBIT project; and trial reports randomly sampled from 14,758 indexed on PubMed over the 12-month period from August 2007 to July 2008. A total of 268 trials were identified for inclusion, 183 published since 2002 and included in the Cochrane systematic reviews selected for the ORBIT project and 85 randomly selected published trials indexed on PubMed. The response rate from researchers in the former group was 21% (38/183) and in the latter group was 25% (21/85). Overall, 59 trialists were interviewed from the two different sources. A number of major but related themes emerged regarding the conduct and reporting of trials: establishment of the research question; identification of outcome variables; use of and adherence to the study protocol; conduct of the research; reporting and publishing of findings. Our results reveal that, although a substantial proportion of trialists identify outcome variables based on their clinical experience and knowing experts in the field, there can be insufficient reference to previous research in the planning of a new trial. We have revealed problems with trial recruitment: not reaching the target sample size, over-estimation of recruitment potential and recruiting clinicians not being in equipoise. We found a wide variation in the completeness of protocols, in terms of detailing study rationale, outlining the proposed methods, trial organisation and ethical considerations. Our results confirm that the conduct and reporting of some trials can be inadequate. Interviews with researchers identified aspects of clinical research that can be especially challenging: establishing appropriate and relevant outcome variables to measure, use of and adherence to the study protocol, recruiting of study participants and reporting and publishing the study findings. Our trialists considered the prestige and impact factors of academic journals to be the most important criteria for selecting those to which they would submit manuscripts.

  13. Quantum gambling using three nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Hwang, Won-Young; Matsumoto, Keiji

    2002-11-01

    We provide a quantum gambling protocol using three (symmetric) nonorthogonal states. The bias of the proposed protocol is less than that of previous ones, making it more practical. We show that the proposed scheme is secure against nonentanglement attacks. The security of the proposed scheme against entanglement attacks is shown heuristically.

  14. Meristem culture and subsequent micropropagation of Chilean strawberry (Fragaria chiloensis (L.) Duch.).

    PubMed

    Quiroz, Karla A; Berríos, Miguel; Carrasco, Basilio; Retamales, Jorge B; Caligari, Peter D S; García-Gonzáles, Rolando

    2017-06-02

    Vegetative propagation of Fragaria sp. is traditionally carried out using stolons. This system of propagation, in addition to being slow, can spread plant diseases, particularly serious being viral. In vitro culture of meristems and the establishment of micropropagation protocols are important tools for solving these problems. In recent years, considerable effort has been made to develop in vitro propagation of the commercial strawberry in order to produce virus-free plants of high quality. These previous results can serve as the basis for developing in vitro-based propagation technologies in the less studied species Fragaria chiloensis. In this context, we studied the cultivation of meristems and establishment of a micropropagation protocol for F. chiloensis. The addition of polyvinylpyrrolidone (PVP) improved the meristem regeneration efficiency of F. chiloensis accessions. Similarly, the use of 6-benzylaminopurine (BAP) in the culture media increased the average rate of multiplication to 3-6 shoots per plant. In addition, the use of 6-benzylaminopurine (BAP), had low levels (near zero) of explant losses due to oxidation. However, plant height as well as number of leaves and roots were higher in media without growth regulators, with average values of 0.5 cm, 9 leaves and 4 roots per plant. For the first time in Chilean strawberry, meristem culture demonstrated to be an efficient tool for eliminating virus from infected plants, giving the possibility to produce disease free propagation material. Also, the addition of PVP into the basal MS medium improved the efficiency of plant recovery from isolated meristems. Farmers can now access to high quality plant material produced by biotech tools which will improve their technological practices.

  15. Cell Type-Specific Modulation of Cobalamin Uptake by Bovine Serum

    PubMed Central

    Zhao, Hua; Ruberu, Kalani; Li, Hongyun; Garner, Brett

    2016-01-01

    Tracking cellular 57Co-labelled cobalamin (57Co-Cbl) uptake is a well-established method for studying Cbl homeostasis. Previous studies established that bovine serum is not generally permissive for cellular Cbl uptake when used as a supplement in cell culture medium, whereas supplementation with human serum promotes cellular Cbl uptake. The underlying reasons for these differences are not fully defined. In the current study we address this question. We extend earlier observations by showing that fetal calf serum inhibits cellular 57Co-Cbl uptake by HT1080 cells (a fibrosarcoma-derived fibroblast cell line). Furthermore, we discovered that a simple heat-treatment protocol (95°C for 10 min) ameliorates this inhibitory activity for HT1080 cell 57Co-Cbl uptake. We provide evidence that the very high level of haptocorrin in bovine serum (as compared to human serum) is responsible for this inhibitory activity. We suggest that bovine haptocorrin competes with cell-derived transcobalamin for Cbl binding, and that cellular Cbl uptake may be minimised in the presence of large amounts of bovine haptocorrin that are present under routine in vitro cell culture conditions. In experiments conducted with AG01518 cells (a neonatal foreskin-derived fibroblast cell line), overall cellular 57Co-Cbl uptake was 86% lower than for HT1080 cells, cellular TC production was below levels detectable by western blotting, and heat treatment of fetal calf serum resulted in only a modest increase in cellular 57Co-Cbl uptake. We recommend a careful assessment of cell culture protocols should be conducted in order to determine the potential benefits that heat-treated bovine serum may provide for in vitro studies of mammalian cell lines. PMID:27893837

  16. Current Status of Efforts on Standardizing Magnetic Resonance Imaging of Juvenile Idiopathic Arthritis: Report from the OMERACT MRI in JIA Working Group and Health-e-Child.

    PubMed

    Nusman, Charlotte M; Ording Muller, Lil-Sofie; Hemke, Robert; Doria, Andrea S; Avenarius, Derk; Tzaribachev, Nikolay; Malattia, Clara; van Rossum, Marion A J; Maas, Mario; Rosendahl, Karen

    2016-01-01

    To report on the progress of an ongoing research collaboration on magnetic resonance imaging (MRI) in juvenile idiopathic arthritis (JIA) and describe the proceedings of a meeting, held prior to Outcome Measures in Rheumatology (OMERACT) 12, bringing together the OMERACT MRI in JIA working group and the Health-e-Child radiology group. The goal of the meeting was to establish agreement on scoring definitions, locations, and scales for the assessment of MRI of patients with JIA for both large and small joints. The collaborative work process included premeeting surveys, presentations, group discussions, consensus on scoring methods, pilot scoring, conjoint review, and discussion of a future research agenda. The meeting resulted in preliminary statements on the MR imaging protocol of the JIA knee and wrist and determination of the starting point for development of MRI scoring systems based on previous studies. It was also considered important to be descriptive rather than explanatory in the assessment of MRI in JIA (e.g., "thickening" instead of "hypertrophy"). Further, the group agreed that well-designed calibration sessions were warranted before any future scoring exercises were conducted. The combined efforts of the OMERACT MRI in JIA working group and Health-e-Child included the assessment of currently available material in the literature and determination of the basis from which to start the development of MRI scoring systems for both the knee and wrist. The future research agenda for the knee and wrist will include establishment of MRI scoring systems, an atlas of MR imaging in healthy children, and MRI protocol requisites.

  17. Quality control of involved field radiotherapy in the HD 13 and HD 14 trials : Report of the radiotherapy panel of the German Hodgkin Study Group (GHSG).

    PubMed

    Kriz, J; Baues, C; Engenhart-Cabillic, R; Haverkamp, U; Herfart, K; Lukas, P; Plütschow, A; Schmidberger, H; Staar, S; Fuchs, M; Engert, A; Eich, H T

    2017-02-01

    As part of the foundation of the German Hodgkin Study Group (GHSG) in 1978, a central radiotherapy (RT) reference centre was established to evaluate and to improve the quality of treatment. During the study generations, the quality assurance programs (QAP) were continued and adapted to the demands of each study. The purpose of this article is to demonstrate the results of the fifth study generation and to compare them to the previous findings. With the start of the fourth GHSG study generation (HD10-12), a central prospective review of all diagnostic images was established to create an individual treatment plan for each early stage study patient. The quality of involved field RT was retrospectively evaluated by an expert panel of radiation oncologists. In the fifth study generation (HD13-15), the retrospective review of radiotherapy performed was refined and the results were compared with the findings of the fourth generation. The expert panel analyzed the RT planning and application of 1037 (28 %) patients (HD13 n = 465, HD14 n = 572). Simulation films were available in 85 % of cases and verification films in 87 %. RT was assessed as major violation in 46 % (HD13 = 38 %, HD14 = 52 %), minor violation in 9 % (HD13 = 9 %, HD14 = 9 %) and according to the protocol in 45 % (HD13 = 52 %, HD14 = 38 %). The value for QAP of RT within the GHSG trials is well known. Still there were several protocol violations. In the future, the QAP program has to be adapted to the requirements of "modern RT" in malignant lymphoma.

  18. Changes in the dominance hierarchy of captive female Japanese macaques as a consequence of merging two previously established groups.

    PubMed

    Anderson, Emily J; Weladji, Robert B; Paré, Patrick

    2016-11-01

    Dominance hierarchies play an important role in reducing competition and aggression in social animals. In zoos, changes in group composition are often required due to management protocols, but these changes may have long lasting effects on dominance hierarchies, and, consequently, the wellbeing of the animals. We studied the changes in the female dominance hierarchy that occurred both during and after the formation of a group of 10 adult Japanese macaques at the Zoo de Granby by combining members from two previously established groups. There was no significant correlation between individual ranks in the old groups (groups A and B) and their ranks in the new group (group AB), indicating a significant change in the hierarchy. Alliances between kin appeared to be important in determining rank; when the sister of the dominant female was removed from group AB, the hierarchy changed significantly a second time. The average standardized rank of individuals added later in the formation process of group AB was not different from those added earlier. Ranks in the group AB did correlate with age of individual at the beginning of the field season, but not at the end, after the shift in hierarchy occurred. Zoo management must be aware of the consequences small changes in a social group can have when removing and transferring individuals in both primates and in other social species. Zoo Biol. 35:505-512, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  19. Reconstitution of mouse oogenesis in a dish from pluripotent stem cells.

    PubMed

    Hayashi, Katsuhiko; Hikabe, Orie; Obata, Yayoi; Hirao, Yuji

    2017-09-01

    This protocol is an extension to: Nat. Protoc. 8, 1513-1524 (2013); doi: 10.1038/nprot.2013.090; published online 11 July 2013Generation of functional oocytes in culture from pluripotent stem cells should provide a useful model system for improving our understanding of the basic mechanisms underlying oogenesis. In addition, it has potential applications as an alternative source of oocytes for reproduction. Using the most advanced mouse model in regard to reproductive engineering and stem cell biology, we previously developed a culture method that produces functional primorial germ cells starting from pluripotent cells in culture and described it in a previous protocol. This Protocol Extension describes an adaptation of this existing Protocol in which oogenesis also occurs in vitro, thus substantially modifying the technique. Oocytes generated from embryonic stem cells (ESCs) or induced pluripotent stem cells give rise to healthy pups. Here, we describe the protocol for oocyte generation in culture. The protocol is mainly composed of three different culture stages: in vitro differentiation (IVDi), in vitro growth (IVG), and in vitro maturation (IVM), which in total take ∼5 weeks. In each culture period, there are several checkpoints that enable the number of oocytes being produced in the culture to be monitored. The basic structure of the culture system should provide a useful tool for clarifying the complicated sequence of oogenesis in mammals.

  20. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  1. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    PubMed

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  2. Unconditional security of a three state quantum key distribution protocol.

    PubMed

    Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M

    2005-02-04

    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.

  3. User-Centered Design of Serious Games for Older Adults Following 3 Years of Experience With Exergames for Seniors: A Study Design

    PubMed Central

    2017-01-01

    Background Seniors need sufficient balance and strength to manage in daily life, and sufficient physical activity is required to achieve and maintain these abilities. This can be a challenge, but fun and motivational exergames can be of help. However, most commercial games are not suited for this age group for several reasons. Many usability studies and user-centered design (UCD) protocols have been developed and applied, but to the best of our knowledge none of them are focusing on seniors’ use of games for physical activity. In GameUp, a European cofunded project, some prototype Kinect exergames to enhance the mobility of seniors were developed in a user-centered approach. Objective In this paper we aim to record lessons learned in 3 years of experience with exergames for seniors, considering both the needs of older adults regarding user-centered development of exergames and participation in UCD. We also provide a UCD protocol for exergames tailored to senior needs. Methods An initial UCD protocol was formed based on literature of previous research outcomes. Senior users participated in UCD following the initial protocol. The users formed a steady group that met every second week for 3 years to play exergames and participate in the UCD during the 4 phases of the protocol. Several methods were applied in the 4 different phases of the UCD protocol; the most important methods were structured and semistructured interviews, observations, and group discussions. Results A total of 16 seniors with an average age above 80 years participated for 3 years in UCD in order to develop the GameUp exergames. As a result of the lessons learned by applying the different methodologies of the UCD protocol, we propose an adjusted UCD protocol providing explanations on how it should be applied for seniors as users. Questionnaires should be turned into semistructured and structured interviews while user consultation sessions should be repeated with the same theme to ensure that the UCD methods produce a valid outcome. By first following the initial and gradually the adjusted UCD protocol, the project resulted in exergame functionalities and interface features for seniors. Conclusions The main lessons learned during 3 years of experience with exergames for seniors applying UCD are that devoting time to seniors is a key element of success so that trust can be gained, communication can be established, and users’ opinions can be recorded. All different game elements should be taken into consideration during the design of exergames for seniors even if they seem obvious. Despite the limitations of this study, one might argue that it provides a best practice guide to the development of serious games for physical activity targeting seniors. PMID:28077348

  4. Performance assessment of two lysis methods for direct identification of yeasts from clinical blood cultures using MALDI-TOF mass spectrometry.

    PubMed

    Jeddi, Fakhri; Yapo-Kouadio, Gisèle Cha; Normand, Anne-Cécile; Cassagne, Carole; Marty, Pierre; Piarroux, Renaud

    2017-02-01

    In cases of fungal infection of the bloodstream, rapid species identification is crucial to provide adapted therapy and thereby ameliorate patient outcome. Currently, the commercial Sepsityper kit and the sodium-dodecyl sulfate (SDS) method coupled with MALDI-TOF mass spectrometry are the most commonly reported lysis protocols for direct identification of fungi from positive blood culture vials. However, the performance of these two protocols has never been compared on clinical samples. Accordingly, we performed a two-step survey on two distinct panels of clinical positive blood culture vials to identify the most efficient protocol, establish an appropriate log score (LS) cut-off, and validate the best method. We first compared the performance of the Sepsityper and the SDS protocols on 71 clinical samples. For 69 monomicrobial samples, mass spectrometry LS values were significantly higher with the SDS protocol than with the Sepsityper method (P < .0001), especially when the best score of four deposited spots was considered. Next, we established the LS cut-off for accurate identification at 1.7, based on specimen DNA sequence data. Using this LS cut-off, 66 (95.6%) and 46 (66.6%) isolates were correctly identified at the species level with the SDS and the Sepsityper protocols, respectively. In the second arm of the survey, we validated the SDS protocol on an additional panel of 94 clinical samples. Ninety-two (98.9%) of 93 monomicrobial samples were correctly identified at the species level (median LS = 2.061). Overall, our data suggest that the SDS method yields more accurate species identification of yeasts, than the Sepsityper protocol. © The Author 2016. Published by Oxford University Press on behalf of The International Society for Human and Animal Mycology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. HPLC-Based Activity Profiling for GABAA Receptor Modulators in Extracts: Validation of an Approach Utilizing a Larval Zebrafish Locomotor Assay.

    PubMed

    Moradi-Afrapoli, Fahimeh; Ebrahimi, Samad Nejad; Smiesko, Martin; Hamburger, Matthias

    2017-05-26

    Gamma-aminobutyric acid type A (GABA A ) receptors are major inhibitory neurotransmitter receptors in the central nervous system and a target for numerous clinically important drugs used to treat anxiety, insomnia, and epilepsy. A series of allosteric GABA A receptor agonists was identified previously with the aid of HPLC-based activity profiling, whereby activity was tracked with an electrophysiological assay in Xenopus laevis oocytes. To accelerate the discovery process, an approach has been established for HPLC-based profiling using a larval zebrafish (Danio rerio) seizure model induced by pentylenetetrazol (PTZ), a pro-convulsant GABA A receptor antagonist. The assay was validated with the aid of representative GABAergic plant compounds and extracts. Various parameters that are relevant for the quality of results obtained, including PTZ concentration, the number of larvae, the incubation time, and the data analysis protocol, were optimized. The assay was then translated into an HPLC profiling protocol, and active compounds were tracked in extracts of Valeriana officinalis and Magnolia officinalis. For selected compounds the effects in the zebrafish larvae model were compared with data from in silico blood-brain barrier (BBB) permeability predictions, to validate the use for discovery of BBB-permeable natural products.

  6. Improved protocols to accelerate the assembly of DNA barcode reference libraries for freshwater zooplankton.

    PubMed

    Elías-Gutiérrez, Manuel; Valdez-Moreno, Martha; Topan, Janet; Young, Monica R; Cohuo-Colli, José Angel

    2018-03-01

    Currently, freshwater zooplankton sampling and identification methodologies have remained virtually unchanged since they were first established in the beginning of the XX century. One major contributing factor to this slow progress is the limited success of modern genetic methodologies, such as DNA barcoding, in several of the main groups. This study demonstrates improved protocols which enable the rapid assessment of most animal taxa inhabiting any freshwater system by combining the use of light traps, careful fixation at low temperatures using ethanol, and zooplankton-specific primers. We DNA-barcoded 2,136 specimens from a diverse array of taxonomic assemblages (rotifers, mollusks, mites, crustaceans, insects, and fishes) from several Canadian and Mexican lakes with an average sequence success rate of 85.3%. In total, 325 Barcode Index Numbers (BINs) were detected with only three BINs (two cladocerans and one copepod) shared between Canada and Mexico, suggesting a much narrower distribution range of freshwater zooplankton than previously thought. This study is the first to broadly explore the metazoan biodiversity of freshwater systems with DNA barcodes to construct a reference library that represents the first step for future programs which aim to monitor ecosystem health, track invasive species, or improve knowledge of the ecology and distribution of freshwater zooplankton.

  7. Using cardiovascular imaging modalities to determine cardiac disorders before starting sports activities.

    PubMed

    Ceylan, Özgür; Meşe, Timur; Gürsu, Alper Hazım

    2017-03-01

    We re-examined children who had previously been declared eligible to participate in competitive sports activities for cardiac disorders, using cardiac investigation protocol. Total of 250 children (224 males [89.6%], and 26 females [10.4%]) between the ages of 8 and 17 years who had just started or were already engaged in sports activities were included in the study. Participants had detailed physical examination evaluated by a pediatric cardiologist. Those with findings suggesting cardiac disorder in their history and/or physical examinations, and/or 12-channel electrocardiography (ECG) were examined with echocardiography (ECHO), 24-hour Holter monitoring, and exercise test. Mean duration of participation in sports activities was 13 months. Among all, 10.4% of the children had abnormalities on ECG. ECHO demonstrated cardiomyopathy in 1, mitral valve prolapse in 2, tricuspid insufficiency in 2, and mitral insufficiency in 1 participant. Holter monitoring revealed non-sustained ventricular tachycardia attacks in 1, and supraventricular tachycardia in another child. Three were ultimately disqualified from partaking in competitive sports. Sports and medical communities must work together to establish study protocols to prevent sudden death related to sports and to make these activities safer for athletes. Pediatric cardiology consultation for young athletes before they start sports activities is needed.

  8. Robust and effective methodologies for cryopreservation and DNA extraction from anaerobic gut fungi.

    PubMed

    Solomon, Kevin V; Henske, John K; Theodorou, Michael K; O'Malley, Michelle A

    2016-04-01

    Cell storage and DNA isolation are essential to developing an expanded suite of microorganisms for biotechnology. However, many features of non-model microbes, such as an anaerobic lifestyle and rigid cell wall, present formidable challenges to creating strain repositories and extracting high quality genomic DNA. Here, we establish accessible, high efficiency, and robust techniques to store lignocellulolytic anaerobic gut fungi long term without specialized equipment. Using glycerol as a cryoprotectant, gut fungal isolates were preserved for a minimum of 23 months at -80 °C. Unlike previously reported approaches, this improved protocol is non-toxic and rapid, with samples surviving twice as long with negligible growth impact. Genomic DNA extraction for these isolates was optimized to yield samples compatible with next generation sequencing platforms (e.g. Illumina, PacBio). Popular DNA isolation kits and precipitation protocols yielded preps that were unsuitable for sequencing due to carbohydrate contaminants from the chitin-rich cell wall and extensive energy reserves of gut fungi. To address this, we identified a proprietary method optimized for hardy plant samples that rapidly yielded DNA fragments in excess of 10 kb with minimal RNA, protein or carbohydrate contamination. Collectively, these techniques serve as fundamental tools to manipulate powerful biomass-degrading gut fungi and improve their accessibility among researchers. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Organoid culture systems for prostate epithelial tissue and prostate cancer tissue

    PubMed Central

    Drost, Jarno; Karthaus, Wouter R.; Gao, Dong; Driehuis, Else; Sawyers, Charles L.; Chen, Yu; Clevers, Hans

    2016-01-01

    Summary This protocol describes a recently developed strategy to generate 3D prostate organoid cultures from healthy mouse and human prostate (either bulk or FAC-sorted single luminal and basal cells), metastatic prostate cancer lesions and circulating tumour cells. Organoids derived from healthy material contain the differentiated luminal and basal cell types, whereas organoids derived from prostate cancer tissue mimic the histology of the tumour. The stepwise establishment of these cultures and the fully defined serum-free conditioned medium that is required to sustain organoid growth are outlined. Organoids established using this protocol can be used to study many different aspects of prostate biology, including homeostasis, tumorigenesis and drug discovery. PMID:26797458

  10. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    PubMed

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P < 0.001). Within the limitations of the study, the short drilling protocol proposed herein may represent a safe approach for implant site preparation.

  11. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  12. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  13. J-PAKE: Authenticated Key Exchange without PKI

    NASA Astrophysics Data System (ADS)

    Hao, Feng; Ryan, Peter

    Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.

  14. DWTP: a basis for networked VR on the Internet

    NASA Astrophysics Data System (ADS)

    Broll, Wolfgang; Schick, Daniel

    1998-04-01

    Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.

  15. Prospective Intervention of a Novel Levothyroxine Dosing Protocol Based on Body Mass Index after Thyroidectomy.

    PubMed

    Elfenbein, Dawn M; Schaefer, Sarah; Shumway, Cynthia; Chen, Herbert; Sippel, Rebecca S; Schneider, David F

    2016-01-01

    Weight-based postoperative levothyroxine (LT4) dosing often fails to appropriately dose overweight and underweight patients. Previously, we created an LT4-dosing algorithm based on BMI. We hypothesize that more patients will achieve euthyroidism at their postoperative visit with the use of the protocol. A prospective evaluation was performed of our previously published BMI-based LT4 dosing. All adults who underwent thyroidectomy for benign disease between January 1, 2011 and December 31, 2013 were included; the new protocol was implemented in October 2012. Serum TSH was measured for all patients 6 to 8 weeks postoperatively, and adjustments were based on TSH. Three hundred and thirty patients were included, with 54% undergoing thyroidectomy after institution of the protocol. The groups were well matched. Before protocol implementation, LT4 was dosed solely by weight and 25% of patients were euthyroid at initial follow-up. After the protocol, 39% of patients were euthyroid (p = 0.01). The percentage of patients who were given too high a dose of LT4 remained the same (46% vs 42%), and there was a significant reduction in the number of patients who were given too little (29% vs 19%; p = 0.05). The effect was most profound in patients with low and normal BMI, and there were slight differences between sexes. Although correct initial dosing of LT4 remains challenging, this dosing protocol that we developed and implemented has improved patient care by increasing the number of patients who achieve euthyroidism at the first postoperative visit. We have made a change to our original protocol to incorporate sex differences into the calculation. Copyright © 2016 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  16. Usefulness of an injectable anaesthetic protocol for semen collection through urethral catheterisation in domestic cats.

    PubMed

    Pisu, Maria Carmela; Ponzio, Patrizia; Rovella, Chiara; Baravalle, Michela; Veronesi, Maria Cristina

    2017-10-01

    Objectives Although less often requested in comparison with dogs, the collection of semen in cats can be necessary for artificial insemination, for semen evaluation in tom cats used for breeding and for semen storage. Urethral catheterisation after pharmacological induction with medetomidine has proved to be useful for the collection of semen in domestic cats. However, most of the previously used protocols require the administration of high doses of medetomidine that can increase the risk of side effects, especially on the cardiovascular system. In routine clinical practice, one safe and useful injectable anaesthetic protocol for short-term clinical investigations or surgery in cats involves premedication with low intramuscular doses of dexmedetomidine with methadone, followed by intravenous propofol bolus injection. We aimed to assess the usefulness of this injectable anaesthetic protocol for semen collection, via urethral catheterisation, in domestic cats. Methods The study was performed on 38 purebred, adult cats, during the breeding season, and semen was collected via urethral catheterisation using an injectable anaesthesia protocol with methadone (0.2 mg/kg) and dexmedetomidine (5 µg/kg) premedication, followed by induction with propofol. Results The anaesthetic protocol used in the present study allowed the collection of large-volume semen samples, characterised by good parameters and without side effects. Conclusions and relevance The results from the present study suggest that the injectable anaesthetic protocol using methadone and dexmedetomidine premedication, followed by induction with propofol, could be suitable and safe for the collection of a good-quality semen sample, via urethral catheterisation, in domestic cats. It can therefore be used as an alternative to previous medetomidine-based sedation protocols.

  17. Comparison of two neonatal indomethacin protocols: efficacy and outcome for patent ductus arteriosus closure.

    PubMed

    Rosito, G; Sum, K; Chorne, N

    2010-10-01

    Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.

  18. A method for acetylcholinesterase staining of brain sections previously processed for receptor autoradiography.

    PubMed

    Lim, M M; Hammock, E A D; Young, L J

    2004-02-01

    Receptor autoradiography using selective radiolabeled ligands allows visualization of brain receptor distribution and density on film. The resolution of specific brain regions on the film often can be difficult to discern owing to the general spread of the radioactive label and the lack of neuroanatomical landmarks on film. Receptor binding is a chemically harsh protocol that can render the tissue virtually unstainable by Nissl and other conventional stains used to delineate neuroanatomical boundaries of brain regions. We describe a method for acetylcholinesterase (AChE) staining of slides previously processed for receptor binding. AChE staining is a useful tool for delineating major brain nuclei and tracts. AChE staining on sections that have been processed for receptor autoradiography provides a direct comparison of brain regions for more precise neuroanatomical description. We report a detailed thiocholine protocol that is a modification of the Koelle-Friedenwald method to amplify the AChE signal in brain sections previously processed for autoradiography. We also describe several temporal and experimental factors that can affect the density and clarity of the AChE signal when using this protocol.

  19. Continuing the Original Stanford Sleep Surgery Protocol From Upper Airway Reconstruction to Upper Airway Stimulation: Our First Successful Case.

    PubMed

    Liu, Stanley Yung; Riley, Robert Wayne

    2017-07-01

    In 1993, a surgical protocol for dynamic upper airway reconstruction in patients with obstructive sleep apnea (OSA) was published, and it became commonly known as the Stanford phase 1 and 2 sleep surgery protocol. It served as a platform on which research and clinical studies have continued to perfect the surgical care of patients with OSA. However, relapse is inevitable in a chronic condition such as OSA, and a subset of previously cured surgical patients return with complaints of excessive daytime sleepiness. This report describes a patient who was successfully treated with phase 1 and 2 operations more than a decade previously. He returned at 65 years of age with relapse of moderate OSA, and after workup with polysomnography and drug-induced sleep endoscopy, he underwent upper airway stimulation of the hypoglossal nerve that resulted in a cure of OSA. This case shows why upper airway stimulation is an appropriate option for patients with OSA relapse, after previously successful maxillomandibular advancement. Copyright © 2017. Published by Elsevier Inc.

  20. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  1. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  2. Peri-procedural protocols for interventional pain management techniques: a survey of US pain centers.

    PubMed

    Ahmed, Shihab U; Tonidandel, William; Trella, Jason; Martin, Nicole M; Chang, Yuchiao

    2005-04-01

    Interventional techniques are now an integral part of chronic pain management. As new procedures are arising at a rapid pace, decisions regarding patient safety and comfort are becoming more challenging. No peri-procedural consensus protocol currently addresses issues such as 1. nulla per os (NPO) status, 2. sedation, 3. monitoring, or 4. recovery. In establishing safety guidelines for interventional pain procedures, the knowledge of current peri-procedural protocols is required. To survey interventional pain practices and to obtain current peri-procedural protocols. We faxed a one-page questionnaire to 105 United States pain practices identified using the directory of the American Pain Society. Fifty-seven academic and private pain practices (54%) responded and were included in the analysis. Monitoring devices such as electrocardiogram (EKG), blood pressure, and pulse oximetry are not universally employed for cervical or lumbar spinal procedures. Even procedures that are often performed by anesthesiologists in operating rooms, such as Bier blocks, are not monitored in a uniform manner when performed in pain clinics. Establishment of intravenous access for procedures also varies among practitioners. Most (72%) practices had treated patients with vasovagal reactions over the past 12 months, but only 42% had simulated cardiac arrests to prepare for these situations. While various trends in peri-procedural care are observable, standards of care are not well established. In order to minimize complications associated with interventional pain management techniques, the pain management community should agree on safety guidelines for all procedures, much as these advocated by the American Society of Anesthesiology for surgical anesthetic care.

  3. Refining animal models in fracture research: seeking consensus in optimising both animal welfare and scientific validity for appropriate biomedical use.

    PubMed

    Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W

    2007-08-01

    In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards.

  4. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

    PubMed

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-08-19

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.

  5. Generation of an arbitrary concatenated Greenberger-Horne-Zeilinger state with single photons

    NASA Astrophysics Data System (ADS)

    Chen, Shan-Shan; Zhou, Lan; Sheng, Yu-Bo

    2017-02-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new kind of logic-qubit entangled state, which may have extensive applications in future quantum communication. In this letter, we propose a protocol for constructing an arbitrary C-GHZ state with single photons. We exploit the cross-Kerr nonlinearity for this purpose. This protocol has some advantages over previous protocols. First, it only requires two kinds of cross-Kerr nonlinearities to generate single phase shifts  ±θ. Second, it is not necessary to use sophisticated m-photon Toffoli gates. Third, this protocol is deterministic and can be used to generate an arbitrary C-GHZ state. This protocol may be useful in future quantum information processing based on the C-GHZ state.

  6. [Independent ethics committees for clinical research in Argentina. An evaluation and a system to guarantee their independence].

    PubMed

    Gonorazky, Sergio E

    2008-01-01

    The Administración Nacional de Medicamentos, Alimentos y Tecnología Médica de la República Argentina (ANMAT) requires that an independent ethics committee of sponsors and/or researchers must previously evaluate and approve all the new pharmacological research protocols carried out on human beings. However, due to the lucrative nature of the evaluation, and because the selection of the Independent Ethics Committee is carried out by the sponsors and/or researchers, the assumed autonomy of the former can be reduced to merely a relationship of "service provider-customer". The Institutional Review Board of the Mar del Plata s Community Hospital has evaluated, between 2005 and 2006, thirty three research protocols (with their corresponding information sheets for patients and informed consent forms) previously approved by a non-institutional Independent Ethics Committee. The median number of objections made by the Institutional Review Board, which prompted the previously mentioned protocols to be modified in order to be approved, was of three per protocol. In other words, the accreditation of an Independent Ethics Committee requires a system that guarantees actual independence from the sponsors and/or researchers, as well as management control mechanisms that may lead them into an eventual loss of accreditation. Several measures are proposed in order to correct the deficiencies of the present system.

  7. An Efficient Plant Regeneration and Transformation System of Ma Bamboo (Dendrocalamus latiflorus Munro) Started from Young Shoot as Explant

    PubMed Central

    Ye, Shanwen; Cai, Changyang; Ren, Huibo; Wang, Wenjia; Xiang, Mengqi; Tang, Xiaoshan; Zhu, Caiping; Yin, Tengfei; Zhang, Li; Zhu, Qiang

    2017-01-01

    Genetic engineering technology has been successfully used in many plant species, but is limited in woody plants, especially in bamboos. Ma bamboo (Dendrocalamus latiflorus Munro) is one of the most important bamboo species in Asia, and its genetic improvement was largely restricted by the lack of an efficient regeneration and transformation method. Here we reported a plantlet regeneration and Agrobacterium-mediated transformation protocol by using Ma bamboo young shoots as explants. Under our optimized conditions, embryogenic calluses were successfully induced from the excised young shoots on callus induction medium and rapidly grew on callus multiplication medium. Shoots and roots were regenerated on shoot induction medium and root induction medium, respectively, with high efficiency. An Agrobacterium-mediated genetic transformation protocol of Ma bamboo was established, verified by PCR and GUS staining. Furthermore, the maize Lc gene under the control of the ubiquitin promoter was successfully introduced into Ma bamboo genome and generated an anthocyanin over-accumulation phenotype. Our methods established here will facilitate the basic research as well as genetic breeding of this important bamboo species. Key achievements: A stable and high efficiency regeneration and Agrobacterium-mediated transformation protocol for Ma bamboo from vegetative organ is established. PMID:28798758

  8. Image registration for a UV-Visible dual-band imaging system

    NASA Astrophysics Data System (ADS)

    Chen, Tao; Yuan, Shuang; Li, Jianping; Xing, Sheng; Zhang, Honglong; Dong, Yuming; Chen, Liangpei; Liu, Peng; Jiao, Guohua

    2018-06-01

    The detection of corona discharge is an effective way for early fault diagnosis of power equipment. UV-Visible dual-band imaging can detect and locate corona discharge spot at all-weather condition. In this study, we introduce an image registration protocol for this dual-band imaging system. The protocol consists of UV image denoising and affine transformation model establishment. We report the algorithm details of UV image preprocessing, affine transformation model establishment and relevant experiments for verification of their feasibility. The denoising algorithm was based on a correlation operation between raw UV images, a continuous mask and the transformation model was established by using corner feature and a statistical method. Finally, an image fusion test was carried out to verify the accuracy of affine transformation model. It has proved the average position displacement error between corona discharge and equipment fault at different distances in a 2.5m-20 m range are 1.34 mm and 1.92 mm in the horizontal and vertical directions, respectively, which are precise enough for most industrial applications. The resultant protocol is not only expected to improve the efficiency and accuracy of such imaging system for locating corona discharge spot, but also supposed to provide a more generalized reference for the calibration of various dual-band imaging systems in practice.

  9. Differences in quantitative assessment of myocardial scar and gray zone by LGE-CMR imaging using established gray zone protocols.

    PubMed

    Mesubi, Olurotimi; Ego-Osuala, Kelechi; Jeudy, Jean; Purtilo, James; Synowski, Stephen; Abutaleb, Ameer; Niekoop, Michelle; Abdulghani, Mohammed; Asoglu, Ramazan; See, Vincent; Saliaris, Anastasios; Shorofsky, Stephen; Dickfeld, Timm

    2015-02-01

    Late gadolinium enhancement cardiac magnetic resonance (LGE-CMR) imaging is the gold standard for myocardial scar evaluation. Heterogeneous areas of scar ('gray zone'), may serve as arrhythmogenic substrate. Various gray zone protocols have been correlated to clinical outcomes and ventricular tachycardia channels. This study assessed the quantitative differences in gray zone and scar core sizes as defined by previously validated signal intensity (SI) threshold algorithms. High quality LGE-CMR images performed in 41 cardiomyopathy patients [ischemic (33) or non-ischemic (8)] were analyzed using previously validated SI threshold methods [Full Width at Half Maximum (FWHM), n-standard deviation (NSD) and modified-FWHM]. Myocardial scar was defined as scar core and gray zone using SI thresholds based on these methods. Scar core, gray zone and total scar sizes were then computed and compared among these models. The median gray zone mass was 2-3 times larger with FWHM (15 g, IQR: 8-26 g) compared to NSD or modified-FWHM (5 g, IQR: 3-9 g; and 8 g. IQR: 6-12 g respectively, p < 0.001). Conversely, infarct core mass was 2.3 times larger with NSD (30 g, IQR: 17-53 g) versus FWHM and modified-FWHM (13 g, IQR: 7-23 g, p < 0.001). The gray zone extent (percentage of total scar that was gray zone) also varied significantly among the three methods, 51 % (IQR: 42-61 %), 17 % (IQR: 11-21 %) versus 38 % (IQR: 33-43 %) for FWHM, NSD and modified-FWHM respectively (p < 0.001). Considerable variability exists among the current methods for MRI defined gray zone and scar core. Infarct core and total myocardial scar mass also differ using these methods. Further evaluation of the most accurate quantification method is needed.

  10. Optimization of a Sample Processing Protocol for Recovery of ...

    EPA Pesticide Factsheets

    Journal Article Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps.

  11. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  12. Boldness, Aggression, and Shoaling Assays for Zebrafish Behavioral Syndromes.

    PubMed

    Way, Gregory P; Southwell, Maura; McRobert, Scott P

    2016-08-29

    A behavioral syndrome exists when specific behaviors interact under different contexts. Zebrafish have been test subjects in recent studies and it is important to standardize protocols to ensure proper analyses and interpretations. In our previous studies, we have measured boldness by monitoring a series of behaviors (time near surface, latency in transitions, number of transitions, and darts) in a 1.5 L trapezoidal tank. Likewise, we quantified aggression by observing bites, lateral displays, darts, and time near an inclined mirror in a rectangular 19 L tank. By dividing a 76 L tank into thirds, we also examined shoaling preferences. The shoaling assay is a highly customizable assay and can be tailored for specific hypotheses. However, protocols for this assay also must be standardized, yet flexible enough for customization. In previous studies, end chambers were either empty, contained 5 or 10 zebrafish, or 5 pearl danios (D. albolineatus). In the following manuscript, we present a detailed protocol and representative data that accompany successful applications of the protocol, which will allow for replication of behavioral syndrome experiments.

  13. Deterministic and efficient quantum cryptography based on Bell's theorem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen Zengbing; Pan Jianwei; Physikalisches Institut, Universitaet Heidelberg, Philosophenweg 12, 69120 Heidelberg

    2006-05-15

    We propose a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic. The proposal uses photon pairs with entanglement both in polarization and in time degrees of freedom; each measurement in which both of the two communicating parties register a photon can establish one and only one perfect correlation, and thus deterministically create a key bit. Eavesdropping can be detected by violation of local realism. A variation of the protocol shows a higher security, similar to the six-state protocol, under individual attacks. Our scheme allows a robust implementation under the current technology.

  14. Evaluation of parameters affecting switchgrass tissue culture: toward a consolidated procedure for Agrobacterium-mediated transformation of switchgrass (Panicum virgatum)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lin, Chien-Yuan; Donohoe, Bryon S.; Ahuja, Neha

    Switchgrass (Panicum virgatum), a robust perennial C4-type grass, has been evaluated and designated as a model bioenergy crop by the U.S. DOE and USDA. Conventional breeding of switchgrass biomass is difficult because it displays self-incompatible hindrance. Therefore, direct genetic modifications of switchgrass have been considered the more effective approach to tailor switchgrass with traits of interest. Successful transformations have demonstrated increased biomass yields, reduction in the recalcitrance of cell walls and enhanced saccharification efficiency. Several tissue culture protocols have been previously described to produce transgenic switchgrass lines using different nutrient-based media, co-cultivation approaches, and antibiotic strengths for selection. After evaluatingmore » the published protocols, we consolidated these approaches and optimized the process to develop a more efficient protocol for producing transgenic switchgrass. First, seed sterilization was optimized, which led to a 20% increase in yield of induced calluses. Second, we have selected a N 6 macronutrient/B 5 micronutrient (NB)-based medium for callus induction from mature seeds of the Alamo cultivar, and chose a Murashige and Skoog-based medium to regenerate both Type I and Type II calluses. Third, Agrobacterium-mediated transformation was adopted that resulted in 50-100% positive regenerated transformants after three rounds (2 weeks/round) of selection with antibiotic. Genomic DNA PCR, RT-PCR, Southern blot, visualization of the red fluorescent protein and histochemical β-glucuronidase (GUS) staining were conducted to confirm the positive switchgrass transformants. The optimized methods developed here provide an improved strategy to promote the production and selection of callus and generation of transgenic switchgrass lines. The process for switchgrass transformation has been evaluated and consolidated to devise an improved approach for transgenic switchgrass production. With the optimization of seed sterilization, callus induction, and regeneration steps, a reliable and effective protocol is established to facilitate switchgrass engineering.« less

  15. Development of a simplified and standardized protocol with potential for high-throughput for sperm cryopreservation in zebrafish Danio rerio

    PubMed Central

    Yang, Huiping; Jones, Carrie; Varga, Zoltan M.; Tiersch, Terrence R.

    2009-01-01

    Sperm cryopreservation offers potential for long-term storage of genetic resources. However, the current protocols for zebrafish Danio rerio are cumbersome and poorly reproducible. Our objective was to facilitate adoption of cryopreservation by streamlining methods from sperm collection through thawing and use. First, sperm activation was evaluated, and motility was completely inhibited when osmolality of the extender was ≥ 295 to 300 mOsmol/kg. To evaluate cryoprotectant toxicity, sperm were incubated with dimethyl sulfoxide (DMSO), N, N-dimethyl acetamide (DMA), methanol, or glycerol at 5, 10, and 15% concentrations. Based on motility, DMSO, DMA, and methanol (≤ 10%) were less toxic; therefore, sperm were cryopreserved using these cryoprotectants at cooling rates of 10 and 20 °C/min. The highest motility (mean ± SD) (35 ± 23%; P ≤ 0.0001) and fertility (13 ± 8%; P ≤ 0.001) in thawed sperm were obtained with the combination of 8% methanol and a cooling rate of 10 °C/min. Further evaluations of 8% methanol and 10 °C/min were performed with males from populations with high (2.05 ± 0.24) and low (1.18 ± 0.12) body condition (P = 0.0001). Motility of thawed sperm from the two populations was 38 ± 16% and 78 ± 10% (P = 0.0001), and fertilization was 6 ± 6% and 33 ± 20% (P = 0.0001). These values were positively related with body condition factor. Overall, this study simplified and standardized sperm cryopreservation, and established a protocol using French straws as a freezing container and an extender without powdered milk. This protocol can be readily adapted for high-throughput application using automated equipment, and motility and fertility comparable to previous reports were obtained. Male variability and sperm quality remain important considerations for future work, especially in mutant and inbred lines. PMID:17544099

  16. Evaluation of parameters affecting switchgrass tissue culture: toward a consolidated procedure for Agrobacterium-mediated transformation of switchgrass (Panicum virgatum)

    DOE PAGES

    Lin, Chien-Yuan; Donohoe, Bryon S.; Ahuja, Neha; ...

    2017-12-19

    Switchgrass (Panicum virgatum), a robust perennial C4-type grass, has been evaluated and designated as a model bioenergy crop by the U.S. DOE and USDA. Conventional breeding of switchgrass biomass is difficult because it displays self-incompatible hindrance. Therefore, direct genetic modifications of switchgrass have been considered the more effective approach to tailor switchgrass with traits of interest. Successful transformations have demonstrated increased biomass yields, reduction in the recalcitrance of cell walls and enhanced saccharification efficiency. Several tissue culture protocols have been previously described to produce transgenic switchgrass lines using different nutrient-based media, co-cultivation approaches, and antibiotic strengths for selection. After evaluatingmore » the published protocols, we consolidated these approaches and optimized the process to develop a more efficient protocol for producing transgenic switchgrass. First, seed sterilization was optimized, which led to a 20% increase in yield of induced calluses. Second, we have selected a N 6 macronutrient/B 5 micronutrient (NB)-based medium for callus induction from mature seeds of the Alamo cultivar, and chose a Murashige and Skoog-based medium to regenerate both Type I and Type II calluses. Third, Agrobacterium-mediated transformation was adopted that resulted in 50-100% positive regenerated transformants after three rounds (2 weeks/round) of selection with antibiotic. Genomic DNA PCR, RT-PCR, Southern blot, visualization of the red fluorescent protein and histochemical β-glucuronidase (GUS) staining were conducted to confirm the positive switchgrass transformants. The optimized methods developed here provide an improved strategy to promote the production and selection of callus and generation of transgenic switchgrass lines. The process for switchgrass transformation has been evaluated and consolidated to devise an improved approach for transgenic switchgrass production. With the optimization of seed sterilization, callus induction, and regeneration steps, a reliable and effective protocol is established to facilitate switchgrass engineering.« less

  17. Breaking Megrelishvili protocol using matrix diagonalization

    NASA Astrophysics Data System (ADS)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  18. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    PubMed Central

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols. PMID:22163775

  19. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  20. Dynamic Hierarchical Energy-Efficient Method Based on Combinatorial Optimization for Wireless Sensor Networks

    PubMed Central

    Tang, Hongying; Cheng, Yongbo; Zhao, Qin; Li, Baoqing; Yuan, Xiaobing

    2017-01-01

    Routing protocols based on topology control are significantly important for improving network longevity in wireless sensor networks (WSNs). Traditionally, some WSN routing protocols distribute uneven network traffic load to sensor nodes, which is not optimal for improving network longevity. Differently to conventional WSN routing protocols, we propose a dynamic hierarchical protocol based on combinatorial optimization (DHCO) to balance energy consumption of sensor nodes and to improve WSN longevity. For each sensor node, the DHCO algorithm obtains the optimal route by establishing a feasible routing set instead of selecting the cluster head or the next hop node. The process of obtaining the optimal route can be formulated as a combinatorial optimization problem. Specifically, the DHCO algorithm is carried out by the following procedures. It employs a hierarchy-based connection mechanism to construct a hierarchical network structure in which each sensor node is assigned to a special hierarchical subset; it utilizes the combinatorial optimization theory to establish the feasible routing set for each sensor node, and takes advantage of the maximum–minimum criterion to obtain their optimal routes to the base station. Various results of simulation experiments show effectiveness and superiority of the DHCO algorithm in comparison with state-of-the-art WSN routing algorithms, including low-energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering (HEED), genetic protocol-based self-organizing network clustering (GASONeC), and double cost function-based routing (DCFR) algorithms. PMID:28753962

  1. Cryopreservation: a cold look at technology for fertility preservation.

    PubMed

    Gosden, Roger

    2011-08-01

    To outline the history of cryopreservation technology and its contributions to reproductive medicine, including fertility preservation. A search of the relevant literature using Medline and other online tools. Research and laboratory protocol development. The biology of preserving cells at low temperatures is complex and still being unraveled. Principles were first established more than half a century ago, with progress being driven empirically and often by trial and error. The protocols vary widely, and practice is still heavily dependent on operator skill, accounting for wide differences in the success rates between centers. No single protocol fits all specimen types, and differential vulnerability to cryoinjury remains a major obstacle. Nevertheless, semen cryopreservation has long been established, embryo banking is now highly effective, and vitrification appears to overcome problems with oocytes. Protocols in the future, although specific to the cell type and tissue, are likely to evolve toward generally acknowledged standards. But heterogeneity between patients and even within samples implies that each cell may have its own peculiar optimum for minimizing cryoinjury; because protocols are therefore compromises, "perfect" preservation may be unattainable. Cryopreservation has become a mainstay in the assisted reproduction laboratory and underpins fertility preservation for patients with cancer and other conditions. The practice is currently evolving from slow freezing methods toward more vitrification, and future technology is likely to reduce dependence on operator skill, which should raise success rates to higher, more uniform levels. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  2. Direct identification of bacteria from charcoal-containing blood culture bottles using matrix-assisted laser desorption/ionisation time-of-flight mass spectrometry.

    PubMed

    Wüppenhorst, N; Consoir, C; Lörch, D; Schneider, C

    2012-10-01

    Several protocols for direct matrix-assisted laser desorption/ionisation time-of-flight mass spectrometry (MALDI-TOF MS) from positive blood cultures are currently used to speed up the diagnostic process of bacteraemia. Identification rates are high and results are accurate for the BACTEC™ system and for charcoal-free bottles. Only a few studies have evaluated protocols for charcoal-containing BacT/ALERT bottles reaching substantially lower identification rates. We established a new protocol for sample preparation from aerobic and anaerobic positive charcoal-containing BacT/ALERT blood culture bottles and measured the protein profiles (n = 167). Then, we integrated this protocol in the routine workflow of our laboratory (n = 212). During the establishment of our protocol, 74.3 % of bacteria were correctly identified to the species level, in 23.4 %, no result and in 2.4 %, a false identification were obtained. Reliable criteria for correct species identification were a score value ≥1.400 and a best match on rank 1-3 of the same species. Identification rates during routine workflow were 77.8 % for correct identification, 20.8 % for not identified samples and 1.4 % for discordant identification. In conclusion, our results indicate that MALDI-TOF MS is possible, even from charcoal-containing blood cultures. Reliable criteria for correct species identification are a score value ≥1.400 and a best match on rank 1-3 of a single species.

  3. Evaluation of a discharge education protocol for pediatric patients with gastrostomy tubes.

    PubMed

    Schweitzer, Michelle; Aucoin, Julia; Docherty, Sharron L; Rice, Henry E; Thompson, Julie; Sullivan, Dori Taylor

    2014-01-01

    To evaluate the impact of a preprocedure education protocol for children who receive a gastrostomy tube (GT). A preintervention-postintervention design, using surveys and comparison between preprotocol and postprotocol cohorts, was used to evaluate the effect of implementation of a standardized GT education protocol with 26 subjects on caregiver, patient, and provider outcomes. The use of a preprocedure education protocol resulted in improved patient outcomes and increased caregiver knowledge and confidence and was considered a positive change by the providers. Often education is a forgotten part of a medical procedure, and the importance of education is typically only recognized after an adverse event occurs. Establishing a standardized evidence-based education protocol for GT care improves overall care and satisfaction. Use of a systematic and family-centered interdisciplinary approach markedly improves patient care. Copyright © 2014 National Association of Pediatric Nurse Practitioners. Published by Mosby, Inc. All rights reserved.

  4. Electroporation of cells using EM induction of ac fields by a magnetic stimulator

    NASA Astrophysics Data System (ADS)

    Chen, C.; Evans, J. A.; Robinson, M. P.; Smye, S. W.; O'Toole, P.

    2010-02-01

    This paper describes a method of effectively electroporating mammalian cell membranes with pulsed alternating-current (ac) electric fields at field strengths of 30-160 kV m-1. Although many in vivo electroporation protocols entail applying square wave or monotonically decreasing pulses via needles or electrode plates, relatively few have explored the use of pulsed ac fields. Following our previous study, which established the effectiveness of ac fields for electroporating cell membranes, a primary/secondary coil system was constructed to produce sufficiently strong electric fields by electromagnetic induction. The primary coil was formed from the applicator of an established transcranial magnetic stimulation (TMS) system, while the secondary coil was a purpose-built device of a design which could eventually be implanted into tissue. The effects of field strength, pulse interval and cumulative exposure time were investigated using microscopy and flow cytometry. Results from experiments on concentrated cell suspensions showed an optimized electroporation efficiency of around 50%, demonstrating that electroporation can be practicably achieved by inducing such pulsed ac fields. This finding confirms the possibility of a wide range of in vivo applications based on magnetically coupled ac electroporation.

  5. Will parents participate in and comply with programs and regimens using xylitol for preventing acute otitis media in their children?

    PubMed

    Danhauer, Jeffrey L; Johnson, Carole E; Baker, Jason A; Ryu, Jung A; Smith, Rachel A; Umeda, Claire J

    2015-04-01

    Antiadhesive properties in xylitol, a natural sugar alcohol, can help prevent acute otitis media (AOM) in children by inhibiting harmful bacteria from colonizing and adhering to oral and nasopharyngeal areas and traveling to the Eustachian tube and middle ear. This study investigated parents' willingness to use and comply with a regimen of xylitol for preventing AOM in their preschool- and kindergarten-aged children. An Internet questionnaire was designed and administered to parents of young children in preschool and kindergarten settings. Most parents were unaware of xylitol's use for AOM and would not likely comply with regimens for preventing AOM in their children; however, parents having previous knowledge of xylitol and whose children had a history of AOM would be more likely to do so. Generally, most of these parents did not know about xylitol and probably would not use it to prevent ear infections. Unfortunately, these results parallel earlier findings for teachers and schools, which present obstacles for establishing ear infection prevention programs using similar protocols for young children. The results showed that considerable education and age-appropriate vehicles for administering xylitol are needed before establishing AOM prevention programs in schools and/or at home.

  6. Ovarian responses of dairy buffalo cows to timed artificial insemination protocol, using new or used progesterone devices, during the breeding season (autumn-winter).

    PubMed

    Monteiro, Bruno Moura; de Souza, Diego Cavalcante; Vasconcellos, Guilherme Souza Floriano Machado; Corrêa, Thalita Bueno; Vecchio, Domenico; de Sá Filho, Manoel Francisco; de Carvalho, Nelcio Antonio Tonizza; Baruselli, Pietro Sampaio

    2016-01-01

    This study evaluated the effect of new or used P4 devices on the ovarian responses of dairy buffalo that were administered an estradiol (E2) plus progesterone (P4)-based timed artificial insemination (TAI) protocol during the breeding season. On the first day of the TAI protocol, 142 cows were randomly assigned to receive one of the following: a new device (New; 1.0 g of P4; n = 48); a device that had previously been used for 9 days (Used1x, n = 47); or a device that had previously been used for 18 days (Used2x, n = 47). Ultrasound was used to evaluate the following: the presence of a corpus luteum (CL); the diameter of the dominant follicle (ØDF) during protocol; ovulatory response; and pregnancies per AI (P/AI). Despite similar responses among the treatments, there was a significant positive association of the ØDF during TAI protocol with ovulatory responses and number of pregnancies. In conclusion, satisfactory ovarian responses and a satisfactory pregnancy rate were achieved when grazing dairy buffalo were subjected to the TAI protocol in breeding season, independent of whether a new or used P4 device was used. Furthermore, the presence of the larger follicle was associated with a higher ovulation rate and higher P/AI following TAI. © 2015 Japanese Society of Animal Science.

  7. Session Initiation Protocol Network Encryption Device Plain Text Domain Discovery Service

    DTIC Science & Technology

    2007-12-07

    MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION / AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a...such as the TACLANE, have developed unique discovery methods to establish Plain Text Domain (PTD) Security Associations (SA). All of these techniques...can include network and host Internet Protocol (IP) addresses, Information System Security Office (ISSO) point of contact information and PTD status

  8. Assessment of Protocol Designed to Detect Endocine Disrupting Effects of Flutamide in Xenopus Tropicalis

    DTIC Science & Technology

    2006-01-01

    Environmental Protection Agency (USEPA) Endocrine Disruptor Screening and Testing Program. The frogs were exposed to the model anti- androgenic...the study were to develop a protocol that could be used for a standard U.S. EPA testing procedure in the Endocrine Disruptor Screening and Testing...compounds. As a consequence of this requirement, the USEPA established an Endocrine Disruptor Screening and Testing Advisory Committee (EDSTAC

  9. Extending IPsec for Efficient Remote Attestation

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Schulz, Steffen

    When establishing a VPN to connect different sites of a network, the integrity of the involved VPN endpoints is often a major security concern. Based on the Trusted Platform Module (TPM), available in many computing platforms today, remote attestation mechanisms can be used to evaluate the internal state of remote endpoints automatically. However, existing protocols and extensions are either unsuited for use with IPsec or impose considerable additional implementation complexity and protocol overhead.

  10. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  11. Older drivers: On-road and off-road test results.

    PubMed

    Selander, Helena; Lee, Hoe C; Johansson, Kurt; Falkmer, Torbjörn

    2011-07-01

    Eighty-five volunteer drivers, 65-85 years old, without cognitive impairments impacting on their driving were examined, in order to investigate driving errors characteristic for older drivers. In addition, any relationships between cognitive off-road and on-road tests results, the latter being the gold standard, were identified. Performance measurements included Trail Making Test (TMT), Nordic Stroke Driver Screening Assessment (NorSDSA), Useful Field of View (UFOV), self-rating driving performance and the two on-road protocols P-Drive and ROA. Some of the older drivers displayed questionable driving behaviour. In total, 21% of the participants failed the on-road assessment. Some of the specific errors were more serious than others. The most common driving errors embraced speed; exceeding the speed limit or not controlling the speed. Correlations with the P-Drive protocol were established for NorSDSA total score (weak), UFOV subtest 2 (weak), and UFOV subtest 3 (moderate). Correlations with the ROA protocol were established for UFOV subtest 2 (weak) and UFOV subtest 3 (weak). P-Drive and self ratings correlated weakly, whereas no correlation between self ratings and the ROA protocol was found. The results suggest that specific problems or errors seen in an older person's driving can actually be "normal driving behaviours". Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Brazilian version of the Protocole Montréal d'Evaluation de la Communication (Protocole MEC): normative and reliability data.

    PubMed

    Fonseca, Rochele Paz; Joanette, Yves; Côté, Hélène; Ska, Bernadette; Giroux, Francine; Fachel, Jandyra Maria Guimarães; Damasceno Ferreira, Gabriela; Parente, Maria Alice de Mattos Pimenta

    2008-11-01

    The lack of standardized instruments to evaluate communication disorders related to the right hemisphere was verified. A new evaluation tool was developed: Protocole Montréal d'Evaluation de la Communication--Protocole MEC, adapted to Brazilian Portuguese--Bateria Montreal de Avaliação da Comunicação--Bateria MAC (Montreal Evaluation of Communication Battery). The purpose was to present stratified normative data by age and educational level, and to verify the reliability parameters of the MEC Battery. 300 individuals, between the ages of 19 and 75 years, and levels of formal education between 2 and 35 years, participated in this study. They were divided equally into six normative groups, according to three age categories (young adults, intermediary age, and seniors) and two educational levels (low and high). Two procedures were used to check reliability: Cronbach alpha and reliability between evaluators, Results were established at the 10th percentile, and an alert point per task for each normative group. Cronbach's alpha was, in general, between .70 and .90 and the average rate of agreement between evaluators varied from .62 to .94. Standards of age and education were established. The reliability of this instrument was verified. The psychometric legitimization of the MEC Battery will contribute to the diagnostic process for communicative disorders.

  13. METHOD FOR MICRORNA ISOLATION FROM CLINICAL SERUM SAMPLES

    PubMed Central

    Li, Yu; Kowdley, Kris V.

    2012-01-01

    MicroRNAs are a group of intracellular non-coding RNA molecules that have been implicated in a variety of human diseases. Due to their high stability in blood, microRNAs released into circulation could be potentially utilized as non-invasive biomarkers for diagnosis or prognosis. Current microRNA isolation protocols are specifically designed for solid tissues and are impractical for biomarker development utilizing small-volume serum samples on a large scale. Thus, a protocol for microRNA isolation from serum is needed to accommodate these conditions in biomarker development. To establish such a protocol, we developed a simplified approach to normalize sample input by using single synthetic spike-in microRNA. We evaluated three commonly used commercial microRNA isolation kits for the best performance by comparing RNA quality and yield. The manufacturer’s protocol was further modified to improve the microRNA yield from 200 μL of human serum. MicroRNAs isolated from a large set of clinical serum samples were tested on the miRCURY LNA real-time PCR panel and confirmed to be suitable for high-throughput microRNA profiling. In conclusion, we have established a proven method for microRNA isolation from clinical serum samples suitable for microRNA biomarker development. PMID:22982505

  14. Thermodynamic equilibrium solubility measurements in simulated fluids by 96-well plate method in early drug discovery.

    PubMed

    Bharate, Sonali S; Vishwakarma, Ram A

    2015-04-01

    An early prediction of solubility in physiological media (PBS, SGF and SIF) is useful to predict qualitatively bioavailability and absorption of lead candidates. Despite of the availability of multiple solubility estimation methods, none of the reported method involves simplified fixed protocol for diverse set of compounds. Therefore, a simple and medium-throughput solubility estimation protocol is highly desirable during lead optimization stage. The present work introduces a rapid method for assessment of thermodynamic equilibrium solubility of compounds in aqueous media using 96-well microplate. The developed protocol is straightforward to set up and takes advantage of the sensitivity of UV spectroscopy. The compound, in stock solution in methanol, is introduced in microgram quantities into microplate wells followed by drying at an ambient temperature. Microplates were shaken upon addition of test media and the supernatant was analyzed by UV method. A plot of absorbance versus concentration of a sample provides saturation point, which is thermodynamic equilibrium solubility of a sample. The established protocol was validated using a large panel of commercially available drugs and with conventional miniaturized shake flask method (r(2)>0.84). Additionally, the statistically significant QSPR models were established using experimental solubility values of 52 compounds. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Technical Note: Independent component analysis for quality assurance in functional MRI.

    PubMed

    Astrakas, Loukas G; Kallistis, Nikolaos S; Kalef-Ezra, John A

    2016-02-01

    Independent component analysis (ICA) is an established method of analyzing human functional MRI (fMRI) data. Here, an ICA-based fMRI quality control (QC) tool was developed and used. ICA-based fMRI QC tool to be used with a commercial phantom was developed. In an attempt to assess the performance of the tool relative to preexisting alternative tools, it was used seven weeks before and eight weeks after repair of a faulty gradient amplifier of a non-state-of-the-art MRI unit. More specifically, its performance was compared with the AAPM 100 acceptance testing and quality assurance protocol and two fMRI QC protocols, proposed by Freidman et al. ["Report on a multicenter fMRI quality assurance protocol," J. Magn. Reson. Imaging 23, 827-839 (2006)] and Stocker et al. ["Automated quality assurance routines for fMRI data applied to a multicenter study," Hum. Brain Mapp. 25, 237-246 (2005)], respectively. The easily developed and applied ICA-based QC protocol provided fMRI QC indices and maps equally sensitive to fMRI instabilities with the indices and maps of other established protocols. The ICA fMRI QC indices were highly correlated with indices of other fMRI QC protocols and in some cases theoretically related to them. Three or four independent components with slow varying time series are detected under normal conditions. ICA applied on phantom measurements is an easy and efficient tool for fMRI QC. Additionally, it can protect against misinterpretations of artifact components as human brain activations. Evaluating fMRI QC indices in the central region of a phantom is not always the optimal choice.

  16. Dry needling in a manual physiotherapy and therapeutic exercise protocol for patients with chronic mechanical shoulder pain of unspecific origin: a protocol for a randomized control trial.

    PubMed

    Tejera-Falcón, Emma; Toledo-Martel, Nuria Del Carmen; Sosa-Medina, Francisco Manuel; Santana-González, Fátima; Quintana-de la Fe, Miriam Del Pino; Gallego-Izquierdo, Tomás; Pecos-Martín, Daniel

    2017-09-18

    Shoulder pain of musculoskeletal origin is the main cause of upper limb pain of non-traumatic origin. Despite being one of the most common reasons for consultation, there is no established protocol for treatment due to the complexity of its etiology. However, it has been shown that the presence of myofascial trigger points on the shoulder muscles is a common condition associated with patients suffering from shoulder pain. This protocol has been created which describes the design of a randomized controlled trial to evaluate the effectiveness of the inclusion of dry needling (DN) within a protocol of manual physiotherapy and therapeutic exercise in the treatment of chronic shoulder pain of unspecific origin. Thirty-six participants aged 18-65 years will be recruited having mechanical chronic shoulder pain on unspecific origin and meeting the inclusion criteria. These will be randomized to one of two interventions, (i) DN, manual physiotherapy and therapeutic exercise or (ii) sham DN, manual physiotherapy and therapeutic exercise. The protocol will cover 6 weeks of treatment, with a 6-month follow-up. Our main outcome measure will be the Visual Analogue Scale for pain. This is the first study to combine the use of DN, manual physiotherapy and an exercise program with a 6-month follow-up, thus becoming a new contribution to the treatment of chronic shoulder pain, while new lines of research may be established to help determine the effects of DN on chronic shoulder pain and the frequency and proper dosage. International Standard Randomized Controlled Trial Number Register: ISRCTN30604244 ( http://www.controlled-trials.com ) 29 June 2016.

  17. Numerical approach for unstructured quantum key distribution

    PubMed Central

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-01-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739

  18. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  19. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

    PubMed Central

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654

  20. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    PubMed

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  1. Continued Development of Internet Protocols under the IBM OS/MVS Operating System

    DTIC Science & Technology

    1985-01-25

    developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP

  2. Problematic protocols: An overview of medical research protocols not approved by the LUMC medical ethics review committee.

    PubMed

    Tersmette, Derek Gideon; Engberts, Dirk Peter

    2017-01-01

    The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.

  3. Daily accumulation rates of marine debris on sub-Antarctic island beaches.

    PubMed

    Eriksson, Cecilia; Burton, Harry; Fitch, Stuart; Schulz, Martin; van den Hoff, John

    2013-01-15

    The worlds' oceans contain a large but unknown amount of plastic debris. We made daily collections of marine debris stranded at two sub-Antarctic islands to establish (a) physical causes of strandings, and (b) a sampling protocol to better estimate the oceans' plastic loading. Accumulation rates at some beaches were dependent on tide and onshore winds. Most of the 6389 items collected were plastic (Macquarie 95%, Heard 94%) and discarded or lost fishing gear comprised 22% of those plastic items. Stalked barnacles (Lepas spp.) were a regular attachment on Macquarie debris but not at Heard Island. The daily accumulation rate of plastic debris on Macquarie Island was an order of magnitude higher than that estimated from monthly surveys during the same 4 months in the previous 5 years. This finding suggests that estimates of the oceans' plastic loading are an order of magnitude too low. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Human embryonic stem cell research: implications from an ethical and legal standpoint.

    PubMed

    Trepagnier, D M

    2000-12-01

    The purpose of this paper is to discuss the ethical and legal implications of one of the newest and most controversial medical breakthroughs. Stem cell research has been performed on mice for many years, but human embryonic stem cells are believed by scientists to be the basis for possible treatments and/or cures to many diseases affecting millions of people around the world. In order to perform research on human embryonic stem cells, numerous ethical issues must be addressed. Guidelines and protocols can be established in order to allow scientists to pursue new medical advances while maintaining the highest ethical standards in the use of human embryos. An alternative to using embryos is adult stem cells which have recently proven to be more versatile than previously believed. Opposing views will always be encountered when facing new science technologies. Where should the ethical line be drawn?

  5. Influence of chemotherapy for lymphoma in canine parvovirus DNA distribution and specific humoral immunity.

    PubMed

    Elias, M A; Duarte, A; Nunes, T; Lourenço, A M; Braz, B S; Vicente, G; Henriques, J; Tavares, L

    2014-12-01

    In man, the combination of cancer and its treatment increases patients' susceptibility to opportunistic infections, due to immune system impairment. In veterinary medicine little information is available concerning this issue. In order to evaluate if a similar dysfunction is induced in small animals undergoing chemotherapy, we assessed the complete blood count, leukocytic, plasma and fecal canine parvovirus (CPV) viral load, and anti-CPV protective antibody titers, in dogs with lymphoma treated with CHOP (cyclophosphamide, doxorubicin, vincristine and prednisolone) protocol, before and during chemotherapy. There was no evidence of decreased immune response, either at admission or after two chemotherapy cycles, indicating that the previously established immunity against CPV was not significantly impaired, supporting the idea that immunosuppression as a result of hematopoietic neoplasms and their treatment in dogs requires further investigation and conclusions cannot be extrapolated from human literature. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Significant Weakening of Brewer-Dobson Circulation Trends Over the 21st Century as a Consequence of the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Polvani, Lorenzo M.; Abalos, Marta; Garcia, Rolando; Kinnison, Doug; Randel, William J.

    2018-01-01

    It is well established that increasing greenhouse gases, notably CO2, will cause an acceleration of the stratospheric Brewer-Dobson circulation (BDC) by the end of this century. We here present compelling new evidence that ozone depleting substances are also key drivers of BDC trends. We do so by analyzing and contrasting small ensembles of "single-forcing" integrations with a stratosphere resolving atmospheric model with interactive chemistry, coupled to fully interactive ocean, land, and sea ice components. First, confirming previous work, we show that increasing concentrations of ozone depleting substances have contributed a large fraction of the BDC trends in the late twentieth century. Second, we show that the phasing out of ozone depleting substances in coming decades—as a consequence of the Montreal Protocol—will cause a considerable reduction in BDC trends until the ozone hole is completely healed, toward the end of the 21st century.

  7. Identification and Application of Plasmids Suitable for Transfer of Foreign DNA to Members of the Genus Gordonia

    PubMed Central

    Arenskötter, Matthias; Baumeister, Dirk; Kalscheuer, Rainer; Steinbüchel, Alexander

    2003-01-01

    Gene transfer systems for Gordonia polyisoprenivorans strains VH2 and Y2K based on electroporation and conjugation, respectively, were established. Several parameters were optimized, resulting in transformation efficiencies of >4 × 105 CFU/μg of plasmid DNA. In contrast to most previously described electroporation protocols, the highest efficiencies were obtained by applying a heat shock after the intrinsic electroporation. Under these conditions, transfer and autonomous replication of plasmid pNC9503 was also demonstrated to proceed in G. alkanivorans DSM44187, G. nitida DSM44499T, G. rubropertincta DSM43197T, G. rubropertincta DSM46038, and G. terrae DSM43249T. Conjugational plasmid DNA transfer to G. polyisoprenivorans resulted in transfer frequencies of up to 5 × 10−6 of the recipient cells. Recombinant strains capable of polyhydroxyalkanoate synthesis from alkanes were constructed. PMID:12902293

  8. Concise and diversity-oriented synthesis of ligand arm-functionalized azoamides.

    PubMed

    Urankar, Damijana; Kosmrlj, Janez

    2008-01-01

    Azoamides, previously established as bioactive intracellular GSH-depleting agents, were decorated with a terminal alkyne moiety to 4 and then were transformed, by copper(I)-catalyzed azide-alkyne cycloaddition (CuAAC), into different ligand-arm functionalized azoamides 6. Azides 5 having ligand-arms amenable for binding to platinum(II) were selected for this study. Because, for the fragile azoamides 4, the typically employed reaction conditions for CuAAC failed, several alternative solvents and copper catalysts were tested. Excellent results were obtained with copper(II) sulfate pentahydrate/metallic copper and especially with heterogeneous catalysts, such as copper-in-charcoal, cupric oxide, and cuprous oxide. The heterogeneous catalysts were employed to obtain the desired products in almost quantitative yields by a simple three-step "stir-filter-evaporate" protocol with no or negligible contamination with copper impurities. This is of particular importance because compounds 6 have been designed for coordination.

  9. Solitary Rectal Ulcer Syndrome: A Paediatric Case Report

    PubMed Central

    Abreu, Marlene; Azevedo Alves, Raquel; Pinto, João; Campos, Miguel; Aroso, Sofia

    2017-01-01

    Introduction Solitary rectal ulcer syndrome (SRUS) is an uncommon benign rectal disease. Mostly young adults are affected, and it is rare in paediatric populations. Clinical Case We present a 12-year-old girl with a 6-month history of tenesmus, frequent defaecation, and bloody stools with mucus. There was no previous history of constipation or other symptoms. At the first visit, physical examination and routine laboratory test results were normal. A stool examination for bacteria and parasites was negative. Colonoscopy revealed a single ulcer in the distal rectum 6 cm from the anal margin. SRUS was confirmed by biopsy. Despite conservative measures, the symptoms persisted. A defaecation proctography showed a small rectocele with no rectal mucosal prolapse. Because of its proximity to the anal sphincter, no surgical intervention was performed. Conclusion The present case illustrates how difficult the management of SRUS is. Multicentre studies are needed to establish treatment protocols for children. PMID:28848799

  10. Dynamic signatures of the transition from stacking disordered to hexagonal ice: Dielectric and nuclear magnetic resonance studies

    NASA Astrophysics Data System (ADS)

    Gainaru, C.; Vynokur, E.; Köster, K. W.; Fuentes-Landete, V.; Spettel, N.; Zollner, J.; Loerting, T.; Böhmer, R.

    2018-04-01

    Using various temperature-cycling protocols, the dynamics of ice I were studied via dielectric spectroscopy and nuclear magnetic resonance relaxometry on protonated and deuterated samples obtained by heating high-density amorphous ices as well as crystalline ice XII. Previous structural studies of ice I established that at temperatures of about 230 K, the stacking disorder of the cubic/hexagonal oxygen lattice vanishes. The present dielectric and nuclear magnetic resonance investigations of spectral changes disclose that the memory of the existence of a precursor phase is preserved in the hydrogen matrix up to 270 K. This finding of hydrogen mobility lower than that of the undoped hexagonal ice near the melting point highlights the importance of dynamical investigations of the transitions between various ice phases and sheds new light on the dynamics in ice I in general.

  11. Understanding protocol performance: impact of test performance.

    PubMed

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as more tests are added to the protocol, greater test variation indicates using fewer tests in the protocol. American Academy of Audiology.

  12. Establishment of integrated protocols for automated high throughput kinetic chlorophyll fluorescence analyses.

    PubMed

    Tschiersch, Henning; Junker, Astrid; Meyer, Rhonda C; Altmann, Thomas

    2017-01-01

    Automated plant phenotyping has been established as a powerful new tool in studying plant growth, development and response to various types of biotic or abiotic stressors. Respective facilities mainly apply non-invasive imaging based methods, which enable the continuous quantification of the dynamics of plant growth and physiology during developmental progression. However, especially for plants of larger size, integrative, automated and high throughput measurements of complex physiological parameters such as photosystem II efficiency determined through kinetic chlorophyll fluorescence analysis remain a challenge. We present the technical installations and the establishment of experimental procedures that allow the integrated high throughput imaging of all commonly determined PSII parameters for small and large plants using kinetic chlorophyll fluorescence imaging systems (FluorCam, PSI) integrated into automated phenotyping facilities (Scanalyzer, LemnaTec). Besides determination of the maximum PSII efficiency, we focused on implementation of high throughput amenable protocols recording PSII operating efficiency (Φ PSII ). Using the presented setup, this parameter is shown to be reproducibly measured in differently sized plants despite the corresponding variation in distance between plants and light source that caused small differences in incident light intensity. Values of Φ PSII obtained with the automated chlorophyll fluorescence imaging setup correlated very well with conventionally determined data using a spot-measuring chlorophyll fluorometer. The established high throughput operating protocols enable the screening of up to 1080 small and 184 large plants per hour, respectively. The application of the implemented high throughput protocols is demonstrated in screening experiments performed with large Arabidopsis and maize populations assessing natural variation in PSII efficiency. The incorporation of imaging systems suitable for kinetic chlorophyll fluorescence analysis leads to a substantial extension of the feature spectrum to be assessed in the presented high throughput automated plant phenotyping platforms, thus enabling the simultaneous assessment of plant architectural and biomass-related traits and their relations to physiological features such as PSII operating efficiency. The implemented high throughput protocols are applicable to a broad spectrum of model and crop plants of different sizes (up to 1.80 m height) and architectures. The deeper understanding of the relation of plant architecture, biomass formation and photosynthetic efficiency has a great potential with respect to crop and yield improvement strategies.

  13. Optimization of protocol design: a path to efficient, lower cost clinical trial execution

    PubMed Central

    Malikova, Marina A

    2016-01-01

    Managing clinical trials requires strategic planning and efficient execution. In order to achieve a timely delivery of important clinical trials’ outcomes, it is useful to establish standardized trial management guidelines and develop robust scoring methodology for evaluation of study protocol complexity. This review will explore the challenges clinical teams face in developing protocols to ensure that the right patients are enrolled and the right data are collected to demonstrate that a drug is safe and efficacious, while managing study costs and study complexity based on proposed comprehensive scoring model. Key factors to consider when developing protocols and techniques to minimize complexity will be discussed. A methodology to identify processes at planning phase, approaches to increase fiscal return and mitigate fiscal compliance risk for clinical trials will be addressed. PMID:28031939

  14. Large scale study of multiple-molecule queries

    PubMed Central

    2009-01-01

    Background In ligand-based screening, as well as in other chemoinformatics applications, one seeks to effectively search large repositories of molecules in order to retrieve molecules that are similar typically to a single molecule lead. However, in some case, multiple molecules from the same family are available to seed the query and search for other members of the same family. Multiple-molecule query methods have been less studied than single-molecule query methods. Furthermore, the previous studies have relied on proprietary data and sometimes have not used proper cross-validation methods to assess the results. In contrast, here we develop and compare multiple-molecule query methods using several large publicly available data sets and background. We also create a framework based on a strict cross-validation protocol to allow unbiased benchmarking for direct comparison in future studies across several performance metrics. Results Fourteen different multiple-molecule query methods were defined and benchmarked using: (1) 41 publicly available data sets of related molecules with similar biological activity; and (2) publicly available background data sets consisting of up to 175,000 molecules randomly extracted from the ChemDB database and other sources. Eight of the fourteen methods were parameter free, and six of them fit one or two free parameters to the data using a careful cross-validation protocol. All the methods were assessed and compared for their ability to retrieve members of the same family against the background data set by using several performance metrics including the Area Under the Accumulation Curve (AUAC), Area Under the Curve (AUC), F1-measure, and BEDROC metrics. Consistent with the previous literature, the best parameter-free methods are the MAX-SIM and MIN-RANK methods, which score a molecule to a family by the maximum similarity, or minimum ranking, obtained across the family. One new parameterized method introduced in this study and two previously defined methods, the Exponential Tanimoto Discriminant (ETD), the Tanimoto Power Discriminant (TPD), and the Binary Kernel Discriminant (BKD), outperform most other methods but are more complex, requiring one or two parameters to be fit to the data. Conclusion Fourteen methods for multiple-molecule querying of chemical databases, including novel methods, (ETD) and (TPD), are validated using publicly available data sets, standard cross-validation protocols, and established metrics. The best results are obtained with ETD, TPD, BKD, MAX-SIM, and MIN-RANK. These results can be replicated and compared with the results of future studies using data freely downloadable from http://cdb.ics.uci.edu/. PMID:20298525

  15. Establishment of a protocol for the gene expression analysis of laser microdissected rat kidney samples with affymetrix genechips

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stemmer, Kerstin; Ellinger-Ziegelbauer, Heidrun; Lotz, Kerstin

    2006-11-15

    Laser microdissection in conjunction with microarray technology allows selective isolation and analysis of specific cell populations, e.g., preneoplastic renal lesions. To date, only limited information is available on sample preparation and preservation techniques that result in both optimal histomorphological preservation of sections and high-quality RNA for microarray analysis. Furthermore, amplification of minute amounts of RNA from microdissected renal samples allowing analysis with genechips has only scantily been addressed to date. The objective of this study was therefore to establish a reliable and reproducible protocol for laser microdissection in conjunction with microarray technology using kidney tissue from Eker rats p.o. treatedmore » for 7 days and 6 months with 10 and 1 mg Aristolochic acid/kg bw, respectively. Kidney tissues were preserved in RNAlater or snap frozen. Cryosections were cut and stained with either H and E or cresyl violet for subsequent morphological and RNA quality assessment and laser microdissection. RNA quality was comparable in snap frozen and RNAlater-preserved samples, however, the histomorphological preservation of renal sections was much better following cryopreservation. Moreover, the different staining techniques in combination with sample processing time at room temperature can have an influence on RNA quality. Different RNA amplification protocols were shown to have an impact on gene expression profiles as demonstrated with Affymetrix Rat Genome 230{sub 2}.0 arrays. Considering all the parameters analyzed in this study, a protocol for RNA isolation from laser microdissected samples with subsequent Affymetrix chip hybridization was established that was also successfully applied to preneoplastic lesions laser microdissected from Aristolochic acid-treated rats.« less

  16. A rapid infusion protocol is safe for total dose iron polymaltose: time for change.

    PubMed

    Garg, M; Morrison, G; Friedman, A; Lau, A; Lau, D; Gibson, P R

    2011-07-01

    Intravenous correction of iron deficiency by total dose iron polymaltose is inexpensive and safe, but current protocols entail prolonged administration over more than 4 h. This results in reduced patient acceptance, and hospital resource strain. We aimed to assess prospectively the safety of a rapid intravenous protocol and compare this with historical controls. Consecutive patients in whom intravenous iron replacement was indicated were invited to have up to 1.5 g iron polymaltose by a 58-min infusion protocol after an initial 15-min test dose without pre-medication. Infusion-related adverse events (AE) and delayed AE over the ensuing 5 days were also prospectively documented and graded as mild, moderate or severe. One hundred patients, 63 female, mean age 54 (range 18-85) years were studied. Thirty-four infusion-related AE to iron polymaltose occurred in a total of 24 patients--25 mild, 8 moderate and 1 severe; higher than previously reported for a slow protocol iron infusion. Thirty-one delayed AE occurred in 26 patients--26 mild, 3 moderate and 2 severe; similar to previously reported. All but five patients reported they would prefer iron replacement through the rapid protocol again. The presence of inflammatory bowel disease (IBD) predicted infusion-related reactions (54% vs 14% without IBD, P < 0.001) and the serum C-reactive protein was higher in those with reactions (P = 0.043). Iron polymaltose can be successfully administered using a rapid total dose infusion protocol and was well accepted by patients. It offers significant cost, resource utilization and time benefits for the patient and hospital system. © 2011 The Authors. Internal Medicine Journal © 2011 Royal Australasian College of Physicians.

  17. Blind quantum computation with identity authentication

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong

    2018-04-01

    Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.

  18. Quantum private comparison protocol based on the entanglement swapping between χ ^+ state and W-Class state

    NASA Astrophysics Data System (ADS)

    Xu, Ling; Zhao, Zhiwen

    2017-12-01

    Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.

  19. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  20. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    PubMed

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P < 0.05). The total duration of antibiotic use decreased significantly from 80.7 ± 17.6 h (mean ± SD) in the control group to 55.5 ± 14.9 h in the protocol group (P < 0.05). Similarly, introduction of the protocol significantly decreased the total antibiotic dose used in the perioperative period (P < 0.05). Furthermore, antibiotic regimens were changed under suspicion of infection in 5 of 30 control group patients, whereas none of the protocol group patients required this additional change in the antibiotic regimen (P < 0.05). Our novel antibiotic prophylaxis protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.

  1. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    PubMed

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  2. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  5. Discrimination of Native-like States of Membrane Proteins with Implicit Membrane-based Scoring Functions.

    PubMed

    Dutagaci, Bercem; Wittayanarakul, Kitiyaporn; Mori, Takaharu; Feig, Michael

    2017-06-13

    A scoring protocol based on implicit membrane-based scoring functions and a new protocol for optimizing the positioning of proteins inside the membrane was evaluated for its capacity to discriminate native-like states from misfolded decoys. A decoy set previously established by the Baker lab (Proteins: Struct., Funct., Genet. 2006, 62, 1010-1025) was used along with a second set that was generated to cover higher resolution models. The Implicit Membrane Model 1 (IMM1), IMM1 model with CHARMM 36 parameters (IMM1-p36), generalized Born with simple switching (GBSW), and heterogeneous dielectric generalized Born versions 2 (HDGBv2) and 3 (HDGBv3) were tested along with the new HDGB van der Waals (HDGBvdW) model that adds implicit van der Waals contributions to the solvation free energy. For comparison, scores were also calculated with the distance-scaled finite ideal-gas reference (DFIRE) scoring function. Z-scores for native state discrimination, energy vs root-mean-square deviation (RMSD) correlations, and the ability to select the most native-like structures as top-scoring decoys were evaluated to assess the performance of the scoring functions. Ranking of the decoys in the Baker set that were relatively far from the native state was challenging and dominated largely by packing interactions that were captured best by DFIRE with less benefit of the implicit membrane-based models. Accounting for the membrane environment was much more important in the second decoy set where especially the HDGB-based scoring functions performed very well in ranking decoys and providing significant correlations between scores and RMSD, which shows promise for improving membrane protein structure prediction and refinement applications. The new membrane structure scoring protocol was implemented in the MEMScore web server ( http://feiglab.org/memscore ).

  6. The Role of Plasma and Urine Metabolomics in Identifying New Biomarkers in Severe Newborn Asphyxia: A Study of Asphyxiated Newborn Pigs following Cardiopulmonary Resuscitation

    PubMed Central

    Sachse, Daniel; Solevåg, Anne Lee; Berg, Jens Petter; Nakstad, Britt

    2016-01-01

    Background Optimizing resuscitation is important to prevent morbidity and mortality from perinatal asphyxia. The metabolism of cells and tissues is severely disturbed during asphyxia and resuscitation, and metabolomic analyses provide a snapshot of many small molecular weight metabolites in body fluids or tissues. In this study metabolomics profiles were studied in newborn pigs that were asphyxiated and resuscitated using different protocols to identify biomarkers for subject characterization, intervention effects and possibly prognosis. Methods A total of 125 newborn Noroc pigs were anesthetized, mechanically ventilated and inflicted progressive asphyxia until asystole. Pigs were randomized to resuscitation with a FiO2 0.21 or 1.0, different duration of ventilation before initiation of chest compressions (CC), and different CC to ventilation ratios. Plasma and urine samples were obtained at baseline, and 2 h and 4 h after return of spontaneous circulation (ROSC, heart rate > = 100 bpm). Metabolomics profiles of the samples were analyzed by nuclear magnetic resonance spectroscopy. Results Plasma and urine showed severe metabolic alterations consistent with hypoxia and acidosis 2 h and 4 h after ROSC. Baseline plasma hypoxanthine and lipoprotein concentrations were inversely correlated to the duration of hypoxia sustained before asystole occurred, but there was no evidence for a differential metabolic response to the different resuscitation protocols or in terms of survival. Conclusions Metabolic profiles of asphyxiated newborn pigs showed severe metabolic alterations. Consistent with previously published reports, we found no evidence of differences between established and alternative resuscitation protocols. Lactate and pyruvate may have a prognostic value, but have to be independently confirmed. PMID:27529347

  7. Cloning, overexpression, and purification of glucose-6-phosphate dehydrogenase of Pseudomonas aeruginosa.

    PubMed

    Acero-Navarro, Kevin E; Jiménez-Ramírez, Mariella; Villalobos, Miguel A; Vargas-Martínez, Rocío; Perales-Vela, Hugo V; Velasco-García, Roberto

    2018-02-01

    Glucose-6-phosphate dehydrogenase (G6PDH) (EC 1.1.1.363) plays an important role in the human pathogen Pseudomonas aeruginosa because it generates NADPH, an essential cofactor for several biosynthetic pathways and antioxidant enzymes. P. aeruginosa G6PDH is also a key enzyme in the metabolism of various carbon sources, such as glucose, glycerol, fructose, and mannitol. Understanding the kinetic characteristics and mechanisms that control the activity of this enzyme is crucial for future studies in this context. However, one of the impediments to achieving this goal is the limited amount of protein obtained when current purification protocols are implemented, a factor curtailing its biochemical characterization. In this study, we report a fast, efficient and reproducible procedure for the purification of P. aeruginosa G6PDH that can be implemented in a short period (2 days). In order to establish this protocol, the zwf gene, which encodes for this enzyme, was cloned and overexpressed in Escherichia coli cells. In contrast to other procedures, our method is based on protein precipitation with CaCl 2 and further purification by ion exchange chromatography. Using this protocol, we were able to obtain 31 mg/L of pure protein that manifested specific activity of 145.7 U/mg. The recombinant enzyme obtained in this study manifested similar physicochemical and kinetic properties to those reported in previous works for this molecule. The large quantities of active enzyme obtained using this procedure will facilitate its structural characterization and identify differences between P. aeruginosa- and human G6PDH, thus contributing to the search for selective inhibitors against the bacterial enzyme. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. [Parameters of phoniatric examination of solo vocalists].

    PubMed

    Mitrović, Slobodan; Jović, Rajko; Aleksić, Vesna; Cvejić, Biserka

    2002-01-01

    A phoniatrist analyzes the professional's voice at the beginning of his vocal studies or career but also later, in cases of voice disorder. Phoniatric examination of professional singers must be done according to "all inclusive" protocols of examination. Such protocols must establish the status of basic elements of phonatory system: activator, generator and resonator of voice and articulatory space. All patients requiring phoniatric examination no matter if they are candidates for professional singers, need to provide anamnestic data about their previous problems regarding voice or singing. This examination is necessary and it must include: examination of nose, cavum oris, pharynx, ears and larynx. This analysis is based on evaluation of physiological and pathophysiological manifestations of voice. Determination of musical voice range during phoniatric examination does not intend to make any classification of voice, nor to suggest to vocal teacher what he should count upon from future singers. Musical range can be determined only by a phoniatrist skilled in music or with musical training, but first of all vocal teacher. These methods are used for examination of phonatory function, or laryngeal pathology. They are not invasive and give objective and quantitative information. They include: laryngostroboscopy, spectral analysis of voice (sonography) and fundamental parameters of voice signal (computer program). Articulation is very important for solo singers, because good articulation contributes to qualitative emission of sound and expression of emotions. Tonal-threshold audiometry is performed as a hearing test. They include rhinomanometry, vital capacity measurements, maximal phonation time and phonation quotient. Phoniatric examination is a necessary proceeding which must be performed before admission to the academy of solo singing, and then during singers' education and career. The phoniatric protocol must include a minimal number of parameters, which can be increased if required. All parameters of phoniatric examination must be adequately evaluated by experts.

  9. Residual energy level based clustering routing protocol for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Yuan, Xu; Zhong, Fangming; Chen, Zhikui; Yang, Deli

    2015-12-01

    The wireless sensor networks, which nodes prone to premature death, with unbalanced energy consumption and a short life time, influenced the promotion and application of this technology in internet of things in agriculture. This paper proposes a clustering routing protocol based on the residual energy level (RELCP). RELCP includes three stages: the selection of cluster head, establishment of cluster and data transmission. RELCP considers the remaining energy level and distance to base station, while election of cluster head nodes and data transmitting. Simulation results demonstrate that the protocol can efficiently balance the energy dissipation of all nodes, and prolong the network lifetime.

  10. Chapter 4- Fertility preservation in women with breast cancer

    PubMed Central

    Rodriguez-Wallberg, Kenny A.; Oktay, Kutluk

    2010-01-01

    Fertility preservation is an important issue for young women diagnosed with breast cancer. The most well-established options for fertility preservation in cancer patients, embryo and oocyte cryopreservation, have not been traditionally offered to breast cancer patients as estradiol rise during standard stimulation protocols may not be safe for those patients. Potentially safer stimulation protocols using tamoxifen and aromatase inhibitors induce lower levels of estradiol while similar results in terms of number of oocyte and embryo obtained to standard protocols. Cryopreservation of immature oocytes and ovarian cortical tissue, both still experimental methods, are also fertility preservation options for breast cancer patients. PMID:21048442

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. PyPele Rewritten To Use MPI

    NASA Technical Reports Server (NTRS)

    Hockney, George; Lee, Seungwon

    2008-01-01

    A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.

  13. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference

    PubMed Central

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale. PMID:28243453

  14. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference.

    PubMed

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale .

  15. Protocols and characterization data for 2D, 3D, and slice-based tumor models from the PREDECT project.

    PubMed

    de Hoogt, Ronald; Estrada, Marta F; Vidic, Suzana; Davies, Emma J; Osswald, Annika; Barbier, Michael; Santo, Vítor E; Gjerde, Kjersti; van Zoggel, Hanneke J A A; Blom, Sami; Dong, Meng; Närhi, Katja; Boghaert, Erwin; Brito, Catarina; Chong, Yolanda; Sommergruber, Wolfgang; van der Kuip, Heiko; van Weerden, Wytske M; Verschuren, Emmy W; Hickman, John; Graeser, Ralph

    2017-11-21

    Two-dimensional (2D) culture of cancer cells in vitro does not recapitulate the three-dimensional (3D) architecture, heterogeneity and complexity of human tumors. More representative models are required that better reflect key aspects of tumor biology. These are essential studies of cancer biology and immunology as well as for target validation and drug discovery. The Innovative Medicines Initiative (IMI) consortium PREDECT (www.predect.eu) characterized in vitro models of three solid tumor types with the goal to capture elements of tumor complexity and heterogeneity. 2D culture and 3D mono- and stromal co-cultures of increasing complexity, and precision-cut tumor slice models were established. Robust protocols for the generation of these platforms are described. Tissue microarrays were prepared from all the models, permitting immunohistochemical analysis of individual cells, capturing heterogeneity. 3D cultures were also characterized using image analysis. Detailed step-by-step protocols, exemplary datasets from the 2D, 3D, and slice models, and refined analytical methods were established and are presented.

  16. Protocols and characterization data for 2D, 3D, and slice-based tumor models from the PREDECT project

    PubMed Central

    de Hoogt, Ronald; Estrada, Marta F.; Vidic, Suzana; Davies, Emma J.; Osswald, Annika; Barbier, Michael; Santo, Vítor E.; Gjerde, Kjersti; van Zoggel, Hanneke J. A. A.; Blom, Sami; Dong, Meng; Närhi, Katja; Boghaert, Erwin; Brito, Catarina; Chong, Yolanda; Sommergruber, Wolfgang; van der Kuip, Heiko; van Weerden, Wytske M.; Verschuren, Emmy W.; Hickman, John; Graeser, Ralph

    2017-01-01

    Two-dimensional (2D) culture of cancer cells in vitro does not recapitulate the three-dimensional (3D) architecture, heterogeneity and complexity of human tumors. More representative models are required that better reflect key aspects of tumor biology. These are essential studies of cancer biology and immunology as well as for target validation and drug discovery. The Innovative Medicines Initiative (IMI) consortium PREDECT (www.predect.eu) characterized in vitro models of three solid tumor types with the goal to capture elements of tumor complexity and heterogeneity. 2D culture and 3D mono- and stromal co-cultures of increasing complexity, and precision-cut tumor slice models were established. Robust protocols for the generation of these platforms are described. Tissue microarrays were prepared from all the models, permitting immunohistochemical analysis of individual cells, capturing heterogeneity. 3D cultures were also characterized using image analysis. Detailed step-by-step protocols, exemplary datasets from the 2D, 3D, and slice models, and refined analytical methods were established and are presented. PMID:29160867

  17. Consensus for second-order multi-agent systems with position sampled data

    NASA Astrophysics Data System (ADS)

    Wang, Rusheng; Gao, Lixin; Chen, Wenhai; Dai, Dameng

    2016-10-01

    In this paper, the consensus problem with position sampled data for second-order multi-agent systems is investigated. The interaction topology among the agents is depicted by a directed graph. The full-order and reduced-order observers with position sampled data are proposed, by which two kinds of sampled data-based consensus protocols are constructed. With the provided sampled protocols, the consensus convergence analysis of a continuous-time multi-agent system is equivalently transformed into that of a discrete-time system. Then, by using matrix theory and a sampled control analysis method, some sufficient and necessary consensus conditions based on the coupling parameters, spectrum of the Laplacian matrix and sampling period are obtained. While the sampling period tends to zero, our established necessary and sufficient conditions are degenerated to the continuous-time protocol case, which are consistent with the existing result for the continuous-time case. Finally, the effectiveness of our established results is illustrated by a simple simulation example. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LY13F030005) and the National Natural Science Foundation of China (Grant No. 61501331).

  18. Database integration of protocol-specific neurological imaging datasets

    PubMed Central

    Pacurar, Emil E.; Sethi, Sean K.; Habib, Charbel; Laze, Marius O.; Martis-Laze, Rachel; Haacke, E. Mark

    2016-01-01

    For many years now, Magnetic Resonance Innovations (MR Innovations), a magnetic resonance imaging (MRI) software development, technology, and research company, has been aggregating a multitude of MRI data from different scanning sites through its collaborations and research contracts. The majority of the data has adhered to neuroimaging protocols developed by our group which has helped ensure its quality and consistency. The protocols involved include the study of: traumatic brain injury, extracranial venous imaging for multiple sclerosis and Parkinson's disease, and stroke. The database has proven invaluable in helping to establish disease biomarkers, validate findings across multiple data sets, develop and refine signal processing algorithms, and establish both public and private research collaborations. Myriad Masters and PhD dissertations have been possible thanks to the availability of this database. As an example of a project that cuts across diseases, we have used the data and specialized software to develop new guidelines for detecting cerebral microbleeds. Ultimately, the database has been vital in our ability to provide tools and information for researchers and radiologists in diagnosing their patients, and we encourage collaborations and welcome sharing of similar data in this database. PMID:25959660

  19. Management of Hyperglycemia and Enteral Nutrition in the Hospitalized Patient.

    PubMed

    Davidson, Patricia; Kwiatkowski, Cynthia Ann; Wien, Michelle

    2015-10-01

    There has been increased attention on the importance of identifying and distinguishing the differences between stress-induced hyperglycemia (SH), newly diagnosed hyperglycemia (NDH), and hyperglycemia in persons with established diabetes mellitus (DM). Inpatient blood glucose control is now being recognized as not only a cost issue for hospitals but also a concern for patient safety and care. The reasons for the increased incidence of hyperglycemia in hospitalized patients include preexisting DM, undiagnosed DM or prediabetes, SH, and medication-induced hyperglycemia with resulting transient blood glucose variability. It is clear that identifying and documenting hyperglycemia in hospitalized patients with and without a previous diagnosis of DM and initiating prompt insulin treatment are important. Agreement on the optimum treatment goals for hyperglycemia remains quite controversial, and the benefits of intensive glucose management may be lost at the cost of hypoglycemia in intensive care unit patients. Nutrition support in the form of enteral nutrition (EN) increases the risk of hyperglycemia in both critical and non-critically ill hospitalized patients. Reasons for beginning a tube feeding are the same whether a person has NDH or DM. What differs is how to incorporate EN into the established insulin management protocols. The risk for hyperglycemia with the addition of EN is even higher in those without a previous diagnosis of DM. This review discusses the incidence of hyperglycemia, the pathogenesis of hyperglycemia, factors contributing to hyperglycemia in the hospitalized patient, glycemic management goals, current glycemic management recommendations, and considerations for EN formula selection, administration, and treatment. © 2015 American Society for Parenteral and Enteral Nutrition.

  20. User-Centered Design of Serious Games for Older Adults Following 3 Years of Experience With Exergames for Seniors: A Study Design.

    PubMed

    Brox, Ellen; Konstantinidis, Stathis Th; Evertsen, Gunn

    2017-01-11

    Seniors need sufficient balance and strength to manage in daily life, and sufficient physical activity is required to achieve and maintain these abilities. This can be a challenge, but fun and motivational exergames can be of help. However, most commercial games are not suited for this age group for several reasons. Many usability studies and user-centered design (UCD) protocols have been developed and applied, but to the best of our knowledge none of them are focusing on seniors' use of games for physical activity. In GameUp, a European cofunded project, some prototype Kinect exergames to enhance the mobility of seniors were developed in a user-centered approach. In this paper we aim to record lessons learned in 3 years of experience with exergames for seniors, considering both the needs of older adults regarding user-centered development of exergames and participation in UCD. We also provide a UCD protocol for exergames tailored to senior needs. An initial UCD protocol was formed based on literature of previous research outcomes. Senior users participated in UCD following the initial protocol. The users formed a steady group that met every second week for 3 years to play exergames and participate in the UCD during the 4 phases of the protocol. Several methods were applied in the 4 different phases of the UCD protocol; the most important methods were structured and semistructured interviews, observations, and group discussions. A total of 16 seniors with an average age above 80 years participated for 3 years in UCD in order to develop the GameUp exergames. As a result of the lessons learned by applying the different methodologies of the UCD protocol, we propose an adjusted UCD protocol providing explanations on how it should be applied for seniors as users. Questionnaires should be turned into semistructured and structured interviews while user consultation sessions should be repeated with the same theme to ensure that the UCD methods produce a valid outcome. By first following the initial and gradually the adjusted UCD protocol, the project resulted in exergame functionalities and interface features for seniors. The main lessons learned during 3 years of experience with exergames for seniors applying UCD are that devoting time to seniors is a key element of success so that trust can be gained, communication can be established, and users' opinions can be recorded. All different game elements should be taken into consideration during the design of exergames for seniors even if they seem obvious. Despite the limitations of this study, one might argue that it provides a best practice guide to the development of serious games for physical activity targeting seniors. ©Ellen Brox, Stathis Th Konstantinidis, Gunn Evertsen. Originally published in JMIR Serious Games (http://games.jmir.org), 11.01.2017.

  1. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  2. A dyadic protocol for training complex skills: a replication using female participants.

    PubMed

    Sanchez-Ku, M L; Arthur, W

    2000-01-01

    The effectiveness and efficiency of the active interlocked modeling (AIM) dyadic protocol in training complex skills has been extensively demonstrated. However, past evaluation studies have all used male participants exclusively. Consequently, the present study investigated the generalizability of the effectiveness and efficiency gains to women. We randomly assigned 108 female participants to either the AIM-dyad condition or a standard individual control training condition. The results supported the robustness and viability of the AIM protocol. Although their overall performance was lower than that obtained for men in previous studies, women trained in the AIM-dyad condition performed as well as those trained in the individual condition. Thus, the efficiency gains associated with the AIM-dyad protocol, which result from the ability to train two people simultaneously to reach the same performance level as a single person with no increase in training time or machine cost, are generalizable to female participants. The applied and basic research implications of the present study are discussed within the context of well-documented male/female differences in the performance of complex psychomotor tasks. For instance, given the number of women entering the workforce and the significant proportion of women in professions previously deemed to be male-dominated (e.g., air navigation), it is reassuring to know that sex differences in task performance do not necessarily imply sex differences in the effectiveness of training protocols.

  3. Secure and Efficient Network Fault Localization

    DTIC Science & Technology

    2012-02-27

    ORGANIZATION NAME(S) AND ADDRESS (ES) Carnegie Mellon University,School of Computer Science,Computer Science Department,Pittsburgh,PA,15213 8. PERFORMING...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT...efficiency than previously known protocols for fault localization. Our proposed fault localization protocols also address the security threats that

  4. Evaluation of a Sexual Assault Risk Reduction and Self-Defense Program: A Prospective Analysis of a Revised Protocol

    ERIC Educational Resources Information Center

    Orchowski, Lindsay M.; Gidycz, Christine A.; Raffle, Holly

    2008-01-01

    The current study extends the development and evaluation of an existing and previously evaluated sexual assault risk reduction program with a self-defense component for college women (N = 300). The program protocol was revised to address psychological barriers to responding assertively to risky dating situations, and a placebo-control group was…

  5. Improved cryoEM-Guided Iterative Molecular Dynamics–Rosetta Protein Structure Refinement Protocol for High Precision Protein Structure Prediction

    PubMed Central

    2016-01-01

    Many excellent methods exist that incorporate cryo-electron microscopy (cryoEM) data to constrain computational protein structure prediction and refinement. Previously, it was shown that iteration of two such orthogonal sampling and scoring methods – Rosetta and molecular dynamics (MD) simulations – facilitated exploration of conformational space in principle. Here, we go beyond a proof-of-concept study and address significant remaining limitations of the iterative MD–Rosetta protein structure refinement protocol. Specifically, all parts of the iterative refinement protocol are now guided by medium-resolution cryoEM density maps, and previous knowledge about the native structure of the protein is no longer necessary. Models are identified solely based on score or simulation time. All four benchmark proteins showed substantial improvement through three rounds of the iterative refinement protocol. The best-scoring final models of two proteins had sub-Ångstrom RMSD to the native structure over residues in secondary structure elements. Molecular dynamics was most efficient in refining secondary structure elements and was thus highly complementary to the Rosetta refinement which is most powerful in refining side chains and loop regions. PMID:25883538

  6. Level of adherence to an extravasation protocol over 10 years in a tertiary care hospital.

    PubMed

    Molas-Ferrer, Gloria; Farré-Ayuso, Elisabet; doPazo-Oubiña, Fernando; deAndrés-Lázaro, Ana; Guell-Picazo, Jaume; Borrás-Maixenchs, Núria; Corominas-Bosch, Lourdes; Valverde-Bosch, Montserrat; Creus-Baró, Natalia

    2015-04-01

    Extravasation of chemotherapy is an undesirable complication related to the administration of antineoplastic therapy. Establishing the real incidence is difficult. Because of the importance of a quick intervention after an extravasation, every hospital should have an extravasation protocol. The purpose of this study was to determine the degree of observance of an extravasation protocol by nursing staff and to determine extravasation incidence. This descriptive, longitudinal, retrospective study was set in a tertiary-level hospital. The researchers reviewed 117 extravasation notification forms received by the pharmacy department during a 10-year period. Nursing actuation, particularly observance of the extravasation protocol, was analyzed. Protocol adherence was 89%. Twelve deviations from the protocol in the application of recommended measures were detected. An antidote was used in 41 patients, and temperature measures were applied in 14 cases. Ninety-nine patients had at least one episode of reported follow-up. No cases of necrosis or skin ulcers were described, except by one patient, who developed a delayed skin ulcer to vinorelbine. Drugs most frequently reported were etoposide, carboplatin, and paclitaxel. Nursing staff should be continuously trained in extravasation protocol because a rapid actuation can prevent skin lesions.

  7. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    NASA Astrophysics Data System (ADS)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  8. Scoring System for the Management of Acute Gallstone Pancreatitis: Cost Analysis of a Prospective Study.

    PubMed

    Prigoff, Jake G; Swain, Gary W; Divino, Celia M

    2016-05-01

    Predicting the presence of a persistent common bile duct (CBD) stone is a difficult and expensive task. The aim of this study is to determine if a previously described protocol-based scoring system is a cost-effective strategy. The protocol includes all patients with gallstone pancreatitis and stratifies them based on laboratory values and imaging to high, medium, and low likelihood of persistent stones. The patient's stratification then dictates the next course of management. A decision analytic model was developed to compare the costs for patients who followed the protocol versus those that did not. Clinical data model inputs were obtained from a prospective study conducted at The Mount Sinai Medical Center to validate the protocol from Oct 2009 to May 2013. The study included all patients presenting with gallstone pancreatitis regardless of disease severity. Seventy-three patients followed the proposed protocol and 32 did not. The protocol group cost an average of $14,962/patient and the non-protocol group cost $17,138/patient for procedural costs. Mean length of stay for protocol and non-protocol patients was 5.6 and 7.7 days, respectively. The proposed protocol is a cost-effective way to determine the course for patients with gallstone pancreatitis, reducing total procedural costs over 12 %.

  9. Patient doses from CT examinations in Turkey.

    PubMed

    Ataç, Gökçe Kaan; Parmaksız, Aydın; İnal, Tolga; Bulur, Emine; Bulgurlu, Figen; Öncü, Tolga; Gündoğdu, Sadi

    2015-01-01

    We aimed to establish the first diagnostic reference levels (DRLs) for computed tomography (CT) examinations in adult and pediatric patients in Turkey and compare these with international DRLs. CT performance information and examination parameters (for head, chest, high-resolution CT of the chest [HRCT-chest], abdominal, and pelvic protocols) from 1607 hospitals were collected via a survey. Dose length products and effective doses for standard patient sizes were calculated from the reported volume CT dose index (CTDIvol). The median number of protocols reported from the 167 responding hospitals (10% response rate) was 102 across five different age groups. Third quartile CTDIvol values for adult pelvic and all pediatric body protocols were higher than the European Commission standards but were comparable to studies conducted in other countries. The radiation dose indicators for adult patients were similar to those reported in the literature, except for those associated with head protocols. CT protocol optimization is necessary for adult head and pediatric chest, HRCT-chest, abdominal, and pelvic protocols. The findings from this study are recommended for use as national DRLs in Turkey.

  10. The use of a photoionization detector to detect harmful volatile chemicals by emergency personnel

    PubMed Central

    Patel, Neil D; Fales, William D; Farrell, Robert N

    2009-01-01

    Objective The objective of this investigation was to determine if a photoionization detector (PID) could be used to detect the presence of a simulated harmful chemical on simulated casualties of a chemical release. Methods A screening protocol, based on existing radiation screening protocols, was developed for the purposes of the investigation. Three simulated casualties were contaminated with a simulated chemical agent and two groups of emergency responders were involved in the trials. The success–failure ratio of the participants was used to judge the performance of the PID in this application. Results A high success rate was observed when the screening protocol was properly adhered to (97.67%). Conversely, the success rate suffered when participants deviated from the protocol (86.31%). With one exception, all failures were noted to have been the result of a failure to correctly observe the established screening protocol. Conclusions The results of this investigation indicate that the PID may be an effective screening tool for emergency responders. However, additional study is necessary to both confirm the effectiveness of the PID and refine the screening protocol if necessary. PMID:27147829

  11. Refining animal models in fracture research: seeking consensus in optimising both animal welfare and scientific validity for appropriate biomedical use

    PubMed Central

    Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W

    2007-01-01

    Background In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. Methods The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Results & Conclusion Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards. PMID:17678534

  12. Comparison of Bruce treadmill exercise test protocols: is ramped Bruce equal or superior to standard bruce in producing clinically valid studies for patients presenting for evaluation of cardiac ischemia or arrhythmia with body mass index equal to or greater than 30?

    PubMed

    Bires, Angela Macci; Lawson, Dori; Wasser, Thomas E; Raber-Baer, Donna

    2013-12-01

    Clinically valid cardiac evaluation via treadmill stress testing requires patients to achieve specific target heart rates and to successfully complete the cardiac examination. A comparison of the standard Bruce protocol and the ramped Bruce protocol was performed using data collected over a 1-y period from a targeted patient population with a body mass index (BMI) equal to or greater than 30 to determine which treadmill protocol provided more successful examination results. The functional capacity, metabolic equivalent units achieved, pressure rate product, and total time on the treadmill as measured for the obese patients were clinically valid and comparable to normal-weight and overweight patients (P < 0.001). Data gathered from each protocol demonstrated that the usage of the ramped Bruce protocol achieved more consistent results in comparison across all BMI groups in achieving 80%-85% of their age-predicted maximum heart rate. This study did not adequately establish that the ramped Bruce protocol was superior to the standard Bruce protocol for the examination of patients with a BMI equal to or greater than 30.

  13. Decellularized and matured esophageal scaffold for circumferential esophagus replacement: Proof of concept in a pig model.

    PubMed

    Luc, Guillaume; Charles, Guillaume; Gronnier, Caroline; Cabau, Magali; Kalisky, Charlotte; Meulle, Mallory; Bareille, Reine; Roques, Samantha; Couraud, Lionel; Rannou, Johanna; Bordenave, Laurence; Collet, Denis; Durand, Marlène

    2018-08-01

    Surgical resection of the esophagus requires sacrificing a long portion of it. Its replacement by the demanding gastric pull-up or colonic interposition techniques may be avoided by using short biologic scaffolds composed of decellularized matrix (DM). The aim of this study was to prepare, characterize, and assess the in vivo remodeling of DM and its clinical impact in a preclinical model. A dynamic chemical and enzymatic decellularization protocol of porcine esophagus was set up and optimized. The resulting DM was mechanically and biologically characterized by DNA quantification, histology, and histomorphometry techniques. Then, in vitro and in vivo tests were performed, such as DM recellularization with human or porcine adipose-derived stem cells, or porcine stromal vascular fraction, and maturation in rat omentum. Finally, the DM, matured or not, was implanted as a 5-cm-long esophagus substitute in an esophagectomized pig model. The developed protocol for esophageal DM fulfilled previously established criteria of decellularization and resulted in a scaffold that maintained important biologic components and an ultrastructure consistent with a basement membrane complex. In vivo implantation was compatible with life without major clinical complications. The DM's scaffold in vitro characteristics and in vivo implantation showed a pattern of constructive remodeling mimicking major native esophageal characteristics. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Cytomegalovirus pp65 antigenemia-guided pre-emptive treatment with ganciclovir after allogeneic stem transplantation: a single-center experience.

    PubMed

    Manteiga, R; Martino, R; Sureda, A; Labeaga, R; Brunet, S; Sierra, J; Rabella, N

    1998-11-01

    The optimal prophylactic strategy for cytomegalovirus (CMV) disease after allogeneic hematopoietic stem cell transplantation has not yet been established. The aim of this study was to analyze our single-center experience with a uniform protocol of CMV antigenemia-guided pre-emptive treatment with ganciclovir (GCV) after allografting. Fifty-two consecutive adult patients, 48 of them transplanted from HLA-identical matched related donors were included. T cell-depleted marrow or peripheral blood were used in 21 cases. After engraftment, weekly blood samples were tested for CMV pp65 antigenemia and viremia (conventional cultures) until day +100. GCV was started if CMV antigenemia and/or CMV viremia were detected. CMV infection (CMV-I) was found in 19 patients (37%). Seven patients suffered from CMV disease (CMV-D), three colitis and four pneumonias. There was one death directly related to CMV-D and three further cases died from refractory GVHD with CMV-D. Only one patient developed CMV pneumonia without any previous positive antigenemia and/or viremia. Multivariate analysis identified grades II-IV acute GVHD (P = 0.02) and peripheral blood stem cell transplantation (P = 0.03) to be risk factors for developing CMV-I. In conclusion, this monitoring protocol allowed early treatment of CMV-I without progression to CMV-D. Pre-emptive therapy had the additional advantage of avoiding GCV administration in most of our allograft recipients.

  15. The Undiagnosed Diseases Network: Accelerating Discovery about Health and Disease.

    PubMed

    Ramoni, Rachel B; Mulvihill, John J; Adams, David R; Allard, Patrick; Ashley, Euan A; Bernstein, Jonathan A; Gahl, William A; Hamid, Rizwan; Loscalzo, Joseph; McCray, Alexa T; Shashi, Vandana; Tifft, Cynthia J; Wise, Anastasia L

    2017-02-02

    Diagnosis at the edges of our knowledge calls upon clinicians to be data driven, cross-disciplinary, and collaborative in unprecedented ways. Exact disease recognition, an element of the concept of precision in medicine, requires new infrastructure that spans geography, institutional boundaries, and the divide between clinical care and research. The National Institutes of Health (NIH) Common Fund supports the Undiagnosed Diseases Network (UDN) as an exemplar of this model of precise diagnosis. Its goals are to forge a strategy to accelerate the diagnosis of rare or previously unrecognized diseases, to improve recommendations for clinical management, and to advance research, especially into disease mechanisms. The network will achieve these objectives by evaluating patients with undiagnosed diseases, fostering a breadth of expert collaborations, determining best practices for translating the strategy into medical centers nationwide, and sharing findings, data, specimens, and approaches with the scientific and medical communities. Building the UDN has already brought insights to human and medical geneticists. The initial focus has been on data sharing, establishing common protocols for institutional review boards and data sharing, creating protocols for referring and evaluating patients, and providing DNA sequencing, metabolomic analysis, and functional studies in model organisms. By extending this precision diagnostic model nationally, we strive to meld clinical and research objectives, improve patient outcomes, and contribute to medical science. Copyright © 2017 American Society of Human Genetics. All rights reserved.

  16. An evaluation of the use of oral contrast media in abdominopelvic CT.

    PubMed

    Buttigieg, Erica Lauren; Grima, Karen Borg; Cortis, Kelvin; Soler, Sandro Galea; Zarb, Francis

    2014-11-01

    To evaluate the diagnostic efficacy of different oral contrast media (OCM) for abdominopelvic CT examinations performed for follow-up general oncological indications. The objectives were to establish anatomical image quality criteria for abdominopelvic CT; use these criteria to evaluate and compare image quality using positive OCM, neutral OCM and no OCM; and evaluate possible benefits for the medical imaging department. Forty-six adult patients attending a follow-up abdominopelvic CT for general oncological indications and who had a previous abdominopelvic CT with positive OCM (n = 46) were recruited and prospectively placed into either the water (n = 25) or no OCM (n = 21) group. Three radiologists performed absolute visual grading analysis (VGA) to assess image quality by grading the fulfilment of 24 anatomical image quality criteria. Visual grading characteristics (VGC) analysis of the data showed comparable image quality with regards to reproduction of abdominal structures, bowel discrimination, presence of artefacts, and visualization of the amount of intra-abdominal fat for the three OCM protocols. All three OCM protocols provided similar image quality for follow-up abdominopelvic CT for general oncological indications. • Positive oral contrast media are routinely used for abdominopelvic multidetector computed tomography • Experimental study comparing image quality using three different oral contrast materials • Three different oral contrast materials result in comparable CT image quality • Benefits for patients and medical imaging department.

  17. Designing, optimization and validation of tetra-primer ARMS PCR protocol for genotyping mutations in caprine Fec genes

    PubMed Central

    Ahlawat, Sonika; Sharma, Rekha; Maitra, A.; Roy, Manoranjan; Tantia, M.S.

    2014-01-01

    New, quick, and inexpensive methods for genotyping novel caprine Fec gene polymorphisms through tetra-primer ARMS PCR were developed in the present investigation. Single nucleotide polymorphism (SNP) genotyping needs to be attempted to establish association between the identified mutations and traits of economic importance. In the current study, we have successfully genotyped three new SNPs identified in caprine fecundity genes viz. T(-242)C (BMPR1B), G1189A (GDF9) and G735A (BMP15). Tetra-primer ARMS PCR protocol was optimized and validated for these SNPs with short turn-around time and costs. The optimized techniques were tested on 158 random samples of Black Bengal goat breed. Samples with known genotypes for the described genes, previously tested in duplicate using the sequencing methods, were employed for validation of the assay. Upon validation, complete concordance was observed between the tetra-primer ARMS PCR assays and the sequencing results. These results highlight the ability of tetra-primer ARMS PCR in genotyping of mutations in Fec genes. Any associated SNP could be used to accelerate the improvement of goat reproductive traits by identifying high prolific animals at an early stage of life. Our results provide direct evidence that tetra-primer ARMS-PCR is a rapid, reliable, and cost-effective method for SNP genotyping of mutations in caprine Fec genes. PMID:25606428

  18. Network time synchronization servers at the US Naval Observatory

    NASA Technical Reports Server (NTRS)

    Schmidt, Richard E.

    1995-01-01

    Responding to an increased demand for reliable, accurate time on the Internet and Milnet, the U.S. Naval Observatory Time Service has established the network time servers, tick.usno.navy.mil and tock.usno.navy.mil. The system clocks of these HP9000/747i industrial work stations are synchronized to within a few tens of microseconds of USNO Master Clock 2 using VMEbus IRIG-B interfaces. Redundant time code is available from a VMEbus GPS receiver. UTC(USNO) is provided over the network via a number of protocols, including the Network Time Protocol (NTP) (DARPA Network Working Group Report RFC-1305), the Daytime Protocol (RFC-867), and the Time protocol (RFC-868). Access to USNO network time services is presently open and unrestricted. An overview of USNO time services and results of LAN and WAN time synchronization tests will be presented.

  19. Structured Transition Protocol for Children with Cystinosis

    PubMed Central

    Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod

    2017-01-01

    The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE). This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives. PMID:28913329

  20. Comparing Usual Care With a Warfarin Initiation Protocol After Mechanical Heart Valve Replacement.

    PubMed

    Roberts, Gregory; Razooqi, Rasha; Quinn, Stephen

    2017-03-01

    The immediate postoperative warfarin sensitivity for patients receiving heart valve prostheses is increased. Established warfarin initiation protocols may lack clinical applicability, resulting in dosing based on clinical judgment. To compare current practice for warfarin initiation with a known warfarin initiation protocol, with doses proportionally reduced to account for the increased postoperative sensitivity. We compared the Mechanical Heart Valve Warfarin Initiation Protocol (Protocol group) with current practice (clinical judgment-Empirical group) for patients receiving mechanical heart valves in an observational before-and-after format. End points were the time to achieve a stable therapeutic international normalized ratio (INR), doses held in the first 6 days, and overanticoagulation in the first 6 days. The Protocol group (n = 37) achieved a stable INR more rapidly than the Empirical group (n = 77; median times 5.1 and 8.7 days, respectively; P = 0.002). Multivariable analysis indicated that the Protocol group (hazard ratio [HR] = 2.22; P = 0.005) and men (HR = 1.76; P = 0.043) more rapidly achieved a stable therapeutic INR. Age, serum albumin, amiodarone, presence of severe heart failure, and surgery type had no impact. Protocol patients had fewer doses held (1.1% vs 10.1%, P < 0.001) and no difference in overanticoagulation (2.7% vs 9.1%, P = 0.27). The Mechanical Heart Valve Warfarin Initiation Protocol provided a reliable approach to initiating warfarin in patients receiving mechanical aortic or mitral valves.

  1. Protocols for pressure ulcer prevention: are they evidence-based?

    PubMed

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  2. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    PubMed

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, p<0.001. The novel protocol resulted in deeper chest compressions (mean (SD): 58 (12)mm vs. 52 (13)mm, p=0.02) and improved rate of correct hand position (61% vs. 36%, p=0.01) compared with the standard protocol. In both protocols hands-off time was short. The novel protocol improved motivation among rescuers compared with the standard protocol (p=0.002). Participants guided with a standard dispatch protocol performed high quality CPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  4. A protocol for combined Photinus and Renilla luciferase quantification compatible with protein assays.

    PubMed

    Hampf, Mathias; Gossen, Manfred

    2006-09-01

    We established a quantitative reporter gene protocol, the P/Rluc assay system, allowing the sequential measurement of Photinus and Renilla luciferase activities from the same extract. Other than comparable commercial reporter assay systems and their noncommercial counterparts, the P/Rluc assay system was formulated under the aspect of full compatibility with standard methods for protein assays. This feature greatly expands the range of applications for assay systems quantifying the expression of multiple luciferase reporters.

  5. A prototype for forest health monitoring in Indiana state parks

    Treesearch

    Rachel Morse; KaDonna Randolph; John W., Jr. Moser

    2000-01-01

    In 1997, 25 Forest Health Monitoring (FHM) plots were established in two Indiana state parks and a nearby parcel of privately owned land using a new protocol that differs from the systematic grid of the national program. All plots were reassessed in 1998. Data analysis focuses upon establishing baseline conditions for the study sites and providing relevant information...

  6. Research Supporting Satellite Communications Technology

    NASA Technical Reports Server (NTRS)

    Horan Stephen; Lyman, Raphael

    2005-01-01

    This report describes the second year of research effort under the grant Research Supporting Satellite Communications Technology. The research program consists of two major projects: Fault Tolerant Link Establishment and the design of an Auto-Configurable Receiver. The Fault Tolerant Link Establishment protocol is being developed to assist the designers of satellite clusters to manage the inter-satellite communications. During this second year, the basic protocol design was validated with an extensive testing program. After this testing was completed, a channel error model was added to the protocol to permit the effects of channel errors to be measured. This error generation was used to test the effects of channel errors on Heartbeat and Token message passing. The C-language source code for the protocol modules was delivered to Goddard Space Flight Center for integration with the GSFC testbed. The need for a receiver autoconfiguration capability arises when a satellite-to-ground transmission is interrupted due to an unexpected event, the satellite transponder may reset to an unknown state and begin transmitting in a new mode. During Year 2, we completed testing of these algorithms when noise-induced bit errors were introduced. We also developed and tested an algorithm for estimating the data rate, assuming an NRZ-formatted signal corrupted with additive white Gaussian noise, and we took initial steps in integrating both algorithms into the SDR test bed at GSFC.

  7. Effects of Nitrogen and Phosphorus Fertilizer and Topsoil Amendment on Native Plant Cover in Roadside Revegetation Projects

    NASA Astrophysics Data System (ADS)

    Hillhouse, Heidi L.; Schacht, Walter H.; Soper, Jonathan M.; Wienhold, Carol E.

    2018-01-01

    Establishing vegetation on roadsides following construction can be challenging, especially for relatively slow growing native species. Topsoil is generally removed during construction, and the surface soil following construction ("cut-slope soils") is often compacted and low in nutrients, providing poor growing conditions for vegetation. Nebraska Department of Transportation (NDOT) protocols have historically called for nitrogen (N) and phosphorus (P) fertilization when planting roadside vegetation following construction, but these recommendations were developed for cool-season grass plantings and most current plantings use slower-establishing, native warm-season grasses that may benefit less than expected from current planting protocols. We evaluated the effects of nitrogen and phosphorus fertilization, and also topsoil amendment, on the foliar cover of seeded and non-seeded species planted into two post-construction roadside sites in eastern Nebraska. We also examined soil movement to determine how planting protocols and plant growth may affect erosion potential. Three years after planting, we found no consistent effects of N or P fertilization on foliar cover. Plots receiving topsoil amendment had 14% greater cover of warm-season grasses, 10% greater total foliar cover, and 4-13% lower bare ground (depending on site) than plots without topsoil. None of the treatments consistently affected soil movement. We recommend that NDOT change their protocols to remove N and P fertilization and focus on stockpiling and spreading topsoil following construction.

  8. Determination of quantitative retention-activity relationships between pharmacokinetic parameters and biological effectiveness fingerprints of Salvia miltiorrhiza constituents using biopartitioning and microemulsion high-performance liquid chromatography.

    PubMed

    Gao, Haoshi; Huang, Hongzhang; Zheng, Aini; Yu, Nuojun; Li, Ning

    2017-11-01

    In this study, we analyzed danshen (Salvia miltiorrhiza) constituents using biopartitioning and microemulsion high-performance liquid chromatography (MELC). The quantitative retention-activity relationships (QRARs) of the constituents were established to model their pharmacokinetic (PK) parameters and chromatographic retention data, and generate their biological effectiveness fingerprints. A high-performance liquid chromatography (HPLC) method was established to determine the abundance of the extracted danshen constituents, such as sodium danshensu, rosmarinic acid, salvianolic acid B, protocatechuic aldehyde, cryptotanshinone, and tanshinone IIA. And another HPLC protocol was established to determine the abundance of those constituents in rat plasma samples. An experimental model was built in Sprague Dawley (SD) rats, and calculated the corresponding PK parameterst with 3P97 software package. Thirty-five model drugs were selected to test the PK parameter prediction capacities of the various MELC systems and to optimize the chromatographic protocols. QRARs and generated PK fingerprints were established. The test included water/oil-soluble danshen constituents and the prediction capacity of the regression model was validated. The results showed that the model had good predictability. Copyright © 2017. Published by Elsevier B.V.

  9. Use of probability analysis to establish routine bioassay screening levels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carbaugh, E.H.; Sula, M.J.; McFadden, K.M.

    1990-09-01

    Probability analysis was used by the Hanford Internal Dosimetry Program to establish bioassay screening levels for tritium and uranium in urine. Background environmental levels of these two radionuclides are generally detectable by the highly sensitive urine analysis procedures routinely used at Hanford. Establishing screening levels requires balancing the impact of false detection with the consequence of potentially undetectable occupation dose. To establish the screening levels, tritium and uranium analyses were performed on urine samples collected from workers exposed only to environmental sources. All samples were collected at home using a simulated 12-hour protocol for tritium and a simulated 24-hour collectionmore » protocol for uranium. Results of the analyses of these samples were ranked according to tritium concentration or total sample uranium. The cumulative percentile was calculated and plotted using log-probability coordinates. Geometric means and screening levels corresponding to various percentiles were estimated by graphical interpolation and standard calculations. The potentially annual internal dose associated with a screening level was calculated. Screening levels were selected corresponding to the 99.9 percentile, implying that, on the average, 1 out of 1000 samples collected from an unexposed worker population would be expected to exceed the screening level. 4 refs., 2 figs.« less

  10. Unification of quantum information theory

    NASA Astrophysics Data System (ADS)

    Abeyesinghe, Anura

    We present the unification of many previously disparate results in noisy quantum Shannon theory and the unification of all of noiseless quantum Shannon theory. More specifically we deal here with bipartite, unidirectional, and memoryless quantum Shannon theory. We find all the optimal protocols and quantify the relationship between the resources used, both for the one-shot and for the ensemble case, for what is arguably the most fundamental task in quantum information theory: sharing entangled states between a sender and a receiver. We find that all of these protocols are derived from our one-shot superdense coding protocol and relate nicely to each other. We then move on to noisy quantum information theory and give a simple, direct proof of the "mother" protocol, or rather her generalization to the Fully Quantum Slepian-Wolf protocol (FQSW). FQSW simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim, and Winter as well as a new class of distributed compression protocols for correlated quantum sources, which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecessary: all protocols in the family are children of the mother.

  11. Feasible logic Bell-state analysis with linear optics

    PubMed Central

    Zhou, Lan; Sheng, Yu-Bo

    2016-01-01

    We describe a feasible logic Bell-state analysis protocol by employing the logic entanglement to be the robust concatenated Greenberger-Horne-Zeilinger (C-GHZ) state. This protocol only uses polarization beam splitters and half-wave plates, which are available in current experimental technology. We can conveniently identify two of the logic Bell states. This protocol can be easily generalized to the arbitrary C-GHZ state analysis. We can also distinguish two N-logic-qubit C-GHZ states. As the previous theory and experiment both showed that the C-GHZ state has the robustness feature, this logic Bell-state analysis and C-GHZ state analysis may be essential for linear-optical quantum computation protocols whose building blocks are logic-qubit entangled state. PMID:26877208

  12. Feasible logic Bell-state analysis with linear optics.

    PubMed

    Zhou, Lan; Sheng, Yu-Bo

    2016-02-15

    We describe a feasible logic Bell-state analysis protocol by employing the logic entanglement to be the robust concatenated Greenberger-Horne-Zeilinger (C-GHZ) state. This protocol only uses polarization beam splitters and half-wave plates, which are available in current experimental technology. We can conveniently identify two of the logic Bell states. This protocol can be easily generalized to the arbitrary C-GHZ state analysis. We can also distinguish two N-logic-qubit C-GHZ states. As the previous theory and experiment both showed that the C-GHZ state has the robustness feature, this logic Bell-state analysis and C-GHZ state analysis may be essential for linear-optical quantum computation protocols whose building blocks are logic-qubit entangled state.

  13. Security of a semi-quantum protocol where reflections contribute to the secret key

    NASA Astrophysics Data System (ADS)

    Krawec, Walter O.

    2016-05-01

    In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.

  14. Speedy routing recovery protocol for large failure tolerance in wireless sensor networks.

    PubMed

    Lee, Joa-Hyoung; Jung, In-Bum

    2010-01-01

    Wireless sensor networks are expected to play an increasingly important role in data collection in hazardous areas. However, the physical fragility of a sensor node makes reliable routing in hazardous areas a challenging problem. Because several sensor nodes in a hazardous area could be damaged simultaneously, the network should be able to recover routing after node failures over large areas. Many routing protocols take single-node failure recovery into account, but it is difficult for these protocols to recover the routing after large-scale failures. In this paper, we propose a routing protocol, referred to as ARF (Adaptive routing protocol for fast Recovery from large-scale Failure), to recover a network quickly after failures over large areas. ARF detects failures by counting the packet losses from parent nodes, and upon failure detection, it decreases the routing interval to notify the neighbor nodes of the failure. Our experimental results indicate that ARF could provide recovery from large-area failures quickly with less packets and energy consumption than previous protocols.

  15. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  16. A protocol for rheological characterization of hydrogels for tissue engineering strategies.

    PubMed

    Zuidema, Jonathan M; Rivet, Christopher J; Gilbert, Ryan J; Morrison, Faith A

    2014-07-01

    Hydrogels are studied extensively for many tissue engineering applications, and their mechanical properties influence both cellular and tissue compatibility. However, it is difficult to compare the mechanical properties of hydrogels between studies due to a lack of continuity between rheological protocols. This study outlines a straightforward protocol to accurately determine hydrogel equilibrium modulus and gelation time using a series of rheological tests. These protocols are applied to several hydrogel systems used within tissue engineering applications: agarose, collagen, fibrin, Matrigel™, and methylcellulose. The protocol is outlined in four steps: (1) Time sweep to determine the gelation time of the hydrogel. (2) Strain sweep to determine the linear-viscoelastic region of the hydrogel with respect to strain. (3) Frequency sweep to determine the linear equilibrium modulus plateau of the hydrogel. (4) Time sweep with values obtained from strain and frequency sweeps to accurately report the equilibrium moduli and gelation time. Finally, the rheological characterization protocol was evaluated using a composite Matrigel™-methylcellulose hydrogel blend whose mechanical properties were previously unknown. The protocol described herein provides a standardized approach for proper analysis of hydrogel rheological properties. © 2013 Wiley Periodicals, Inc.

  17. Lack of evidence of a beneficial effect of azathioprine in dogs treated with prednisolone for idiopathic immune-mediated hemolytic anemia: a retrospective cohort study.

    PubMed

    Piek, Christine J; van Spil, Willem Evert; Junius, Greet; Dekker, Aldo

    2011-04-13

    Azathioprine is used as an immunosuppressant in canine immune-mediated hemolytic anemia (IMHA), but this potentially toxic and carcinogenic drug has not been proven to be beneficial. The aim of this study was to determine the difference in outcome and survival of dogs with idiopathic IMHA treated with a protocol that included azathioprine and prednisolone versus a protocol that included prednisolone alone. The study included 222 dogs with a hematocrit lower than 0.30 L/L and either a positive Coombs' test or spherocytosis and no evidence of diseases that could trigger IMHA. The clinical and laboratory data at the time of diagnosis and the response to therapy and survival were compared in dogs treated according to the prednisolone and azathioprine protocol (AP protocol; n = 149) and dogs treated according to the prednisolone protocol (P protocol; n = 73). At study entry, the two groups were comparable, except that thrombocyte counts were significantly lower and clinical signs had been present significantly longer in the AP protocol group. No significant difference in survival was found between the two groups: the 1-year survival was 64% (95% CI 54 - 77%) in the P protocol group and 69% (95% CI 59-80%) in the AP protocol group, respectively. Azathioprine would appear not to be beneficial as standard treatment for all cases of IMHA; however, a blinded, randomized clinical trial is needed to establish whether outcome is different with the two treatment protocols.

  18. Shortcomings of protocols of drug trials in relation to sponsorship as identified by Research Ethics Committees: analysis of comments raised during ethical review.

    PubMed

    van Lent, Marlies; Rongen, Gerard A; Out, Henk J

    2014-12-10

    Submission of study protocols to research ethics committees (RECs) constitutes one of the earliest stages at which planned trials are documented in detail. Previous studies have investigated the amendments requested from researchers by RECs, but the type of issues raised during REC review have not been compared by sponsor type. The objective of this study was to identify recurring shortcomings in protocols of drug trials based on REC comments and to assess whether these were more common among industry-sponsored or non-industry trials. Retrospective analysis of 226 protocols of drug trials approved in 2010-2011 by three RECs affiliated to academic medical centres in The Netherlands. For each protocol, information on sponsorship, number of participating centres, participating countries, study phase, registration status of the study drug, and type and number of subjects was retrieved. REC comments were extracted from decision letters sent to investigators after review and were classified using a predefined checklist that was based on legislation and guidelines on clinical drug research and previous literature. Most protocols received comments regarding participant information and consent forms (n = 182, 80.5%), methodology and statistical analyses (n = 160, 70.8%), and supporting documentation, including trial agreements and certificates of insurance (n = 154, 68.1%). Of the submitted protocols, 122 (54.0%) were non-industry and 104 (46.0%) were industry-sponsored trials. Non-industry trials more often received comments on subject selection (n = 44, 36.1%) than industry-sponsored trials (n = 18, 17.3%; RR, 1.58; 95% CI, 1.01 to 2.47), and on methodology and statistical analyses (n = 95, 77.9% versus n = 65, 62.5%, respectively; RR, 1.18; 95% CI, 1.01 to 1.37). Non-industry trials less often received comments on supporting documentation (n = 72, 59.0%) than industry-sponsored trials (n = 82, 78.8%; RR, 0.83; 95% CI, 0.72 to 0.95). RECs identified important ethical and methodological shortcomings in protocols of both industry-sponsored and non-industry drug trials. Investigators, especially of non-industry trials, should better prepare their research protocols in order to facilitate the ethical review process.

  19. A Systematic Review Protocol on the Use of Online Learning versus Blended Learning for Teaching Clinical Skills to Undergraduate Health Professional Students

    ERIC Educational Resources Information Center

    McCutcheon, Karen; Lohan, Maria; Traynor, Marian

    2016-01-01

    Aim: This paper is a review protocol that will be used to identify, critically appraise and synthesise the best current evidence relating to the use of online learning and blended learning approaches in teaching clinical skills in undergraduate health professionals. Background: Although previous systematic reviews on online learning vs. face to…

  20. Intensity-Modulated Radiation Therapy in Treating Younger Patients With Lung Metastases

    ClinicalTrials.gov

    2013-09-23

    Adult Rhabdomyosarcoma; Lung Metastases; Metastatic Ewing Sarcoma/Peripheral Primitive Neuroectodermal Tumor; Previously Treated Childhood Rhabdomyosarcoma; Recurrent Adult Soft Tissue Sarcoma; Recurrent Childhood Rhabdomyosarcoma; Recurrent Ewing Sarcoma/Peripheral Primitive Neuroectodermal Tumor; Recurrent Wilms Tumor and Other Childhood Kidney Tumors; Stage IV Adult Soft Tissue Sarcoma; Stage IV Wilms Tumor; Stage V Wilms Tumor; Unspecified Adult Solid Tumor, Protocol Specific; Unspecified Childhood Solid Tumor, Protocol Specific

  1. How blockchain-timestamped protocols could improve the trustworthiness of medical science

    PubMed Central

    Irving, Greg; Holden, John

    2017-01-01

    Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies. PMID:27239273

  2. Using a CLIPS expert system to automatically manage TCP/IP networks and their components

    NASA Technical Reports Server (NTRS)

    Faul, Ben M.

    1991-01-01

    A expert system that can directly manage networks components on a Transmission Control Protocol/Internet Protocol (TCP/IP) network is described. Previous expert systems for managing networks have focused on managing network faults after they occur. However, this proactive expert system can monitor and control network components in near real time. The ability to directly manage network elements from the C Language Integrated Production System (CLIPS) is accomplished by the integration of the Simple Network Management Protocol (SNMP) and a Abstract Syntax Notation (ASN) parser into the CLIPS artificial intelligence language.

  3. How blockchain-timestamped protocols could improve the trustworthiness of medical science.

    PubMed

    Irving, Greg; Holden, John

    2016-01-01

    Trust in scientific research is diminished by evidence that data are being manipulated. Outcome switching, data dredging and selective publication are some of the problems that undermine the integrity of published research. Methods for using blockchain to provide proof of pre-specified endpoints in clinical trial protocols were first reported by Carlisle. We wished to empirically test such an approach using a clinical trial protocol where outcome switching has previously been reported. Here we confirm the use of blockchain as a low cost, independently verifiable method to audit and confirm the reliability of scientific studies.

  4. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    PubMed

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Extravasation injuries: current medical and surgical treatment.

    PubMed

    Doornaert, M; Monstrey, S; Roche, N

    2013-01-01

    Extravasation is a devastating complication of intravenous therapy that develops when a drug infiltrates the interstitial tissue surrounding the vein. Due to the uncertain and possibly dramatic outcome, early recognition and adequate treatment with the aid of a standardized protocol are needed. A pubmed literature search was conducted and all relevant articles were reviewed for the development of an extravasation treatment protocol. An overview of current treatment guidelines and clinical experience is provided. The extravasation treatment protocol was implied during 1 year in this university hospital with satisfactory outcome. Treatment starts with prevention. In case of an established extravasation injury, early recognition, assessment of severity, and treatment with medical and/or surgical therapies are recommended.

  6. Analysis of Counterfactual Quantum Certificate Authorization

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Li, Yan-Ping; Zhang, Rui-Ling

    2016-12-01

    A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89, 052307 (20)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.

  7. Generation of natural killer cells from hematopoietic stem cells in vitro for immunotherapy

    PubMed Central

    Luevano, Martha; Madrigal, Alejandro; Saudemont, Aurore

    2012-01-01

    Natural killer (NK) cells are part of the innate immune system and are an alluring option for immunotherapy due to their ability to kill infected cells or cancer cells without prior sensitization. Throughout the past 20 years, different groups have been able to reproduce NK cell development in vitro, and NK cell ontogeny studies have provided the basis for the establishment of protocols to produce NK cells in vitro for immunotherapy. Here, we briefly discuss NK cell development and NK cell immunotherapy approaches. We review the factors needed for NK cell differentiation in vitro, which stem cell sources have been used, published protocols, challenges and future directions for Good Manufacturing Practice protocols. PMID:22705914

  8. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    USGS Publications Warehouse

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  9. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  10. Difficulties when assessing birdsong learning programmes under field conditions: a re-evaluation of song repertoire flexibility in the great tit.

    PubMed

    Rivera-Gutierrez, Hector F; Pinxten, Rianne; Eens, Marcel

    2011-01-17

    There is a remarkable diversity of song-learning strategies in songbirds. Establishing whether a species is closed- or open-ended is important to be able to interpret functional and evolutionary consequences of variation in repertoire size. Most of our knowledge regarding the timing of vocal learning is based on laboratory studies, despite the fact that these may not always replicate the complex ecological and social interactions experienced by birds in the wild. Given that field studies cannot provide the experimental control of laboratory studies, it may not be surprising that species such as the great tit that were initially assumed to be closed-ended learners have later been suggested to be open-ended learners. By using an established colour-ringed population, by following a standardized recording protocol, and by taking into account the species' song ecology (using only recordings obtained during peak of singing at dawn), we replicated two previous studies to assess song repertoire learning and flexibility in adult wild great tits elicited by social interactions. First, we performed a playback experiment to test repertoire plasticity elicited by novel versus own songs. Additionally, in a longitudinal study, we followed 30 males in two consecutive years and analysed whether new neighbours influenced any change in the repertoire. Contrary to the previous studies, song repertoire size and composition were found to be highly repeatable both between years and after confrontation with a novel song. Our results suggest that great tits are closed-ended learners and that their song repertoire probably does not change during adulthood. Methodological differences that may have led to an underestimation of the repertoires or population differences may explain the discrepancy in results with previous studies. We argue that a rigorous and standardized assessment of the repertoire is essential when studying age- or playback-induced changes in repertoire size and composition under field conditions.

  11. QKD-based quantum private query without a failure probability

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, QiaoYan

    2015-10-01

    In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.

  12. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  13. Best practices in specialty pharmacy management.

    PubMed

    Patterson, Courtney J

    2013-01-01

    Specialty pharmacy is a growing area of research, utilization, and cost. Because of the unique nature of the diseases treated by specialty pharmaceuticals, such as cancer and rheumatoid arthritis, novel management approaches are needed. Advocate Physician Partners (APP) is an entity within the Advocate Health Care Health System in the Chicago and the central Illinois area. It coordinates the care management and managed care contracting between the Advocate Health Care System and more than 4,000 physicians on the medical staffs of Advocate hospitals. APP has experienced a per-member-per-month (PMPM) increase of less than  3% in oncology intravenous medications spend in 2012. This spend refers to the intravenous medications covered under the medical benefits for APP's health maintenance organization (HMO) population. The spend has consistently been less than national projections, and we believe this is tied to the adoption of several key best practices. Prior to instituting the best practices, the yearly percentage increases for oncology spending were 5.52% (2007 to 2008), 9.39% (2008 to 2009), and 5.29% (2009 to 2010). After instituting best practices during the first quarter of 2011, the increases in PMPM were 3.11% (2010 to 2011) and 2.11% (2011 to 2012), which were below previous years. To describe the best practices of specialty pharmacy management adopted by APP, specifically (a) establishing a content expert and governing bodies, (b) ensuring compliance with policies, and (c) providing educational resources. APP has several key result areas (KRAs). One KRA was compliance with appropriate utilization of intravenous oncology protocols for its HMO population. The protocols for each medication outline the appropriate indication and patient population. These protocols were developed and reviewed by the APP Pharmacy and Technology (PT) committee. The PT-approved indications reflect FDA indications and indications found in national guidelines. The APP KRA target for the utilization of protocols was 80%. The compliance for completing the protocols that correspond to these medications was calculated by tabulating the number of paid claims over the number of completed protocols, resulting in a compliance percentage. APP defined noncompliance as any utilization not outlined in the protocol. Another KRA was physician feedback. APP requires that physicians complete a certain number of continuing medical education (CME) programs provided by APP each year. Feedback from physicians, provided at the end of the CME, were tabulated and utilized for further programs. Additionally, APP strived to increase physician engagement by placing them in key roles that oversaw clinical and business aspects of the organization. In order to meet the KRAs, investigate inappropriate utilization, and become better involved in engaging oncology specialists, APP invested in an oncology clinical pharmacist position. The primary responsibility of the oncology clinical pharmacist was to be a specialty drug resource for the organization with a focus on provider education. The oncology clinical pharmacist was deemed the content expert who developed clinical protocols, educated providers, and encouraged compliance with organizational policies and procedures as it pertained to the KRAs. Since establishing the oncology clinical pharmacist position, APP has seen an increase in protocol compliance. Prior to the institution of this position, the protocol compliance was 62%. In less than 1 year after hiring the oncology clinical pharmacist, the compliance percentage spiked to over 80%. APP has several committees and boards that oversee the clinical and business aspects of the organization. By placing physicians in chairmanship positions of the committees, APP has seen the benefit of handling difficult patient decisions and increased compliance with policies. Lastly, extensive provider education has led to an improved physician satisfaction in the educational initiatives of APP. Greater than 80% of the physicians felt the CME content was relevant to their practices; the content would likely have a positive impact on their practices; and the clinical content was evidence based and accepted by the medical community. By hiring an oncology clinical pharmacist, engaging physicians by placing them in key roles, and providing more specialist-specific education, APP has improved its KRAs and compliance percentages. APP achieved success in containing expenditures for oncology intravenous medications by implementing key best practices combined with traditional management strategies.

  14. Screening protocols for the prevention of occupational noise-induced hearing loss: the role of conventional and extended high frequency audiometry may vary according to the years of employment.

    PubMed

    Riga, Maria; Korres, George; Balatsouras, Dimitrios; Korres, Stavros

    2010-07-01

    Although occupational noise-induced hearing loss (NIHL) has become a major problem in industrialized societies, there is a notable lack of effective screening protocols to ensure its early diagnosis. The aim of this study was to detect a potential role of extended high frequency (EHF) audiometry in industrial hearing screening protocols. The population consisted of 151 persons, working for 8 hours daily in a noisy environment (90-110 dBA). The changes of hearing thresholds in industrial workers were analyzed, not only with respect to their age, as has been presented by previous studies, but also with respect to the duration of their previous employment. During the first 10 years of employment, the frequencies 12500, 14000 and 16000Hz were the only ones significantly affected. For the second decade of employment, thresholds were significantly elevated only at 2000 and 4000Hz. After exceeding 20 years of employment, the affected frequencies were 250, 500 and 1000Hz. The effects of age on hearing acuity were significant at all frequencies for the first 2 groups. EHF audiometry seems able to identify the first signs of NIHL, much earlier than conventional audiometry, and therefore may need to be implemented in the screening examinations especially of workers with less than 1 decade of employment. Hearing screening protocols could become more efficient by adjusting their frequency ranges according to the frequencies "at risk", which correspond to the duration of the workers' previous employment.

  15. Establishment and maintenance of a standardized glioma tissue bank: Huashan experience.

    PubMed

    Aibaidula, Abudumijiti; Lu, Jun-feng; Wu, Jin-song; Zou, He-jian; Chen, Hong; Wang, Yu-qian; Qin, Zhi-yong; Yao, Yu; Gong, Ye; Che, Xiao-ming; Zhong, Ping; Li, Shi-qi; Bao, Wei-min; Mao, Ying; Zhou, Liang-fu

    2015-06-01

    Cerebral glioma is the most common brain tumor as well as one of the top ten malignant tumors in human beings. In spite of the great progress on chemotherapy and radiotherapy as well as the surgery strategies during the past decades, the mortality and morbidity are still high. One of the major challenges is to explore the pathogenesis and invasion of glioma at various "omics" levels (such as proteomics or genomics) and the clinical implications of biomarkers for diagnosis, prognosis or treatment of glioma patients. Establishment of a standardized tissue bank with high quality biospecimens annotated with clinical information is pivotal to the solution of these questions as well as the drug development process and translational research on glioma. Therefore, based on previous experience of tissue banks, standardized protocols for sample collection and storage were developed. We also developed two systems for glioma patient and sample management, a local database for medical records and a local image database for medical images. For future set-up of a regional biobank network in Shanghai, we also founded a centralized database for medical records. Hence we established a standardized glioma tissue bank with sufficient clinical data and medical images in Huashan Hospital. By September, 2013, tissues samples from 1,326 cases were collected. Histological diagnosis revealed that 73 % were astrocytic tumors, 17 % were oligodendroglial tumors, 2 % were oligoastrocytic tumors, 4 % were ependymal tumors and 4 % were other central nervous system neoplasms.

  16. Fungal colonies in open fractures of subseafloor basalt

    NASA Astrophysics Data System (ADS)

    Ivarsson, Magnus; Bengtson, Stefan; Skogby, Henrik; Belivanova, Veneta; Marone, Federica

    2013-08-01

    The deep subseafloor crust is one of the few great frontiers of unknown biology on Earth and, still today, the notion of the deep biosphere is commonly based on the fossil record. Interpretation of palaeobiological information is thus central in the exploration of this hidden biosphere and, for each new discovery, criteria used to establish biogenicity are challenged and need careful consideration. In this paper networks of fossilized filamentous structures are for the first time described in open fractures of subseafloor basalts collected at the Emperor Seamounts, Pacific Ocean. These structures have been investigated with optical microscopy, environmental scanning electron microscope, energy dispersive spectrometer, X-ray powder diffraction as well as synchrotron-radiation X-ray tomographic microscopy, and interpreted as fossilized fungal mycelia. Morphological features such as hyphae, yeast-like growth and sclerotia were observed. The fossilized fungi are mineralized by montmorillonite, a process that probably began while the fungi were alive. It seems plausible that the fungi produced mucilaginous polysaccharides and/or extracellular polymeric substances that attracted minerals or clay particles, resulting in complete fossilization by montmorillonite. The findings are in agreement with previous observations of fossilized fungi in subseafloor basalts and establish fungi as regular inhabitants of such settings. They further show that fossilized microorganisms are not restricted to pore spaces filled by secondary mineralizations but can be found in open pore spaces as well. This challenges standard protocols for establishing biogenicity and calls for extra care in data interpretation.

  17. Osteosarcoma: the European Osteosarcoma Intergroup (EOI) perspective.

    PubMed

    Craft, Alan W

    2009-01-01

    In the late 1970s, there was confusion regarding the best management for osteosarcoma. The benefit of chemotherapy had not been established and which chemotherapy could be used was even more uncertain. The European Osteosarcoma Intergroup (EOI) was established in order to conduct randomised studies to determine the best treatment for this tumour. Their first study 80831 established that a two drug combination of CDDP/DOX was safe and improved the survival rate over previous regimes with suboptimal chemotherapy. The CDDP/DOX was superior to a less intense CDDP/DOX/MTX regime. The second study 80861 compared the CDDP/DOX arm with a multi-drug Rosen-T10 regime. In almost 400 patients, there was the difference in outcome between the two arms. However, adherence to the protocol and completion of allocated treatment was substantially less good in the prolonged 42 week multi-drug regime compared to the two drug arm. The third study 80961 investigated interval compression i.e. if the CDDP/DOX when given every 2 weeks with GCSF superior to the same two drugs given every 3 weeks. There was no difference in survival between the arms, although there was a better histologic response rate in the compressed arm. Three randomised controlled trials on this rare disease have taken more than 20 years to accrue a sufficient sample of patients. The overall outcome has changed little in this time. Large multinational studies are needed to be able to answer these important questions in a timely fashion.

  18. Part 2. Comparison of emergency washing solutions in 70% hydrofluoric acid-burned human skin in an established ex vivo explants model

    PubMed Central

    Burgher, François; Mathieu, Laurence; Lati, Elian; Gasser, Philippe; Peno-Mazzarino, Laurent; Blomet, Joël; Hall, Alan H; Maibach, Howard I

    2011-01-01

    Background: Hydrofluoric acid (HF) is a small and partially dissociated acid (pKa 3.2), able to deeply penetrate into human skin in addition to the corrosiveness of the hydrogen ion (H+) and the toxicity of the fluoride ion (F-). However, there has been a lack of experimental studies to objectively characterize the results of human HF skin exposure decontamination. Methodology/principal findings: A previously established experimental method using a human skin explants ex vivo model (Part 1. Experimental 70% hydrofluoric acid (HF) burns: Histological observations in an established human skin explants ex vivo model) described the lesions that appeared following 70% HF penetration. Within 5min, 70% HF penetrates to the dermis. Using the same experimental conditions, a comparison study of two different washing protocols was performed: water + topical calcium gluconate (CaG) versus Hexafluorine®. In these conditions, washing for 15min with running tap water followed by topical CaG ointment only delayed burn onset, while severe tissue damage appeared later. In contrast, after washing with Hexafluorine® over 10 min, no histological lesions developed. These results are in accordance with the results of accidental human industrial case reports. Conclusion/significance: Amphoteric and hypertonic Hexafluorine® can deactivate H+ and chelate F- ions. Based on these results, it should be considered as a promising first-aid decontamination solution to prevent or minimize significant local and systemic consequences of concentrated HF skin exposures. PMID:21083510

  19. Empirical Methods for Detecting Regional Trends and Other Spatial Expressions in Antrim Shale Gas Productivity, with Implications for Improving Resource Projections Using Local Nonparametric Estimation Techniques

    USGS Publications Warehouse

    Coburn, T.C.; Freeman, P.A.; Attanasi, E.D.

    2012-01-01

    The primary objectives of this research were to (1) investigate empirical methods for establishing regional trends in unconventional gas resources as exhibited by historical production data and (2) determine whether or not incorporating additional knowledge of a regional trend in a suite of previously established local nonparametric resource prediction algorithms influences assessment results. Three different trend detection methods were applied to publicly available production data (well EUR aggregated to 80-acre cells) from the Devonian Antrim Shale gas play in the Michigan Basin. This effort led to the identification of a southeast-northwest trend in cell EUR values across the play that, in a very general sense, conforms to the primary fracture and structural orientations of the province. However, including this trend in the resource prediction algorithms did not lead to improved results. Further analysis indicated the existence of clustering among cell EUR values that likely dampens the contribution of the regional trend. The reason for the clustering, a somewhat unexpected result, is not completely understood, although the geological literature provides some possible explanations. With appropriate data, a better understanding of this clustering phenomenon may lead to important information about the factors and their interactions that control Antrim Shale gas production, which may, in turn, help establish a more general protocol for better estimating resources in this and other shale gas plays. ?? 2011 International Association for Mathematical Geology (outside the USA).

  20. Prevention of Trauma/Hemorrhagic Shock-Induced Mortality, Apoptosis, Inflammation and Mitochondrial Dysfunction

    DTIC Science & Technology

    2012-12-01

    injury, which they wanted to use to establish if kidney injury occurred in our standard rat T/HS model and to determine whether kidney injury could be...prevented by use of IL-6 as a resuscitation adjuvant. In this experiment, we subjected 6 rats each to either our sham protocol or our standard T/HS...time of accumulation in our standard T/HS protocol. Our results demonstrated that shred blood accumulated sIL-6R over time to concentrations (100 ng

  1. Owner perceptions of their cat's quality of life when treated with a modified University of Wisconsin-Madison protocol for lymphoma.

    PubMed

    Thornton, Laura A; Cave, Nicholas; Bridges, Janis P; Stell, Anneliese J

    2018-04-01

    Objectives The objectives of this study were to assess owner perceptions of their cat's quality of life during treatment for lymphoma with a doxorubicin-containing multi-agent chemotherapy protocol, whether various health-related parameters correlated with quality of life scores, and to assess owner satisfaction with the protocol. Methods A postal questionnaire was sent to the owners of 33 treated cats. Owners retrospectively assessed their cat's quality of life using a Likert scale (1-10) before lymphoma was diagnosed, at diagnosis and during chemotherapy. Owners assigned scores to various health-related parameters previously reported to affect quality of life at the three time points, and correlations with quality of life scores were sought. Owners were asked to rate the importance of these health-related parameters. Satisfaction with the protocol was investigated. Results Twenty questionnaires were completed (61% response rate). The median quality of life score before diagnosis (10, range 5-10) was higher than at diagnosis (3, range 1-9) ( P <0.05). The median quality of life score during chemotherapy (7, range 3-9) was lower than before diagnosis ( P <0.05) and higher than at diagnosis, but this was not statistically significant. Quality of life scores did not correlate with individual health-related parameter scores consistently; however, quality of life scores did correlate with appetite scores during chemotherapy. Appetite, vomiting and diarrhoea were parameters perceived as important in affecting quality of life. Most owners (75%) were happy they had treated their cat. Conclusions and relevance The quality of life scores observed were comparable to a previous study using cyclophosphamide, vincristine and prednisolone, employing the same scoring system. Although quality of life scores during chemotherapy were not significantly improved at diagnosis, owner satisfaction with the protocol was high. The factors perceived by owners to determine quality of life in their pets may be different to those previously conjectured, but appetite during chemotherapy remains important.

  2. A shortened protocol for assessing cognitive bias in rats.

    PubMed

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  3. Implementation of bipartite or remote unitary gates with repeater nodes

    NASA Astrophysics Data System (ADS)

    Yu, Li; Nemoto, Kae

    2016-08-01

    We propose some protocols to implement various classes of bipartite unitary operations on two remote parties with the help of repeater nodes in-between. We also present a protocol to implement a single-qubit unitary with parameters determined by a remote party with the help of up to three repeater nodes. It is assumed that the neighboring nodes are connected by noisy photonic channels, and the local gates can be performed quite accurately, while the decoherence of memories is significant. A unitary is often a part of a larger computation or communication task in a quantum network, and to reduce the amount of decoherence in other systems of the network, we focus on the goal of saving the total time for implementing a unitary including the time for entanglement preparation. We review some previously studied protocols that implement bipartite unitaries using local operations and classical communication and prior shared entanglement, and apply them to the situation with repeater nodes without prior entanglement. We find that the protocols using piecewise entanglement between neighboring nodes often require less total time compared to preparing entanglement between the two end nodes first and then performing the previously known protocols. For a generic bipartite unitary, as the number of repeater nodes increases, the total time could approach the time cost for direct signal transfer from one end node to the other. We also prove some lower bounds of the total time when there are a small number of repeater nodes. The application to position-based cryptography is discussed.

  4. Comparison of microdose flare-up and antagonist multiple-dose protocols for poor-responder patients: a randomized study.

    PubMed

    Demirol, Aygul; Gurgan, Timur

    2009-08-01

    To compare the efficacy of the microdose flare-up and multiple-dose antagonist protocols for poor-responder patients in intracytoplasmic sperm injection-ET cycles. A randomized, prospective study. Center for assisted reproductive technology in Turkey. Ninety patients with poor ovarian response in a minimum of two previous IVF cycles. All women were prospectively randomized into two groups by computer-assisted randomization. The patients in group 1 were stimulated according to the microdose flare-up protocol (n = 45), while the patients in group 2 were stimulated according to antagonist multiple-dose protocol (n = 45). The mean number of mature oocytes retrieved was the primary outcome measure, and fertilization rate, implantation rate per embryo, and clinical pregnancy rates were secondary outcome measures. The mean age of the women, the mean duration of infertility, basal FSH level, and the number of previous IVF cycles were similar in both groups. The total gonadotropin dose used was significantly higher in group 2, while the number of oocytes retrieved was significantly greater in group 1. Although the fertilization and clinical pregnancy rates were nonsignificantly higher in group 1 compared with group 2, the implantation rate was significantly higher in the microdose flare-up group than in the multiple-dose antagonist group (22% vs. 11%). The microdose flare-up protocol seems to have a better outcome in poor-responder patients, with a significantly higher mean number of mature oocytes retrieved and higher implantation rate.

  5. Comparison of inter-trial recovery times for the determination of critical power and W' in cycling.

    PubMed

    Karsten, Bettina; Hopker, James; Jobson, Simon A; Baker, Jonathan; Petrigna, Luca; Klose, Andreas; Beedie, Christopher

    2017-07-01

    Critical Power (CP) and W' are often determined using multi-day testing protocols. To investigate this cumbersome testing method, the purpose of this study was to compare the differences between the conventional use of a 24-h inter-trial recovery time with those of 3 h and 30 min for the determination of CP and W'. 9 moderately trained cyclists performed an incremental test to exhaustion to establish the power output associated with the maximum oxygen uptake (p[Formula: see text] max ), and 3 protocols requiring time-to-exhaustion trials at a constant work-rate performed at 80%, 100% and 105% of p[Formula: see text] max. Design: Protocol A utilised 24-h inter-trial recovery (CP 24 /W' 24 ), protocol B utilised 3-h inter-trial recovery (CP 3 /W' 3 ), and protocol C used 30-min inter-trial recovery period (CP 0.5 /W' 0.5 ). CP and W' were calculated using the inverse time (1/t) versus power (P) relation (P = W'(1/t) + CP). 95% Limits of Agreement between protocol A and B were -9 to 15 W; -7.4 to 7.8 kJ (CP/W') and between protocol A and protocol C they were -27 to 22 W; -7.2 to 15.1 kJ (CP/W'). Compared to criterion protocol A, the average prediction error of protocol B was 2.5% (CP) and 25.6% (W'), whilst for protocol C it was 3.7% (CP) and 32.9% (W'). 3-h and 30-min inter-trial recovery time protocols provide valid methods of determining CP but not W' in cycling.

  6. Comment on "Direct counterfactual transmission of a quantum state"

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2016-06-01

    The protocol for counterfactual transmission of a qubit [Z.-H. Li et al., Phys. Rev. A 92, 052315 (2015), 10.1103/PhysRevA.92.052315] relies on the counterfactuality of transmissions of bit 1 and of bit 0. Since counterfactuality of transmission of bit 0 is not established, the claim of counterfactuality of transmission of a quantum state is not established too.

  7. Establishment of a Cre recombinase based mutagenesis protocol for markerless gene deletion in Streptococcus suis.

    PubMed

    Koczula, A; Willenborg, J; Bertram, R; Takamatsu, D; Valentin-Weigand, P; Goethe, R

    2014-12-01

    The lack of knowledge about pathogenicity mechanisms of Streptococcus (S.) suis is, at least partially, attributed to limited methods for its genetic manipulation. Here, we established a Cre-lox based recombination system for markerless gene deletions in S. suis serotype 2 with high selective pressure and without undesired side effects. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...

  9. Erratum: Development, appraisal, validation and implementation of a consensus protocol for the assessment of cerebral amyloid angiopathy in post-mortem brain tissue.

    PubMed

    Love, Seth; Chalmers, Katy; Ince, Paul; Esiri, Margaret; Attems, Johannes; Kalaria, Raj; Jellinger, Kurt; Yamada, Masahito; McCarron, Mark; Minett, Thais; Matthews, Fiona; Greenberg, Steven; Mann, David; Kehoe, Patrick Gavin

    2015-01-01

    In a collaboration involving 11 groups with research interests in cerebral amyloid angiopathy (CAA), we used a two-stage process to develop and in turn validate a new consensus protocol and scoring scheme for the assessment of CAA and associated vasculopathic abnormalities in post-mortem brain tissue. Stage one used an iterative Delphi-style survey to develop the consensus protocol. The resultant scoring scheme was tested on a series of digital images and paraffin sections that were circulated blind to a number of scorers. The scoring scheme and choice of staining methods were refined by open-forum discussion. The agreed protocol scored parenchymal and meningeal CAA on a 0-3 scale, capillary CAA as present/absent and vasculopathy on 0-2 scale, in the 4 cortical lobes that were scored separately. A further assessment involving three centres was then undertaken. Neuropathologists in three centres (Bristol, Oxford and Sheffield) independently scored sections from 75 cases (25 from each centre) and high inter-rater reliability was demonstrated. Stage two used the results of the three-centre assessment to validate the protocol by investigating previously described associations between APOE genotype (previously determined), and both CAA and vasculopathy. Association of capillary CAA with or without arteriolar CAA with APOE ε4 was confirmed. However APOE ε2 was also found to be a strong risk factor for the development of CAA, not only in AD but also in elderly non-demented controls. Further validation of this protocol and scoring scheme is encouraged, to aid its wider adoption to facilitate collaborative and replication studies of CAA.[This corrects the article on p. 19 in vol. 3, PMID: 24754000.].

  10. Development, appraisal, validation and implementation of a consensus protocol for the assessment of cerebral amyloid angiopathy in post-mortem brain tissue

    PubMed Central

    Love, Seth; Chalmers, Katy; Ince, Paul; Esiri, Margaret; Attems, Johannes; Kalaria, Raj; Jellinger, Kurt; Yamada, Masahito; McCarron, Mark; Minett, Thais; Matthews, Fiona; Greenberg, Steven; Mann, David; Kehoe, Patrick Gavin

    2015-01-01

    In a collaboration involving 11 groups with research interests in cerebral amyloid angiopathy (CAA), we used a two-stage process to develop and in turn validate a new consensus protocol and scoring scheme for the assessment of CAA and associated vasculopathic abnormalities in post-mortem brain tissue. Stage one used an iterative Delphi-style survey to develop the consensus protocol. The resultant scoring scheme was tested on a series of digital images and paraffin sections that were circulated blind to a number of scorers. The scoring scheme and choice of staining methods were refined by open-forum discussion. The agreed protocol scored parenchymal and meningeal CAA on a 0-3 scale, capillary CAA as present/absent and vasculopathy on 0-2 scale, in the 4 cortical lobes that were scored separately. A further assessment involving three centres was then undertaken. Neuropathologists in three centres (Bristol, Oxford and Sheffield) independently scored sections from 75 cases (25 from each centre) and high inter-rater reliability was demonstrated. Stage two used the results of the three-centre assessment to validate the protocol by investigating previously described associations between APOE genotype (previously determined), and both CAA and vasculopathy. Association of capillary CAA with or without arteriolar CAA with APOE ε4 was confirmed. However APOE ε2 was also found to be a strong risk factor for the development of CAA, not only in AD but also in elderly non-demented controls. Further validation of this protocol and scoring scheme is encouraged, to aid its wider adoption to facilitate collaborative and replication studies of CAA. PMID:26807344

  11. Development, appraisal, validation and implementation of a consensus protocol for the assessment of cerebral amyloid angiopathy in post-mortem brain tissue

    PubMed Central

    Love, Seth; Chalmers, Katy; Ince, Paul; Esiri, Margaret; Attems, Johannes; Jellinger, Kurt; Yamada, Masahito; McCarron, Mark; Minett, Thais; Matthews, Fiona; Greenberg, Steven; Mann, David; Kehoe, Patrick Gavin

    2014-01-01

    In a collaboration involving 11 groups with research interests in cerebral amyloid angiopathy (CAA), we used a two-stage process to develop and in turn validate a new consensus protocol and scoring scheme for the assessment of CAA and associated vasculopathic abnormalities in post-mortem brain tissue. Stage one used an iterative Delphi-style survey to develop the consensus protocol. The resultant scoring scheme was tested on a series of digital images and paraffin sections that were circulated blind to a number of scorers. The scoring scheme and choice of staining methods were refined by open-forum discussion. The agreed protocol scored parenchymal and meningeal CAA on a 0-3 scale, capillary CAA as present/absent and vasculopathy on 0-2 scale, in the 4 cortical lobes that were scored separately. A further assessment involving three centres was then undertaken. Neuropathologists in three centres (Bristol, Oxford and Sheffield) independently scored sections from 75 cases (25 from each centre) and high inter-rater reliability was demonstrated. Stage two used the results of the three-centre assessment to validate the protocol by investigating previously described associations between APOE genotype (previously determined), and both CAA and vasculopathy. Association of capillary CAA with or without arteriolar CAA with APOE ε4 was confirmed. However APOE ε2 was also found to be a strong risk factor for the development of CAA, not only in AD but also in elderly non-demented controls. Further validation of this protocol and scoring scheme is encouraged, to aid its wider adoption to facilitate collaborative and replication studies of CAA. PMID:24754000

  12. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  13. XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes

    NASA Technical Reports Server (NTRS)

    Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.

    2009-01-01

    Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.

  14. Traffic placement policies for a multi-band network

    NASA Technical Reports Server (NTRS)

    Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael

    1990-01-01

    Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.

  15. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.

  16. Effect of consecutive re-synchronization protocols on pregnancy rate in buffalo (Bubalus bubalis) heifers out of the breeding season.

    PubMed

    Neglia, Gianluca; Capuano, Massimo; Balestrieri, Anna; Cimmino, Roberta; Iannaccone, Francesco; Palumbo, Francesco; Presicce, Giorgio A; Campanile, Giuseppe

    2018-06-01

    The combined effect of six consecutive timed artificial inseminations (TAIs) on pregnancy rates, following two different synchronization protocols on buffalo heifers, over a period of seven months typically characterized by low breeding performances, were investigated in this study. A total of 2189 TAIs were performed on 1463 buffalo heifers within a large buffalo farm in the south of Italy. Individual animals were allowed to undergo synchronization protocol (either a slightly modified Ovsynch or Progesterone treatment) and TAI until establishment of pregnancy or else for not more than six consecutive times. Semen of seven proven bulls was used throughout the study, which was carried out from March to September of the same year. Therefore, other than the effect given by consecutive TAIs over time, a monthly and a seasonal effect could also be tested, once the entire period was split into a Low Breeding Season (LBS) from March to June, and a Transition to Breeding Season (TBS) from July to September. From the data recorded in this study and the statistical analysis performed, it can be stated that the two protocols for the synchronization of ovulation were similar in efficiency in determining pregnancies with an overall fertility rate of 89.4% when the comparison was run both on a monthly basis or when months were grouped into two different seasons. In addition, an average of 1.83 AI/pregnancy was reported, slightly higher for the Ovsynch when compared to the Progesterone protocol: 1.91 vs 1.70, respectively. Finally, when considering the number of progressive synchronization treatments implemented over time as covariate, neither Ovsynch nor Progesterone treatment significantly affected pregnancy rates following the first of the six synchronization sessions. However, repeating the synchronization procedure, the progesterone based protocol resulted in significantly higher probability of success in terms of established pregnancies during the second and third re-synchronization sessions. Copyright © 2018 Elsevier Inc. All rights reserved.

  17. Dose calculation accuracy of different image value to density tables for cone-beam CT planning in head & neck and pelvic localizations.

    PubMed

    Barateau, Anaïs; Garlopeau, Christopher; Cugny, Audrey; De Figueiredo, Bénédicte Henriques; Dupin, Charles; Caron, Jérôme; Antoine, Mikaël

    2015-03-01

    We aimed to identify the most accurate combination of phantom and protocol for image value to density table (IVDT) on volume-modulated arc therapy (VMAT) dose calculation based on kV-Cone-beam CT imaging, for head and neck (H&N) and pelvic localizations. Three phantoms (Catphan(®)600, CIRS(®)062M (inner phantom for head and outer phantom for body), and TomoTherapy(®) "Cheese" phantom) were used to create IVDT curves of CBCT systems with two different CBCT protocols (Standard-dose Head and Standard Pelvis). Hounsfield Unit (HU) time stability and repeatability for a single On-Board-Imager (OBI) and compatibility of two distinct devices were assessed with Catphan(®)600. Images from the anthropomorphic phantom CIRS ATOM(®) for both CT and CBCT modalities were used for VMAT dose calculation from different IVDT curves. Dosimetric indices from CT and CBCT imaging were compared. IVDT curves from CBCT images were highly different depending on phantom used (up to 1000 HU for high densities) and protocol applied (up to 200 HU for high densities). HU time stability was verified over seven weeks. A maximum difference of 3% on the dose calculation indices studied was found between CT and CBCT VMAT dose calculation across the two localizations using appropriate IVDT curves. One IVDT curve per localization can be established with a bi-monthly verification of IVDT-CBCT. The IVDT-CBCTCIRS-Head phantom with the Standard-dose Head protocol was the most accurate combination for dose calculation on H&N CBCT images. For pelvic localizations, the IVDT-CBCTCheese established with the Standard Pelvis protocol provided the best accuracy. Copyright © 2015 Associazione Italiana di Fisica Medica. Published by Elsevier Ltd. All rights reserved.

  18. An Analysis of Transmission and Storage Gains from Sliding Checksum Methods

    DTIC Science & Technology

    1998-11-01

    analysed a protocol "rsync" for synchronising related files at different ends of a communications channel with a minimum of transmitted data. This report...Sliding Checksum Methods Executive Summary In a previous report we described, modelled and analysed a protocol "rsync" for synchronising related...collaborative writing of documentation and synchronisation of distributed databases in the situation where no one location is aware of the differences

  19. Analysis of the new code stroke protocol in Asturias after one year. Experience at one hospital.

    PubMed

    García-Cabo, C; Benavente, L; Martínez-Ramos, J; Pérez-Álvarez, Á; Trigo, A; Calleja, S

    2018-03-01

    Prehospital code stroke (CS) systems have been proved effective for improving access to specialised medical care in acute stroke cases. They also improve the prognosis of this disease, which is one of the leading causes of death and disability in our setting. The aim of this study is to analyse results one year after implementation of the new code stroke protocol at one hospital in Asturias. We prospectively included patients who were admitted to our tertiary care centre as per the code stroke protocol for the period of one year. We analysed 363 patients. Mean age was 69 years and 54% of the cases were men. During the same period in the previous year, there were 236 non-hospital CS activations. One hundred forty-seven recanalisation treatments were performed (66 fibrinolysis and 81 mechanical thrombectomies or combined treatments), representing a 25% increase with regard to the previous year. Recent advances in the management of acute stroke call for coordinated code stroke protocols that are adapted to the needs of each specific region. This may result in an increased number of patients receiving early care, as well as revascularisation treatments. Copyright © 2016 Sociedad Española de Neurología. Publicado por Elsevier España, S.L.U. All rights reserved.

  20. SeaWiFS technical report series. Volume 5: Ocean optics protocols for SeaWiFS validation

    NASA Technical Reports Server (NTRS)

    Mueller, James L.; Austin, Roswell W.; Hooker, Stanford B. (Editor); Firestone, Elaine R. (Editor)

    1992-01-01

    Protocols are presented for measuring optical properties, and other environmental variables, to validate the radiometric performance of the Sea-viewing Wide Field-of-view Sensor (SeaWiFS), and to develop and validate bio-optical algorithms for use with SeaWiFS data. The protocols are intended to establish foundations for a measurement strategy to verify the challenging SeaWiFS accuracy goals of 5 percent in water-leaving radiances and 35 percent in chlorophyll alpha concentration. The protocols first specify the variables which must be measured, and briefly review rationale. Subsequent chapters cover detailed protocols for instrument performance specifications, characterizing and calibration instruments, methods of making measurements in the field, and methods of data analysis. These protocols were developed at a workshop sponsored by the SeaWiFS Project Office (SPO) and held at the Naval Postgraduate School in Monterey, California (9-12 April, 1991). This report is the proceedings of that workshop, as interpreted and expanded by the authors and reviewed by workshop participants and other members of the bio-optical research community. The protocols are a first prescription to approach unprecedented measurement accuracies implied by the SeaWiFS goals, and research and development are needed to improve the state-of-the-art in specific areas. The protocols should be periodically revised to reflect technical advances during the SeaWiFS Project cycle.

  1. Characterization of photoactivated singlet oxygen damage in single-molecule optical trap experiments.

    PubMed

    Landry, Markita P; McCall, Patrick M; Qi, Zhi; Chemla, Yann R

    2009-10-21

    Optical traps or "tweezers" use high-power, near-infrared laser beams to manipulate and apply forces to biological systems, ranging from individual molecules to cells. Although previous studies have established that optical tweezers induce photodamage in live cells, the effects of trap irradiation have yet to be examined in vitro, at the single-molecule level. In this study, we investigate trap-induced damage in a simple system consisting of DNA molecules tethered between optically trapped polystyrene microspheres. We show that exposure to the trapping light affects the lifetime of the tethers, the efficiency with which they can be formed, and their structure. Moreover, we establish that these irreversible effects are caused by oxidative damage from singlet oxygen. This reactive state of molecular oxygen is generated locally by the optical traps in the presence of a sensitizer, which we identify as the trapped polystyrene microspheres. Trap-induced oxidative damage can be reduced greatly by working under anaerobic conditions, using additives that quench singlet oxygen, or trapping microspheres lacking the sensitizers necessary for singlet state photoexcitation. Our findings are relevant to a broad range of trap-based single-molecule experiments-the most common biological application of optical tweezers-and may guide the development of more robust experimental protocols.

  2. Characterization of Photoactivated Singlet Oxygen Damage in Single-Molecule Optical Trap Experiments

    PubMed Central

    Landry, Markita P.; McCall, Patrick M.; Qi, Zhi; Chemla, Yann R.

    2009-01-01

    Abstract Optical traps or “tweezers” use high-power, near-infrared laser beams to manipulate and apply forces to biological systems, ranging from individual molecules to cells. Although previous studies have established that optical tweezers induce photodamage in live cells, the effects of trap irradiation have yet to be examined in vitro, at the single-molecule level. In this study, we investigate trap-induced damage in a simple system consisting of DNA molecules tethered between optically trapped polystyrene microspheres. We show that exposure to the trapping light affects the lifetime of the tethers, the efficiency with which they can be formed, and their structure. Moreover, we establish that these irreversible effects are caused by oxidative damage from singlet oxygen. This reactive state of molecular oxygen is generated locally by the optical traps in the presence of a sensitizer, which we identify as the trapped polystyrene microspheres. Trap-induced oxidative damage can be reduced greatly by working under anaerobic conditions, using additives that quench singlet oxygen, or trapping microspheres lacking the sensitizers necessary for singlet state photoexcitation. Our findings are relevant to a broad range of trap-based single-molecule experiments—the most common biological application of optical tweezers—and may guide the development of more robust experimental protocols. PMID:19843445

  3. Standardized Assay Medium To Measure Lactococcus lactis Enzyme Activities while Mimicking Intracellular Conditions

    PubMed Central

    Goel, Anisha; Santos, Filipe; de Vos, Willem M.; Teusink, Bas

    2012-01-01

    Knowledge of how the activity of enzymes is affected under in vivo conditions is essential for analyzing their regulation and constructing models that yield an integrated understanding of cell behavior. Current kinetic parameters for Lactococcus lactis are scattered through different studies and performed under different assay conditions. Furthermore, assay conditions often diverge from conditions prevailing in the intracellular environment. To establish uniform assay conditions that resemble intracellular conditions, we analyzed the intracellular composition of anaerobic glucose-limited chemostat cultures of L. lactis subsp. cremoris MG 1363. Based on this, we designed a new assay medium for enzyme activity measurements of growing cells of L. lactis, mimicking as closely as practically possible its intracellular environment. Procedures were optimized to be carried out in 96-well plates, and the reproducibility and dynamic range were checked for all enzyme activity measurements. The effects of freezing and the carryover of ammonium sulfate from the addition of coupling enzymes were also established. Activities of all 10 glycolytic and 4 fermentative enzymes were measured. Remarkably, most in vivo-like activities were lower than previously published data. Yet, the ratios of Vmax over measured in vivo fluxes were above 1. With this work, we have developed and extensively validated standard protocols for enzyme activity measurements for L. lactis. PMID:22020503

  4. Metaproteome analysis to determine the metabolically active part of a thermophilic microbial community producing biogas from agricultural biomass.

    PubMed

    Hanreich, Angelika; Heyer, Robert; Benndorf, Dirk; Rapp, Erdmann; Pioch, Markus; Reichl, Udo; Klocke, Michael

    2012-07-01

    Complex consortia of microorganisms are responsible for biogas production. A lot of information about the taxonomic structure and enzymatic potential of such communities has been collected by a variety of gene-based approaches, yet little is known about which of all the assumable metabolic pathways are active throughout the process of biogas formation. To tackle this problem, we established a protocol for the metaproteomic analysis of samples taken from biogas reactors fed with agricultural biomass. In contrast to previous studies where an anaerobic digester was fed with synthetic wastewater, the complex matrix in this study required the extraction of proteins with liquid phenol and the application of paper bridge loading for 2-dimensional gel electrophoresis. Proteins were subjected to nanoHPLC (high-performance liquid chromatography) coupled to tandem mass spectrometry for characterization. Several housekeeping proteins as well as methanogenesis-related enzymes were identified by a MASCOT search and de novo sequencing, which proved the feasibility of our approach. The establishment of such an approach is the basis for further metaproteomic studies of biogas-producing communities. In particular, the apparent status of metabolic activities within the communities can be monitored. The knowledge collected from such experiments could lead to further improvements of biogas production.

  5. The potential of matrix-assisted laser desorption/ionization time-of-flight mass spectrometry for the identification of biogroups of Cronobacter sakazakii.

    PubMed

    Karamonová, Ludmila; Junková, Petra; Mihalová, Denisa; Javůrková, Barbora; Fukal, Ladislav; Rauch, Pavel; Blažková, Martina

    2013-02-15

    The bacterial genus Cronobacter was established quite recently, in 2008. Therefore, its systematic classification is still in progress as well as the risk assessment of Cronobacter strains. The possibility of rapid identification within the biogroup level has an essential epidemiological significance. We examined the potential of mass spectrometry to accomplish this task on species Cronobacter sakazakii comprising eight different biogroups. Members of all Cronobacter sakazakii biogroups were characterized by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF-MS) using intact cells. Analyses were performed on a Biflex IV MALDI-TOF mass spectrometer in the range of 2000 to 20 000 Da in linear mode with an accelerated voltage of 19 kV. Optimal conditions for a proper identification of biogroups, such as suitable cultivation media or growth time of bacteria, were investigated. The biomarker patterns characterizing each of the Cronobacter sakazakii biogroups were obtained. The established identification protocol was applied to ten previously non-identified strains and their biogroups were successfully determined. The presented work is the first report of successful and rapid bacterial biogroup taxonomy classification using MALDI-TOF-MS that could substitute demanding biochemical testing. Copyright © 2012 John Wiley & Sons, Ltd.

  6. A Mouse Model of Subchronic and Mild Social Defeat Stress for Understanding Stress-induced Behavioral and Physiological Deficits

    PubMed Central

    Goto, Tatsuhiko; Toyoda, Atsushi

    2015-01-01

    Stressful life events often increase the incidence of depression in humans. To study the mechanisms of depression, the development of animal models of depression is essential. Because there are several types of depression, various animal models are needed for a deeper understanding of the disorder. Previously, a mouse model of subchronic and mild social defeat stress (sCSDS) using a modified chronic social defeat stress (CSDS) paradigm was established. In the paradigm, to reduce physical injuries from aggressors, the duration of physical contact between the aggressor and a subordinate was reduced compared to in the original CSDS paradigm. sCSDS mice showed increased body weight gain, food intake, and water intake during the stress period, and their social behaviors were suppressed after the stress period. In terms of the face validity of the stress-induced overeating and overdrinking following the increased body weight gain, the sCSDS mice may show some features related to atypical depression in humans. Thus, a mouse model of sCSDS may be useful for studying the pathogenic mechanisms underlying depression. This protocol will help establish the sCSDS mouse model, especially for studying the mechanisms underlying stress-induced weight gain and polydipsia- and hyperphagia-like symptoms. PMID:26650680

  7. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  8. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  9. Secure quantum private information retrieval using phase-encoded queries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olejnik, Lukasz

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less

  10. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  11. Comparing inactivation protocols of Yersinia organisms for identification with matrix-assisted laser desorption/ionization time-of-flight mass spectrometry.

    PubMed

    Couderc, Carine; Nappez, Claude; Drancourt, Michel

    2012-03-30

    It is recommended that harmful Biosafety Level 3 (BSL-3) bacteria be inactivated prior to identification by mass spectrometry, yet optimal effects of inactivation protocol have not been defined. Here, we compare trifluoroacetic acid inactivation (protocol A) with ethanol inactivation (protocol B) of Yersinia organisms prior to identification by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF-MS). The total number of peaks detected was 10.5 ± 1.7 for protocol A and 15.7 ± 4.2 for protocol B (ρ <0.001, ANOVA test). The signal-to-noise ratio for the m/z 6049 peak present in all of the tested Yersinia isolates was 9.7 ± 3.1 for protocol A and 18.1 ± 4.6 for protocol B (ρ < 0.001). Compared with spectra in our local database containing 48 Yersinia spp., including 20 strains of Y. pestis, the identification score was 1.79 ± 0.2 for protocol A and 1.97 ± 0.19 for protocol B (ρ = 0.0024). Our observations indicate that for the identification of Yersinia organisms, ethanol inactivation yielded MALDI-TOF-MS spectra of significantly higher quality than spectra derived from trifluoroacetic acid inactivation. Combined with previously published data, our results permit the updating of protocols for inactivating BSL-3 bacteria. Copyright © 2012 John Wiley & Sons, Ltd.

  12. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    PubMed

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  13. Counting at low concentrations: the statistical challenges of verifying ballast water discharge standards

    USGS Publications Warehouse

    Frazier, Melanie; Miller, A. Whitman; Lee, Henry; Reusser, Deborah A.

    2013-01-01

    Discharge from the ballast tanks of ships is one of the primary vectors of nonindigenous species in marine environments. To mitigate this environmental and economic threat, international, national, and state entities are establishing regulations to limit the concentration of living organisms that may be discharged from the ballast tanks of ships. The proposed discharge standards have ranged from zero detectable organisms to 3. If standard sampling methods are used, verifying whether ballast discharge complies with these stringent standards will be challenging due to the inherent stochasticity of sampling. Furthermore, at low concentrations, very large volumes of water must be sampled to find enough organisms to accurately estimate concentration. Despite these challenges, adequate sampling protocols comprise a critical aspect of establishing standards because they help define the actual risk level associated with a standard. A standard that appears very stringent may be effectively lax if it is paired with an inadequate sampling protocol. We describe some of the statistical issues associated with sampling at low concentrations to help regulators understand the uncertainties of sampling as well as to inform the development of sampling protocols that ensure discharge standards are adequately implemented.

  14. ? PID output-feedback control under event-triggered protocol

    NASA Astrophysics Data System (ADS)

    Zhao, Di; Wang, Zidong; Ding, Derui; Wei, Guoliang; Alsaadi, Fuad E.

    2018-07-01

    This paper is concerned with the ? proportional-integral-derivative (PID) output-feedback control problem for a class of linear discrete-time systems under event-triggered protocols. The controller and the actuators are connected through a communication network of limited bandwidth, and an event-triggered communication mechanism is adopted to decide when a certain control signal should be transmitted to the respective actuator. Furthermore, a novel PID output-feedback controller is designed where the accumulative sum-loop (the counterpart to the integral-loop in the continues-time setting) operates on a limited time-window with hope to mitigate the effect from the past measurement data. The main objective of the problem under consideration is to design a desired PID controller such that the closed-loop system is exponentially stable and the prescribed ? disturbance rejection attenuation level is guaranteed under event-triggered protocols. By means of the Lyapunov stability theory combined with the orthogonal decomposition, sufficient conditions are established under which the addressed PID controller design problem is recast into a linear convex optimization one that can be easily solved via available software packages. Finally, a simulation example is exploited to illustrate the usefulness and effectiveness of the established control scheme.

  15. Standardizing Quality Assessment of Fused Remotely Sensed Images

    NASA Astrophysics Data System (ADS)

    Pohl, C.; Moellmann, J.; Fries, K.

    2017-09-01

    The multitude of available operational remote sensing satellites led to the development of many image fusion techniques to provide high spatial, spectral and temporal resolution images. The comparison of different techniques is necessary to obtain an optimized image for the different applications of remote sensing. There are two approaches in assessing image quality: 1. Quantitatively by visual interpretation and 2. Quantitatively using image quality indices. However an objective comparison is difficult due to the fact that a visual assessment is always subject and a quantitative assessment is done by different criteria. Depending on the criteria and indices the result varies. Therefore it is necessary to standardize both processes (qualitative and quantitative assessment) in order to allow an objective image fusion quality evaluation. Various studies have been conducted at the University of Osnabrueck (UOS) to establish a standardized process to objectively compare fused image quality. First established image fusion quality assessment protocols, i.e. Quality with No Reference (QNR) and Khan's protocol, were compared on varies fusion experiments. Second the process of visual quality assessment was structured and standardized with the aim to provide an evaluation protocol. This manuscript reports on the results of the comparison and provides recommendations for future research.

  16. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    PubMed Central

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  17. A case-crossover study of transient risk factors influence on occupational injuries: a study protocol based on a review of previous studies.

    PubMed

    Oesterlund, Anna H; Lander, Flemming; Lauritsen, Jens

    2016-10-01

    The occupational injury incident rate remains relatively high in the European Union. The case-crossover study gives a unique opportunity to study transient risk factors that normally would be very difficult to approach. Studies like this have been carried out in both America and Asia, but so far no relevant research has been conducted in Europe. Case-crossover studies of occupational injuries were collected from PubMed and Embase and read through. Previous experiences concerning method, exposure and outcome, time-related measurements and construction of the questionnaire were taken into account in the preparation of a pilot study. Consequently, experiences from the pilot study were used to design the study protocol. Approximately 2000 patients with an occupational injury will be recruited from the emergency departments in Herning and Odense, Denmark. A standardised questionnaire will be used to collect basic demographic data and information on eight transient risk factors. Based on previous studies and knowledge on occupational injuries the transient risk factors we chose to examine were: time pressure, performing a task with a different method/using unaccustomed technique, change in working surroundings, using a phone, disagreement, feeling ill, being distracted and using malfunctioning machinery/tools or work material. Exposure time 'just before the injury' will be compared with two control periods, 'previous day at the same time of the injury' (pair match) and the previous work week (usual frequency). This study protocol describes a unique opportunity to calculate the effect of transient risk factors on occupational injuries in a European setting. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. A universal protocol to generate consensus level genome sequences for foot-and-mouth disease virus and other positive-sense polyadenylated RNA viruses using the Illumina MiSeq.

    PubMed

    Logan, Grace; Freimanis, Graham L; King, David J; Valdazo-González, Begoña; Bachanek-Bankowska, Katarzyna; Sanderson, Nicholas D; Knowles, Nick J; King, Donald P; Cottam, Eleanor M

    2014-09-30

    Next-Generation Sequencing (NGS) is revolutionizing molecular epidemiology by providing new approaches to undertake whole genome sequencing (WGS) in diagnostic settings for a variety of human and veterinary pathogens. Previous sequencing protocols have been subject to biases such as those encountered during PCR amplification and cell culture, or are restricted by the need for large quantities of starting material. We describe here a simple and robust methodology for the generation of whole genome sequences on the Illumina MiSeq. This protocol is specific for foot-and-mouth disease virus (FMDV) or other polyadenylated RNA viruses and circumvents both the use of PCR and the requirement for large amounts of initial template. The protocol was successfully validated using five FMDV positive clinical samples from the 2001 epidemic in the United Kingdom, as well as a panel of representative viruses from all seven serotypes. In addition, this protocol was successfully used to recover 94% of an FMDV genome that had previously been identified as cell culture negative. Genome sequences from three other non-FMDV polyadenylated RNA viruses (EMCV, ERAV, VESV) were also obtained with minor protocol amendments. We calculated that a minimum coverage depth of 22 reads was required to produce an accurate consensus sequence for FMDV O. This was achieved in 5 FMDV/O/UKG isolates and the type O FMDV from the serotype panel with the exception of the 5' genomic termini and area immediately flanking the poly(C) region. We have developed a universal WGS method for FMDV and other polyadenylated RNA viruses. This method works successfully from a limited quantity of starting material and eliminates the requirement for genome-specific PCR amplification. This protocol has the potential to generate consensus-level sequences within a routine high-throughput diagnostic environment.

  19. An Experiment of GMPLS-Based Dispersion Compensation Control over In-Field Fibers

    NASA Astrophysics Data System (ADS)

    Seno, Shoichiro; Horiuchi, Eiichi; Yoshida, Sota; Sugihara, Takashi; Onohara, Kiyoshi; Kamei, Misato; Baba, Yoshimasa; Kubo, Kazuo; Mizuochi, Takashi

    As ROADMs (Reconfigurable Optical Add/Drop Multiplexers) are becoming widely used in metro/core networks, distributed control of wavelength paths by extended GMPLS (Generalized MultiProtocol Label Switching) protocols has attracted much attention. For the automatic establishment of an arbitrary wavelength path satisfying dynamic traffic demands over a ROADM or WXC (Wavelength Cross Connect)-based network, precise determination of chromatic dispersion over the path and optimized assignment of dispersion compensation capabilities at related nodes are essential. This paper reports an experiment over in-field fibers where GMPLS-based control was applied for the automatic discovery of chromatic dispersion, path computation, and wavelength path establishment with dynamic adjustment of variable dispersion compensation. The GMPLS-based control scheme, which the authors called GMPLS-Plus, extended GMPLS's distributed control architecture with attributes for automatic discovery, advertisement, and signaling of chromatic dispersion. In this experiment, wavelength paths with distances of 24km and 360km were successfully established and error-free data transmission was verified. The experiment also confirmed path restoration with dynamic compensation adjustment upon fiber failure.

  20. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

Top