Improvements of Quantum Private Comparison Protocol Based on Cluster States
NASA Astrophysics Data System (ADS)
Zhou, Ming-Kuai
2018-01-01
Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.
Secure multiparty computation of a comparison problem.
Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang
2016-01-01
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.
Quantum Private Comparison Protocol with Linear Optics
NASA Astrophysics Data System (ADS)
Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu
2016-12-01
In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.
NASA Astrophysics Data System (ADS)
Zhao-Xu, Ji; Tian-Yu, Ye
2017-07-01
In this paper, a novel multi-party quantum private comparison protocol with a semi-honest third party (TP) is proposed based on the entanglement swapping of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own, but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties' secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Wen-Bo; Zhang, Shi-Bin; Wang, Hai-Chun; Yan, Li-Li; Han, Gui-Hua; Sheng, Zhi-Wei; Huang, Yuan-Yuan; Suo, Wang; Xiong, Jin-Xin
2016-12-01
A protocol for quantum private comparison of equality (QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party (TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information (each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups (each group has N private information) in one execution or just N private information. Supported by NSFC under Grant Nos. 61402058, 61572086, the Fund for Middle and Young Academic Leaders of CUIT under Grant No. J201511, the Science and Technology Support Project of Sichuan Province of China under Grant No. 2013GZX0137, the Fund for Young Persons Project of Sichuan Province of China under Grant No. 12ZB017, and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No. szjj2014-074
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-08-01
A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.
Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs
NASA Astrophysics Data System (ADS)
Wang, Cong; Xu, Gang; Yang, Yi-Xian
2013-07-01
In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.
NASA Astrophysics Data System (ADS)
Pan, Hong-Ming
2018-03-01
Recently, Jia et al. proposed the quantum private comparison protocol with the genuine four-particle entangled states (Jia et al., Int. J. Theor. Phys. 51(4), 1187-1194 (2012)). Jia et al. claimed that in this protocol, TP cannot obtain Alice and Bob's secrets and only knows their comparison result. However, in this paper, we demonstrate that if TP is a genuine semi-honest third party, he can totally obtain Alice and Bob's secrets by launching a particular intercept-resend-measure attack. After suggesting the intercept-resend-measure attack strategy from TP first, we put forward one corresponding improvement to prevent this attack.
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-12-01
Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu
2016-09-01
Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407
Statistics attack on `quantum private comparison with a malicious third party' and its improvement
NASA Astrophysics Data System (ADS)
Gu, Jun; Ho, Chih-Yung; Hwang, Tzonelih
2018-02-01
Recently, Sun et al. (Quantum Inf Process:14:2125-2133, 2015) proposed a quantum private comparison protocol allowing two participants to compare the equality of their secrets via a malicious third party (TP). They designed an interesting trap comparison method to prevent the TP from knowing the final comparison result. However, this study shows that the malicious TP can use the statistics attack to reveal the comparison result. A simple modification is hence proposed to solve this problem.
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan
2018-02-01
Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan
2018-06-01
Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.
Secure quantum private information retrieval using phase-encoded queries
NASA Astrophysics Data System (ADS)
Olejnik, Lukasz
2011-08-01
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.
Secure quantum private information retrieval using phase-encoded queries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olejnik, Lukasz
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less
The development, verification, and comparison study between LC-MS libraries for two manufacturers’ instruments and a verified protocol are discussed. The LC-MS library protocol was verified through an inter-laboratory study that involved Federal, State, and private laboratories. ...
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Nearest private query based on quantum oblivious key distribution
NASA Astrophysics Data System (ADS)
Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan
2017-12-01
Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.
A kind of universal quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol.
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-12
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109
Secret-key-assisted private classical communication capacity over quantum channels
NASA Astrophysics Data System (ADS)
Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd
2008-10-01
We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.
Enhancing user privacy in SARG04-based private database query protocols
NASA Astrophysics Data System (ADS)
Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun
2015-11-01
The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.
Quantum Private Query Based on Bell State and Single Photons
NASA Astrophysics Data System (ADS)
Gao, Xiang; Chang, Yan; Zhang, Shi-Bin; Yang, Fan; Zhang, Yan
2018-03-01
Quantum private query (QPQ) can protect both user's and database holder's privacy. In this paper, we propose a novel quantum private query protocol based on Bell state and single photons. As far as we know, no one has ever proposed the QPQ based on Bell state. By using the decoherence-free (DF) states, our protocol can resist the collective noise. Besides that, our protocol is a one-way quantum protocol, which can resist the Trojan horse attack and reduce the communication complexity. Our protocol can not only guarantee the participants' privacy but also stand against an external eavesdropper.
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
Multi-Bit Quantum Private Query
NASA Astrophysics Data System (ADS)
Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing
2015-09-01
Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Private randomness expansion with untrusted devices
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2011-03-01
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
Private database queries based on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Jia-Li; Guo, Fen-Zhuo; Gao, Fei; Liu, Bin; Wen, Qiao-Yan
2013-08-01
Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve quantum private database queries, which is a theoretical study of how counterfactuality can be employed beyond counterfactual quantum key distribution (QKD). By adding crucial detecting apparatus to the device of QKD, the privacy of both the distrustful user and the database owner can be guaranteed. Furthermore, the proposed private-database-query protocol makes full use of the low efficiency in the counterfactual QKD, and by adjusting the relevant parameters, the protocol obtains excellent flexibility and extensibility.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Biodiversity gains from efficient use of private sponsorship for flagship species conservation.
Bennett, Joseph R; Maloney, Richard; Possingham, Hugh P
2015-04-22
To address the global extinction crisis, both efficient use of existing conservation funding and new sources of funding are vital. Private sponsorship of charismatic 'flagship' species conservation represents an important source of new funding, but has been criticized as being inefficient. However, the ancillary benefits of privately sponsored flagship species conservation via actions benefiting other species have not been quantified, nor have the benefits of incorporating such sponsorship into objective prioritization protocols. Here, we use a comprehensive dataset of conservation actions for the 700 most threatened species in New Zealand to examine the potential biodiversity gains from national private flagship species sponsorship programmes. We find that private funding for flagship species can clearly result in additional species and phylogenetic diversity conserved, via conservation actions shared with other species. When private flagship species funding is incorporated into a prioritization protocol to preferentially sponsor shared actions, expected gains can be more than doubled. However, these gains are consistently smaller than expected gains in a hypothetical scenario where private funding could be optimally allocated among all threatened species. We recommend integrating private sponsorship of flagship species into objective prioritization protocols to sponsor efficient actions that maximize biodiversity gains, or wherever possible, encouraging private donations for broader biodiversity goals. © 2015 The Author(s) Published by the Royal Society. All rights reserved.
Biodiversity gains from efficient use of private sponsorship for flagship species conservation
Bennett, Joseph R.; Maloney, Richard; Possingham, Hugh P.
2015-01-01
To address the global extinction crisis, both efficient use of existing conservation funding and new sources of funding are vital. Private sponsorship of charismatic ‘flagship’ species conservation represents an important source of new funding, but has been criticized as being inefficient. However, the ancillary benefits of privately sponsored flagship species conservation via actions benefiting other species have not been quantified, nor have the benefits of incorporating such sponsorship into objective prioritization protocols. Here, we use a comprehensive dataset of conservation actions for the 700 most threatened species in New Zealand to examine the potential biodiversity gains from national private flagship species sponsorship programmes. We find that private funding for flagship species can clearly result in additional species and phylogenetic diversity conserved, via conservation actions shared with other species. When private flagship species funding is incorporated into a prioritization protocol to preferentially sponsor shared actions, expected gains can be more than doubled. However, these gains are consistently smaller than expected gains in a hypothetical scenario where private funding could be optimally allocated among all threatened species. We recommend integrating private sponsorship of flagship species into objective prioritization protocols to sponsor efficient actions that maximize biodiversity gains, or wherever possible, encouraging private donations for broader biodiversity goals. PMID:25808885
Comment on "Secure quantum private information retrieval using phase-encoded queries"
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun
2016-12-01
In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
NASA Astrophysics Data System (ADS)
Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo
2008-06-01
We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.
Barr, Donald A
2007-01-01
Public-private partnerships have become a common approach to health care problems worldwide. Many public-private partnerships were created during the late 1990s, but most were focused on specific diseases such as HIV/AIDS, tuberculosis, and malaria. Recently there has been enthusiasm for using public-private partnerships to improve the delivery of health and welfare services for a wider range of health problems, especially in developing countries. The success of public-private partnerships in this context appears to be mixed, and few data are available to evaluate their effectiveness. This analysis provides an overview of the history of health-related public-private partnerships during the past 20 years and describes a research protocol commissioned by the World Health Organization to evaluate the effectiveness of public-private partnerships in a research context.
Hospital Casemix Protocol - Medibank Private Perspective.
Szakiel, John
2010-06-01
Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of the collection, cleansing and processing of these data and subsequent reporting to DoHA by Medibank Private, which accounts for approximately 30% of collected data.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Fault-tolerant symmetrically-private information retrieval
NASA Astrophysics Data System (ADS)
Wang, Tian-Yin; Cai, Xiao-Qiu; Zhang, Rui-Ling
2016-08-01
We propose two symmetrically-private information retrieval protocols based on quantum key distribution, which provide a good degree of database and user privacy while being flexible, loss-resistant and easily generalized to a large database similar to the precedent works. Furthermore, one protocol is robust to a collective-dephasing noise, and the other is robust to a collective-rotation noise.
Implementation of Quantum Private Queries Using Nuclear Magnetic Resonance
NASA Astrophysics Data System (ADS)
Wang, Chuan; Hao, Liang; Zhao, Lian-Jie
2011-08-01
We present a modified protocol for the realization of a quantum private query process on a classical database. Using one-qubit query and CNOT operation, the query process can be realized in a two-mode database. In the query process, the data privacy is preserved as the sender would not reveal any information about the database besides her query information, and the database provider cannot retain any information about the query. We implement the quantum private query protocol in a nuclear magnetic resonance system. The density matrix of the memory registers are constructed.
Quantum private query with perfect user privacy against a joint-measurement attack
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min
2016-12-01
The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.
A novel quantum solution to secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun
2018-06-01
Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.
Quantum private query based on single-photon interference
NASA Astrophysics Data System (ADS)
Xu, Sheng-Wei; Sun, Ying; Lin, Song
2016-08-01
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
Investigating nurse practitioners in the private sector: a theoretically informed research protocol.
Adams, Margaret; Gardner, Glenn; Yates, Patsy
2017-06-01
To report a study protocol and the theoretical framework normalisation process theory that informs this protocol for a case study investigation of private sector nurse practitioners. Most research evaluating nurse practitioner service is focused on public, mainly acute care environments where nurse practitioner service is well established with strong structures for governance and sustainability. Conversely, there is lack of clarity in governance for emerging models in the private sector. In a climate of healthcare reform, nurse practitioner service is extending beyond the familiar public health sector. Further research is required to inform knowledge of the practice, operational framework and governance of new nurse practitioner models. The proposed research will use a multiple exploratory case study design to examine private sector nurse practitioner service. Data collection includes interviews, surveys and audits. A sequential mixed method approach to analysis of each case will be conducted. Findings from within-case analysis will lead to a meta-synthesis across all four cases to gain a holistic understanding of the cases under study, private sector nurse practitioner service. Normalisation process theory will be used to guide the research process, specifically coding and analysis of data using theory constructs and the relevant components associated with those constructs. This article provides a blueprint for the research and describes a theoretical framework, normalisation process theory in terms of its flexibility as an analytical framework. Consistent with the goals of best research practice, this study protocol will inform the research community in the field of primary health care about emerging research in this field. Publishing a study protocol ensures researcher fidelity to the analysis plan and supports research collaboration across teams. © 2016 John Wiley & Sons Ltd.
Analysis of Survivor Benefit Plan - Acceptance and Comparison with Private Sector
1989-01-01
I COPY AIU WAR COLLEGE ,.SEARCH REPORT ,YSIS OF SURVIVOR BENEFIT PLAN-__CCEPTANCE ’-U AND COMPARISON WITH PRIVATE SECTOR LIEUENNT COLONEL JOHN R...AAA AIR WAR COLLEGE AIR UNIVERSITY ANALYSIS OF SURVIVOR BENEFIT PLAN--ACCEPTANCE AND COMPARISON WITH PRIVATE SECTOR by John R. Adams Lieutenant...Survivor Benefit Plan (SBP)--Acceptance and Comparison With Private Sector . AUTHORS: John R. Adams, Lieutenant Colonel, USAF; Daniel 3. Kohn
Practical private database queries based on a quantum-key-distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph
2011-02-15
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less
Loss-tolerant measurement-device-independent quantum private queries
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Loss-tolerant measurement-device-independent quantum private queries.
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-04
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Dvash, Jonathan; Ben-Zèev, Aaron; Noga, Adler; Shamay-Tsoory, Simone
2014-05-30
Evaluation of the outcomes of our decisions may instigate comparisons of our actual outcome with those of others (social comparisons) or comparisons with alternative outcomes of choices not made (private comparisons). Previous research has suggested a deficit in attention to social information among individuals with autism spectrum disorders. As social comparison involves the processing of social information, here we investigated the orientation towards and sensitivity to social vs. private comparisons in individuals with autism spectrum disorders. We compared the sensitivity to social vs. private comparisons among individuals diagnosed with Asperger's Syndrome (AS) or High Functioning Autism, using a task that entailed monetary rewards. Results showed that while individuals with AS generally demonstrate comparable sensitivity to absolute and relative rewards, they show less sensitivity to social comparison as compared to controls. Furthermore, they are characterized by a higher sensitivity to private rather than social comparison. These results suggest that low sensitivity to social comparisons is an important factor to consider in autism spectrum disorders. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Noisy processing and distillation of private quantum States.
Renes, Joseph M; Smith, Graeme
2007-01-12
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.
Cache Coherence Protocols for Large-Scale Multiprocessors
1990-09-01
and is compared with the other protocols for large-scale machines. In later analysis, this coherence method is designated by the acronym OCPD , which...private read misses 2 6 6 ( OCPD ) private write misses 2 6 6 Table 4.2: Transaction Types and Costs. the performance of the memory system. These...methodologies. Figure 4-2 shows the processor utiliza- tions of the Weather program, with special code in the dyn-nic post-mortem sched- 94 OCPD DlrINB
QKD-based quantum private query without a failure probability
NASA Astrophysics Data System (ADS)
Liu, Bin; Gao, Fei; Huang, Wei; Wen, QiaoYan
2015-10-01
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
NASA Astrophysics Data System (ADS)
Basak, Jyotirmoy; Maitra, Subhamoy
2018-04-01
In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.
NASA Astrophysics Data System (ADS)
Yang, YuGuang; Liu, ZhiChao; Chen, XiuBo; Zhou, YiHua; Shi, WeiMin
2017-12-01
Quantum channel noise may cause the user to obtain a wrong answer and thus misunderstand the database holder for existing QKD-based quantum private query (QPQ) protocols. In addition, an outside attacker may conceal his attack by exploiting the channel noise. We propose a new, robust QPQ protocol based on four-qubit decoherence-free (DF) states. In contrast to existing QPQ protocols against channel noise, only an alternative fixed sequence of single-qubit measurements is needed by the user (Alice) to measure the received DF states. This property makes it easy to implement the proposed protocol by exploiting current technologies. Moreover, to retain the advantage of flexible database queries, we reconstruct Alice's measurement operators so that Alice needs only conditioned sequences of single-qubit measurements.
Textual production of children without learning difficulties.
Santos, Maria Aparecida Gonçalves dos; Hage, Simone Rocha de Vasconcellos
2015-01-01
To characterize the writing skills of students, to compare the performance of students in public and private schools, and to identify enhancements in the course of the school year. Three texts (narrative, game rules description, and a note or letter) written by 160 students from public and private schools were analyzed based on a specific protocol. Descriptive statistical analysis was performed. To compare the overall performance by the protocol between school grades, the Kruskal-Wallis and Miller tests were used, and to compare results as to schools (private and public), Mann-Whitney test was used. Median values of aesthetic aspects, coherence, clarity, and concision for game rules description among public school students remained one point below the top score. Students from private schools achieved the highest score at medians. When comparing schools, private institutions had students with better performances, with significant difference. As to grades, statistical difference was found between the fourth and sixth grades of public schools and between the fourth and fifth grades of private schools. Most of the private school children showed consolidation of skills assessed in the different grades. However, public school children had this consolidation only at the sixth grade. Students from private schools had better performances compared to those from public schools. There is tendency to evolution from the fourth to sixth grades in public schools. However, the overall performance is similar in all grades in private schools.
Bound entangled states with a private key and their classical counterpart.
Ozols, Maris; Smith, Graeme; Smolin, John A
2014-03-21
Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.
Two Quantum Protocols for Oblivious Set-member Decision Problem
NASA Astrophysics Data System (ADS)
Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-10-01
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.
Symmetrically private information retrieval based on blind quantum computing
NASA Astrophysics Data System (ADS)
Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling
2015-05-01
Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.
Two Quantum Protocols for Oblivious Set-member Decision Problem
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-01-01
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668
Two Quantum Protocols for Oblivious Set-member Decision Problem.
Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-10-30
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.
Loss-tolerant measurement-device-independent quantum private queries
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101
The implementation of a new Malaria Treatment Protocol in Timor-Leste: challenges and constraints
Martins, João Soares; Zwi, Anthony B; Hobday, Karen; Bonaparte, Fernando; Kelly, Paul M
2012-01-01
Background Timor-Leste changed its malaria treatment protocol in 2007, replacing the first-line for falciparum malaria from sulphadoxine-pyrimethamine to artemether-lumefantrine. This study explored the factors affecting the implementation of the revised treatment protocol, with an emphasis on identifying key constraints. Methods A mixed method approach drew on both qualitative and quantitative data. The study included data from District Health Services in seven districts, community health centres in 14 sub-districts, four hospitals, five private clinics, one private pharmacy and the country's autonomous medical store. In-depth interviews with 36 key informants, five group interviews and 15 focus group discussions were conducted. A survey was also undertaken at community health centres and hospitals to assess the availability of a physical copy of the Malaria Treatment Protocol, as well as the availability and utilization of artemether-lumefantrine and sulphadoxine-pyrimethamine. Results Many factors impeded the implementation of the new malaria protocol. These included: inadequate introduction and training around the revised treatment protocol; unclear phasing out of sulphadoxine-pyrimethamine and phasing in of the revised treatment, artemether-lumefantrine, and the rapid diagnostic test (RDT); lack of supervision; lack of adherence to the revised guidelines by foreign health workers; lack of access to the new drug by the private sector; obstacles in the procurement process; and the use of trade names rather than generic drug description. Insufficient understanding of the rapid diagnostic test and the untimely supply of drugs further hampered implementation. Conclusion To effectively implement a revised malaria treatment protocol, barriers should be identified during the policy formulation process and those emerging during implementation should be recognized promptly and addressed. PMID:22460007
Fostering public cord blood banking and research in Canada.
Isasi, Rosario; Dalpe, Gratien; Knoppers, Bartha M
2013-12-01
In June 2013, Canadian Blood Services (CBS) established the National Public Cord Blood Bank (NPCBB) accessible to Canadian and international patients and researchers. The NPCBB promotes efforts that contribute to research and improved clinical care by making units not suitable for banking or transplantation available for research. In the context of the NPCBB of the CBS, this article will focus on the practical tools (e.g., consent protocols) developed to optimize umbilical cord blood (UCB) banking and research while enabling ethical provenance of UCB stem cells. The Canadian approach represents an ideal model for comparison as it is a country in which the national public bank (and other regional/provincial public banks) coexists with private companies.
Urban, Ruth A; Rowe, Dorothy J
2015-02-01
The purpose of this study was to survey dental hygienists to determine their knowledge, attitudes and practices regarding the implementation of caries risk assessment, particularly caries management by risk assessment (CAMBRA), in private dental practices. A 17 item survey was developed to evaluate dental hygienists' knowledge, attitudes and practices related to CAMBRA and perceived barriers to CAMBRA implementation in private dental practice. Surveys were mailed to a randomized sample of 1,000 dental hygienists licensed to practice in California. Responses were tabulated for each respondent, and the response frequency for each survey item was calculated. Respondents' comments to the open-ended question were compiled, according to themes. The response rate was 18%. Only 66% of the respondents were familiar with the term CAMBRA, although 89% agreed with its underlying principles of risk assessment. CAMBRA protocol had been implemented in 40% of the respondents' employment sites. Respondents disagreed that time (45%) and cost of products (68%) were barriers to implementation. Many did not know their employers' knowledge or attitudes about CAMBRA and its implementation, as evidenced by a "don't know" response range of 29 to 48% for the 4 relevant statements. Respondents' comments included both successes and barriers implementing CAMBRA. CAMBRA protocol has not been widely implemented in private practice, although the current data do not indicate insurmountable barriers. Broader dissemination may be feasible if dental hygienists would obtain more comprehensive knowledge of evidence-based risk assessment protocols and would assume a leadership role in implementing CAMBRA protocols and procedures in private dental practices. Copyright © 2015 The American Dental Hygienists’ Association.
Privacy-Preserving Integration of Medical Data : A Practical Multiparty Private Set Intersection.
Miyaji, Atsuko; Nakasho, Kazuhisa; Nishida, Shohei
2017-03-01
Medical data are often maintained by different organizations. However, detailed analyses sometimes require these datasets to be integrated without violating patient or commercial privacy. Multiparty Private Set Intersection (MPSI), which is an important privacy-preserving protocol, computes an intersection of multiple private datasets. This approach ensures that only designated parties can identify the intersection. In this paper, we propose a practical MPSI that satisfies the following requirements: The size of the datasets maintained by the different parties is independent of the others, and the computational complexity of the dataset held by each party is independent of the number of parties. Our MPSI is based on the use of an outsourcing provider, who has no knowledge of the data inputs or outputs. This reduces the computational complexity. The performance of the proposed MPSI is evaluated by implementing a prototype on a virtual private network to enable parallel computation in multiple threads. Our protocol is confirmed to be more efficient than comparable existing approaches.
PNNI Performance Validation Test Report
NASA Technical Reports Server (NTRS)
Dimond, Robert P.
1999-01-01
Two Private Network-Network Interface (PNNI) neighboring peers were monitored with a protocol analyzer to understand and document how PNNI works with regards to initialization and recovery processes. With the processes documented, pertinent events were found and measured to determine the protocols behavior in several environments, which consisted of congestion and/or delay. Subsequent testing of the protocol in these environments was conducted to determine the protocol's suitability for use in satellite-terrestrial network architectures.
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-01-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810
Device-independent quantum private query
NASA Astrophysics Data System (ADS)
Maitra, Arpita; Paul, Goutam; Roy, Sarbani
2017-04-01
In quantum private query (QPQ), a client obtains values corresponding to his or her query only, and nothing else from the server, and the server does not get any information about the queries. V. Giovannetti et al. [Phys. Rev. Lett. 100, 230502 (2008)], 10.1103/PhysRevLett.100.230502 gave the first QPQ protocol and since then quite a few variants and extensions have been proposed. However, none of the existing protocols are device independent; i.e., all of them assume implicitly that the entangled states supplied to the client and the server are of a certain form. In this work, we exploit the idea of a local CHSH game and connect it with the scheme of Y. G. Yang et al. [Quantum Info. Process. 13, 805 (2014)], 10.1007/s11128-013-0692-8 to present the concept of a device-independent QPQ protocol.
Job Values in Today's Workforce: A Comparison of Public and Private Sector Employees.
ERIC Educational Resources Information Center
Karl, Katherine A.; Sutton, Cynthia L.
1998-01-01
A comparison of 47 public- and 170 private-sector workers revealed private-sector workers value good wages most and public-sector workers value interesting work. Results suggest that employers must keep in touch with employee values to design jobs, reward systems, and human-resource policies that will result in maximum job satisfaction. (JOW)
Is the flexible GnRH antagonist protocol better suited for fresh eSET cycles?
Dahdouh, Elias M; Gomes, Francisco L A F; Granger, Louis; Carranza-Mamane, Belina; Faruqi, Faez; Kattygnarath, Tiao-Virirak; St-Michel, Pierre
2014-10-01
This study was performed to evaluate the efficacy of the flexible GnRH antagonist protocol in comparison with the long GnRH agonist protocol in elective single embryo transfer (eSET) practice. It was conducted in a publicly funded in vitro fertilization program. We performed a prospective cohort analysis of data from a private infertility clinic from August 2010 to August 2011. Three hundred fourteen women with normal ovarian reserve and undergoing fresh eSET cycles were included. Sixty-four women underwent follicular stimulation using a flexible GnRH antagonist protocol, and 250 underwent stimulation with a standard long mid-luteal GnRH agonist protocol. Implantation rates (35.9% in the GnRH antagonist group and 29.6% in the GnRH agonist group, P = 0.5) and ongoing pregnancy rates (32.8% in the GnRH antagonist group and 28.8% in the GnRH agonist group, P = 0.5) were equivalent in both groups. The duration of stimulation (9.8 ± 2 days vs. 10.7 ± 1.8 days, P < 0.001) and total FSH dose required (2044 vs. 2775 IU, P < 0.001) were lower in the GnRH antagonist group than in the GnRH agonist group. The number of mature oocytes (6.0 vs. 10.0, P < 0. 001) and number of embryos (5.0 vs. 7.0, P < 0.001) were also lower in GnRH antagonist group. However, the number of embryos cryopreserved was similar in both groups (median 2.0, P = 0.3). In women undergoing in vitro fertilization, the flexible GnRH antagonist protocol yields implantation and ongoing pregnancy rates that are similar to the long GnRH agonist protocol, and requires lower doses of gonadotropins and a shorter duration of treatment. The flexible GnRH antagonist protocol appears to be the protocol of choice for an eSET IVF program.
Thin film femtosecond laser damage competition
NASA Astrophysics Data System (ADS)
Stolz, Christopher J.; Ristau, Detlev; Turowski, Marcus; Blaschke, Holger
2009-10-01
In order to determine the current status of thin film laser resistance within the private, academic, and government sectors, a damage competition was started at the 2008 Boulder Damage Symposium. This damage competition allows a direct comparison of the current state of the art of high laser resistance coatings since they are tested using the same damage test setup and the same protocol. In 2009 a high reflector coating was selected at a wavelength of 786 nm at normal incidence at a pulse length of 180 femtoseconds. A double blind test assured sample and submitter anonymity so only a summary of the results are presented here. In addition to the laser resistance results, details of deposition processes, coating materials and layer count, and spectral results will also be shared.
BDS thin film damage competition
NASA Astrophysics Data System (ADS)
Stolz, Christopher J.; Thomas, Michael D.; Griffin, Andrew J.
2008-10-01
A laser damage competition was held at the 2008 Boulder Damage Symposium in order to determine the current status of thin film laser resistance within the private, academic, and government sectors. This damage competition allows a direct comparison of the current state-of-the-art of high laser resistance coatings since they are all tested using the same damage test setup and the same protocol. A normal incidence high reflector multilayer coating was selected at a wavelength of 1064 nm. The substrates were provided by the submitters. A double blind test assured sample and submitter anonymity so only a summary of the results are presented here. In addition to the laser resistance results, details of deposition processes, coating materials, and layer count will also be shared.
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
1994-01-01
Public and Private Sector Manufacturing Firms 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e...REGIONAL EFFICIENCY IN PAKISTAN: COMPARISON OF PUBLIC AND PRIVATE SECTOR MANUFACTURING FIRMS by Robert E. Looney In an examination of the relative...efficiency in public and private sector enter- prises should be explored in more detail. In this vein the purpose of the analysis below is to examine the
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-18
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
A Quantum Private Query Protocol for Enhancing both User and Database Privacy
NASA Astrophysics Data System (ADS)
Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang
2018-01-01
In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016
Bidirectional private key exchange using delay-coupled semiconductor lasers.
Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo
2016-06-15
We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11 Mbit/s over a public channel.
NASA Astrophysics Data System (ADS)
Yu, Xiaoyuan; Yuan, Jian; Chen, Shi
2013-03-01
Cloud computing is one of the most popular topics in the IT industry and is recently being adopted by many companies. It has four development models, as: public cloud, community cloud, hybrid cloud and private cloud. Except others, private cloud can be implemented in a private network, and delivers some benefits of cloud computing without pitfalls. This paper makes a comparison of typical open source platforms through which we can implement a private cloud. After this comparison, we choose Eucalyptus and Wavemaker to do a case study on the private cloud. We also do some performance estimation of cloud platform services and development of prototype software as cloud services.
ERIC Educational Resources Information Center
Liao, Yuan
2011-01-01
The virtualization of computing resources, as represented by the sustained growth of cloud computing, continues to thrive. Information Technology departments are building their private clouds due to the perception of significant cost savings by managing all physical computing resources from a single point and assigning them to applications or…
Benefits and impacts of road removal
T. A. Switalski; J. A. Bissonette; T. H. Deluca; C. H. Luce; M. A. Madej
2004-01-01
Road removal is being used to mitigate the physical and ecological impacts of roads and to restore both public and private lands. Although many federal and state agencies and private landowners have created protocols for road removal and priorities for restoration, research has not kept pace with the rate of removal. Some research has been conducted on hydrologic and...
Deborah S. Page-Dumroese; Ann M. Abbott; Thomas M. Rice
2009-01-01
Volume I and volume II of the Forest Soil Disturbance Monitoring Protocol (FSDMP) provide information for a wide range of users, including technicians, field crew leaders, private landowners, land managers, forest professionals, and researchers. Volume I: Rapid Assessment includes the basic methods for establishing forest soil monitoring transects and consistently...
Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology
ERIC Educational Resources Information Center
Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot
2004-01-01
The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…
ERIC Educational Resources Information Center
Zhan, Shengli; Bray, Mark; Wang, Dan; Lykins, Chad; Kwo, Ora
2013-01-01
This paper examines Hong Kong students' perceptions on the effectiveness of private supplementary tutoring relative to mainstream schooling. Drawing on survey and interview data, it shows that large proportions of secondary school students receive private tutoring. Students generally perceive private tutoring and private tutors to be more…
Evaluation of a Crisis-Preparedness Training Program for the Faculty of a Private Elementary School
ERIC Educational Resources Information Center
Boyle, Marybeth N.
2010-01-01
The purpose of this study was to determine the effectiveness of a training program for the faculty of a private elementary school on executing the protocols, roles, and responsibilities defined in the institution's crisis-management plan. A formal training program for the faculty had not been developed, and administrators had no measure by which…
Practical quantum private query with better performance in resisting joint-measurement attack
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei
2016-04-01
As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.
Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy.
Christandl, Matthias; Ferrara, Roberto
2017-12-01
An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)PRLTAO0031-900710.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.
Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy
NASA Astrophysics Data System (ADS)
Christandl, Matthias; Ferrara, Roberto
2017-12-01
An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.
Kwong, Enid Wai-yung; Lee, Paul Hong; Yeung, Kwan-mo
2016-01-18
Because the demand for government-subsidized nursing homes in Hong Kong outstrips the supply, the number of for-profit private nursing homes has been increasing rapidly. However, the standard of care in such homes is always criticized. Pressure ulcers are a major long-term care issue that is closely associated with the quality of care delivered in nursing home settings. The aim of this study is to evaluate the effectiveness of a pressure ulcer prevention programme for residents in private for-profit nursing homes. This is a two-arm cluster randomized controlled trial with an estimated sample size of 1088 residents and 74 care staff from eight for-profit private nursing homes. Eligible nursing homes will be those classified as category A2 homes in the Enhanced Bought Place Scheme (EBPS), having a capacity of around 130-150 beds, and no structured PU prevention protocol and/or programmes in place. Care staff will be health workers, personal care workers, and nurses who are front-line staff providing direct care to residents. Eight nursing homes will be randomly assigned to either an experimental or control group. The experimental group will be provided with an intensive training programme and will be involved in the implementation of a 16-week pressure ulcer prevention protocol, while the control group will deliver the usual pressure ulcer prevention care. The study outcomes are the pressure ulcer prevention knowledge and skills of the care staff and the prevalence and incidence of pressure ulcers. Data on the knowledge and skills of care staff, and prevalence of pressure ulcer will be collected at the base line, and then at the 8(th) week and at completion of the implementation of the protocol. The assessment of the incidence of pressures will start from before the commencement of the intensive training course to the end of the implementation of the protocol. In view of the negative impact of pressure ulcers, it is important to have an effective and evidence-based pressure ulcer prevention programme to improve preventive care in private for-profit nursing homes. The programme will potentially improve the knowledge and skills of care staff on the prevention of pressure ulcers and also lead to a reduction in the development of pressure ulcers in nursing homes. The Current Controlled Trial is NCT02270385, 18 October 2014.
Experimental quantum private queries with linear optics
NASA Astrophysics Data System (ADS)
de Martini, Francesco; Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo; Nagali, Eleonora; Sansoni, Linda; Sciarrino, Fabio
2009-07-01
The quantum private query is a quantum cryptographic protocol to recover information from a database, preserving both user and data privacy: the user can test whether someone has retained information on which query was asked and the database provider can test the amount of information released. Here we discuss a variant of the quantum private query algorithm that admits a simple linear optical implementation: it employs the photon’s momentum (or time slot) as address qubits and its polarization as bus qubit. A proof-of-principle experimental realization is implemented.
A significant number (80%) of organic contaminants that represent health risks in drinking water are better suited to screening by LC/MS rather than GC/MS analysis. We report progress with the draft Library System Protocol 1.1 from a round robin of private, state and federal lab...
2005-05-01
efficiencies similar to those in the private sector . However, along the way, Government and private sector industry have begun to disagree about how PPI is...double that of the private sector due to an evaluation process that is cumbersome, time-consuming, and lacking the efficiencies enjoyed by private
Maldonado, Luiz Guilherme Louzada; Franco, José Gonçalves; Setti, Amanda Souza; Iaconelli, Assumpto; Borges, Edson
2013-05-01
To compare cost-effectiveness between pituitary down-regulation with a GnRH agonist (GnRHa) short regimen on alternate days and GnRH antagonist (GnRHant) multidose protocol on in vitro fertilization (IVF)/intracytoplasmic sperm injection (ICSI) outcome. Prospective, randomized. A private center. Patients were randomized into GnRHa (n = 48) and GnRHant (n = 48) groups. GnRHa stimulation protocol: administration of triptorelin on alternate days starting on the first day of the cycle, recombinant FSH (rFSH), and recombinant hCG (rhCG) microdose. GnRHant protocol: administration of a daily dose of rFSH, cetrorelix, and rhCG microdose. ICSI outcomes and treatment costs. A significantly lower number of patients underwent embryo transfer in the GnRHa group. Clinical pregnancy rate was significantly lower and miscarriage rate was significantly higher in the GnRHa group. It was observed a significant lower cost per cycle in the GnRHa group compared with the GnRHant group ($5,327.80 ± 387.30 vs. $5,900.40 ± 472.50). However, mean cost per pregnancy in the GnRHa was higher than in the GnRHant group ($19,671.80 ± 1,430.00 vs. $11,328.70 ± 907.20). Although the short controlled ovarian stimulation protocol with GnRHa on alternate days, rFSH, and rhCG microdose may lower the cost of an individual IVF cycle, it requires more cycles to achieve pregnancy. NCT01468441. Copyright © 2013 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
ERIC Educational Resources Information Center
Fitz, John; Beers, Bryan
2002-01-01
British government policies promoting public-private partnerships enabled the privatization of failing schools. In the U.S., the private sector has drawn upon a political network of well-financed institutions to advance privatized education, most recently among charter schools. Privatization has not yet been very successful, but promises to be…
Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.
1995-12-01
private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
Public-private interactions in global food safety governance.
Lin, Ching-Fu
2014-01-01
In response to an apparent decline in global food safety, numerous public and private regulatory initiatives have emerged to restore public confidence. This trend has been particularly marked by the growing influence of private regulators such as multinational food companies, supermarket chains and non-governmental organizations (NGOs), who employ private standards, certification protocols, third-party auditing, and transnational contracting practices. This paper explores how the structure and processes of private food safety governance interact with traditional public governance regimes, focusing on Global Good Agricultural Practices (GlobalGAP) as a primary example of the former. Due to the inefficiency and ineffectiveness of public regulation in the face of global problems, private governance in food safety has gradually replaced states' command-and-control regulation with more flexible, market-oriented mechanisms. The paper concludes by emphasizing the importance of constructive regime interaction instead of institutional boundary building to global food safety governance. Public and private ordering must each play a role as integral parts of a larger, dynamic and evolving governance complex.
ERIC Educational Resources Information Center
Rabossi, Marcelo
2010-01-01
Private higher education literature recognizes large public-private differentiation in terms of field of study. Relative to public counterparts, private universities tend to offer their services in fields that require low initial investments and present at least relatively attractive internal private rates of return. Thus, the main objective of…
Quantum And Relativistic Protocols For Secure Multi-Party Computation
NASA Astrophysics Data System (ADS)
Colbeck, Roger
2009-11-01
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions. In the final chapter we discuss the task of expanding a private random string, while dropping the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.
Macedo, Thiago Andrade; de Barros E Silva, Pedro Gabriel Melo; Simões, Sheila Aparecida; Okada, Mariana Yumi; Garcia, José Carlos Teixeira; Sampaio, Marcio Campos; Dantas, Roberto Nery; Oliveira, Roger Pereira; Rocha, Liliane Gomes; da Cunha Lopes, Bernardo Baptista; Frigini, Tiago; Furlan, Valter
2016-07-01
Brazilian registries have shown a gap between evidence-based therapies and real treatments. We aim to compare the use of the pharmacoinvasive strategy and mortality in patients with ST elevation myocardial infarction (STEMI) transferred pre- and post-chest pain protocol with access to telemedicine (CPPT) in a private hospital network. A CPPT was implemented in 22 private emergency departments in 2012. Emergency physicians and nurses of all facilities were trained to disseminate the information to comply with a chest pain protocol focusing on reperfusion therapy (pharmacoinvasive strategy) for STEMI. To conduct clinical discussions using telemedicine, a cardiologist from a reference hospital in cardiology (RHC) was available 24 h/day, 7 days/week. Using the database of all consecutive admissions, we compared the data of patients with STEMI transferred to the RHC in 2011 (pre-CPPT) and 2013-2014 (post-CPPT). We included 376 patients (113 pre-CPPT and 263 post-CPPT) with STEMI. All patients admitted in the RHC were transferred from the 22 emergency departments. Comparing pre-CPPT and post-CPPT, we did not find differences regarding age, gender, hypertension, dyslipidemia, diabetes, smoking, previous myocardial infarction, or Killip classification. However, the use of CPPT was associated with a greater use of pharmacoinvasive strategy (55.8% versus 38%; p = 0.002) and a trend toward lower in-hospital mortality (3% versus 8%; p = 0.06). The implementation of a CPPT was associated with a significant increase in the use of pharmacoinvasive strategy in patients with STEMI and a trend toward reduced in-hospital mortality in a private hospital network.
Quantum solution to a class of two-party private summation problems
NASA Astrophysics Data System (ADS)
Shi, Run-Hua; Zhang, Shun
2017-09-01
In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.
Kwong, Enid Wy; Hung, Maria Sy; Woo, Kevin
2016-11-25
A need exits to develop a protocol for preventing pressure ulcers (PUs) in private for-profit nursing homes in Hong Kong, where the incidence of PUs is relatively high and which have high proportion of non-professional care staff. The implementation of such protocol would involve changes in the practice of care, likely evoking feelings of fear and uncertainty that may become a barrier to staff adherence. We thus adopted the Systems Model of Action Research in this study to manage the process of change for improving PU prevention care and to develop a pressure ulcer prevention protocol for private for-profit nursing homes. A total of 474 residents and care staff who were health workers, personal care workers, and/or nurses from four private, for-profit nursing homes in Hong Kong participated in this study. Three cyclic stages and steps, namely, unfreezing (planning), changing (action), and refreezing (results) were carried out. During each cycle, focus group interviews, field observations of the care staff's practices and inspections of the skin of the residents for pressure ulcers were conducted to evaluate the implementation of the protocol. Qualitative content analysis was adopted to analyse the data. The data and methodological triangulation used in this study increased the credibility and validity of the results. The following nine themes emerged from this study: prevention practices after the occurrence of PUs, the improper use of pressure ulcer prevention materials, non-compliance with several prevention practices, improper prevention practices, the perception that the preventive care was being performed correctly, inadequate readiness to use the risk assessment tool, an undesirable environment, the supplying of unfavorable resources, and various management styles in the homes with or without nurses. At the end of the third cycle, the changes that were identified included improved compliance with the revised risk assessment method, the timely and appropriate use of PU prevention materials, the empowering of staff to improve the quality of PU care, and improved home management. Through the action research approach, the care staff were empowered and their PU prevention care practices had improved, which contributed to the decreased incidence of pressure ulcers. A PU prevention protocol that was accepted by the staff was finally developed as the standard of care for such homes.
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
Comparison of Management Practices in Public and Private Universities in Khyber Pakhtunkhwa
ERIC Educational Resources Information Center
Khan, Nasrullah; Aajiz, Niaz Muhammad; Ali, Akber
2018-01-01
This study attempted to compare the management practices in public and private universities in Khyber Pakhtunkhawa, Pakistan. The comparison is based on availability of written rules and regulations, distribution of tasks, availability of managers, access to officers, time management, work load, staff promotion procedure and appraisal system.…
1999-12-01
compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not
Farajzadegan, Ziba; Pozveh, Zahra Amini
2013-08-01
Abnormal weight gain during pregnancy increases the adverse health outcomes during the pregnancy, delivery, and the postpartum period. Most of the pregnant women develop weight gain more than the recommended limits; therefore, interventions to manage such disproportionate weight gain are needed. In this paper, the design of the maternal centered life-style intervention study is described, which focuses on controlling weight gaining during pregnancy for all body mass index (BMI) groups. In our randomized field trial, 160 pregnant women with 6-10 weeks of gestational age who visit one of the participating Isfahan four urban public-health centers and 4 private obstetric offices are included. The maternal centered life-style intervention carried out by trained midwives is standardized in a protocol. All the participants are visited at 6-10, 11-15, 16-20, 21-25, 26-30, 31-34, 35-37, 38, 39, and 40 weeks of pregnancy. The women who are randomized in the intervention group receive maternal centered educational package of prenatal care for the pregnant woman and a log book in the first visit. Counselors accompany the pregnant women to maintain or develop a healthy life-style. Data collection will perform monthly measuring body weight, BMI. Because, we don't have structured protocol for weight management during pregnancy especially, in private sectors if the maternal centered life-style intervention proves to be effective, it will be suggested to merge this package to routine care. Therewith by empowering women to manage their weight the public-health burden can be reduced. Beside that private obstetricians also have structured protocol for their client management.
Huang, Terry T-K; Ferris, Emily; Crossley, Rachel; Guillermin, Michelle; Costa, Sergio; Cawley, John
2015-01-01
Public health leaders increasingly recognize the importance of multi-sector partnerships and systems approaches to address obesity. Public-private partnerships (PPP), which are joint ventures between government agencies and private sector entities, may help facilitate this process, but need to be delivered through comprehensive, transparent frameworks to maximize potential benefits and minimize potential risks for all partners. The City University of New York (CUNY) School of Public Health and the Healthy Weight Commitment Foundation (HWCF) propose to engage in a unique academic-private-sector research partnership to evaluate the impact and effectiveness of the food and beverage industry's investment in obesity and hunger prevention and reduction through community-level healthful eating and active living programs. The CUNY-HWCF academic-private partnership protocol described here incorporates best practices from the literature on PPP into the partnership's design. The CUNY-HWCF partnership design demonstrates how established guidelines for partnership components will actively incorporate and promote the principles of successful PPPs identified in various research papers. These identified principles of successful PPP, including mutuality (a reciprocal relationship between entities), and equality among partners, recognition of partners' unique strengths and roles, alignment of resources and expertise toward a common cause, and coordination and delegation of responsibilities, will be embedded throughout the design of governance, management, funding, intellectual property and accountability structures. The CUNY-HWCF partnership responds to the call for increased multi-sector work in obesity prevention and control. This framework aims to promote transparency and the shared benefits of complementary expertise while minimizing shared risks and conflicts of interest. This framework serves as a template for future academic-private research partnerships.
On Reconstructing School Segregation: The Efficacy and Equity of Single-Sex Schooling
ERIC Educational Resources Information Center
Billger, Sherrilyn M.
2009-01-01
A change to Title IX has spurred new single-sex public schooling in the US. Until recently, nearly all gender-segregated schools were private, and comprehensive data for public school comparisons are not yet available. To investigate the effects of single-sex education, I focus on within private sector comparisons, and additionally address…
Comparison of Navy and Private-Sector Construction Costs
1997-09-01
contracts are comparable to private - sector construction costs. This report compares those costs. The report includes a description of the methodology...costs of complying with federal contracting requirements as compared with the costs of similar projects completed under typical private - sector contracts...The study found that the costs of facilities constructed under Navy contracts compare favorably to private - sector construction costs for similar
Kakoko, Deodatus C; Ketting, Evert; Kamazima, Switbert R; Ruben, Ruerd
2012-12-01
Adherence to the policy guidelines and standards is necessary for family planning services. We compared public and private facilities in terms of provision of family planning services. We analyzed data from health facility questionnaire of the 2006 Tanzania Service Provision Assessment survey, based on 529 health facilities. Majority of public facilities (95.4%) offered family planning services, whereas more than half of private facilities (52.1%) did not offer those. Public facilities were more likely to offer modern contraceptives as compared to private facilities. However, private facilities were more likely to offer counseling on natural methods of family planning [AOR = 2.12 (1.15-3.92), P < or = 0.001]. Public facilities were more likely to report having guidelines or protocols for family planning services and various kinds of visual aids for family planning and STIs when compared to private facilities. This comparative analysis entails the need to enforce the standards of family planning services in Tanzania.
An information model for a virtual private optical network (OVPN) using virtual routers (VRs)
NASA Astrophysics Data System (ADS)
Vo, Viet Minh Nhat
2002-05-01
This paper describes a virtual private optical network architecture (Optical VPN - OVPN) based on virtual router (VR). It improves over architectures suggested for virtual private networks by using virtual routers with optical networks. The new things in this architecture are necessary changes to adapt to devices and protocols used in optical networks. This paper also presents information models for the OVPN: at the architecture level and at the service level. These are extensions to the DEN (directory enable network) and CIM (Common Information Model) for OVPNs using VRs. The goal is to propose a common management model using policies.
Quimbo, Stella Alabastro
2006-11-01
This paper examines how premiums for ability are set and how these can enhance the quality of care provided in private markets. The specific context for this study is the market for tuberculosis (TB) care in the Philippines. While the most cost- and clinically-effective treatment method known as TB Directly Observed Treatment Short Course (TB DOTS) is increasingly being provided by the public sector, few private doctors have adopted this protocol. As findings of multivariate regression analyses of private physicians' fees suggest, this low adoption rate can be partly explained by the modest premiums private doctors receive for using TB DOTS. While the public provision of TB DOTS should be pursued in earnest, this paper argues that the complementarity between public and private provision of TB DOTS should be strengthened, especially since Filipino TB patients seem to prefer private doctors. This goal can be achieved through user fees that (i) include a sufficiently large premium for physician ability and (ii) are paid through the social insurance system. Copyright (c) 2006 John Wiley & Sons, Ltd.
Enterprise virtual private network (VPN) with dense wavelength division multiplexing (DWDM) design
NASA Astrophysics Data System (ADS)
Carranza, Aparicio
An innovative computer simulation and modeling tool for metropolitan area optical data communication networks is presented. These models address the unique requirements of Virtual Private Networks for enterprise data centers, which may comprise a mixture of protocols including ESCON, FICON, Fibre Channel, Sysplex protocols (ETR, CLO, ISC); and other links interconnected over dark fiber using Dense Wavelength Division Multiplexing (DWDM). Our models have the capability of designing a network with minimal inputs; to compute optical link budgets; suggest alternative configurations; and also optimize the design based on user-defined performance metrics. The models make use of Time Division Multiplexing (TDM) wherever possible for lower data rate traffics. Simulation results for several configurations are presented and they have been validated by means of experiments conducted on the IBM enterprise network testbed in Poughkeepsie, N.Y.
PACIFIC NORTHWEST SIDE-BY-SIDE PROTOCOL COMPARISON TEST
Eleven state, tribal, and federal agencies participated during summer 2005 in a side-by-side comparison of protocols used to measure common in-stream physical attributes to help determine which protocols are best for determining status and trend of stream/watershed condition. Th...
Cadierno, Juan Pedro García; Renedo, J I Serrano; Lopez, E Gil
2006-11-01
The presence of radioactive materials in scrap metal has been detected relatively often in recent years. As a result of an accidental melting of a 137Cs source in a Spanish steel mill (Acerinox) in 1998, the national authorities, the involved private companies, and the main trade unions drafted a protocol for prevention of and responding to such events ("Spanish Protocol"). The Protocol was signed in 1999. The number of subscribing companies is 90. The Protocol is a voluntary agreement defining the radiological surveillance of scrap metal and its products and the duties and rights of the signatories. From the effective date of the Protocol to December 2004, 461 pieces of ferric scrap were detected including sources of radiation and contaminated metal. Four melting incidents have happened in different companies.
ERIC Educational Resources Information Center
Williams, Jeffrey W.; And Others
This report presents the results of a national survey on the status of the library media resources and services in elementary and secondary public and private schools in the United States in 1985. Also included are selected comparisons of survey results with the 1975 AASL (American Association of School Librarians)/AECT (Association for…
Public and Private Adoption: A Comparison of Service and Accessibility.
ERIC Educational Resources Information Center
Daly, Kerry J.; Sobol, Michael P.
1994-01-01
Used data from national survey of public and private adoption service providers in Canada to examine similarities and differences with respect to clients served, issues associated with adoption accessibility, and nature of postadoption services. Found high degree of homogeneity that cut across public and private division, with typical adoptive…
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Private quantum computation: an introduction to blind quantum computing and related protocols
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.
2017-06-01
Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.
ERIC Educational Resources Information Center
Nutting, Paul A.; And Others
Utilizing a quality assessment methodology for ambulatory patient care currently under development by the Indian Health Service's (IHS) Office of Research and Development, comparisons were made between results derived from a pilot test in IHS service units, 2 metropolitan Health Maintenance Organizations (HMO), and 3 rural private practices.…
ERIC Educational Resources Information Center
Walford, Geoffrey
2011-01-01
There has been a growing amount of research on low-fee private schools in less economically developed countries, but much less on low-fee private schools in developed countries. Yet, low-fee private schools have also been a recent feature of the educational landscape in countries such as Canada, the USA, Australia and Great Britain. This paper…
Hanada, Takaaki; Zaitsu, Ai; Kojima, Satoshi; Ukai, Hirohiko; Nagasawa, Yasuhiro; Takada, Shiro; Kawakami, Takuya; Ohashi, Fumiko; Ikeda, Masayuki
2014-01-01
Solvents used in production facility-affiliated private laboratories have been seldomly reported. This study was initiated to specify solvent use characteristics in private laboratories in comparison with the use in public research laboratories and on production floors. Elucidation of the applicability of conclusions from a public laboratory survey to private institutions is not only of scientific interest but also of practical importance. A survey on use of 47 legally stipulated organic solvents was conducted. The results were compiled for April 2011 to March 2013. Through sorting, data were available for 479 unit workplaces in private laboratories. Similar sorting for April 2012 to March 2013 was conducted for public research laboratories (e.g., national universities) and production floors (in private enterprises) to obtain 621 and 937 cases, respectively. Sampling of workroom air followed by capillary gas-chromatographic analyses for solvents was conducted in accordance with regulatory requirements. More than one solvent was usually detected in the air of private laboratories. With regard to solvent types, acetone, methyl alcohol, chloroform and hexane were prevalently used in private laboratories, and this was similar to the case of public laboratories. Prevalent use of ethyl acetate was unique to private laboratories. Toluene use was less common both in private and public laboratories. The prevalence of administrative control class 1 (i.e., an adequately controlled environment) was higher in laboratories (both private and public) than production floors. Solvent use patterns are similar in private and public laboratories, except that the use of mixtures of solvents is substantially more popular in private laboratories than in public laboratories.
Private Schooling in the U.S.: Expenditures, Supply, and Policy Implications
ERIC Educational Resources Information Center
Baker, Bruce D.
2009-01-01
This report provides a first-of-its-kind descriptive summary of private school expenditures. It includes comparisons of expenditures among different types and affiliations of private schools, and it also compares those expenditures with public school expenditures for districts in the same state and labor market. Results indicate that (1) the…
Comparisons of Young Children's Private Speech Profiles: Analogical Versus Nonanalogical Reasoners.
ERIC Educational Resources Information Center
Manning, Brenda H.; White, C. Stephen
The primary intention of this study was to compare private speech profiles of young children classified as analogical reasoners (AR) with young children classified as nonanalogical reasoners (NAR). The secondary purpose was to investigate Berk's (1986) research methodology and categorical scheme for the collection and coding of private speech…
Experimental extraction of secure correlations from a noisy private state.
Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P
2011-01-21
We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.
Bhatia, Jagdish; Cleland, John
2004-11-01
The object of this study was to compare components of quality of care provided to female outpatients by practitioners working in the private and public sectors in Karnataka State, India. Consultations conducted by 18 private practitioners and 25 public-sector practitioners were observed for 5 days using a structured protocol. Private practitioners were selected from members of the Indian Medical Association in a predominantly rural sub-district of Kolar District. Government doctors were selected from a random sample of hospitals and health centres in three sub-districts of Mysore District. A total of 451 private-sector and 650 public-sector consultations were observed; in each sector about half involved a female practitioner. The mean length of consultation was 2.81 minutes in the public sector and 6.68 minutes in the private sector. Compared with public-sector practitioners, private practitioners were significantly more likely to undertake a physical examination and to explain their diagnosis and prognosis to the patient. Privacy was much better in the private sector. One-third of public-sector patients received an injection compared with two-thirds of private patients. The mean cost of drugs dispensed or prescribed were Rupees 37 and 74 in public and private sectors, respectively. Both in terms of thoroughness of diagnosis and doctor-patient communication, the quality of care appears to be much higher in the private than in the public sector. However, over-prescription of drugs by private practitioners may be occurring.
Monitoring protocols: options, approaches, implementation, benefits
USDA-ARS?s Scientific Manuscript database
Monitoring and adaptive management are fundamental concepts to rangeland management across land management agencies and embodied as best management practices for private landowners. Historically, rangeland monitoring was limited to determining impacts or maximizing the potential of specific land use...
Public Funding and Control of Private Schools: Canadian-U.S. Comparisons.
ERIC Educational Resources Information Center
Husby, Philip J.
This paper examines the legal questions involved in public financial support and resulting public control of private schools in both Canada and the U.S. Three factors are responsible for increased public interest in private schools in recent years, the paper states: increased educational costs, concern over the concept of equal education, and…
Key handling in wireless sensor networks
NASA Astrophysics Data System (ADS)
Li, Y.; Newe, T.
2007-07-01
With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.
A Comparison of the Sodium Content of Supermarket Private-Label and Branded Foods in Australia.
Trevena, Helen; Neal, Bruce; Dunford, Elizabeth; Haskelberg, Hila; Wu, Jason H Y
2015-08-21
Supermarket private-label products are perceived to be lower quality than their branded counterparts. Excess dietary sodium in foods contributes to high blood pressure and cardiovascular disease. Sodium concentrations in products are an important indicator of quality. We compared the sodium content of 15,680 supermarket private-label and branded products, available in four Australian supermarkets between 2011-2013, overall and for 15 food categories. Mean sodium values were compared for: (1) all products in 2013; (2) products in both 2011 and 2013; and (3) products only in 2013. Comparisons were made using paired and unpaired t tests. In each year the proportion of supermarket private-label products was 31%-32%, with overall mean sodium content 17% (12%-23%) lower than branded products in 2013 (p ≤ 0.001). For products available in both 2011 and 2013 there was a ≤2% (1%-3%) mean sodium reduction overall with no difference in reformulation between supermarket private-label and branded products (p = 0.73). New supermarket private-label products in 2013 were 11% lower in sodium than their branded counterparts (p = 0.02). Supermarket private-label products performed generally better than branded in terms of their sodium content. Lower sodium intake translates into lower blood pressure; some supermarket private-label products may be a good option for Australians needing to limit their sodium intake.
A Comparison of the Sodium Content of Supermarket Private-Label and Branded Foods in Australia
Trevena, Helen; Neal, Bruce; Dunford, Elizabeth; Haskelberg, Hila; Wu, Jason H. Y.
2015-01-01
Supermarket private-label products are perceived to be lower quality than their branded counterparts. Excess dietary sodium in foods contributes to high blood pressure and cardiovascular disease. Sodium concentrations in products are an important indicator of quality. We compared the sodium content of 15,680 supermarket private-label and branded products, available in four Australian supermarkets between 2011–2013, overall and for 15 food categories. Mean sodium values were compared for: (1) all products in 2013; (2) products in both 2011 and 2013; and (3) products only in 2013. Comparisons were made using paired and unpaired t tests. In each year the proportion of supermarket private-label products was 31%–32%, with overall mean sodium content 17% (12%–23%) lower than branded products in 2013 (p ≤ 0.001). For products available in both 2011 and 2013 there was a ≤2% (1%–3%) mean sodium reduction overall with no difference in reformulation between supermarket private-label and branded products (p = 0.73). New supermarket private-label products in 2013 were 11% lower in sodium than their branded counterparts (p = 0.02). Supermarket private-label products performed generally better than branded in terms of their sodium content. Lower sodium intake translates into lower blood pressure; some supermarket private-label products may be a good option for Australians needing to limit their sodium intake. PMID:26308047
Direct cost comparison of totally endoscopic versus open ear surgery.
Patel, N; Mohammadi, A; Jufas, N
2018-02-01
Totally endoscopic ear surgery is a relatively new method for managing chronic ear disease. This study aimed to test the null hypothesis that open and endoscopic approaches have similar direct costs for the management of attic cholesteatoma, from an Australian private hospital setting. A retrospective direct cost comparison of totally endoscopic ear surgery and traditional canal wall up mastoidectomy for the management of attic cholesteatoma in a private tertiary setting was undertaken. Indirect and future costs were excluded. A direct cost comparison of anaesthetic setup and resources, operative setup and resources, and surgical time was performed between the two techniques. Totally endoscopic ear surgery has a mean direct cost reduction of AUD$2978.89 per operation from the hospital perspective, when compared to canal wall up mastoidectomy. Totally endoscopic ear surgery is more cost-effective, from an Australian private hospital perspective, than canal wall up mastoidectomy for attic cholesteatoma.
Ways and Means to Utilize Private Practitioners for Tuberculosis Care in India.
Samal, Janmejaya
2017-02-01
The growing interest of utilizing the private practitioners in improving the outreach of public health services including Tuberculosis (TB) control programme stemmed out of people's preference for private health facilities in situations where public health facilities fail to meet the expectations. In different parts of India, many models of Public Private Partnership have been tried and tested and proved successful in providing quality TB care in the concerned community. In this paper, several ways and means have been proposed to effectively utilize private practitioners for TB care in India. These strategies are discussed under different headings: (1) identification of potential private practitioners: (2) orientation of private practitioners: (3) networking of private practitioners with patients and Directly Observed Treatment Short course (DOTS) provider: (4) follow-up and sensitization of patients by private practitioners: (5) let the word of mouth work: and (6) evaluation of the involvement of private practitioners in TB care. However the following points must be addressed before utilizing the private practitioners for TB care: time constraints in notifying the disease, adherence to DOTS regime/alternative to DOTS regime, referral of patients to public health facilities for diagnosis and treatment, follow-up and sensitization of the patients and behaviour change communication and awareness in the community by the private practitioners. Few of these are mandatory for the private practitioners; most are practicable. With the effective utilization of private practitioners many problems can be sorted out that are currently plaguing the system such as irrational and excessive use of certain drugs, over reliance on chest X-ray for diagnosis, under use of sputum microscopy, lack of knowledge regarding standard treatment protocols and varied prescription practices.
ERIC Educational Resources Information Center
Allard, Sandra
Revenues and expenditures at public and private colleges and universities in Maryland were analyzed and compared with national patterns. State Board for Higher Education (SBHE) guidelines were also consulted. Expenditure patterns of public and private colleges are similar. However, private colleges are most dependent on tuition and fees and income…
ERIC Educational Resources Information Center
Mostafa, Mohamed M.
2006-01-01
The overall purpose of this research is to further our understanding of how students perceive service quality in Egypt's private universities. The paper also tests the SERVQUAL dimensions in higher education within an Arab, non-Western context. A sample of 508 students from four private universities in Egypt participated in the study. Student…
ERIC Educational Resources Information Center
Tsigilis, Nikolaos; Zachopoulou, Evridiki; Grammatikopoulos, Vasilios
2006-01-01
The purpose of the present study was to examine perceived levels of burnout and job satisfaction of Greek early educators, across public and private sector. One hundred and seventy eight childhood educators participated in the study. 108 were working in the public sector, 67 in private sector, whereas three did not respond. Participants were…
Investigations of Fully Homomorphic Encryption (IFHE)
2015-05-01
analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able...used in Bitcoin [30]. The implementation of the secp256k1 curve in OpenSSL is interesting as it uses the wNAF method for exponentiation, as opposed to... Bitcoin an obvious mitigation against the attack is to limit the number of times a private key is used within the Bitcoin protocol. Each wallet
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
Ubiquitous virtual private network: a solution for WSN seamless integration.
Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos
2014-01-06
Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network.
Lung-MAP Launches: First Precision Medicine Trial From National Clinical Trials Network
A unique public-private collaboration today announced the initiation of the Lung Cancer Master Protocol (Lung-MAP) trial, a multi-drug, multi-arm, biomarker-driven clinical trial for patients with advanced squamous cell lung cancer. Squamous cell carcinom
Children's Perspective of Game: A Comparison of the Public and Private Schools
ERIC Educational Resources Information Center
Gündüz, Nevin; Taspinar, Tugçe; Demis, Nurdan
2017-01-01
The purpose of this research is to determine what the game means from the perspectives of children studying at public and private schools. Four questionnaires were applied to all the third grade parents of four schools; two public and two private schools in Ankara, and questionnaires were completed and sent back by 212 parents. A total of 32…
ERIC Educational Resources Information Center
Brown, Celia; Belfield, Clive R.
Despite the strategic importance of the private-school sector to education policy reform, and a general belief in the superiority of private schools, there is very little evidence on the relative effects of such schooling in comparison with public schools. This paper reviews the current evidence in the United States and United Kingdom on the…
Lasers in private dermatologic practice.
Eastern, J S
1986-04-01
The author has collected and evaluated data from 464 cutaneous laser procedures performed on 315 patients over two and one-half years. All procedures were performed under local anesthesia in a private dermatology office. The quality of results obtained, the advantages and disadvantages of laser treatment for the treatment of cutaneous problems, comparison with more conventional therapies, and the future of the laser in dermatologic private practice are discussed.
Brito, Maíra M; Lúcio, Cristina F; Angrimani, Daniel S R; Losano, João Diego A; Dalmazzo, Andressa; Nichi, Marcílio; Vannucchi, Camila I
2017-01-02
In addition to the existence of several cryopreservation protocols, no systematic research has been carried out in order to confirm the suitable protocol for canine sperm. This study aims to assess the effect of adding 5% glycerol during cryopreservation at 37°C (one-step) and 5°C (two-steps), in addition of testing two thawing protocols (37°C for 30 seconds, and 70°C for 8 seconds). We used 12 sperm samples divided into four experimental groups: Single-Step - Slow Thawing Group; Two-Step - Slow Thawing Group; Single-Step - Fast Thawing Group; and Two-Step - Fast Thawing Group. Frozen-thawed samples were submitted to automated analysis of sperm motility, evaluation of plasmatic membrane integrity, acrosomal integrity, mitochondrial activity, sperm morphology, sperm susceptibility to oxidative stress, and sperm binding assay to perivitellinic membrane of chicken egg yolk. Considering the comparison between freezing protocols, no statistical differences were verified for any of the response variables. When comparison between thawing protocols was performed, slow thawing protocol presented higher sperm count bound to perivitelline membrane of chicken egg yolk, compared to fast thawing protocol. Regardless of the freezing process, the slow thawing protocol can be recommended for the large scale cryopreservation of canine semen, since it shows a consistent better functional result.
Mondragón-Ramírez, Guillermo A; Bochicchio-Riccardelli, Tommaso; Bernal-Flores, Lourdes; León-Rojas, Gerardo; Martínez-Hernández, José A; Orozco-Tapia, Luis M; Rustrián-Hernández, Alicia E; López-Amozurrutia, Ricardo; Ortega-Montillo, Carlos A; Flores-Gama, Francisco
2011-09-01
The Mexican Institute of Transplantation (IMT) was created in 1999 in response to the need to meet the demand for transplants in the south of the country for patients with limited resources. Thanks to the synergy with private assistance foundations this task has been accomplished. To describe the IMT experience in kidney transplants. From November 1999 to May 23,2011, 754 kidney transplants were performed in the IMT, of which 733 were from living donors and only 21 from deceased donors. In our experience, the 10-year patient and graft survival were 84.4 and 72.4%, respectively. The average follow-up of patients was 44 months, it was during the first year after transplantation when most of patients were lost. More than 50% of patients have been supported by private assistance foundations. The IMT has participated in research protocols for phase II and phase III, for the development of new immunosuppressants. The synergy between our private medical institution and private assistance foundations has permitted to transplant low income patients, a similar association can be carried out in governmental health institutions that have overcharge in their transplant services.
Security Issues for Mobile Medical Imaging: A Primer.
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
2015-10-01
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.
2009-03-27
This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated manymore » questions on the performance and operational cost of these buildings.« less
Securely Measuring the Overlap between Private Datasets with Cryptosets
Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon
2015-01-01
Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898
Bires, Angela Macci; Lawson, Dori; Wasser, Thomas E; Raber-Baer, Donna
2013-12-01
Clinically valid cardiac evaluation via treadmill stress testing requires patients to achieve specific target heart rates and to successfully complete the cardiac examination. A comparison of the standard Bruce protocol and the ramped Bruce protocol was performed using data collected over a 1-y period from a targeted patient population with a body mass index (BMI) equal to or greater than 30 to determine which treadmill protocol provided more successful examination results. The functional capacity, metabolic equivalent units achieved, pressure rate product, and total time on the treadmill as measured for the obese patients were clinically valid and comparable to normal-weight and overweight patients (P < 0.001). Data gathered from each protocol demonstrated that the usage of the ramped Bruce protocol achieved more consistent results in comparison across all BMI groups in achieving 80%-85% of their age-predicted maximum heart rate. This study did not adequately establish that the ramped Bruce protocol was superior to the standard Bruce protocol for the examination of patients with a BMI equal to or greater than 30.
Stimpfel, Martin; Vrtacnik-Bokal, Eda; Pozlep, Barbara; Virant-Klun, Irma
2015-01-01
The reports on how to stimulate the ovaries for oocyte retrieval in good prognosis patients are contradictory and often favor one type of controlled ovarian hyperstimulation (COH). For this reason, we retrospectively analyzed data from IVF/ICSI cycles carried out at our IVF Unit in good prognosis patients (aged <38 years, first and second attempts of IVF/ICSI, more than 3 oocytes retrieved) to elucidate which type of COH is optimal at our condition. The included patients were undergoing COH using GnRH agonist, GnRH antagonist or GnRH antagonist mild protocol in combination with gonadotrophins. We found significant differences in the average number of retrieved oocytes, immature oocytes, fertilized oocytes, embryos, transferred embryos, embryos frozen per cycle, and cycles with embryo freezing between studied COH protocols. Although there were no differences in live birth rate (LBR), miscarriages, and ectopic pregnancies between compared protocols, pregnancy rate was significantly higher in GnRH antagonist mild protocol in comparison with both GnRH antagonist and GnRH agonist protocols and cumulative LBR per cycle was significantly higher in GnRH antagonist mild protocol in comparison to GnRH agonist protocol. Our data show that GnRH antagonist mild protocol of COH could be the best method of choice in good prognosis patients.
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
Ubiquitous Virtual Private Network: A Solution for WSN Seamless Integration
Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos
2014-01-01
Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network. PMID:24399154
A cost and performance comparison of Public Private Partnership and public hospitals in Spain.
Caballer-Tarazona, Maria; Clemente-Collado, Antonio; Vivas-Consuelo, David
2016-12-01
Public-private partnership (PPP) initiatives are extending around the world, especially in Europe, as an innovation to traditional public health systems, with the intention of making them more efficient.There is a varied range of PPP models with different degrees of responsibility from simple public sector contracts with the private, up to the complete privatisation of the service. As such, we may say the involvement of the private sector embraces the development, financing and provision of public infrastructures and delivery services.In this paper, one of the oldest PPP initiatives developed in Spain and transferred to other European and Latin American countries is evaluated for first time: the integrated healthcare delivery Alzira model.Through a comparison of public and PPP hospital performance, cost and quality indicators, the efficiency of the PPP experience in five hospitals is evaluated to identify the influence of private management in the results.Regarding the performance and efficiency analysis, it is seen that the PPP group obtains good results, above the average, but not always better than those directly managed. It is necessary to conduct studies with a greater number of PPP hospitals to obtain conclusive results.
The Submersible Threat to Maritime Homeland Security
2013-09-01
government . IRB Protocol number ____N/A____. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b...20 Figure 8. Privately Owned Tourist Submersible (From Atlantis Submarine off Maui...Armed Forces of Colombia (Spanish) FLIR Forward Looking Infrared Radar GAO Government Accountability Office GPS Global Positioning System
Tuberculosis Notification by Private Sector' Physicians in Tehran.
Ahmadi, Ayat; Nedjat, Saharnaz; Gholami, Jaleh; Majdzadeh, Reza
2015-01-01
A small proportion of physicians adhere to tuberculosis (TB) notification regulations, particularly in the private sector. In most developing countries, the private sector has dominance over delivering services in big cities. In such circumstances deviation from the TB treatment protocol is frequently happening. This study sought to estimate TB notification in the private sector and settle on determinants of TB notification by private sector physicians. A population-based study has been conducted; private physicians at their clinics were interviewed. The total number of 443 private sectors' physicians has been chosen by the stratified random sampling method. Appropriate descriptive analysis was used to describe the study's participants. Logistic regression was used for bivariable and multivariable analysis. The response rate of the study was 90.06 (399%). Among responders, who had stated that they were suspicious of TB over the recent year, 62 (16.45%) stated that they reported cases of TB at least once during the same period. Having reporting requirements and the number of visited patients was significantly related to TB suspicious (odds ratio = 2.84, confidence interval: 1.62-5, P < 0.01). Workplace and access to relevant resources are associated with TB notification (P < 0.05). In poor resource settings with a high burden of TB, the public health administration can promote notification activities in the private sector by simple and quick interventions. It seems that a considerable fraction of private sector physicians, not all of them, will notify TB if they are provided with primary information and primary resources. To optimize the TB notification, however, intersectoral interventions are more likely to be successful.
Evidence-Based Medicine in judicial decisions concerning right to healthcare
Dias, Eduardo Rocha; da Silva, Geraldo Bezerra
2016-01-01
ABSTRACT Objective To analyze, from the examination of decisions issued by Brazilian courts, how Evidence-Based Medicine was applied and if it led to well-founded decisions, searching the best scientific knowledge. Methods The decisions made by the Federal Courts were searched, with no time limits, at the website of the Federal Court Council, using the expression “Evidence-Based Medicine”. With regard to decisions issued by the court of the State of São Paulo, the search was done at the webpage and applying the same terms and criterion as to time. Next, a qualitative analysis of the decisions was conducted for each action, to verify if the patient/plaintiff’s situation, as well as the efficacy or inefficacy of treatments or drugs addressed in existing protocols were considered before the court granted the provision claimed by the plaintiff. Results In less than one-third of the decisions there was an appropriate discussion about efficacy of the procedure sought in court, in comparison to other procedures available in clinical guidelines adopted by the Brazilian Unified Health System (Sistema Único de Saúde) or by private health insurance plans, considering the individual situation. The majority of the decisions involved private health insurance plans (n=13, 68%). Conclusion The number of decisions that did consider scientific evidence and the peculiarities of each patient was a concern. Further discussion on Evidence-Based Medicine in judgments involving public healthcare are required. PMID:27074226
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Greenberger-Horne-Zeilinger states-based blind quantum computation with entanglement concentration.
Zhang, Xiaoqian; Weng, Jian; Lu, Wei; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing
2017-09-11
In blind quantum computation (BQC) protocol, the quantum computability of servers are complicated and powerful, while the clients are not. It is still a challenge for clients to delegate quantum computation to servers and keep the clients' inputs, outputs and algorithms private. Unfortunately, quantum channel noise is unavoidable in the practical transmission. In this paper, a novel BQC protocol based on maximally entangled Greenberger-Horne-Zeilinger (GHZ) states is proposed which doesn't need a trusted center. The protocol includes a client and two servers, where the client only needs to own quantum channels with two servers who have full-advantage quantum computers. Two servers perform entanglement concentration used to remove the noise, where the success probability can almost reach 100% in theory. But they learn nothing in the process of concentration because of the no-signaling principle, so this BQC protocol is secure and feasible.
USDA-ARS?s Scientific Manuscript database
Private-label brands account for about one in four foods sold in U.S. supermarkets. They provide value to consumers due to their low cost. We know of no U.S. studies comparing the nutrition content of private-label with corresponding national-brand products. The objective of this study was to compar...
Positive interaction of social comparison and personal responsibility for outcomes.
Grygolec, Jaroslaw; Coricelli, Giorgio; Rustichini, Aldo
2012-01-01
We formulate and test a model that allows sharp separation between two different ways in which environment affects evaluation of outcomes, by comparing social vs. private and personal responsibility vs. chance. In the experiment, subjects chose between two lotteries, one low-risk and one high-risk. They could then observe the outcomes. By varying the environment between private (they could observe the outcome of the chosen lottery and the outcome of the lottery they had not chosen) and social (they could observe the outcome of the lottery chosen by another subject) we can differentiate the response and brain activity following the feedback in social and private settings. The evidence suggests that envy and pride are significant motives driving decisions and outcomes evaluation, stronger than private emotions like regret and rejoice, with ventral striatum playing a key role. When we focus on the outcome evaluation stage we demonstrate that BOLD signal in ventral striatum is increasing in the difference between obtained and counterfactual payoffs. For a given difference in payoffs, striatal responses are more pronounced in social than in private environment. Moreover, a positive interaction (complementarity) between social comparison and personal responsibility is reflected in the pattern of activity in the ventral striatum. At decision stage we observe getting ahead of the Joneses effect in ventral striatum with subjective value of risk larger in social than in private environment.
Positive Interaction of Social Comparison and Personal Responsibility for Outcomes
Grygolec, Jaroslaw; Coricelli, Giorgio; Rustichini, Aldo
2012-01-01
We formulate and test a model that allows sharp separation between two different ways in which environment affects evaluation of outcomes, by comparing social vs. private and personal responsibility vs. chance. In the experiment, subjects chose between two lotteries, one low-risk and one high-risk. They could then observe the outcomes. By varying the environment between private (they could observe the outcome of the chosen lottery and the outcome of the lottery they had not chosen) and social (they could observe the outcome of the lottery chosen by another subject) we can differentiate the response and brain activity following the feedback in social and private settings. The evidence suggests that envy and pride are significant motives driving decisions and outcomes evaluation, stronger than private emotions like regret and rejoice, with ventral striatum playing a key role. When we focus on the outcome evaluation stage we demonstrate that BOLD signal in ventral striatum is increasing in the difference between obtained and counterfactual payoffs. For a given difference in payoffs, striatal responses are more pronounced in social than in private environment. Moreover, a positive interaction (complementarity) between social comparison and personal responsibility is reflected in the pattern of activity in the ventral striatum. At decision stage we observe getting ahead of the Joneses effect in ventral striatum with subjective value of risk larger in social than in private environment. PMID:22371706
Suchman, Lauren; Hart, Elizabeth; Montagu, Dominic
2018-06-13
Social health insurance (SHI), one mechanism for achieving universal health coverage, has become increasingly important in low- and middle-income countries (LMICs) as they work to achieve this goal. Although small private providers supply a significant proportion of healthcare in LMICs, integrating these providers into SHI systems is often challenging. Public-private partnerships in health are one way to address these challenges, but we know little about how these collaborations work, how effectively, and why. Drawing on semi-structured interviews conducted with National Health Insurance (NHI) officials in Kenya and Ghana, as well as with staff from several international NGOs (INGOs) representing social franchise networks that are partnering to increase private provider accreditation into the NHIs, this article examines one example of public-private collaboration in practice. We found that interviewees initially had incomplete knowledge about the potential for cross-sector synergy, but both sides were motivated to work together around shared goals and the potential for mutual benefit. The public-private relationship then evolved over time through regular face-to-face interactions, reciprocal feedback, and iterative workplan development. This process led to a collegial relationship that also has given small private providers more voice in the health system. In order to sustain this relationship, we recommend that both public and private sector representatives develop formalized protocols for working together, as well as less formal open channels for communication. Models for aggregating small private providers and delivering them to government programmes as a package have potential to facilitate public-private partnerships as well, but there is little evidence on how these models work in LMICs thus far.
Raub, Florian; Höfer, Hubert; Scheuermann, Ludger
2017-07-01
The data presented here have been collected in the southern part of the Atlantic Forest (Mata Atlântica) in the state of Paraná, Brazil within a bilateral scientific project (SOLOBIOMA). The project aimed to assess the quality of secondary forests of different regeneration stages in comparison with old-growth forests with regard to diversity of soil animals and related functions. The Atlantic Forest is a hotspot of biological diversity with an exceptionally high degree of endemic species, extending over a range of 3,500 km along the coast of Brazil. The anthropogenic pressure in the region is very high with three of the biggest cities of Brazil (São Paulo, Rio de Janeiro, and Curitiba) lying in its extension. An evaluation of the value of secondary forests for biodiversity conservation is becoming more and more important due to the complete disappearance of primary forests. In 2005, we sampled spiders in 12 sites of three successional stages (5-8, 10-15, 35-50 yr old, three replicates of each forest stage) and old-growth forests (> 100 yr untouched, also three replicates). All sites were inside a private nature reserve (Rio Cachoeira Nature Reserve). We repeated the sampling design and procedure in 2007 in a second private reserve (Itaqui Nature Reserve). The two nature reserves are within about 25 km of each other within a well preserved region of the Mata Atlântica, where the matrix of the landscape mosaic is still forest. A widely accepted standard protocol was used in a replicated sampling design to apply statistical analyses to the resulting data set and allow for comparison with other studies in Brazil. Spiders were sorted to family level and counted; the adult spiders further identified to species if possible or classified as morphospecies with the help of several spider specialists. © 2017 by the Ecological Society of America.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N
2009-01-01
With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less
Position-based coding and convex splitting for private communication over quantum channels
NASA Astrophysics Data System (ADS)
Wilde, Mark M.
2017-10-01
The classical-input quantum-output (cq) wiretap channel is a communication model involving a classical sender X, a legitimate quantum receiver B, and a quantum eavesdropper E. The goal of a private communication protocol that uses such a channel is for the sender X to transmit a message in such a way that the legitimate receiver B can decode it reliably, while the eavesdropper E learns essentially nothing about which message was transmitted. The ɛ -one-shot private capacity of a cq wiretap channel is equal to the maximum number of bits that can be transmitted over the channel, such that the privacy error is no larger than ɛ \\in (0,1). The present paper provides a lower bound on the ɛ -one-shot private classical capacity, by exploiting the recently developed techniques of Anshu, Devabathini, Jain, and Warsi, called position-based coding and convex splitting. The lower bound is equal to a difference of the hypothesis testing mutual information between X and B and the "alternate" smooth max-information between X and E. The one-shot lower bound then leads to a non-trivial lower bound on the second-order coding rate for private classical communication over a memoryless cq wiretap channel.
ERIC Educational Resources Information Center
Young, Dan
2005-01-01
Internet Protocol (IP) Telephony, or voice-over IP (VoIP), has proved to be a wise decision for many organizations. This technology crosses the boundaries of public and private networks, enterprise and residential markets, voice and data technologies, as well as local and long-distance services. The convergence of voice and data into a single,…
A Comparison of Expenditure Patterns in Four-Year Public and Private Colleges.
ERIC Educational Resources Information Center
Brinkman, Paul T.
Aspects of economic behavior of colleges and universities were examined empirically. Two groups of comparable, instruction-oriented institutions, one from the private sector and one from the public sector, were analyzed. Five issues were examined: resources dedicated to lower-division students, the economic impact of part-time students, the extent…
Fall 1983 Freshmen at Private Black Colleges.
ERIC Educational Resources Information Center
Payne, Kathleen
1984-01-01
Results of a 1983 study of freshmen at private black four-year colleges and a comparison to freshmen at all four-year colleges are presented. Attention is directed to the educational, financial, and family backgrounds of the students, as well as their aspirations and interests. Data were obtained from "The American Freshman: National Norms for…
ERIC Educational Resources Information Center
Beveridge, Scott; Garcia, Jorge; Siblo, Matt
2015-01-01
Purpose: To examine the nature of ethical dilemmas most frequently reported by rehabilitation counselors in the private and public sectors and determine if significant differences exist in how practitioners experience ethical dilemmas in these two settings. Method: A mixed-methods internet-based survey design was utilized and included descriptive,…
Jamaludin, Ummu K; M Suhaimi, Fatanah; Abdul Razak, Normy Norfiza; Md Ralib, Azrina; Mat Nor, Mohd Basri; Pretty, Christopher G; Humaidi, Luqman
2018-08-01
Blood glucose variability is common in healthcare and it is not related or influenced by diabetes mellitus. To minimise the risk of high blood glucose in critically ill patients, Stochastic Targeted Blood Glucose Control Protocol is used in intensive care unit at hospitals worldwide. Thus, this study focuses on the performance of stochastic modelling protocol in comparison to the current blood glucose management protocols in the Malaysian intensive care unit. Also, this study is to assess the effectiveness of Stochastic Targeted Blood Glucose Control Protocol when it is applied to a cohort of diabetic patients. Retrospective data from 210 patients were obtained from a general hospital in Malaysia from May 2014 until June 2015, where 123 patients were having comorbid diabetes mellitus. The comparison of blood glucose control protocol performance between both protocol simulations was conducted through blood glucose fitted with physiological modelling on top of virtual trial simulations, mean calculation of simulation error and several graphical comparisons using stochastic modelling. Stochastic Targeted Blood Glucose Control Protocol reduces hyperglycaemia by 16% in diabetic and 9% in nondiabetic cohorts. The protocol helps to control blood glucose level in the targeted range of 4.0-10.0 mmol/L for 71.8% in diabetic and 82.7% in nondiabetic cohorts, besides minimising the treatment hour up to 71 h for 123 diabetic patients and 39 h for 87 nondiabetic patients. It is concluded that Stochastic Targeted Blood Glucose Control Protocol is good in reducing hyperglycaemia as compared to the current blood glucose management protocol in the Malaysian intensive care unit. Hence, the current Malaysian intensive care unit protocols need to be modified to enhance their performance, especially in the integration of insulin and nutrition intervention in decreasing the hyperglycaemia incidences. Improvement in Stochastic Targeted Blood Glucose Control Protocol in terms of u en model is also a must to adapt with the diabetic cohort. Copyright © 2018 Elsevier B.V. All rights reserved.
Secure multi-party quantum summation based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Hui-Yi; Ye, Tian-Yu
2018-06-01
In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.
Casarin, Fabíola Schwengber; Wong, Cristina Elizabeth Izábal; Parente, Maria Alice de Mattos Pimenta; de Salles, Jerusa Fumagalli; Fonseca, Rochele Paz
2012-11-01
Neuropsychological assessment reveals that certain cognitive changes that take place during the neural development process may be associated with biopsychosocial issues. A substantial body of research has focused on cognitive development in children and adults, but few such studies have been carried out on adolescents. Therefore, research into the processing of neuropsychological functions in adolescents, taking into account the role of major socio-cultural factors such as school type (public vs. private), is highly relevant. The present study sought to assess whether differences in neuropsychological development exist between adolescent students of public (government-funded) and private schools. A total of 373 grade-matched students between the ages of 12 and 18, 190 from public schools and 183 from private schools, took part in the study. All subjects had no self-reported neurologic or psychiatric conditions and sensory disorders. The NEUPSILIN Brazilian Brief Neuropsychological Assessment Battery was administered to this sample. Comparison of mean scores (one-way ANCOVA with socioeconomic score and age as covariates) showed that adolescents attending private schools generally outperformed their public-school peers in tasks involving sustained attention, memory (working and visual), dictated writing, and constructional and reflective abilities. We conclude that school type should be taken into account during standardization of neuropsychological assessment instruments for adolescent and, probably, child populations.
Encryption for Remote Control via Internet or Intranet
NASA Technical Reports Server (NTRS)
Lineberger, Lewis
2005-01-01
A data-communication protocol has been devised to enable secure, reliable remote control of processes and equipment via a collision-based network, while using minimal bandwidth and computation. The network could be the Internet or an intranet. Control is made secure by use of both a password and a dynamic key, which is sent transparently to a remote user by the controlled computer (that is, the computer, located at the site of the equipment or process to be controlled, that exerts direct control over the process). The protocol functions in the presence of network latency, overcomes errors caused by missed dynamic keys, and defeats attempts by unauthorized remote users to gain control. The protocol is not suitable for real-time control, but is well suited for applications in which control latencies up to about 0.5 second are acceptable. The encryption scheme involves the use of both a dynamic and a private key, without any additional overhead that would degrade performance. The dynamic key is embedded in the equipment- or process-monitor data packets sent out by the controlled computer: in other words, the dynamic key is a subset of the data in each such data packet. The controlled computer maintains a history of the last 3 to 5 data packets for use in decrypting incoming control commands. In addition, the controlled computer records a private key (password) that is given to the remote computer. The encrypted incoming command is permuted by both the dynamic and private key. A person who records the command data in a given packet for hostile purposes cannot use that packet after the public key expires (typically within 3 seconds). Even a person in possession of an unauthorized copy of the command/remote-display software cannot use that software in the absence of the password. The use of a dynamic key embedded in the outgoing data makes the central-processing unit overhead very small. The use of a National Instruments DataSocket(TradeMark) (or equivalent) protocol or the User Datagram Protocol makes it possible to obtain reasonably short response times: Typical response times in event-driven control, using packets sized .300 bytes, are <0.2 second for commands issued from locations anywhere on Earth. The protocol requires that control commands represent absolute values of controlled parameters (e.g., a specified temperature), as distinguished from changes in values of controlled parameters (e.g., a specified increment of temperature). Each command is issued three or more times to ensure delivery in crowded networks. The use of absolute-value commands prevents additional (redundant) commands from causing trouble. Because a remote controlling computer receives "talkback" in the form of data packets from the controlled computer, typically within a time interval < or =1 s, the controlling computer can re-issue a command if network failure has occurred. The controlled computer, the process or equipment that it controls, and any human operator(s) at the site of the controlled equipment or process should be equipped with safety measures to prevent damage to equipment or injury to humans. These features could be a combination of software, external hardware, and intervention by the human operator(s). The protocol is not fail-safe, but by adopting these safety measures as part of the protocol, one makes the protocol a robust means of controlling remote processes and equipment by use of typical office computers via intranets and/or the Internet.
Pressure sores following elective total hip arthroplasty: pitfalls of misinterpretation.
Keong, Nicole; Ricketts, David; Alakeson, Nuki; Rust, Philippa
2004-01-01
OBJECTIVE: To assess the reliability of reporting protocols regarding pressure sores. METHODS: Retrospective data were collected regarding pressure sore rates following total hip arthroplasty operations carried out during 2001 at two orthopaedic units in an NHS hospital (Princess Royal Hospital) and in a local private hospital. RESULTS: Preliminary results presented in audit and interim reports indicated an alarmingly high pressure sore rate across the two sites (17/172 [9.9%] NHS, 23/71 [32.4%] private hospital). On analysis, the data collection system was revealed to be flawed. Grade 1 areas (erythema with no ulceration) were included, leading to a dramatic discrepancy between reported and confirmed pressure sores. Re-analysis showed the confirmed pressure sore rates to be much lower (2.3% NHS, 1.0% private hospital). CONCLUSIONS: This audit suggests that both poor data collection and education lead to inaccurate audit. This may lead to subsequent inappropriate management and inappropriate NHS star ratings. PMID:15140301
Colyar, Jessica M; Eggett, Dennis L; Steele, Frost M; Dunn, Michael L; Ogden, Lynn V
2009-09-01
The relative sensitivity of side-by-side and sequential monadic consumer liking protocols was compared. In the side-by-side evaluation, all samples were presented at once and evaluated together 1 characteristic at a time. In the sequential monadic evaluation, 1 sample was presented and evaluated on all characteristics, then returned before panelists received and evaluated another sample. Evaluations were conducted on orange juice, frankfurters, canned chili, potato chips, and applesauce. Five commercial brands, having a broad quality range, were selected as samples for each product category to assure a wide array of consumer liking scores. Without their knowledge, panelists rated the same 5 retail brands by 1 protocol and then 3 wk later by the other protocol. For 3 of the products, both protocols yielded the same order of overall liking. Slight differences in order of overall liking for the other 2 products were not significant. Of the 50 pairwise overall liking comparisons, 44 were in agreement. The different results obtained by the 2 protocols in order of liking and significance of paired comparisons were due to the experimental variation and differences in sensitivity. Hedonic liking scores were subjected to statistical power analyses and used to calculate minimum number of panelists required to achieve varying degrees of sensitivity when using side-by-side and sequential monadic protocols. In most cases, the side-by-side protocol was more sensitive, thus providing the same information with fewer panelists. Side-by-side protocol was less sensitive in cases where sensory fatigue was a factor.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jacobsen, R., E-mail: ray.jacobsen@ugent.be; Buysse, J., E-mail: j.buysse@ugent.be; Gellynck, X., E-mail: xavier.gellynck@ugent.be
2013-01-15
Highlights: Black-Right-Pointing-Pointer The goal is to compare collection costs for residual household waste. Black-Right-Pointing-Pointer We have clustered all municipalities in order to find mutual comparable pairs. Black-Right-Pointing-Pointer Each pair consists of one private and one public operating waste collection program. Black-Right-Pointing-Pointer All cases show that private service has lower costs than public service. Black-Right-Pointing-Pointer Municipalities were contacted to identify the deeper causes for the waste management program. - Abstract: The rising pressure in terms of cost efficiency on public services pushes governments to transfer part of those services to the private sector. A trend towards more privatizing can be noticedmore » in the collection of municipal household waste. This paper reports the findings of a research project aiming to compare the cost between the service of private and public collection of residual household waste. Multiple case studies of municipalities about the Flemish region of Belgium were conducted. Data concerning the year 2009 were gathered through in-depth interviews in 2010. In total 12 municipalities were investigated, divided into three mutual comparable pairs with a weekly and three mutual comparable pairs with a fortnightly residual waste collection. The results give a rough indication that in all cases the cost of private service is lower than public service in the collection of household waste. Albeit that there is an interest in establishing whether there are differences in the costs and service levels between public and private waste collection services, there are clear difficulties in establishing comparisons that can be made without having to rely on a large number of assumptions and corrections. However, given the cost difference, it remains the responsibility of the municipalities to decide upon the service they offer their citizens, regardless the cost efficiency: public or private.« less
USDA-ARS?s Scientific Manuscript database
In the carbon market, greenhouse gas (GHG) offset protocols need to ensure that emission reductions are of high quality, quantifiable and real. However, lack of consistency across protocols for quantifying emission reductions compromise the credibility of offsets generated. Thus, protocol quantifica...
Solar power. [comparison of costs to wind, nuclear, coal, oil and gas
NASA Technical Reports Server (NTRS)
Walton, A. L.; Hall, Darwin C.
1990-01-01
This paper describes categories of solar technologies and identifies those that are economic. It compares the private costs of power from solar, wind, nuclear, coal, oil, and gas generators. In the southern United States, the private costs of building and generating electricity from new solar and wind power plants are less than the private cost of electricity from a new nuclear power plant. Solar power is more valuable than nuclear power since all solar power is available during peak and midpeak periods. Half of the power from nuclear generators is off-peak power and therefore is less valuable. Reliability is important in determining the value of wind and nuclear power. Damage from air pollution, when factored into the cost of power from fossil fuels, alters the cost comparison in favor of solar and wind power. Some policies are more effective at encouraging alternative energy technologies that pollute less and improve national security.
ERIC Educational Resources Information Center
Munoz, Marco A.
Healthy People 2010 is the initiative that defines the U.S. health agenda and guides policy. The initiative provides direction for individuals to change personal behaviors and for organizations and communities to support good health through health promotion policies. The objective of this research was to compare public and private schools on…
ERIC Educational Resources Information Center
Bourne, Compton; Dass, Anand
2003-01-01
Estimates private and social rates of return for university science and technology graduates in Trinidad and Tobago. Makes comparisons with other fields of study such as agriculture, natural sciences, engineering, and humanities. Concludes that rates of return are inconsistent with the allocative preferences of policymakers. (Authors/PKP)
Current Operating Costs of Two-Year Colleges in the South.
ERIC Educational Resources Information Center
Scales, Eldridge E.
This analysis of current expenditures of 127 accredited public and private 2-year colleges in 11 southern states is intended to provide data for comparison of expenditures by private and public colleges, to show administrators where spending differs among the colleges, and to provide objective data for them to judge the efficiency of their own…
ERIC Educational Resources Information Center
Balay, Refik
2012-01-01
This research aims to examine the impact of faculty members' learning organization perceptions to the organizational commitment through quantitative method. The study group consists of 172 faculty members working in two universities, which are private (Zirve University) and public (Harran University) ones. The research results show that faculty…
Private Tutoring Intensity in Schools: A Comparison between High and Low Socio-Economic Schools
ERIC Educational Resources Information Center
Addi-Raccah, Audrey; Dana, Oshra
2015-01-01
Private tutoring (PT) is becoming a worldwide phenomenon. In Israel too, about a third of elementary school students participate in PT. Based on sociological and school quality considerations, we examined school characteristics that are associated with PT intensity at school. The data encompassed a random state wide sample of 389 Israeli…
Enterprise networks. Strategies for integrated delivery systems.
Siwicki, B
1997-02-01
More integrated delivery systems are making progress toward building computer networks that link all their care delivery sites so they can efficiently and economically coordinate care. A growing number of these systems are turning to intranets--private computer networks that use Internet-derived protocols and technologies--to move information that's essential to managing scare health care resources.
From Partisanship to Pluralism: Teaching Students How to Listen to Each Other
ERIC Educational Resources Information Center
Sussman, Daniel
2018-01-01
Educators must prepare students to live with the perpetual discomfort of difference. That includes teaching them how to respectfully listen to others' views, especially when those views are in opposition to their own. Borrowing from protocols used in a professional Critical Friends Group, a teacher at a private Quaker school designed a discussion…
Berger, Cezar Augusto Sarraf; Freitas, Renato da Silva; Malafaia, Osvaldo; Pinto, José Simão de Paula; Macedo Filho, Evaldo Dacheux; Mocellin, Marcos; Fagundes, Marina Serrato Coelho
2014-01-01
Introduction The knowledge and study of surgical techniques and anthropometric measurements of the nose make possible a qualitative and quantitative analysis of surgical results. Objective Study the main technique used in rhinoplasty on Caucasian noses and compare preoperative and postoperative anthropometric measurements of the nose. Methods A prospective study with 170 patients was performed at a private hospital. Data were collected using the Electronic System Integrated of Protocols software (Sistema Integrado de Protocolos Eletrônicos, SINPE©). The surgical techniques used in the nasal dorsum and tip were evaluated. Preoperative and 12-month follow-up photos as well as the measurements compared with the ideal aesthetic standard of a Caucasian nose were analyzed objectively. Student t test and standard deviation test were applied. Results There was a predominance of endonasal access (94.4%). The most common dorsum technique was hump removal (33.33%), and the predominance of sutures (24.76%) was observed on the nasal tip, with the lateral intercrural the most frequent (32.39%). Comparison between preoperative and postoperative photos found statistically significant alterations on the anthropometric measurements of the noses. Conclusion The main surgical techniques on Caucasian noses were evaluated, and a great variety was found. The evaluation of anthropometric measurements of the nose proved the efficiency of the performed procedures. PMID:25992149
Cost-Control Mechanisms in Canadian Private Drug Plans
Kratzer, Jillian; McGrail, Kimberlyn; Strumpf, Erin; Law, Michael R.
2013-01-01
Approximately 68% of Canadians receive prescription drug coverage through an employer-sponsored private plan. However, we have very limited data on the structure of these plans. This study aims to identify and describe the use of cost-control mechanisms in private drug plans in Canada and describe what private coverage looks like for the average Canadian. Using 2010 data from over 113,000 different private drug plans, provided by Applied Management Consultants, we determined the overall use of key cost-control measures, and the cost-control tools that appear to be gaining currency compared to a report on benefits coverage in 1998. We found that the use of common cost-control measures is relatively low among Canadian private benefits programs. Co-insurance is much more common in private coverage plans than co-payments. Deductibles are uncommon in Canada and, when in place, are very small. The use of annual and lifetime maximums is increasing. Canadian private benefits programs use few cost-control measures to respond to increasing costs, particularly in comparison to their public counterparts. These results suggest there are ample opportunities for greater efficiency in private sector drug coverage plans. PMID:23968672
Network Upgrade for the SLC: PEP II Network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crane, M.; Call, M.; Clark, S.
2011-09-09
The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status informationmore » is included.« less
Error recovery in shared memory multiprocessors using private caches
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.
1990-01-01
The problem of recovering from processor transient faults in shared memory multiprocesses systems is examined. A user-transparent checkpointing and recovery scheme using private caches is presented. Processes can recover from errors due to faulty processors by restarting from the checkpointed computation state. Implementation techniques using checkpoint identifiers and recovery stacks are examined as a means of reducing performance degradation in processor utilization during normal execution. This cache-based checkpointing technique prevents rollback propagation, provides rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions to take error latency into account are presented.
Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.
DeCanio, Stephen J; Norman, Catherine S
2007-10-01
The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.
VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance
Watzlaf, Valerie R.; Ondich, Briana
2012-01-01
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194
Oldrini, Guillaume; Fedida, Benjamin; Poujol, Julie; Felblinger, Jacques; Trop, Isabelle; Henrot, Philippe; Darai, Emile; Thomassin-Naggara, Isabelle
2017-10-01
To evaluate the added value of ULTRAFAST-MR sequence to an abbreviated FAST protocol in comparison with FULL protocol to distinguish benign from malignant lesions in a population of women, regardless of breast MR imaging indication. From March 10th to September 22th, 2014, we retrospectively included a total of 70 consecutive patients with 106 histologically proven lesions (58 malignant and 48 benign) who underwent breast MR imaging for preoperative breast staging (n=38), high-risk screening (n=7), problem solving (n=18), and nipple discharge (n=4) with 12 time resolved imaging of contrast kinetics (TRICKS) acquisitions during contrast inflow interleaved in a regular high-resolution dynamic MRI protocol (FULL protocol). Two readers scored MR exams as either positive or negative and described significant lesions according to Bi-RADS lexicon with a TRICKS images (ULTRAFAST), an abbreviated protocol (FAST) and all images (FULL protocol). Sensitivity, specificity, positive and negative predictive values, and accuracy were calculated for each protocol and compared with McNemar's test. For all readers, the combined FAST-ULTRAFAST protocol significantly improved the reading with a specificity of 83.3% and 70.8% in comparison with FAST protocol or FULL protocol, respectively, without change in sensitivity. By adding ULTRAFAST protocol to FAST protocol, readers 1 and 2 were able to correctly change the diagnosis in 22.9% (11/48) and 10.4% (5/48) of benign lesions, without missing any malignancy, respectively. Both interpretation and image acquisition times for combined FAST-ULTRAFAST protocol and FAST protocol were shorter compared to FULL protocol (p<0.001). Compared to FULL protocol, adding ULTRAFAST to FAST protocol improves specificity, mainly in correctly reclassifying benign masses and reducing interpretation and acquisition time, without decreasing sensitivity. Copyright © 2017 Elsevier B.V. All rights reserved.
Production Economics of Private Forestry: A Comparison of Industrial and Nonindustrial Forest Owners
David H. Newman; David N. Wear
1993-01-01
This paper compares the producrion behavior of industrial and nonindustrial private forestland owners in the southeastern U.S. using a restricted profit function. Profits are modeled as a function of two outputs, sawtimber and pulpwood. one variable input, regeneration effort. and two quasi-fixed inputs, land and growing stock. Although an identical profit function is...
Navigating the Kokosing: A Comparison between Honors and Private Liberal Arts Colleges
ERIC Educational Resources Information Center
Carnicom, Scott
2014-01-01
The Kokosing is a small river, barely a stream after a storm, which meanders its way through the gently undulating hills and farmland of central Ohio. Kenyon College is nestled among the trees atop a hill near the Kokosing. Kenyon is a private, selective, liberal arts college of about 1600 undergraduate students founded by an Episcopal bishop…
Thomas C. Brown; David Kingsley; George L. Peterson; Nicholas E. Flores; Andrea Clarke; Andrej Birjulin
2008-01-01
We examined the reliability of a large set of paired comparison value judgments involving public goods, private goods, and sums of money. As respondents progressed through a random sequence of paired choices they were each given, their response time decreased and they became more consistent, apparently fine-tuning their responses, suggesting that respondents tend to...
ERIC Educational Resources Information Center
Bennett, Robert J.
1994-01-01
Comparison of Britain's Training and Enterprise Councils/Local Enterprise Companies with the United States' Private Industry Councils (PICs) shows common problems: inadequate financing, labor market fragmentation, staff turnover, and lack of national strategy. PICs have a clearer mission and greater success in developing partnerships with local…
Who is More Free? A Comparison of the Decision-Making of Private and Public School Principals
ERIC Educational Resources Information Center
Shakeel, M. Danish; DeAngelis, Corey A.
2017-01-01
While substantial school choice research focuses on student achievement outcomes, little has explored the mechanisms involved in producing such outcomes. We present a comparative analysis of private and public school principals using data from the School and Staffing Survey (SASS) 2011-2012. We add to the literature by examining the differences in…
Broomberg, J
1993-05-01
This paper reviews some aspects of present state policy on private hospitals and sets out broad policy guidelines, as well as specific policy options, for the future role of private hospitals in South Africa. Current state policy is reviewed via an examination of the findings and recommendations of the two major Commissions of Inquiry into the role of private hospitals over the last 2 decades, and comparison of these with the present situation. The analysis confirms that existing state policy on private hospitals is inadequate, and suggests some explanations for this. Policy options analysed include the elimination of the private hospital sector through nationalization; partial integration of private hospitals into a centrally financed health care system (such as a national health insurance system); and the retention of separate, privately owned hospitals that will remain privately financed and outside the system of national health care provision. These options are explained and their merits and the associated problems debated. While it is recognised that, in the long term, public ownership of hospitals may be an effective way of attaining equity and efficiency in hospital services, the paper argues that elimination of private hospitals is not a realistic policy option for the foreseeable future. In this scenario, partial integration of private hospitals under a centrally financed system is argued to be the most effective way of improving the efficiency of the private hospital sector, and of maximising its contribution to national health care resources.
Clinical Investigation Program Annual Progress Report
1993-09-30
272 93/200A 0 Comparison of Healing Rates of Bones Plated Following Fracture, Among Yucatan Swine Having Open and Closed Physes...Study Objective: Compare two enteral formulas in respect to nutritional aspects. (16) Technical Approach: Protocol will take place in SICU. (17...Protocol #: 93/200A (3) Status: Ongoing (4) Title: Comparison of Healing Rates of Bones Plated Following Fractures, Among Yucatan Swine Having Open and
Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav
2017-01-03
Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.
Jeremy Fried; Greg J. Winter; Keith J. Gilless
1999-01-01
Wildland-urban interface (WUI) residents in Michigan were interviewed using a contingent valuation protocol to assess their-willingness-to-pay (WT) for incremental reductions in the risk of losing their homes to wildfire. WTP was elicited using a probability model which segments the risk of structure loss into "public" and "private" components.
A prototype for forest health monitoring in Indiana state parks
Rachel Morse; KaDonna Randolph; John W., Jr. Moser
2000-01-01
In 1997, 25 Forest Health Monitoring (FHM) plots were established in two Indiana state parks and a nearby parcel of privately owned land using a new protocol that differs from the systematic grid of the national program. All plots were reassessed in 1998. Data analysis focuses upon establishing baseline conditions for the study sites and providing relevant information...
The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan
2007-04-11
27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect
Wientjens, Wim; Cairns, Douglas
2012-10-01
In the fight against discrimination, the IDF launched the first ever International Charter of Rights and Responsibilities of People with Diabetes in 2011: a balance between rights and duties to optimize health and quality of life, to enable as normal a life as possible and to reduce/eliminate the barriers which deny realization of full potential as members of society. It is extremely frustrating to suffer blanket bans and many examples exist, including insurance, driving licenses, getting a job, keeping a job and family affairs. In this article, an example is given of how pilots with insulin treated diabetes are allowed to fly by taking the responsibility of using special blood glucose monitoring protocols. At this time the systems in the countries allowing flying for pilots with insulin treated diabetes are applauded, particularly the USA for private flying, and Canada for commercial flying. Encouraging developments may be underway in the UK for commercial flying and, if this materializes, could be used as an example for other aviation authorities to help adopt similar protocols. However, new restrictions implemented by the new European Aviation Authority take existing privileges away for National Private Pilot Licence holders with insulin treated diabetes in the UK. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
A Framework for Integration of Heterogeneous Medical Imaging Networks
Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos
2014-01-01
Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS. PMID:25279021
A framework for integration of heterogeneous medical imaging networks.
Viana-Ferreira, Carlos; Ribeiro, Luís S; Costa, Carlos
2014-01-01
Medical imaging is increasing its importance in matters of medical diagnosis and in treatment support. Much is due to computers that have revolutionized medical imaging not only in acquisition process but also in the way it is visualized, stored, exchanged and managed. Picture Archiving and Communication Systems (PACS) is an example of how medical imaging takes advantage of computers. To solve problems of interoperability of PACS and medical imaging equipment, the Digital Imaging and Communications in Medicine (DICOM) standard was defined and widely implemented in current solutions. More recently, the need to exchange medical data between distinct institutions resulted in Integrating the Healthcare Enterprise (IHE) initiative that contains a content profile especially conceived for medical imaging exchange: Cross Enterprise Document Sharing for imaging (XDS-i). Moreover, due to application requirements, many solutions developed private networks to support their services. For instance, some applications support enhanced query and retrieve over DICOM objects metadata. This paper proposes anintegration framework to medical imaging networks that provides protocols interoperability and data federation services. It is an extensible plugin system that supports standard approaches (DICOM and XDS-I), but is also capable of supporting private protocols. The framework is being used in the Dicoogle Open Source PACS.
Berk, L E; Landau, S
1993-04-01
Learning disabled (LD) children are often targets for cognitive-behavioral interventions designed to train them in effective use of a self-directed speech. The purpose of this study was to determine if, indeed, these children display immature private speech in the naturalistic classroom setting. Comparisons were made of the private speech, motor accompaniment to task, and attention of LD and normally achieving classmates during academic seatwork. Setting effects were examined by comparing classroom data with observations during academic seatwork and puzzle solving in the laboratory. Finally, a subgroup of LD children symptomatic of attention-deficit hyperactivity disorder (ADHD) was compared with pure LD and normally achieving controls to determine if the presumed immature private speech is a function of a learning disability or externalizing behavior problems. Results indicated that LD children used more task-relevant private speech than controls, an effect that was especially pronounced for the LD/ADHD subgroup. Use of private speech was setting- and task-specific. Implications for intervention and future research methodology are discussed.
Private patients in NHS hospitals: comparison of two sources of information.
Williams, B T; Pearson, J
1999-03-01
The use of National Health Service (NHS) hospitals to treat private patients is debatable on the grounds of equity of access. Hospital Episodes Statistics (HES) annual reports are the only routine source of information on the scale of this activity. The accuracy of the information is doubted. This enquiry tested the completeness of HES data against information obtained directly from private patient unit managers. Managers of the 71 pay bed units in NHS hospitals in England were asked to supply from local registers and accounts the numbers of in-patients and day cases admitted in 1995-1996. Their reports were matched with the numbers of first consultant episodes for private in-patients and day cases shown for those hospitals in the HES data file for that year. Of the 71 units 62 responded; 53 of these gave usable data. The 53 included, and 18 excluded from the comparison, matched on median and range of bed numbers. Managers identified 16 per cent more total admissions than did HES, 62,572 against 54,131; 13 per cent more in-patient admissions, 39,776 against 35,319; and 21 per cent more day cases, 22,796 against 18,812. More total admissions were reported by managers of 38 pay bed units than were recorded in HES, fewer by 12, and equal numbers by three. Similar sized discrepancies were noted for in-patient admissions and day cases. Reasons for the under-reporting of private patients in HES included the use of separate patient administration systems for private patients with a failure to feed data to HES, and the omission of some provider units altogether by a minority of trusts from the returns made to the Department of Health. Overall, HES underestimates the amount of private patient activity reported directly by NHS hospitals. No method of validating private patient data is currently available. An amendment to an existing statistical return would provide a check on numbers. Central guidance on the inclusion of private patient activity in data transmitted by providers to the HES processing agency should be reinforced.
The Willingness of Non-Industrial Private Forest Owners to Enter California's Carbon Offset Market.
Kelly, Erin Clover; Gold, Gregg J; Di Tommaso, Joanna
2017-11-01
While non-industrial private forest landowners have a significant amount of forest landholdings in the US, they are underrepresented in the California cap-and-trade market forest offset program. Additional participation could benefit both the market and non-industrial private forest landowners. We developed a mail questionnaire which served as both a survey instrument and outreach tool about the market. Questions covered forest ownership objectives, landowners' future plans for forests, views of climate change, and attitudes and intentions regarding forest carbon offset project development. We sampled from five Northern California counties for a total of 143 usable surveys. Three different groups of landowners were identified based on their management objectives: amenity (including protecting nature and recreation); legacy (passing land to children and/or maintaining a farm or ranch); and income. Landowner objective groups differed on several key variables, particularly related to potential motivations for joining the market, while all landowners expressed concerns about protocol requirements. Regardless of ownership objectives, over half expressed that receiving revenue from their forests would be an important motivator to join, though most were unwilling to satisfy protocol requirements, even after learning of the potential benefits of program participation. Thus, participation appears to be limited by the costly and complex project development process, as well as a lack of landowner awareness. Extending these lessons, we assert that different landowners may approach payment for ecosystem services programs with different needs, awareness, and motivations, which provide important lessons for those who conduct landowner outreach and for PES program designers.
The Willingness of Non-Industrial Private Forest Owners to Enter California's Carbon Offset Market
NASA Astrophysics Data System (ADS)
Kelly, Erin Clover; Gold, Gregg J.; Di Tommaso, Joanna
2017-11-01
While non-industrial private forest landowners have a significant amount of forest landholdings in the US, they are underrepresented in the California cap-and-trade market forest offset program. Additional participation could benefit both the market and non-industrial private forest landowners. We developed a mail questionnaire which served as both a survey instrument and outreach tool about the market. Questions covered forest ownership objectives, landowners' future plans for forests, views of climate change, and attitudes and intentions regarding forest carbon offset project development. We sampled from five Northern California counties for a total of 143 usable surveys. Three different groups of landowners were identified based on their management objectives: amenity (including protecting nature and recreation); legacy (passing land to children and/or maintaining a farm or ranch); and income. Landowner objective groups differed on several key variables, particularly related to potential motivations for joining the market, while all landowners expressed concerns about protocol requirements. Regardless of ownership objectives, over half expressed that receiving revenue from their forests would be an important motivator to join, though most were unwilling to satisfy protocol requirements, even after learning of the potential benefits of program participation. Thus, participation appears to be limited by the costly and complex project development process, as well as a lack of landowner awareness. Extending these lessons, we assert that different landowners may approach payment for ecosystem services programs with different needs, awareness, and motivations, which provide important lessons for those who conduct landowner outreach and for PES program designers.
Calcoen, Piet; Moens, Dirk; Verlinden, Pieter; van de Ven, Wynand P M M; Pacolet, Jozef
2015-03-01
OECD Health Data are a well-known source for detailed information about health expenditure. These data enable us to analyze health policy issues over time and in comparison with other countries. However, current official Belgian estimates of private expenditure (as published in the OECD Health Data) have proven not to be reliable. We distinguish four potential major sources of problems with estimating private health spending: interpretation of definitions, formulation of assumptions, missing or incomplete data and incorrect data. Using alternative sources of billing information, we have reached more accurate estimates of private and out-of-pocket expenditure. For Belgium we found differences of more than 100% between our estimates and the official Belgian estimates of private health expenditure (as published in the OECD Health Data). For instance, according to OECD Health Data private expenditure on hospitals in Belgium amounts to €3.1 billion, while according to our alternative calculations these expenses represent only €1.1 billion. Total private expenditure differs only 1%, but this is a mere coincidence. This exercise may be of interest to other OECD countries looking to improve their estimates of private expenditure on health. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Jacobs, V R; Niemeyer, M; Gottschalk, N; Schneider, K T; Kiechle, M
2005-12-01
Private umbilical cord blood (UCB) banking after delivery has increased over the last decade. For adult/somatic stem cell research UCB is an essential source of stem cells and researchers question if the number of UCB samples for research might be reduced by private banking. A survey among seven private blood banks in Germany and analysis and comparison of the number of UCB samples donated for research within the STEMMAT project with private blood banking were performed from 03/2003 to 06/2005 at the Frauenklinik (OB/GYN), Technical University Munich, Germany. Within 27.5 months 1,551 UCB samples were collected for research purposes; the effective recruitment rate was higher than expectations at an effective 66.2 %. Private UCB banking [n = 24] was distributed among three cord blood banks [n = 16, 6 and 4]. The rate of private blood banking was 0.99 % for all deliveries, thus reducing the effective rate for research purpose by only 1.5 %. Under the assumption of active and successful recruitment of scientific UCB samples, private blood banking does not significantly reduce this rate and therefore is a negligible rival in the competition for sufficient numbers of UCB samples for research.
2005-03-17
private sector . However, along the way, Government and private sector industry have begun to disagree about how PPI is collected and how PPI is used. Industry prefers a passive system of collecting delivery and quality data during contract performance, while the Federal Government uses both a passive system (similar to industry) as well as an active system of pulling PPI during contract performance. Industry uses PPI to establish and maintain a preferred vendor list from which to solicit bids, quotes, or proposals, while government uses PPI to assess
2005-12-01
private sector and the Department of Defense. Additionally, the purpose is to evaluate the strengths and weaknesses of each capital budgeting method and conduct a comparison. The intent is to identify those capital budgeting practices that are used in the private sector , some of which have been implemented in other public sector organizations, which may have merit for implementation in the Federal sector and possibly the Department of Defense. Finally, a set of conclusions and recommendations on how to implement best practices of capital budgeting for
ERIC Educational Resources Information Center
Pittsburg State Univ., KS.
Proceedings of the 1987 Development Conference of Pittsburg State University, Kansas, are presented. The conference reported on the private support program for fiscal year (FY) 1986-1987 and evaluated national development trends and comparisons with peer institutions. Goals of the private support program for 1987-1988 were also reviewed. Contents…
ERIC Educational Resources Information Center
Lechler, Suzanne; Hare, Dougal Julian
2015-01-01
A naturalistic observational single case study was carried out to investigate the form and function of private speech (PS) in a young man with Dandy-Walker variant syndrome and trisomy 22. Video recordings were observed, transcribed and coded to identify all combinations of type and form of PS. Through comparison between theories of PS and the…
ERIC Educational Resources Information Center
Wang, Li; Mandell, David S.; Lawer, Lindsay; Cidav, Zuleyha; Leslie, Douglas L.
2013-01-01
Healthcare costs and service use for autism spectrum disorder (ASD) were compared between Medicaid and private insurance, using 2003 insurance claims data in 24 states. In terms of costs and service use per child with ASD, Medicaid had higher total healthcare costs (22,653 vs. 5,254), higher ASD-specific costs (7,438 vs. 928), higher psychotropic…
Lopez-Rendon, Xochitl; Zhang, Guozhi; Coudyzer, Walter; Develter, Wim; Bosmans, Hilde; Zanca, Federica
2017-11-01
To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI vol of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI vol of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI vol values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. • The z-TCM information is sufficient for accurate dosimetry for standard protocols. • The z-TCM information is sufficient for accurate dosimetry for fast-speed scanning protocols. • For organ-based TCM schemes, the 3D-TCM information is necessary for accurate dosimetry. • At identical CTDI vol , the fast-speed scanning protocol delivered the highest doses. • Lung dose was higher in XCare than standard protocol at identical CTDI vol .
Commercialization of the land remote sensing system: An examination of mechanisms and issues
NASA Technical Reports Server (NTRS)
Cauley, J. K.; Gaelick, C.; Greenberg, J. S.; Logsdon, J.; Monk, T.
1983-01-01
In September 1982 the Secretary of Commerce was authorized (by Title II of H.R. 5890 of the 97th Congress) to plan and provide for the management and operation of the civil land remote sensing satellite systems, to provide for user fees, and to plan for the transfer of the ownership and operation of future civil operational land remote sensing satellite systems to the private sector. As part of the planning for transfer, a number of approaches were to be compared including wholly private ownership and operation of the system by an entity competitively selected, mixed government/private ownership and operation, and a legislatively-chartered privately-owned corporation. The results of an analysis and comparison of a limited number of financial and organizational approaches for either transfer of the ownership and operation of the civil operational land remote sensing program to the private sector or government retention are presented.
Availability of Health-Related Programs in Private and Public Prisons.
Baćak, Valerio; Ridgeway, Greg
2018-01-01
Little is known about the resources available to protect inmates' health in private prisons compared to their public counterparts. This is the first national-level study that exclusively examined the availability of health-related programs in private and public prisons in the United States. We applied propensity score weighting and doubly robust estimation to compare private prisons to comparable public prisons. Data were self-reported by prison administrators as part of the 2005 Census of State and Federal Adult Correctional Facilities. We found that private prisons offered fewer substance dependency, psychological/psychiatric, and HIV/AIDS-related programs. But the differences were progressively reduced when the comparison was limited to public prisons most similar on a variety of facility-level characteristics. The extent to which the two types of prisons differ is closely tied to the characteristics of the facilities that are compared.
Liu, Hsi-Chen; Cheng, Yawen
2018-04-01
To compare psychosocial work conditions and health status between public and private sector employees and to examine if psychosocial work conditions explained the health differences. Two thousand four hundred fourty one public and 15,589 private sector employees participated in a cross-sectional survey. Psychosocial work hazards, self-rated health (SRH), and burnout status were assessed by questionnaire. As compared with private sector employees, public sector employees reported better psychosocial work conditions and better SRH, but higher risk of workplace violence (WPV) and higher levels of client-related burnout. Regression analyses indicated that higher psychosocial job demands, lower workplace justice, and WPV experience were associated with poor SRH and higher burnout. The public-private difference in client-related burnout remained even with adjustment of psychosocial work factors. Greater risks of WPV and client-related burnout observed in public sector employees warrant further investigation.
Economides, S; Hourdakis, C J; Kalivas, N; Kalathaki, M; Simantirakis, G; Tritakis, P; Manousaridis, G; Vogiatzi, S; Kipouros, P; Boziari, A; Kamenopoulou, V
2008-01-01
This study presents the results from a survey conducted by the Greek Atomic Energy Commission (GAEC), during the period 1998-2003, in 530 public and private owned fluoroscopic X-ray systems in Greece. Certain operational parameters for conventional and remote control systems were assessed, according to a quality control protocol developed by GAEC on the basis of the current literature. Public (91.5%) and private (81.5%) owned fluoroscopic units exhibit high-contrast resolution values over 1 lp mm(-1). Moreover, 88.5 and 87.1% of the fluoroscopic units installed in the public and private sector, respectively, present Maximum Patient Entrance Kerma Rate values lower than 100 mGy min(-1). Additionally, 68.3% of the units assessed were found to perform within the acceptance limits. Finally, the third quartile of the Entrance Surface Dose Rate distribution was estimated according to the Dose Reference Level definition and found equal to 35 mGy min(-1).
Standardized methods for Grand Canyon fisheries research 2015
Persons, William R.; Ward, David L.; Avery, Luke A.
2013-01-01
This document presents protocols and guidelines to persons sampling fishes in the Grand Canyon, to help ensure consistency in fish handling, fish tagging, and data collection among different projects and organizations. Most such research and monitoring projects are conducted under the general umbrella of the Glen Canyon Dam Adaptive Management Program and include studies by the U.S. Geological Survey (USGS), U.S. Fish and Wildlife Service (FWS), National Park Service (NPS), the Arizona Game and Fish Department (AGFD), various universities, and private contractors. This document is intended to provide guidance to fieldworkers regarding protocols that may vary from year to year depending on specific projects and objectives. We also provide herein documentation of standard methods used in the Grand Canyon that can be cited in scientific publications, as well as a summary of changes in protocols since the document was first created in 2002.
Secret key distillation from shielded two-qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bae, Joonwoo
The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key canmore » be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.« less
Kolesová, Hana; Čapek, Martin; Radochová, Barbora; Janáček, Jiří; Sedmera, David
2016-08-01
Our goal was to find an optimal tissue clearing protocol for whole-mount imaging of embryonic and adult hearts and whole embryos of transgenic mice that would preserve green fluorescent protein GFP fluorescence and permit comparison of different currently available 3D imaging modalities. We tested various published organic solvent- or water-based clearing protocols intended to preserve GFP fluorescence in central nervous system: tetrahydrofuran dehydration and dibenzylether protocol (DBE), SCALE, CLARITY, and CUBIC and evaluated their ability to render hearts and whole embryos transparent. DBE clearing protocol did not preserve GFP fluorescence; in addition, DBE caused considerable tissue-shrinking artifacts compared to the gold standard BABB protocol. The CLARITY method considerably improved tissue transparency at later stages, but also decreased GFP fluorescence intensity. The SCALE clearing resulted in sufficient tissue transparency up to ED12.5; at later stages the useful depth of imaging was limited by tissue light scattering. The best method for the cardiac specimens proved to be the CUBIC protocol, which preserved GFP fluorescence well, and cleared the specimens sufficiently even at the adult stages. In addition, CUBIC decolorized the blood and myocardium by removing tissue iron. Good 3D renderings of whole fetal hearts and embryos were obtained with optical projection tomography and selective plane illumination microscopy, although at resolutions lower than with a confocal microscope. Comparison of five tissue clearing protocols and three imaging methods for study of GFP mouse embryos and hearts shows that the optimal method depends on stage and level of detail required.
Buregyeya, Esther; Rutebemberwa, Elizeus; LaRussa, Philip; Mbonye, Anthony
2016-11-11
Uganda's under-five mortality is high, currently estimated at 66/1000 live births. Poor referral of sick children that seek care from the private sector is one of the contributory factors. The proposed intervention aims to improve referral and uptake of referral advice for children that seek care from private facilities (registered drug shops/private clinics). A cluster randomized design will be applied to test the intervention in Mukono District, central Uganda. A sample of study clusters will implement the intervention. The intervention will consist of three components: i) raising awareness in the community: village health teams will discuss the importance of referral and encourage households to save money, ii) training and supervision of providers in the private sector to diagnose, treat and refer sick children, iii) regular meetings between the public and private providers (convened by the district health team) to discuss the referral system. Twenty clusters will be included in the study, randomized in the ratio of 1:1. A minimum of 319 sick children per cluster and the total number of sick children to be recruited from all clusters will be 8910; adjusting for a 10 % loss to follow up and possible withdrawal of private outlets. The immediate sustainable impact will be appropriate treatment of sick children. The intervention is likely to impact on private sector practices since the scope of the services they provide will have expanded. The proposed study is also likely to have an impact on families as; i) they may appreciate the importance of timely referral on child illness management, ii) the cost savings related to reduced morbidity will be used by household to access other social services. The linkage between the private and public sectors will create a potential avenue for delivery of other public health interventions and improved working relations in the two sectors. Further, improved quality of services in the private sector will improve provider confidence and hopefully more clientelle to the private practices. NCT02450630 Registration date: May/9 th /2015.
Situation testing: the case of health care refusal.
Després, C; Couralet, P-E
2011-04-01
Situation testing to assess physicians' refusal to provide healthcare is increasingly used in research studies. This paper aims to explain the relevance and limits of this method. Conducted in 2008-2009, this study was designed to assess the rate of healthcare refusal among several categories of private practitioners toward patients covered by the French public means-tested complementary health insurance (CMUc) when they requested a first appointment by phone. The other objectives were to study the determinants of healthcare refusal and assess the method. The study was conducted on a representative sample of Paris-based dentists and physicians in five categories: general practitioners, medical gynecologists, ophthalmologists, radiologists, and dentists. The method was based on two protocols. In the first scenario, an actor pretended to be a CMUc beneficiary and, in the second one, he did not give information about his health coverage but hinted at a low socioeconomic status. The two protocols were compared and procedures checking the relation between refusal and CMUc coverage were implemented in each of them. In the scenario in which the patient declared being a CMUc beneficiary, the results showed different refusal rates depending on the type of practitioner, physician, or dentist, their specialty, and whether or not, they charge more than the standard set fee. In the second scenario, refusal rates were much lower. The comparison of the two protocols seems to confirm the existence of discrimination based on CMUc affiliation rather than patients' socioeconomic status. The discussion presents the limits of situation testing, which remains an experimental instrument because it does not observe reality but reveals behaviors in situation. The findings cannot be extrapolated and are limited in time. The statistical analysis is only valid if the procedure followed is precise and applied consistently using a preset scenario. In addition, the discriminatory nature of the refusal (CMUc coverage) must be confirmed by a validation procedure (unless clearly stated by the interlocutor). Copyright © 2011 Elsevier Masson SAS. All rights reserved.
Funding Mechanisms for Ecosystem Services Projects
NASA Astrophysics Data System (ADS)
Russell, V.
2014-12-01
Ecosystem services projects ideally should be funded through commoditized markets. Where those markets do not exist financing directly from interested private sector parties can be a direct link between business interested in fulfilling sustainability goals and project implementers. Challenges exist, however in 1) linking those interests; 2) carefully quantifying the services produced, their true costs to implement and meeting protocol standards; 3) measuring the success of projects, especially over lengthy periods of time; and 4) balancing issues related to multiple spatial scales for projects and funding to make a difference. Examples from National Forest Foundation's experience implementing carbon and water projects with multiple private sector funders and the USDA Forest Service will highlight experiences and lessons learned in funding and implementing ecosystem service projects.
Ferraz Gonçalves, José António; Almeida, Ana; Costa, Isabel; Silva, Paula; Carneiro, Rui
2016-12-01
Agitation is a very distressing problem that must be controlled as quickly as possible, but using a safe method. The authors conducted a comparison of two protocols: a combination of haloperidol and midazolam and haloperidol alone. The combination drug protocol controlled 101 out of 121 (84%) episodes of agitation with only the first dose, whereas the haloperidol alone protocol controlled 47 out of 74 (64%) episodes. This difference is statistically significant (P =.002), with a post hoc analyzed power of 0.88. The median time from the first dose to the control of agitation was 15 minutes (range: 5-210) with the combination and 60 minutes (range: 10-430) with the other protocol, P <.001. There were no complications other than some transient somnolence, mainly with the combination protocol. The authors conclude that the combination of haloperidol and midazolam is effective and safe for the control of agitation in palliative care and it is more effective than haloperidol alone. Therefore, the combination should be adopted as the preferred protocol. It would be helpful if the usefulness of this protocol is confirmed by others.
Cultivar-Dependent Direct Organogenesis of Date Palm from Shoot Tip Explants.
Abahmane, Larbi
2017-01-01
A number of public and private laboratories are working on date palm micropropagation to meet the increasing worldwide demand for date palm planting material. A standardized direct organogenesis protocol exists for the production of date palm plantlets to maintain the genetic fidelity of regenerated plants. Organogenesis has the advantage of using low concentrations of plant growth regulators and avoiding the callus phase. In addition, direct regeneration of vegetative buds minimizes the risk of somaclonal variation among plant regenerants. However, in vitro multiplication cycles should be limited in duration by frequent renewal of plant material. This chapter describes a simple and routine organogenesis protocol for date palm multiplication using shoot tip explants.
Progress in satellite quantum key distribution
NASA Astrophysics Data System (ADS)
Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander
2017-08-01
Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.
A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets
ERIC Educational Resources Information Center
Lee, Kevin M.; Nicoll, Gayle; Brooks, David W.
2004-01-01
This paper compares two protocols for web-based instruction using simulations in an introductory physics class. The Inquiry protocol allowed students to control input parameters while the Worked Example protocol did not. Students in the Worked Example group performed significantly higher on a common assessment. The ramifications of this study are…
Comparison of students from private and public schools on the spelling performance.
Silva, Nathane Sanches Marques; Crenitte, Patrícia Abreu Pinheiro
2015-01-01
To compare the spelling ability of schoolchildren from the fourth to sixth grades of the elementary schools in the private and public schools of Bauru, São Paulo, and to verify whether errors are overcome as studies progress and the hierarchy of errors as to how often they occur. A dictation was applied to 384 schoolchildren: 206 from the private schools: 74 were at the fourth grade, 65 at the fifth grade, and 67 at the sixth grade; and 178 from the public schools; 56 at the fourth grade, 63 at the fifth grade, and 59 at the sixth grade of elementary school. Student's t test was used. In comparison of total spelling errors score, difference was found among the fourth and sixth grades of the private and public schools. Spelling errors decreased as education progressed, and those related to language irregularities were more common. Spelling ability and performance of students from the private and public schools are not similar in the fourth and sixth grades, but it is in the fifth grade. Spelling errors are gradually overcome as education progresses; however, this overcome rate was considerable between the fourth and fifth grades in the public schools. Decrease in the types of spelling errors follows a hierarchy of categories: phoneme/grapheme conversion, simple contextual rules, complex contextual rules, and language irregularities. Finally, the most common type of spelling error found was that related to language irregularities.
Boller, Christoph; Wyss, Kaspar; Mtasiwa, Deo; Tanner, Marcel
2003-01-01
OBJECTIVE: To compare the quality of public and private first-tier antenatal care services in Dar es Salaam, United Republic of Tanzania, using defined criteria. METHODS: Structural attributes of quality were assessed through a checklist, and process attributes, including interpersonal and technical aspects, through observation and exit interviews. A total of 16 health care providers, and 166 women in the public and 188 in the private sector, were selected by systematic random sampling for inclusion in the study. Quality was measured against national standards, and an overall score calculated for the different aspects to permit comparison. FINDINGS: The results showed that both public and private providers were reasonably good with regard to the structural and interpersonal aspects of quality of care. However, both were poor when it came to technical aspects of quality. For example, guidelines for dispensing prophylactic drugs against anaemia or malaria were not respected, and diagnostic examinations for the assessment of gestation, anaemia, malaria or urine infection were frequently not performed. In all aspects, private providers were significantly better than public ones. CONCLUSION: Approaches to improving quality of care should emerge progressively as a result of regular quality assessments. Changes should be introduced using an incremental approach addressing few improvements at a time, while ensuring participation in, and ownership of, every aspect of the strategy by health personnel, health planners and managers and also the community. PMID:12751419
An investigation into the bacterial contamination of goniolenses in use in clinical practice.
Grundon, Rachael; Scurrell, Emma; Mould, John; Hayton-Lee, Emma; Heinrich, Christine
2017-12-18
Objectives To report the incidence and evaluate the clinical significance of goniolens bacterial contamination in clinical use in dogs with three different usage protocols and one with an added cleaning protocol. Animals Studied and Methods Three groups of twenty dogs undergoing gonioscopy at a private practice in the UK had the goniolenses swabbed for bacteriology culture and identification prior to placement on the cornea. Three protocols of lens use, with 2 different types of goniolens, were studied. One protocol was then repeated with 21 dogs with a lens cleaning protocol prior to storage. Results Low levels of bacterial contamination were found in all 3 initial groups (10-15%). No correlation was found between usage protocol used and rate of contamination and no correlation was found between length of storage between use and contamination. All bacteria cultured were considered naturally occurring commensals for the canine eye and environment. The group with a cleaning protocol had a 4.7% contamination rate. This was not statistically different from the non-cleaning groups. Conclusions The rate of bacterial contamination of goniolenses in clinical practice is low and the bacterial contaminants consist of commensal bacteria, unlikely to be of detriment to the eye. Minimal contamination of the goniolenses was found and this did not appear to be of clinical significance. The introduction of a simple cleaning protocol did not produce a statistically significant reduction in bacterial contamination. © 2017 American College of Veterinary Ophthalmologists.
Kaewsawang, Sarinee; Chongsuvivatwong, Virasakdi; Vongsirinavarat, Mantana
2016-06-01
In Thailand, the shortage of physiotherapists has been an increasing concern because of increased health burden from demographic and epidemiologic changes. This study aims to analyse the current situation of the physiotherapy workforce production system, secular trend, geographical distribution and comparison of public and private physiotherapy training institutes. Longitudinal data related to production capacity of the physiotherapy institutes were applied. Data from 2008 to 2012 were obtained from all 16 physiotherapy institutes in Thailand. Data during 2000-2007 were also retrieved from annual reports from the Ministry of Education. Descriptive statistics were initially used. Comparison was made between public and private physiotherapy institutes in terms of the number of students admitted and graduated, number of teachers, annual tuition fee, student-teacher ratio and dropout rate within 1 year. Predictive factors for graduation within 4 years were determined using logistic regression. In Thailand, there was an average of 800 physiotherapy graduates per year. New private institutes have been recently established and have steadily increased student admission rates. However, this has resulted in a high student-teacher ratio (median 7.1, inter-quartile range (IQR) 5.9-10.0). The first-year dropout rate in 2012 was 29.1%. Geographically, the majority of the institutes are clustered in the central region. Multivariate analysis revealed significantly lower probability of graduation within 4 years among students admitted to the private institutes and those in non-north-east region. The production capacity of the physiotherapy workforce is below an estimated need. Private physiotherapy institutes need more support to improve the situation of staff shortages and student graduation rates. The non-central regions should be encouraged to produce more physiotherapists. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.
AN ANALYSIS OF THE INEQUALITIES BETWEEN THE PUBLIC AND PRIVATE SECTOR IN SOUTH AFRICA.
Dell, A J; Kahn, D; Klopper, J
2017-06-01
The full extent of the global burden of surgical disease is largely unknown; however, the scope of the problem is thought to be large. Despite the substantial burden of surgical disease, surgical services are inaccessible to many of those who need them most. There are disparities between public and private sectors in South Africa, which compounds inequitable access to surgical care. This study involved a descriptive analysis of surgical resources and included the total number of hospitals, hospital beds, surgical beds, general surgeons (specialist and nonspecialist), and the number of functional operating theatres in South Africa. A comparison was performed between the public sector resources per uninsured population and private sector resources per insured population. Hospitals were contacted during the period 01 October 2014 to 31 December 2014. Surgical resources were concentrated in metropolitan areas of urban provinces. There were striking differences between sectors when a comparison was made between patients with and without health insurance. Private resources were comparable to those available in high income countries (HICs) and were accessible to only 16% of South Africans. Improving access to surgical services in lower middle income countries (LMICs) requires addressing gaps between the public and private sector regarding infrastructure, personnel, as well as equipment. South Africa is unique in that although it is classified as an upper middle income country (UMIC), it comprises of two sectors; a public sector which has resources similar to other LMICs, and a private sector which has resources similar to HICs. These data identified disparities between geographic regions which may be contributing to ongoing inequity in South Africa, and by doing so allows for evidence-based planning towards improving surgical infrastructure and workforce.
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui
2016-05-13
Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.
Cho, S H; Lowenstein, J R; Balter, P A; Wells, N H; Hanson, W F
2000-01-01
A new calibration protocol, developed by the AAPM Task Group 51 (TG-51) to replace the TG-21 protocol, is based on an absorbed-dose to water standard and calibration factor (N(D,w)), while the TG-21 protocol is based on an exposure (or air-kerma) standard and calibration factor (N(x)). Because of differences between these standards and the two protocols, the results of clinical reference dosimetry based on TG-51 may be somewhat different from those based on TG-21. The Radiological Physics Center has conducted a systematic comparison between the two protocols, in which photon and electron beam outputs following both protocols were compared under identical conditions. Cylindrical chambers used in this study were selected from the list given in the TG-51 report, covering the majority of current manufacturers. Measured ratios between absorbed-dose and air-kerma calibration factors, derived from the standards traceable to the NIST, were compared with calculated values using the TG-21 protocol. The comparison suggests that there is roughly a 1% discrepancy between measured and calculated ratios. This discrepancy may provide a reasonable measure of possible changes between the absorbed-dose to water determined by TG-51 and that determined by TG-21 for photon beam calibrations. The typical change in a 6 MV photon beam calibration following the implementation of the TG-51 protocol was about 1%, regardless of the chamber used, and the change was somewhat smaller for an 18 MV photon beam. On the other hand, the results for 9 and 16 MeV electron beams show larger changes up to 2%, perhaps because of the updated electron stopping power data used for the TG-51 protocol, in addition to the inherent 1% discrepancy presented in the calibration factors. The results also indicate that the changes may be dependent on the electron energy.
The ROI of VoIP: Everybody Says VoIP Saves Big Bucks. But Does It?
ERIC Educational Resources Information Center
Villano, Matt
2006-01-01
Advocates of Voice over Internet Protocol (VoIP) say it saves money on long distance calls by sending them over the Internet, improves communication by eliminating the Private Branch Exchange (PBX), and offers a host of neat features such as call forwarding, e-mail accessible voicemail, and more. When it comes to measuring the dollars-and-cents…
Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity
2016-03-01
22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades
About machine-readable travel documents
NASA Astrophysics Data System (ADS)
Vaudenay, S.; Vuagnoux, M.
2007-07-01
Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.
Building the Bridge from War to Peace: Defining Interagency Roles in Rebuilding a Nation
2009-11-01
Politics of Strategic Assessment. Princeton: Princeton UP, 2008. (JF 195 .B76 2008) Carafano, James Jay. Private Sector , Public Wars: Contractors in... Private Security Companies in Iraq." Third World Quarterly 26.4-5 (June 2005): 777-96. Erdmann, Martin, Ambassador. "A Comprehensive Approach to Modern... Sectoral Comparisons. Washington: World Bank, Conflict Prevention & Reconstruction, Environmentally and Socially Sustainable Development Network, 2005
Comparison of patients' experiences in public and private primary care clinics in Malta.
Pullicino, Glorianne; Sciortino, Philip; Calleja, Neville; Schäfer, Willemijn; Boerma, Wienke; Groenewegen, Peter
2015-06-01
Demographic changes, technological developments and rising expectations require the analysis of public-private primary care (PC) service provision to inform policy makers. We conducted a descriptive, cross-sectional study using the dataset of the Maltese arm of the QUALICOPC Project to compare the PC patients' experiences provided by public-funded and private (independent) general practitioners in Malta. Seven hundred patients from 70 clinics completed a self-administered questionnaire. Direct logistic regression showed that patients visiting the private sector experienced better continuity of care with more difficulty in accessing out-of-hours care. Such findings help to improve (primary) healthcare service provision and resource allocation. © The Author 2014. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.
Dynamic sentinel lymph node biopsy for penile cancer: a comparison between 1- and 2-day protocols.
Dimopoulos, Panagiotis; Christopoulos, Panagiotis; Shilito, Sam; Gall, Zara; Murby, Brian; Ashworth, David; Taylor, Ben; Carrington, Bernadette; Shanks, Jonathan; Clarke, Noel; Ramani, Vijay; Parr, Nigel; Lau, Maurice; Sangar, Vijay
2016-06-01
To determine the outcome of clinically negative node (cN0) patients with penile cancer undergoing dynamic sentinel node biopsy (DSNB), comparing the results of a 1- and 2-day protocol that can be used as a minimal invasive procedure for staging of penile cancer. This is a retrospective analysis of 151 cN0 patients who underwent DSNB from 2008 to 2013 for newly diagnosed penile cancer. Data were analysed per groin and separated into groups according to the protocol followed. The comparison of the two protocols involved the number of nodes excised, γ-counts, false-negative rates (FNR), and complication rates (Clavien-Dindo grading system). In all, 280 groins from 151 patients underwent DSNB after a negative ultrasound ± fine-needle aspiration cytology. The 1-day protocol was performed in 65 groins and the 2-day protocol in 215. Statistically significantly more nodes were harvested with the 1-day protocol (1.92/groin) compared with the 2-day protocol (1.60/groin). The FNRs were 0%, 6.8% and 5.1%, for the 1-day protocol, 2-day protocol, and overall, respectively. Morbidity of the DSNB was 21.4% for all groins, and 26.2% and 20.1% for the 1-day and 2-day protocols, respectively. Most of the complications were of Clavien-Dindo Grade 1-2. DSNB is safe for staging patients with penile cancer. There is a trend towards a 1-day protocol having a lower FNR than a 2-day protocol, albeit at the expense of a slightly higher complication rate. © 2015 The Authors BJU International © 2015 BJU International Published by John Wiley & Sons Ltd.
Is Vancomycine Still a Choice for Chronic Osteomyelitis Empirical Therapy in Iran?
Izadi, Morteza; Zamani, Mohammad Mahdi; Mousavi, Seyed Ahmad; Sadat, Seyed Mir Mostafa; Siami, Zeinab; Vais Ahmadi, Noushin; Jonaidi Jafari, Nematollah; Shirvani, Shahram; Majidi Fard, Mojgan; Imani Fooladi, Abbas Ali
2012-01-01
Background Pyogenic bacteria and especially Staphylococcus aurous (S. aurous) are the most common cause of chronic osteomyelitis. Not only treatment protocol of chronic osteomyelitis occasionally is amiss but also this malady responds to treatment difficultly. Objectives This study investigates antibiotic resistance pattern of S. aurous isolated from Iranian patients who suffer from chronic osteomyelitis by two methods: disk diffusion (Kirby bauyer) and E-test (Epsilometer test) to find Vancomycin susceptibility and MIC (Minimum inhibitory concentration). Patients and Methods One hundred and thirty one patients who suffer from chronic osteomyelitis which have been referred to both governmental and private hospitals at 2010 were tried out for culturing of osteomyelitis site (sites). Antibiotic susceptibility and MIC of isolated bacteria were investigated by Kirby bauyer and E-test respectively. Results Samples were collected from bone (73.4%), surrounding tissue (14.6%) and wound discharge (12%). S. aureus was isolated from 49.6% of the samples. According to disc diffusion, methicillin resistance S. aureus (MRSA) was 75% and Vancomycin resistance S. aurous (VRSA) was 0% and based on MIC, MRSA was 68.5% and VRSA was 0%. According to MIC experiments, maximum sensitivity was against to Vancomycin (90.2%) and ciprofloxacin (54.4%) respectively but based on disc diffusion, maximum sensitivity was against to Vancomycin (97.7%) and ciprofloxacin (43.2%), respectively (P = 0.001). E-test (9.8%) in comparison with Disc diffusion (2.3%) showed higher percent of intermediate susceptibility to Vancomycin (P = 0.017). Conclusions Comparison of antibiograms and MICs showed that Kirby bauyer technique especially for detection of VISA strains is not reliable comparison with E-test. Already VRSA strains have not detected in Iranian chronic osteomyelitis, Thus Vancomycin is the first choice for chronic osteomyelitis empirical therapy in Iran yet. PMID:23483042
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu
2016-02-01
In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.
Comparison of test protocols for standard room/corner tests
R. H. White; M. A. Dietenberger; H. Tran; O. Grexa; L. Richardson; K. Sumathipala; M. Janssens
1998-01-01
As part of international efforts to evaluate alternative reaction-to-fire tests, several series of room/comer tests have been conducted. This paper reviews the overall results of related projects in which different test protocols for standard room/corner tests were used. Differences in the test protocols involved two options for the ignition burner scenario and whether...
Andersen, Lotte Bøgh; Jakobsen, Mads Leth Felsager
2011-01-01
In terms of clinical procedures (to take the example used in this article, hip operations), both public and private organizations provide highly professionalized services. For this service type, our knowledge about ownership differences is sparse. To begin to fill this gap, we investigate how the ownership of hip clinics affects professional behaviour, treatment quality and patient satisfaction. The comparison of private and public hip clinics is based on data from the Danish Hip Arthroplasty Register and the Danish Central Patient Register combined with 20 semi-structured interviews. We find that private clinics employ stronger individual financial incentives and try harder to increase the income/costs ratio than do public clinics. Private clinics optimize non-clinical factors such as waiting time much more than public clinics and have fewer complication-prone patients than public clinics. However, the clinical procedures are very similar in the two types of clinics. Private clinics do not achieve better clinical results, but patient satisfaction is nevertheless higher with private clinics. The implication is that ownership matters for highly professionalized services, but professionalism neutralizes some – but not all – ownership differences.
Gupta, A K; Garg, C R; Joshi, B C; Rawat, N; Dabla, V; Gupta, A
2015-01-01
In India, programme for prevention of mother-to-child transmission (PMTCT) of HIV is primarily implemented through public health system. State AIDS Control Societies (SACSs) encourage private hospitals to set up integrated counselling and testing centres (ICTCs). However, private hospitals of Delhi did not set up ICTCs. Consequently, there is no information on PMTCT interventions in private hospitals of Delhi. This study was undertaken by Delhi SACS during March 2013 through September 2013 to assess status of implementation of PMTCT programme in various private hospitals of Delhi to assist programme managers in framing national policy to facilitate uniform implementation of National PMTCT guidelines. Out of total 575 private hospitals registered with Government of Delhi, 336 (58.4%) catering to pregnant women were identified. About 100 private hospitals with facility of antenatal care, vaginal/caesarean delivery and postnatal care and minimum 10 indoor beds were selected for study. Study sample comprised of large corporate hospitals (≥100 beds; n = 29), medium-sized hospitals (25 to <100 beds; n = 42) and small nursing homes (10 to <25 beds; n = 29). A pre-tested questionnaire was designed to obtain basic information about hospital in context to PMTCT programme. Interviews of heads of obstetrics and gynaecology and paediatric departments were conducted by trained interviewers. It was observed that in private hospitals in year 2012, out of 38,186 antenatal women tested, 52 (0.14%) were detected HIV-positive. However, against National Policy, HIV testing was done without pre/post-test counselling/or consent of women, no PMTCT protocol existed, delivery of HIV-positive women was not undertaken and no efforts were made to link HIV-positive women to antiretroviral treatment. Major intervention observed was medical termination of pregnancy, which indicates lack of awareness in private hospitals about available interventions under national programme. The role of private hospitals in management of HIV in pregnant women must be recognized and mainstreamed in HIV control efforts. There is an urgent need for capacity building of private health care providers to improve standards of practice. National AIDS Control Organization may consider establishing linkages or adopting model developed by some countries with generalized epidemic for delivering PMTCT services in private health sector.
Pereira, Shreya K; Kumar, Paresh; Dutt, Varun; Haldar, Kaveri; Penn-Kekana, Loveday; Santos, Andreia; Powell-Jackson, Timothy
2015-05-26
Social franchising is the fastest growing market-based approach to organising and improving the quality of care in the private sector of low- and middle-income countries, but there is limited evidence on its impact and cost-effectiveness. The "Sky" social franchise model was introduced in the Indian state of Uttar Pradesh in late 2013. Difference-in-difference methods will be used to estimate the impact of the social franchise programme on the quality and coverage of health services along the continuum of care for reproductive, maternal and newborn health. Comparison clusters will be selected to be as similar as possible to intervention clusters using nearest neighbour matching methods. Two rounds of data will be collected from a household survey of 3600 women with a birth in the last 2 years and a survey of 450 health providers in the same localities. To capture the full range of effects, 59 study outcomes have been specified and then grouped into conceptually similar domains. Methods to account for multiple inferences will be used based on the pre-specified grouping of outcomes. A process evaluation will seek to understand the scale of the social franchise network, the extent to which various components of the programme are implemented and how impacts are achieved. An economic evaluation will measure the costs of setting up, maintaining and running the social franchise as well as the cost-effectiveness and financial sustainability of the programme. There is a dearth of evidence demonstrating whether market-based approaches such as social franchising can improve care in the private sector. This evaluation will provide rigorous evidence on whether an innovative model of social franchising can contribute to better population health in a low-income setting.
A comparison of private and public dental students' perceptions of extramural programming.
Ayers, Curt S; Abrams, Richard A; McCunniff, Michael D; Goldstein, Benjamin R
2003-04-01
This project was undertaken to compare the opinions of private and public dental school students' perceptions concerning extramural programming, which is defined as any aspect of the curriculum in which undergraduate dental students provide dental care outside the main dental facility. A survey instrument was used to collect data from undergraduate students at a private (N = 267; 88.4 percent response rate) and at a public (N = 213; 67.2 percent response rate) dental school. When asked to rate the value of various extramural sites in making them a better dentist, both groups rated private dental offices the most valuable and prisons the least valuable. When questioned about the amount of time students should spend each year in extramural programming, private students, overall, desired 34 percent more time than did public students. When asked what percentage of the total time spent in extramural programming students should spend providing various categories of dental care, public school students thought 26 percent more time should be spent rendering preventive services/health education than did the private students. The private students indicated a stronger desire (13 percent more) for rendering clinical services than did public students. Both private and public students were most likely to enter group private practice after graduation. The increasing interest in community-based programs makes the information gained from this study useful for future curriculum planning.
The Impact of Private Insurance Coverage on Prescription Drug Use in Ontario, Canada.
Kratzer, Jillian; Cheng, Lucy; Allin, Sara; Law, Michael R
2015-05-01
Canadians obtain prescription drug coverage through a patchwork of public insurance, private benefit plans and out-of-pocket payments. Prior evidence suggests that insurance coverage, in general, leads to higher utilization rates of essential medicines; it is unclear whether individuals with private insurance have better access to medicines. Using data from the 2008 Canadian Community Health Survey, we identified cohorts from Ontario who reported having been diagnosed by a physician with asthma, high blood pressure or diabetes. Using propensity score stratification techniques, we compared drug utilization of individuals holding private insurance with that of individuals holding either public insurance (for those aged over 65 years) or no insurance (aged under 65 years). In five out of six comparisons, individuals with private insurance were more likely to take prescribed drugs than those without. Raw differences in the percentage of patients taking medicines ranged from 0.1 to 8.1%. Ontarians with chronic conditions holding private drug insurance are more likely to use prescription drugs than those who do not. Whether these inequities result in health outcome differences remains unknown. Copyright © 2015 Longwoods Publishing.
The Impact of Private Insurance Coverage on Prescription Drug Use in Ontario, Canada
Kratzer, Jillian; Cheng, Lucy; Allin, Sara
2015-01-01
Canadians obtain prescription drug coverage through a patchwork of public insurance, private benefit plans and out-of-pocket payments. Prior evidence suggests that insurance coverage, in general, leads to higher utilization rates of essential medicines; it is unclear whether individuals with private insurance have better access to medicines. Using data from the 2008 Canadian Community Health Survey, we identified cohorts from Ontario who reported having been diagnosed by a physician with asthma, high blood pressure or diabetes. Using propensity score stratification techniques, we compared drug utilization of individuals holding private insurance with that of individuals holding either public insurance (for those aged over 65 years) or no insurance (aged under 65 years). In five out of six comparisons, individuals with private insurance were more likely to take prescribed drugs than those without. Raw differences in the percentage of patients taking medicines ranged from 0.1 to 8.1%. Ontarians with chronic conditions holding private drug insurance are more likely to use prescription drugs than those who do not. Whether these inequities result in health outcome differences remains unknown. PMID:26142359
Standards Are Good (For) Business: Standardised Comparison and the Private Sector in Education
ERIC Educational Resources Information Center
Steiner-Khamsi, Gita
2016-01-01
The article examines how and why the method of "comparison against standards" has benefited non-state actors and businesses in the education sector. Drawing on brief examples from international standard schools in Qatar, Indonesia and Mongolia, the author examines how the global education industry uses the reference to…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
A study compared the compensation packages offered to private sector and Federal white-collar employees. The conclusions drawn in the study were based on data from previous and ongoing research conducted by the General Accounting Office (GAO). Analysis of these data revealed that whereas the Employment Cost Index has shown a cumulative increase of…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Div. of Human Resources.
This briefing report was developed to provide a Senate subcommittee with information concerning certain benefit features of the Federal Employees Health Benefits Program (FEHBP). It compares coverage for selected health benefits in the federal and private sectors for a 6-year period (1980-1985). A description of methodology states that information…
Paying for obesity: a changing landscape.
Simpson, Lisa A; Cooper, Julie
2009-06-01
Coverage for obesity related services is highly variable. Despite this, health plans, purchasers, and states have mounted numerous recent initiatives. To identify the range of approaches being used to address coverage and reimbursement for childhood obesity services. Key informant interviews were conducted using a semi-structured protocol to identify the types of activities they or their organization were engaged in to address childhood obesity, to learn about private payer policies and procedures, to identify best practices, potential resources and/or other key informants. Domains addressed in the protocol included scope of the respondent's organization's activities, the rationale for supporting obesity activities, the degree to which obesity services were a covered benefit and what if any barriers or challenges were encountered in implementation, the policy climate within which the organization operates (e.g. state legislation, initiatives or task forces), and any assessment of the impact and/or cost of implementing their initiatives. The individuals interviewed represented respondents from each of the following categories: employer, health plan, and state insurance programs and conducted by phone between November 2007 and March 2008. In addition to the information gathered by the key informant interviews we conducted a search of the relevant peer review and grey literature between 2005 and 2008 and input from a national expert advisory group. Significant variation, as well as recent changes, were identified in both the private and public sector. Approaches included new benefits and incentives for parents and providers. Only anecdotal evidence of impact of the recent changes was available. There is important forward movement in how public and private players are addressing paying for obesity related services. Medicaid and SCHIP programs have an opportunity to provide additional leadership. Substantial investments in evaluation and research are needed to learn which approaches are most effective.
Thermogravimetric Analysis of Single-Wall Carbon Nanotubes
NASA Technical Reports Server (NTRS)
Arepalli, Sivram; Nikolaev, Pavel; Gorelik, Olga
2010-01-01
An improved protocol for thermogravimetric analysis (TGA) of samples of single-wall carbon nanotube (SWCNT) material has been developed to increase the degree of consistency among results so that meaningful comparisons can be made among different samples. This improved TGA protocol is suitable for incorporation into the protocol for characterization of carbon nanotube material. In most cases, TGA of carbon nanotube materials is performed in gas mixtures that contain oxygen at various concentrations. The improved protocol is summarized.
Marienau, Karen J; Cramer, Elaine H; Coleman, Margaret S; Marano, Nina; Cetron, Martin S
2014-01-01
In-flight transmission risk of Mycobacterium tuberculosis is not well defined, although studies suggest it is low. The impact of flight-related tuberculosis (TB) contact investigations (TBCIs) on TB prevention and control is not well established, and they compete for resources with activities with established benefits. We sought to determine the risks and cost-benefits of using more restrictive criteria in comparison to the Centers for Disease Control and Prevention (CDC) 2008 protocol for TBCIs. The risk-benefits of a modified CDC protocol were analyzed in comparison to the 2008 CDC protocol using data from flight-related TBCIs conducted in the United States from 2007 through 2009. We predicted the numbers and characteristics of case-travelers that would be identified using each protocol's criteria, and results of the associated passenger-contacts' TB screening tests. The economic analysis compared the costs of TBCIs to avoided costs of TB treatment and mortality using a Return on Investment model. The estimated in-flight transmission risk using a modified CDC protocol was 1.4%-19% versus 1.1%-24% for the 2008 protocol. Numbers of TBCIs and immediate costs to health departments were reduced by half. Long-term cost-benefits were comparable. CDC's modified protocol appears to be a feasible alternative that will conserve public health resources without jeopardizing the public's health. Published by Elsevier Ltd.
Comparison of IPSM 1990 photon dosimetry code of practice with IAEA TRS‐398 and AAPM TG‐51.
Henríquez, Francisco Cutanda
2009-01-01
Several codes of practice for photon dosimetry are currently used around the world, supported by different organizations. A comparison of IPSM 1990 with both IAEA TRS‐398 and AAPM TG‐51 has been performed. All three protocols are based on the calibration of ionization chambers in terms of standards of absorbed dose to water, as it is the case with other modern codes of practice. This comparison has been carried out for photon beams of nominal energies: 4 MV, 6 MV, 8 MV, 10 MV and 18 MV. An NE 2571 graphite ionization chamber was used in this study, cross‐calibrated against an NE 2611A Secondary Standard, calibrated in the National Physical Laboratory (NPL). Absolute dose in reference conditions was obtained using each of these three protocols including: beam quality indices, beam quality conversion factors both theoretical and NPL experimental ones, correction factors for influence quantities and absolute dose measurements. Each protocol recommendations have been strictly followed. Uncertainties have been obtained according to the ISO Guide to the Expression of Uncertainty in Measurement. Absorbed dose obtained according to all three protocols agree within experimental uncertainty. The largest difference between absolute dose results for two protocols is obtained for the highest energy: 0.7% between IPSM 1990 and IAEA TRS‐398 using theoretical beam quality conversion factors. PACS number: 87.55.tm
A comparison of protocols and observer precision for measuring physical stream attributes
Whitacre, H.W.; Roper, B.B.; Kershner, J.L.
2007-01-01
Stream monitoring programs commonly measure physical attributes to assess the effect of land management on stream habitat. Variability associated with the measurement of these attributes has been linked to a number of factors, but few studies have evaluated variability due to differences in protocols. We compared six protocols, five used by the U.S. Department of Agriculture Forest Service and one by the U.S. Environmental Protection Agency, on six streams in Oregon and Idaho to determine whether differences in protocol affect values for 10 physical stream attributes. Results from Oregon and Idaho were combined for groups participating in both states, with significant differences in attribute means for 9 out of the 10 stream attributes. Significant differences occurred in 5 of 10 in Idaho, and 10 of 10 in Oregon. Coefficients of variation, signal-to-noise ratio, and root mean square error were used to evaluate measurement precision. There were differences among protocols for all attributes when states were analyzed separately and as a combined dataset. Measurement differences were influenced by choice of instruments, measurement method, measurement location, attribute definitions, and training approach. Comparison of data gathered by observers using different protocols will be difficult unless a core set of protocols for commonly measured stream attributes can be standardized among monitoring programs.
Weidner, Christopher; Steinfath, Matthias; Wistorf, Elisa; Oelgeschläger, Michael; Schneider, Marlon R; Schönfelder, Gilbert
2017-08-16
Recent studies that compared transcriptomic datasets of human diseases with datasets from mouse models using traditional gene-to-gene comparison techniques resulted in contradictory conclusions regarding the relevance of animal models for translational research. A major reason for the discrepancies between different gene expression analyses is the arbitrary filtering of differentially expressed genes. Furthermore, the comparison of single genes between different species and platforms often is limited by technical variance, leading to misinterpretation of the con/discordance between data from human and animal models. Thus, standardized approaches for systematic data analysis are needed. To overcome subjective gene filtering and ineffective gene-to-gene comparisons, we recently demonstrated that gene set enrichment analysis (GSEA) has the potential to avoid these problems. Therefore, we developed a standardized protocol for the use of GSEA to distinguish between appropriate and inappropriate animal models for translational research. This protocol is not suitable to predict how to design new model systems a-priori, as it requires existing experimental omics data. However, the protocol describes how to interpret existing data in a standardized manner in order to select the most suitable animal model, thus avoiding unnecessary animal experiments and misleading translational studies.
Overview of Robotic Devices for Nursing Care Project.
Hirukawa, Hirohisa
2017-01-01
METI/AMED are conducting a project on the development and deployment of robotic devices for nursing care to enhance the autonomy of elderly persons and assist care givers. An evaluation protocol is presented and the devices developed in the project are introduced. The devices consist of transfer assist devices (wearable/non-wearable), walking assist devices (outdoor/indoor), safety surveillance sensors (nursing home/private home), bath lift and toilet assist.
A cache-aided multiprocessor rollback recovery scheme
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent
1989-01-01
This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.
Securing resource constraints embedded devices using elliptic curve cryptography
NASA Astrophysics Data System (ADS)
Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad
2014-06-01
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).
Hansagi, H; Calltorp, J; Andréasson, S
1993-03-01
As in many other countries, the health care system in Sweden is currently undergoing rapid changes. Within a framework of public financing, the delivery of health care is to an increasing extent being transferred to various entrepreneurs; private, public or cooperatives. A privately run, but publicly financed, health care centre was evaluated with regard to quality and costs. Quality was defined in terms of the central guidelines for Swedish primary health care: first level responsibility, accessibility, a holistic view of the patient, and continuity of care and safety. The services offered by the private health care centre were evaluated by different methods--questionnaires, health care utilization data and economic analyses--and found to be of similar quality but produced at a lower cost than by three publicly managed health care centres.
Meltzer, Lisa J; Shaheed, Keisha; Ambler, Devon
2016-01-01
Homeschooled students provide a naturalistic comparison group for later/flexible school start times. This study compared sleep patterns and sleep hygiene for homeschooled students and public/private school students (grades 6-12). Public/private school students (n = 245) and homeschooled students (n = 162) completed a survey about sleep patterns and sleep hygiene. Significant school group differences were found for weekday bedtime, wake time, and total sleep time, with homeschooled students waking later and obtaining more sleep. Homeschooled students had later school start times, waking at the same time that public/private school students were starting school. Public/private school students had poorer sleep hygiene practices, reporting more homework and use of technology in the hour before bed. Regardless of school type, technology in the bedroom was associated with shorter sleep duration. Later school start times may be a potential countermeasure for insufficient sleep in adolescents. Future studies should further examine the relationship between school start times and daytime outcomes, including academic performance, mood, and health.
Zarb, Francis; McEntee, Mark F; Rainford, Louise
2015-06-01
To evaluate visual grading characteristics (VGC) and ordinal regression analysis during head CT optimisation as a potential alternative to visual grading assessment (VGA), traditionally employed to score anatomical visualisation. Patient images (n = 66) were obtained using current and optimised imaging protocols from two CT suites: a 16-slice scanner at the national Maltese centre for trauma and a 64-slice scanner in a private centre. Local resident radiologists (n = 6) performed VGA followed by VGC and ordinal regression analysis. VGC alone indicated that optimised protocols had similar image quality as current protocols. Ordinal logistic regression analysis provided an in-depth evaluation, criterion by criterion allowing the selective implementation of the protocols. The local radiology review panel supported the implementation of optimised protocols for brain CT examinations (including trauma) in one centre, achieving radiation dose reductions ranging from 24 % to 36 %. In the second centre a 29 % reduction in radiation dose was achieved for follow-up cases. The combined use of VGC and ordinal logistic regression analysis led to clinical decisions being taken on the implementation of the optimised protocols. This improved method of image quality analysis provided the evidence to support imaging protocol optimisation, resulting in significant radiation dose savings. • There is need for scientifically based image quality evaluation during CT optimisation. • VGC and ordinal regression analysis in combination led to better informed clinical decisions. • VGC and ordinal regression analysis led to dose reductions without compromising diagnostic efficacy.
What can we learn from international comparisons of health systems and health system reform?
McPake, B.; Mills, A.
2000-01-01
Most commonly, lessons derived from comparisons of international health sector reform can only be generalized in a limited way to similar countries. However, there is little guidance as to what constitutes "similarity" in this respect. We propose that a framework for assessing similarity could be derived from the performance of individual policies in different contexts, and from the cause and effect processes related to the policies. We demonstrate this process by considering research evidence in the "public-private mix", and propose variables for an initial framework that we believe determine private involvement in the public health sector. The most influential model of public leadership places the private role in a contracting framework. Research in countries that have adopted this model suggests an additional list of variables to add to the framework. The variables can be grouped under the headings "demand factors", "supply factors", and "strength of the public sector". These illustrate the nature of a framework that could emerge, and which would help countries aiming to learn from international experience. PMID:10916918
Cost Comparison of Laparoscopic versus Open Procedures at the Sydney Women's Endosurgery Centre
Chou, Danny; Cario, Gregory
1998-01-01
Objectives: The objective of this study was to provide a cost comparison between laparoscopic surgery and open surgery from January 1996 to January 1998. The setting for this study was three private hospitals and one public hospital associated with the Sydney Women's Endosurgery Centre. Cost analysis was done using the costing provided by the private and public hospitals representing the total amount charged to the patient or the fund for their entire stay including disposable laparoscopic instruments and miscellaneous charges. We looked at laparoscopic hysterectomy, abdominal hysterectomy, vaginal hysterectomy, laparoscopic Burch colposuspension and open Burch colposus-pension. Despite the difficulties and limitations using our method of cost analysis, it appears that laparoscopic surgery is a less costly alternative to open abdominal surgery, particularly where the amount of disposable instruments are kept to a minimum. When the added advantages of early return to normal activities, family and workplace are added in, it is clear that providers of health care in the public and private sector will see laparoscopic surgery as an increasingly desirable option.
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.; Barton, Richard J.
2011-01-01
Standards-based wireless sensor network (WSN) protocols are promising candidates for spacecraft avionics systems, offering unprecedented instrumentation flexibility and expandability. Ensuring reliable data transport is key, however, when migrating from wired to wireless data gathering systems. In this paper, we conduct a rigorous laboratory analysis of the relative performances of the ZigBee Pro and ISA100.11a protocols in a representative crewed aerospace environment. Since both operate in the 2.4 GHz radio frequency (RF) band shared by systems such as Wi-Fi, they are subject at times to potentially debilitating RF interference. We compare goodput (application-level throughput) achievable by both under varying levels of 802.11g Wi-Fi traffic. We conclude that while the simpler, more inexpensive ZigBee Pro protocol performs well under moderate levels of interference, the more complex and costly ISA100.11a protocol is needed to ensure reliable data delivery under heavier interference. This paper represents the first published, rigorous analysis of WSN protocols in an aerospace environment that we are aware of and the first published head-to-head comparison of ZigBee Pro and ISA100.11a.
Engelhardt, Othmar G.; Wood, John; Heath, Alan; Katz, Jacqueline M.; Peiris, Malik; Hoschler, Katja; Hungnes, Olav; Zhang, Wenqing; Van Kerkhove, Maria D.
2015-01-01
The microneutralization assay is commonly used to detect antibodies to influenza virus, and multiple protocols are used worldwide. These protocols differ in the incubation time of the assay as well as in the order of specific steps, and even within protocols there are often further adjustments in individual laboratories. The impact these protocol variations have on influenza serology data is unclear. Thus, a laboratory comparison of the 2-day enzyme-linked immunosorbent assay (ELISA) and 3-day hemagglutination (HA) microneutralization (MN) protocols, using A(H1N1)pdm09, A(H3N2), and A(H5N1) viruses, was performed by the CONSISE Laboratory Working Group. Individual laboratories performed both assay protocols, on multiple occasions, using different serum panels. Thirteen laboratories from around the world participated. Within each laboratory, serum sample titers for the different assay protocols were compared between assays to determine the sensitivity of each assay and were compared between replicates to assess the reproducibility of each protocol for each laboratory. There was good correlation of the results obtained using the two assay protocols in most laboratories, indicating that these assays may be interchangeable for detecting antibodies to the influenza A viruses included in this study. Importantly, participating laboratories have aligned their methodologies to the CONSISE consensus 2-day ELISA and 3-day HA MN assay protocols to enable better correlation of these assays in the future. PMID:26108286
COMPARISON OF USEPA FIELD SAMPLING METHODS FOR BENTHIC MACROINVERTEBRATE STUDIES
Two U.S. Environmental Protection Agency (USEPA) macroinvertebrate sampling protocols were compared in the Mid-Atlantic Highlands region. The Environmental Monitoring and Assessment Program (EMAP) wadeable streams protocol results in a single composite sample from nine transects...
Federal Office Space: Comparison of Construction Costs for New Judiciary and Navy Buildings
1991-05-30
09136 United States General Accounting OfficeWashington, D.C. 20548 General Government Division B-243684 May 30 , 1991 The Honorable Howard Metzenbaum...rior and a more austere lobby. Private offices will constitute 70 to 75 percent of the office space in the Judiciary building, compared to 30 percent...Precast concrete Private office percent 70-75 30 Entrance area 5-story atrium 7,500 SF lobby Cafeteria Fully equipped Hookups only Fitness center
Saunders, Daniel G; Faller, Kathleen C; Tolman, Richard M
2016-05-01
Research is lacking on differing perspectives regarding custody cases involving domestic violence (DV). In a survey of judges, legal aid attorneys, private attorneys, DV program workers, and child custody evaluators (n = 1,187), judges, private attorneys, and evaluators were more likely to believe that mothers make false DV allegations and alienate their children. In response to a vignette, evaluators and private attorneys were most likely to recommend joint custody and least likely to recommend sole custody to the survivor. Legal aid attorneys and DV workers were similar on many variables. Gender, DV knowledge, and knowing victims explained many group differences. © The Author(s) 2015.
Virtual private networks can provide reliable IT connections.
Kabachinski, Jeff
2006-01-01
A VPN is a private network that uses a public network, such as the Internet, to connect remote sites and users together. Instead of using a dedicated hard-wired connection as in a trusted connection or leased lines, a VPN uses a virtual connection routed through the Internet from the organization's private network to the remote site or employee. Typical VPN services allow for security in terms of data encryption as well as means to authenticate, authorize, and account for all the traffic. VPN services allow the organization to use whatever network operating system they wish as it also encapsulate your data into the protocols needed to transport data across public lines. The intention of this IT World article was to give the reader an introduction to VPNs. Keep in mind that there are no standard models for a VPN. You're likely to come across many vendors presenting the virtues of their VPN applications and devices when you Google "VPN." However the general uses, concepts, and principles outlined here should give you a fighting chance to read through the marketing language in the online ads and "white papers."
Proposed test protocol for video imaging detection at intersection stop lines.
DOT National Transportation Integrated Search
2010-08-01
Test protocols for non-loop detectors have often required comparing the performance : attributes of these detectors with those of loops or other point detectors, or to manual counts. : However, that comparison is not always appropriate for a variety ...
van Heerden, Julandi A; Burger, Johanita R; Gerber, Jan J; Vlahović-Palčevski, Vera
2018-04-01
To determine the prevalence of potentially serious drug-drug interactions (DDIs) and their relationship with gender and age, among elderly in South Africa. A cross-sectional study was conducted using pharmaceutical claims data for 2013, for a total of 103 420 medical scheme beneficiaries' ≥65 years. All medications dispensed within one calendar month where the days' supply of medication dispensed overlapped, were grouped as one prescription. DDIs per prescription were then identified using the Mimica Matanović/Vlahović-Palčevski DDI protocol. Results were interpreted using effect sizes, that is Cramér's V, Cohen's d and Cohen's ƒ 2 . A total of 331 659 DDIs were identified on 235 870 (25.8%, N = 912 713) prescriptions (mean 0.36 (SD 0.7) (95% CI, 0.36 to 0.37)). Women encountered 63.5% of all DDIs. Effect sizes for the association between DDIs and age group (Cramér's V = 0.06), and gender (Cramér's V = 0.05) was negligible. There was no difference between men and women regarding the mean number of DDIs identified per prescription (Cohen's d = 0.10). The number of medicine per prescription (ƒ 2 = 0.51) was the biggest predictor of the DDIs. The most frequent interacting drug combinations were between central nervous system medicines (30.6%). Our study is the first to report the prevalence of potentially serious DDIs among an elderly population in the South African private health sector utilising the Mimica Matanović/Vlahović-Palčevski DDI protocol. Overall, we identified DDIs in approximately 26% of the prescriptions in our study. Age and gender were not found to be predictors of potentially serious DDIs. © 2017 Royal Pharmaceutical Society.
Thomas V. Dietsch
2005-01-01
This study presents a protocol developed to rapidly assess ectoparasite prevalence and intensity. Using this protocol during a mist-netting project in two different coffee agroecosystems in Chiapas, Mexico, data were collected on ectoparasitic chigger mite larvae (Acarina: Trombiculidae) found on resident and migratory birds. Surprisingly high infestation rates were...
ERIC Educational Resources Information Center
Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose
2008-01-01
This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…
Devereaux, P.J.; Choi, Peter T.L.; Lacchetti, Christina; Weaver, Bruce; Schünemann, Holger J.; Haines, Ted; Lavis, John N.; Grant, Brydon J.B.; Haslam, David R.S.; Bhandari, Mohit; Sullivan, Terrence; Cook, Deborah J.; Walter, Stephen D.; Meade, Maureen; Khan, Humaira; Bhatnagar, Neera; Guyatt, Gordon H.
2002-01-01
Background Canadians are engaged in an intense debate about the relative merits of private for-profit versus private not-for-profit health care delivery. To inform this debate, we undertook a systematic review and meta-analysis of studies comparing the mortality rates of private for-profit hospitals and those of private not-for-profit hospitals. Methods We identified studies through an electronic search of 11 bibliographical databases, our own files, consultation with experts, reference lists, PubMed and SciSearch. We masked the study results before determining study eligibility. Our eligibility criteria included observational studies or randomized controlled trials that compared private for-profit and private not-for-profit hospitals. We excluded studies that evaluated mortality rates in hospitals with a particular profit status that subsequently converted to the other profit status. For each study, we calculated a relative risk of mortality for private for-profit hospitals relative to private not-for-profit hospitals and pooled the studies of adult populations that included adjustment for potential confounders (e.g., teaching status, severity of illness) using a random effects model. Results Fifteen observational studies, involving more than 26 000 hospitals and 38 million patients, fulfilled the eligibility criteria. In the studies of adult populations, with adjustment for potential confounders, private for-profit hospitals were associated with an increased risk of death (relative risk [RR] 1.020, 95% confidence interval [CI] 1.003–1.038; p = 0.02). The one perinatal study with adjustment for potential confounders also showed an increased risk of death in private for-profit hospitals (RR 1.095, 95% CI 1.050–1.141; p < 0.0001). Interpretation Our meta-analysis suggests that private for-profit ownership of hospitals, in comparison with private not-for-profit ownership, results in a higher risk of death for patients. PMID:12054406
Roles of prices, poverty, and health in Medicare and private spending in Texas.
White, Chapin; Taychakhoonavudh, Suthira; Parikh, Rohan; Franzini, Luisa
2015-05-01
To investigate the roles of prices, poverty, and health in divergences between Medicare and private spending in Texas. Retrospective observational design using 2011 Blue Cross Blue Shield of Texas claims data and publicly available Medicare data. We measured market-level spending per enrollee among the privately insured. Variation in Medicare and private spending per person are decomposed into prices and quantities, and their associations with poverty are measured. Markets are divided into 4 groups and are compared based on the ratio of Medicare to private spending: "high-private," "proportional," "high-Medicare," and "extremely high-Medicare." Among the privately insured, poverty appears to have large spillover effects; it is strongly associated with lower prices, quantities, and spending. Among Medicare beneficiaries, health status is a key driver of spending variation. The 2 markets with extremely high Medicare-to-private spending ratios (Harlingen and McAllen) are predominantly Hispanic communities with markedly higher rates of poverty and lack of insurance and also extremely low physician supply. The markets with relatively high private spending stand out for having good health-system performance and health outcomes, and higher than average hospital prices. Variation in private spending appears to reflect the ability of the local population to pay for healthcare, whereas variation in Medicare is more heavily driven by health status, and presumably, by clinical need. These findings highlight the inadvisability of using Medicare spending as a proxy for systemwide spending, and the need for comprehensive market-level spending data that allow comparisons among populations with different sources of insurance coverage.
Anaemia management protocols in the care of haemodialysis patients: examining patient outcomes.
Saunders, Sushila; MacLeod, Martha L P; Salyers, Vince; MacMillan, Peter D; Ogborn, Malcolm R
2013-08-01
To determine whether the use of a nurse-driven protocol in the haemodialysis setting is as safe and effective as traditional physician-driven approaches to anaemia management. The role of haemodialysis nurses in renal anaemia management has evolved through the implementation of nurse-driven protocols, addressing the trend of exceeding haemoglobin targets and rising costs of erythropoietin-stimulating agents. Retrospective, non-equivalent case control group design. The sample was from three haemodialysis units in a control group (n = 64) and three haemodialysis units in a protocol group (n = 43). The protocol group used a nurse-driven renal anaemia management protocol, while the control group used a traditional physician-driven approach to renal anaemia management. All retrospective data were obtained from a provincial renal database. Data were analysed using chi-square tests and t-tests. Patient outcomes examined were haemoglobin levels, transferrin saturation levels, erythropoietin-stimulating agents use and intravenous iron use. Cost comparisons were determined using average use of erythropoietin-stimulating agents and intravenous iron. Control and protocol groups reached haemoglobin target levels. In the protocol group, 75% reached transferrin saturation target levels in comparison with 25% of the control group. Use and costs for iron was higher in the control group, while use and costs for erythropoietin was higher in the protocol group. The higher usage of erythropoietin-stimulating agents was potentially related to comorbid conditions amongst the protocol group. A nurse-driven protocol approach to renal anaemia management was as effective as the physician-driven approach in reaching haemoglobin and transferrin saturation levels. Further examination of the use and dosing of erythropoietin-stimulating agents and intravenous iron, their impact on haemoglobin levels related to patient comorbidities and subsequent cost effectiveness of protocols is required. Using a nurse-driven protocol in practice supports the independent nursing role while contributing to safe patient outcomes. © 2013 Blackwell Publishing Ltd.
The politics of health care reforms in U.S. presidential elections.
Navarro, Vicente
2008-01-01
This article analyzes why people in the United States have major problems in accessing medical care that are due to financial constraints. The author suggests that the cause of these problems is the way in which medical care and elections are funded in the United States, with private sources being the largest component in the funding of both activities. The article includes a comparison of funding of the electoral process in the United States with similar electoral processes in the countries of the European Union, and postulates that privatization of the funding of U.S. elections (primary and general) is responsible for privatization of the funding of medical care-the root of people's problem in paying for their medical care. Privatization of election funding gives undue power to the economic, financial, and professional groups that dominate medicine in the United States.
The Indian Ocean tsunami and private donations to NGOs.
Kim, Youngwan; Nunnenkamp, Peter; Bagchi, Chandreyee
2016-10-01
Non-governmental organisations (NGOs) are widely believed to raise their flag in humanitarian hotspots with a strong media presence in order to attract higher private donations. We assess this hypothesis by comparing the changes in donations between US-based NGOs with and without aid operations in the four countries most affected by the tsunami in the Indian Ocean in 2004. Simple before-after comparisons tend to support the hypothesis that 'flying the flag' helps attract higher private donations. However, performing a difference-in-difference-in-differences (DDD) approach, we find only weak indications that private donors systematically and strongly preferred NGOs with operations in the region. Extended specifications of the baseline regressions reveal that our major findings are robust. NGO heterogeneity matters in some respects, but the DDD results hold when accounting for proxies of the NGOs' reputation and experience. © 2016 The Author(s). Disasters © Overseas Development Institute, 2016.
Effect of Various Environmental Stressors on Target Detection, Identification, and Marksmanship
2007-03-01
diverses conditions environnementales difficiles, dont l’exposition à la chaleur et au froid, le bruit, l’exercice épuisant et la privation de sommeil...urban scenario used for marksmanship testing. The arrow indicates a walking target and the centrepiece depicting a poster of a soldier was a permanent... poster of a soldier was a permanent display that was used to hide targets. The heating and cooling protocols caused significant separations in core
Comparison of EPA Method 1615 RT-qPCR Assays in Standard and Kit Format
EPA Method 1615 contains protocols for measuring enterovirus and norovirus by reverse transcription quantitative polymerase chain reaction. A commercial kit based upon these protocols was designed and compared to the method's standard approach. Reagent grade, secondary effluent, ...
Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram
2016-01-01
A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194
Jensen, Michaeline; Hussong, Andrea M; Baik, Jeesook
2018-05-01
Alcohol-related content on public social networking sites (SNS) has been linked to collegiate alcohol use, but we know little about whether and how private forms of computer-mediated communication (CMC), like text messaging, are related to collegiate drinking, nor how alcohol-related CMC content and drinking are associated in non-Western cultures. We examined the ways in which private text messaging and SNS are used to facilitate alcohol involvement among U.S. (n = 575) and Korean (n = 462) college students (total N = 1037), two technologically wired cultures with prevalent collegiate alcohol misuse. Results show that college students prefer private text messaging over SNS to find parties and facilitate alcohol involvement, and this preference tends to be stronger in Korea than the United States. Private text messaging is more consistently and strongly associated with alcohol use frequency and heavy episodic drinking than SNS posts in both countries, with particularly robust associations between private text messaging and drinking in the United States. Findings underscore the role of CMCs in facilitating alcohol involvement and highlight the potential for analysis of private message content to further understand computer-mediated social processes in college student drinking.
Selmic, L E; Burton, J H; Thamm, D H; Withrow, S J; Lana, S E
2014-01-01
Many chemotherapy protocols have been reported for treatment of canine appendicular osteosarcoma (OSA), but outcome comparisons in a single population are lacking. To evaluate the effects of protocol and dose intensity (DI) on treatment outcomes for carboplatin and doxorubicin-based chemotherapy protocols. Four hundred and seventy dogs with appendicular OSA. A retrospective cohort study was performed comprising consecutive dogs treated (1997-2012) with amputation followed by 1 of 5 chemotherapy protocols: carboplatin 300 mg/m(2) IV q21d for 4 or 6 cycles (CARBO6), doxorubicin 30 mg/m(2) IV q14d or q21d for 5 cycles, and alternating carboplatin 300 mg/m(2) IV and doxorubicin 30 mg/m(2) IV q21d for 3 cycles. Adverse events (AE) and DI were evaluated. Kaplan-Meier survival curves and Cox proportional hazards regression were used to compare disease-free interval (DFI) and survival time (ST) among protocols. The overall median DFI and ST were 291 days and 284 days, respectively. A lower proportion of dogs prescribed CARBO6 experienced AEs compared to other protocols (48.4% versus 60.8-75.8%; P = .001). DI was not associated with development of metastases or death. After adjustment for baseline characteristics and prognostic factors, none of the protocols provided a significant reduction in risk of development of metastases or death. Although choice of protocol did not result in significant differences in DFI or ST, the CARBO6 protocol resulted in a lower proportion of dogs experiencing AEs, which could be advantageous in maintaining high quality of life during treatment. DI was not a prognostic indicator in this study. Copyright © 2014 by the American College of Veterinary Internal Medicine.
Barnett, Mitchell J; Perry, Paul J; Langstaff, Jodi D; Kaboli, Peter J
2006-06-01
Inappropriate prescribing in the elderly is common, but rates across different health care systems and the impact of formulary restrictions are not well described. To determine if rates of inappropriate medication use in the elderly differ between the Veterans Affairs (VA) health care system and the private sector Medicare health maintenance organization (HMO) patients. A cross-sectional study design compared administrative pharmacy claims from 10 distinct geographic regions in the United States in the VA health care system and 10 analogous regions for patients enrolled in Medicare HMOs. The cohorts included 123,633 VA and 157,517 Medicare HMO patients aged 65 years and older. Inappropriate medication use was identified using the Zhan modification of the Beers criteria, which categorizes 33 potentially inappropriate drugs into 3 major classifications: "always avoid," "rarely appropriate," and "some indications." Comparisons between the VA health care system and the private sector Medicare HMO were performed for overall differences and stratified by gender and age. The drug formulary status of the Zhan-criteria drugs was known for the VA health system but not for the Medicare HMO patients. Compared with private sector patients, VA patients were less likely to receive any inappropriate medication (21% vs. 29%, P <0.001), and in each classification: always avoid (2% vs. 5%, P <0.001), rarely appropriate (8% vs. 13%, P<0.001), and some indications (15% vs. 17%, P <0.001). The rate of inappropriate drug use was lower in the VA compared with the private sector for males (21% vs. 24%, P <0.001) and females (28% vs. 32%, P <0.001). Differences were consistent when stratified by age. Compared with private sector Medicare HMOs, elderly VA patients were less likely to receive medications defined by the Zhan criteria as potentially inappropriate. A restrictive formulary that excludes 12 of the 33 Zhan criteria drugs may be a factor in the reduction of undesired prescribing patterns in elderly populations.
Toro A, Richard; Campos, Claudia; Molina, Carolina; Morales S, Raul G E; Leiva-Guzmán, Manuel A
2015-09-01
A critical analysis of Chile's National Air Quality Information System (NAQIS) is presented, focusing on particulate matter (PM) measurement. This paper examines the complexity, availability and reliability of monitoring station information, the implementation of control systems, the quality assurance protocols of the monitoring station data and the reliability of the measurement systems in areas highly polluted by particulate matter. From information available on the NAQIS website, it is possible to confirm that the PM2.5 (PM10) data available on the site correspond to 30.8% (69.2%) of the total information available from the monitoring stations. There is a lack of information regarding the measurement systems used to quantify air pollutants, most of the available data registers contain gaps, almost all of the information is categorized as "preliminary information" and neither standard operating procedures (operational and validation) nor assurance audits or quality control of the measurements are reported. In contrast, events that cause saturation of the monitoring detectors located in northern and southern Chile have been observed using beta attenuation monitoring. In these cases, it can only be concluded that the PM content is equal to or greater than the saturation concentration registered by the monitors and that the air quality indexes obtained from these measurements are underestimated. This occurrence has been observed in 12 (20) public and private stations where PM2.5 (PM10) is measured. The shortcomings of the NAQIS data have important repercussions for the conclusions obtained from the data and for how the data are used. However, these issues represent opportunities for improving the system to widen its use, incorporate comparison protocols between equipment, install new stations and standardize the control system and quality assurance. Copyright © 2015 Elsevier Ltd. All rights reserved.
2010-01-01
Background Surveys from the USA, Australia and Spain have shown significant inter-institutional variation in delivery room (DR) management of very low birth weight infants (VLBWI, < 1500 g) at birth, despite regularly updated international guidelines. Objective To investigate protocols for DR management of VLBWI in Germany, Austria and Switzerland and to compare these with the 2005 ILCOR guidelines. Methods DR management protocols were surveyed in a prospective, questionnaire-based survey in 2008. Results were compared between countries and between academic and non-academic units. Protocols were compared to the 2005 ILCOR guidelines. Results In total, 190/249 units (76%) replied. Protocols for DR management existed in 94% of units. Statistically significant differences between countries were found regarding provision of 24 hr in house neonatal service; presence of a designated resuscitation area; devices for respiratory support; use of pressure-controlled manual ventilation devices; volume control by respirator; and dosage of Surfactant. There were no statistically significant differences regarding application and monitoring of supplementary oxygen, or targeted saturation levels, or for the use of sustained inflations. Comparison of academic and non-academic hospitals showed no significant differences, apart from the targeted saturation levels (SpO2) at 10 min. of life. Comparison with ILCOR guidelines showed good adherence to the 2005 recommendations. Summary Delivery room management in German, Austrian and Swiss neonatal units was commonly based on written protocols. Only minor differences were found regarding the DR setup, devices used and the targeted ranges for SpO2 and FiO2. DR management was in good accordance with 2005 ILCOR guidelines, some units already incorporated evidence beyond the ILCOR statement into their routine practice. PMID:21159574
Cho, Eun-Suk; Kim, Joo Hee; Kim, Sungjun; Yu, Jeong-Sik; Chung, Jae-Joon; Yoon, Choon-Sik; Lee, Hyeon-Kyeong; Lee, Kyung Hee
2012-01-01
To prospectively investigate the feasibility of an 80-kilovolt (peak) (kVp) protocol in computed tomographic venography for varicose veins of the lower extremities by comparison with conventional 120-kVp protocol. Attenuation values and signal-to-noise ratio of iodine contrast medium (CM) were determined in a water phantom for 2 tube voltages (80 kVp and 120 kVp). Among 100 patients, 50 patients were scanned with 120 kVp and 150 effective milliampere second (mAs(eff)), and the other 50 patients were scanned with 80 kVp and 390 mAs(eff) after the administration of 1.7-mL/kg CM (370 mg of iodine per milliliter). The 2 groups were compared for venous attenuation, contrast-to-noise ratio, and subjective degree of venous enhancement, image noise, and overall diagnostic image quality. In the phantom, the attenuation value and signal-to-noise ratio value for iodine CM at 80 kVp were 63.8% and 33.0% higher, respectively, than those obtained at 120 kVp. The mean attenuation of the measured veins of the lower extremities was 148.3 Hounsfield units (HU) for the 80-kVp protocol and 94.8 HU for the 120-kVp protocol. Contrast-to-noise ratio was also significantly higher with the 80-kVp protocol. The overall diagnostic image quality of the 3-dimensional volume-rendered images was good with both protocols. The subjective score for venous enhancement was higher at the 80-kVp protocol. The mean volume computed tomography dose index of the 80-kVp (5.6 mGy) protocol was 23.3% lower than that of the 120-kVp (7.3 mGy) protocol. The use of the 80-kVp protocol improved overall venous attenuation, especially in perforating vein, and provided similarly high diagnostic image quality with a lower radiation dose when compared to the conventional 120-kVp protocol.
Santos, E M; Paula, J F R; Motta, P M C; Heinemann, M B; Leite, R C; Haddad, J P A; Del Puerto, H L; Reis, J K P
2010-08-17
We compared three different protocols for DNA extraction from horse peripheral blood mononuclear cells (PBMC) and lung fragments, determining average final DNA concentration, purity, percentage of PCR amplification using beta-actin, and cost. Thirty-four samples from PBMC, and 33 samples from lung fragments were submitted to DNA extraction by three different protocols. Protocol A consisted of a phenol-chloroform and isoamylic alcohol extraction, Protocol B used alkaline extraction with NaOH, and Protocol C used the DNAzol((R)) reagent kit. Protocol A was the best option for DNA extraction from lung fragments, producing high DNA concentrations, with high sensitivity in PCR amplification (100%), followed by Protocols C and B. On the other hand, for PBMC samples, Protocol B gave the highest sensitivity in PCR amplification (100%), followed by Protocols C and A. We conclude that Protocol A should be used for PCR diagnosis from lung fragment samples, while Protocol B should be used for PBMC.
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
Meltzer, Lisa J.; Shaheed, Keisha; Ambler, Devon
2014-01-01
Homeschool students provide a naturalistic comparison group for later/flexible school start times. This study compared sleep patterns and sleep hygiene for homeschool students and public/private school students (grades 6-12). Public/private school students (n=245) and homeschool students (n=162) completed a survey about sleep patterns and sleep hygiene. Significant school group differences were found for weekday bedtime, wake time, and total sleep time, with homeschool students waking later and obtaining more sleep. Homeschool students had later school start times, waking at the same time that public/private school students were starting school. Public/private school students had poorer sleep hygiene practices, reporting more homework and use of technology in the hour before bed. Regardless of school type, technology in the bedroom was associated with shorter sleep duration. Later school start times may be a potential countermeasure for insufficient sleep in adolescents. Future studies should further examine the relationship between school start times and daytime outcomes, including academic performance, mood, and health. PMID:25315902
2012-01-01
Background Typologies traditionally used for international comparisons of health systems often conflate many system characteristics. To capture policy changes over time and by service in health systems regulation of public and private insurance, we propose a database containing explicit, standardized indicators of policy instruments. Methods The Health Insurance Access Database (HIAD) will collect policy information for ten OECD countries, over a range of eight health services, from 1990–2010. Policy indicators were selected through a comprehensive literature review which identified policy instruments most likely to constitute barriers to health insurance, thus potentially posing a threat to equity. As data collection is still underway, we present here the theoretical bases and methodology adopted, with a focus on the rationale underpinning the study instruments. Results These harmonized data will allow the capture of policy changes in health systems regulation of public and private insurance over time and by service. The standardization process will permit international comparisons of systems’ performance with regards to health insurance access and equity. Conclusion This research will inform and feed the current debate on the future of health care in developed countries and on the role of the private sector in these changes. PMID:22551599
Yoshioka, Yoji; Tamiya, Nanako; Kashiwagi, Masayo; Sato, Mikiya; Okubo, Ichiro
2010-01-01
Long-Term Care Insurance (LTCI), which started in April 2000, allowed private business corporations to provide long-term care services which had been provided by social welfare corporations or public agencies in the previous long-term care scheme. This study compared differences in care management plans for community-dwelling frail elderly people between public care management agencies and private care management agencies. The subjects were 309 community-dwelling frail elderly people living in a suburban city with a population of approximately 55,000 and who had been using community-based long-term care services of the LTCI for 6 months from April 2000. The characteristics of the care management agencies (public/private) were identified using a claims database. After comparing profiles of users and their care mix between those managed by public agencies and by private agencies, the effect of the characteristics of care management agencies on LTCI service use was examined. Public care management agencies favored younger subjects (P = 0.003), male subjects (P = 0.006) and people with a higher need for care (P = 0.02) than private agencies. The number of service items used was significantly larger in public agencies than in their private counterparts. In multivariate regression analysis, the utilization of community-based long-term care service was significantly greater among beneficiaries managed by private agencies than those managed by public agencies (P = 0.02). Private care management agencies play an important role in promoting the use of care services, but their quality of care plans might be questionable.
Case mix in paediatric rheumatology: implications for training in Australia.
Lim, Sern Chin; Allen, Roger C; Munro, Jane E; Akikusa, Jonathan D
2012-05-01
Despite a move towards the provision of specialist training in Australia in settings that extend beyond the public hospital system, formal comparisons of case mix between public and private specialty clinics have rarely been performed. It is therefore unclear for many specialties how well training in one setting prepares trainees for practice in the other. This study aims to compare the case mix of paediatric rheumatology patients seen in public and private settings and the referral sources of patients in each. An audit of all new patients seen in the public and private paediatric rheumatology clinics on campus at Royal Children's Hospital between June 2009 and January 2011. Data related to demographics, primary diagnosis, referral source and location seen were abstracted and compared. Eight hundred and seventy-six new patients were seen during the period of interest. Of these, 429 patients (48.9%) were seen in private clinics. The commonest diagnostic categories for both type of clinics were non-inflammatory musculoskeletal pain/orthopaedic conditions (public 39.4%, private 33.6%) followed by juvenile idiopathic arthritis (public 16.6%, %, private 18.6%), other skin/soft tissue disorders (public 8.7%, private 9.6%) and pain syndromes (public 4.9%, private 11.4%). Patients with haematological and vasculitic disorders were predominantly seen in public clinics. The commonest source of referrals to both clinics was general practitioners (public 40.6%, private 53.1%). The case mix in private paediatric rheumatology clinics closely mirrors that of public clinics at our centre. Training in either setting would provide sufficient case-mix exposure to prepare trainees for practice in the other. © 2011 The Authors. Journal of Paediatrics and Child Health © 2011 Paediatrics and Child Health Division (Royal Australasian College of Physicians).
Student Performances in Various Learning Protocols
ERIC Educational Resources Information Center
Gregorius, Roberto
2011-01-01
A comparison was made between students' overall performance, as measured by overall grade, in different teaching and learning protocols: (1) traditional textbook and lecture along with standard examinations; (2) lectures with online augmentation and PowerPoint lecture notes along with standard examinations; (3) similar to "(2)" but with…
Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa
2007-01-01
Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG<0.8), medium (MRG) and high (HRG>1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified according to protocol BFM-90 for moderate risk group (IR) constitute a mixed group in the ALL-IC 2002 classification. Part of the children was moved to the standard risk group (SR), part to high risk group (HR), and the rest remains in the intermediate risk category (IR). 3. Further studies are needed on stratification validity according to ALL-IL 2002 and on the need of further modification (eg assessment of additional factors) in order to decide on the best treatment, adequate to severity of disease.
A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools
2015-07-14
computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network
Analysis of Marketing and Customer Satisfaction in Base Housing Communities of the Monterey Bay Area
2011-06-01
the U.S. Government. IRB Protocol number NPS.2010.0003- IR -EP7-A. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release...Reese, thank you for answering all my late-night phone calls and reminding me I should be working on my paper instead of venting. This report is...amenities include: ceiling fans, central heating, private balcony, hardwood floors, master bedroom suite, washer/ dryer hookups, media boxes for
Nasal Irrigation for Chronic Rhinosinusitis and Fatigue in Patients with Gulf War Syndrome
2013-07-01
materials (neti pots, xylitol , saline), and subject recruitment and enrollment. The human subjects research approval process required protocol submission...application submitted on 11/25/11 was also approved on 7/10/12. The company that provided xylitol (Danisco) is now owned by a private company (DuPont) a...regarding continuity of study as well as procurement and packaging of xylitol packets (sachets) for individual use by participants in the xylitol arm of
Development of mini VSAT system
NASA Astrophysics Data System (ADS)
Lu, Shyue-Ching; Chiu, Wu-Jhy; Lin, Hen-Dao; Shih, Mu-Piao
1992-03-01
This paper presents the mini VSAT (very small aperture terminal) system, which is a low cost networking system providing economical alternatives to the business world's datacom needs. The system is designed to achieve the highest possible performance/price ratio for private VSAT networks that range from a few tens of remote terminals to large networks of several thousands remote terminals. The paper describes the system architecture, major features, hardware and software structure, access protocol and performance of the developed system.
The effect of relational training on intelligence quotient: a case study.
Vizcaíno-Torres, Rosa M; Ruiz, Francisco J; Luciano, Carmen; López-López, Juan C; Barbero-Rubio, Adrián; Gil, Enriquel
2015-01-01
Relational training protocols based on Relational Frame Theory (RFT) are showing promising results in increasing intelligence quotient. This case study aimed at analyzing the effect of a training protocol in fluency and flexibility in relational responding on intelligence quotient with a 4-year-old child. The child’s cognitive and psychomotor development was evaluated before and after the implementation of the training protocol using the McCarthy’s Aptitudes and Psychomotricity Scale (MSCA). The training protocol consisted of a multiple-exemplar-training (MET) in relational framing in accordance with COORDINATION (Phases 1 and 2), OPPOSITION (Phase 3 and 4), and COMPARISON (Phases 5 and 6). The MET protocol was implemented in approximately 12 hours throughout five and one half months. The training was effective in establishing relational responding in OPPOSITION and COMPARISON frames as well as in promoting fluency and flexibility in all the three types of trained relations. After this training, the child showed an increase above 1.5 SD in the General Cognitive Index of the MSCA (from 106 to 131). This case study adds further empirical evidence of the potential of RFT training to improve cognitive abilities and intelligence.
Azmat, Syed Khurram; Ali, Moazzam; Hameed, Waqas; Mustafa, Ghulam; Abbas, Ghazanfer; Ishaque, Muhammad; Bilgrami, Mohsina; Temmerman, Marleen
2014-05-30
High fertility rates, unwanted pregnancies, low modern contraceptive prevalence and a huge unmet need for contraception adversely affect women's health in Pakistan and this problem is compounded by limited access to reliable information and quality services regarding birth spacing especially in rural and underserved areas. This paper presents a study protocol that describes an evaluation of a demand-side financing (DSF) voucher approach which aims to increase the uptake of modern contraception among women of the lowest two wealth quintiles in Punjab Province, Pakistan. This study will use quasi-experimental design with control arm and be implemented in: six government clinics from the Population Welfare Department; 24 social franchise facilities branded as 'Suraj' (Sun), led by Marie Stopes Society (a local non-governmental organization); and 12 private sector clinics in Chakwal, Mianwali and Bhakkar districts. The study respondents will be interviewed at baseline and endline subject to voluntary acceptance and medical eligibility. In addition, health service data will record each client visit during the study period. The study will examine the impact of vouchers in terms of increasing the uptake of modern contraception by engaging private and public sector service providers (mid-level and medical doctors). If found effective, this approach can be a viable solution to satisfying the current demand and meeting the unmet need for contraception, particularly among the poorest socio-economic group.
Religiosity and religious delusions in schizophrenia - An observational study in a Hindu population.
Mishra, Anand; Das, Basudeb; Goyal, Nishant
2018-02-01
Religion exerts a significant effect on the lives of many individuals including people with mental illness. As evidences keep accumulating, role of religion in mental illness is gaining importance. The study was designed to study the effects of religiosity on religious delusions, its presentation, acute course and outcome in schizophrenia. The study was a naturalistic observational study. Subjects with schizophrenia were grouped into those with religious (RG) and with non-religious delusions (NG). Their premorbid religiosity was assessed with Brief Multi-dimensional measurement of Religiosity/spirituality (BMMRS) and were rated on Scale for Assessment of Positive Symptoms (SAPS), Brown's Assessment of Belief Scale (BABS) and Positive and Negative Symptom Scale (PANSS) at baseline and 4 weeks. Scores on private religious practices, baseline scores of SAPS, BABS & PANSS and duration of untreated psychosis (DUP) were significantly higher for RG in comparison to NG. On component analysis, higher scores were seen on private praying, watching religious programs on TV, reading religious books and prayers at meals. But no significant correlation was found between the private religious practices and the baseline scores of (DUP), SAPS, BABS, PANSS and outcome measure. Also no significant difference was noted in measures of improvement between groups. Private religious practices are more prominent in patients of schizophrenia with religious delusions and this group of patient seems to present with a more severe illness, and a longer duration of untreated psychosis in comparison to those with non-religious delusions. Copyright © 2017 Elsevier B.V. All rights reserved.
Chen, Ai-Hong; Jaafar, Saidah Nafisah; Noor, Abdul Rahim Md
2012-04-01
A comparison of the job satisfaction of health care professionals has not been well studied in Malaysia. This study aimed to compare the job satisfaction level among 8 groups of health care professionals in private settings, using the Job Satisfaction Survey (JSS). A total of 81 health care professionals, including nurses, physiotherapists, occupational therapists, medical laboratory technologists, dieticians, medical imaging practitioners, environmental health officers, and optometrists in private (non-government) settings in the Klang Valley, were interviewed using the Job Satisfaction Survey scale invented by Dr Paul E Spector. Their job satisfaction scores were calculated and determined. In the demographic data, the majority of the subjects were 20-30 years old (81.5%), were female (72.8%), had a basic degree (98.8%), were single (64.2%), and had 1-5 years of working experience (83.9%). A Kruskal-Wallis analysis showed significant differences (P < 0.05) in promotion, supervision, operating conditions, co-workers, nature of the work, and communication, but there were no significant differences (P > 0.05) in pay, fringe benefits, and contingent rewards in JSS score among the 8 health care professions. The Friedman Test showed a significant difference of overall JSS scores (χ(2) = 526.418, P < 0.001) among the 8 health care professions. The overall job satisfaction levels are different among health care professionals in private settings, especially regarding promotion, supervision, operating conditions, co-workers, the nature of the work, and communication.
Ai-Hong, Chen; Saidah Nafisah, Jaafar; Abdul Rahim, Md Noor
2012-01-01
Background: A comparison of the job satisfaction of health care professionals has not been well studied in Malaysia. This study aimed to compare the job satisfaction level among 8 groups of health care professionals in private settings, using the Job Satisfaction Survey (JSS). Methods: A total of 81 health care professionals, including nurses, physiotherapists, occupational therapists, medical laboratory technologists, dieticians, medical imaging practitioners, environmental health officers, and optometrists in private (non-government) settings in the Klang Valley, were interviewed using the Job Satisfaction Survey scale invented by Dr Paul E Spector. Their job satisfaction scores were calculated and determined. Results: In the demographic data, the majority of the subjects were 20–30 years old (81.5%), were female (72.8%), had a basic degree (98.8%), were single (64.2%), and had 1–5 years of working experience (83.9%). A Kruskal–Wallis analysis showed significant differences (P < 0.05) in promotion, supervision, operating conditions, co-workers, nature of the work, and communication, but there were no significant differences (P > 0.05) in pay, fringe benefits, and contingent rewards in JSS score among the 8 health care professions. The Friedman Test showed a significant difference of overall JSS scores (χ2 = 526.418, P < 0.001) among the 8 health care professions. Conclusion: The overall job satisfaction levels are different among health care professionals in private settings, especially regarding promotion, supervision, operating conditions, co-workers, the nature of the work, and communication. PMID:22973134
Vignion-Dewalle, Anne-Sophie; Baert, Gregory; Devos, Laura; Thecua, Elise; Vicentini, Claire; Mortier, Laurent; Mordon, Serge
2017-09-01
Photodynamic therapy (PDT) is an emerging treatment modality for various diseases, especially for dermatological conditions. Although, the standard PDT protocol for the treatment of actinic keratoses in Europe has shown to be effective, treatment-associated pain is often observed in patients. Different modifications to this protocol attempted to decrease pain have been investigated. The decrease in fluence rate seems to be a promising solution. Moreover, it has been suggested that light fractionation significantly increases the efficacy of PDT. Based on a flexible light-emitting textile, the FLEXITHERALIGHT device specifically provides a fractionated illumination at a fluence rate more than six times lower than that of the standard protocol. In a recently completed clinical trial of PDT for the treatment of actinic keratosis, the non-inferiority of a protocol involving illumination with the FLEXITHERALIGHT device after a short incubation time and referred to as the FLEXITHERALIGHT protocol has been assessed compared to the standard protocol. In this paper, we propose a comparison of the two above mentioned 635 nm red light protocols with 37 J/cm 2 in the PDT treatment of actinic keratosis: the standard protocol and the FLEXITHERALIGHT one through a mathematical modeling. This mathematical modeling, which slightly differs from the one we have already published, enables the local damage induced by the therapy to be estimated. The comparison performed in terms of the local damage induced by the therapy demonstrates that the FLEXITHERALIGHT protocol with lower fluence rate, light fractionation and shorter incubation time is somewhat less efficient than the standard protocol. Nevertheless, from the clinical trial results, the FLEXITHERALIGHT protocol results in non-inferior response rates compared to the standard protocol. This finding raises the question of whether the PDT local damage achieved by the FLEXITHERALIGHT protocol (respectively, the standard protocol) is sufficient (respectively, excessive) to destroy actinic keratosis cells. Lasers Surg. Med. 49:686-697, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Yushkevich, Paul A.; Amaral, Robert S. C.; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison C.; Carr, Valerie A.; Chakravarty, M. Mallar; Chetelat, Gael; Daugherty, Ana M.; Davachi, Lila; Ding, Song-Lin; Ekstrom, Arne; Geerlings, Mirjam I.; Hassan, Abdul; Huang, Yushan; Iglesias, Eugenio; La Joie, Renaud; Kerchner, Geoffrey A.; LaRocque, Karen F.; Libby, Laura A.; Malykhin, Nikolai; Mueller, Susanne G.; Olsen, Rosanna K.; Palombo, Daniela J.; Parekh, Mansi B; Pluta, John B.; Preston, Alison R.; Pruessner, Jens C.; Ranganath, Charan; Raz, Naftali; Schlichting, Margaret L.; Schoemaker, Dorothee; Singh, Sachi; Stark, Craig E. L.; Suthana, Nanthia; Tompary, Alexa; Turowski, Marta M.; Van Leemput, Koen; Wagner, Anthony D.; Wang, Lei; Winterburn, Julie L.; Wisse, Laura E.M.; Yassa, Michael A.; Zeineh, Michael M.
2015-01-01
OBJECTIVE An increasing number of human in vivo magnetic resonance imaging (MRI) studies have focused on examining the structure and function of the subfields of the hippocampal formation (the dentate gyrus, CA fields 1–3, and the subiculum) and subregions of the parahippocampal gyrus (entorhinal, perirhinal, and parahippocampal cortices). The ability to interpret the results of such studies and to relate them to each other would be improved if a common standard existed for labeling hippocampal subfields and parahippocampal subregions. Currently, research groups label different subsets of structures and use different rules, landmarks, and cues to define their anatomical extents. This paper characterizes, both qualitatively and quantitatively, the variability in the existing manual segmentation protocols for labeling hippocampal and parahippocampal substructures in MRI, with the goal of guiding subsequent work on developing a harmonized substructure segmentation protocol. METHOD MRI scans of a single healthy adult human subject were acquired both at 3 Tesla and 7 Tesla. Representatives from 21 research groups applied their respective manual segmentation protocols to the MRI modalities of their choice. The resulting set of 21 segmentations was analyzed in a common anatomical space to quantify similarity and identify areas of agreement. RESULTS The differences between the 21 protocols include the region within which segmentation is performed, the set of anatomical labels used, and the extents of specific anatomical labels. The greatest overall disagreement among the protocols is at the CA1/subiculum boundary, and disagreement across all structures is greatest in the anterior portion of the hippocampal formation relative to the body and tail. CONCLUSIONS The combined examination of the 21 protocols in the same dataset suggests possible strategies towards developing a harmonized subfield segmentation protocol and facilitates comparison between published studies. PMID:25596463
Hoffmayer, Eric R; Hendon, Jill M; Parsons, Glenn R; Driggers, William B; Campbell, Matthew D
2015-10-01
Elasmobranch stress responses are traditionally measured in the field by either singly or serially sampling an animal after a physiologically stressful event. Although capture and handling techniques are effective at inducing a stress response, differences in protocols could affect the degree of stress experienced by an individual, making meaningful comparisons between the protocols difficult, if not impossible. This study acutely stressed Atlantic sharpnose sharks, Rhizoprionodon terraenovae, by standardized capture (rod and reel) and handling methods and implemented either a single or serial blood sampling protocol to monitor four indicators of the secondary stress response. Single-sampled sharks were hooked and allowed to swim around the boat until retrieved for a blood sample at either 0, 15, 30, 45, or 60 min post-hooking. Serially sampled sharks were retrieved, phlebotomized, released while still hooked, and subsequently resampled at 15, 30, 45, and 60 min intervals post-hooking. Blood was analyzed for hematocrit, and plasma glucose, lactate, and osmolality levels. Although both single and serial sampling protocols resulted in an increase in glucose, no significant difference in glucose level was found between protocols. Serially sampled sharks exhibited cumulatively heightened levels for lactate and osmolality at all time intervals when compared to single-sampled animals at the same time. Maximal concentration differences of 217.5, 9.8, and 41.6 % were reported for lactate, osmolality, and glucose levels, respectively. Hematocrit increased significantly over time for the single sampling protocol but did not change significantly during the serial sampling protocol. The differences in resultant blood chemistry levels between implemented stress protocols and durations are significant and need to be considered when assessing stress in elasmobranchs.
Schaun, Gustavo Z; Del Vecchio, Fabrício B
2018-01-01
Schaun, GZ and Del Vecchio, FB. High-intensity interval exercises' acute impact on heart rate variability: comparison between whole-body and cycle ergometer protocols. J Strength Cond Res 32(1): 223-229, 2018-Study aimed to compare the effects of 2 high-intensity interval training (HIIT) protocols on heart rate variability. Twelve young adult males (23.3 ± 3.9 years, 177.8 ± 7.4 cm, 76.9 ± 12.9 kg) volunteered to participate. In a randomized cross-over design, subjects performed 2 HIIT protocols, 1 on a cycle ergometer (Tabata protocol [TBT]; eight 20-second bouts at 170% Pmax interspersed by 10-second rest) and another with whole-body calisthenic exercises (McRae protocol; eight 20-second all-out intervals interspersed by 10-second rest). Heart rate variability outcomes in the time, frequency, and nonlinear domains were assessed on 3 moments: (a) presession; (b) immediately postsession; and (c) 24 hours postsession. Results revealed that RRmean, Ln rMSSD, Ln high frequency (HF), and Ln low frequency (LF) were significantly reduced immediately postsession (p ≤ 0.001) and returned to baseline 24 h after both protocols. In addition, LF/HF ratio was reduced 24 h postsession (p ≤ 0.01) and SD2 was significantly lower immediately postsession only in TBT. Our main finding was that responses from heart rate autonomic control were similar in both protocols, despite different modes of exercise performed. Specifically, exercises resulted in a high parasympathetic inhibition immediately after session with subsequent recovery within 1 day. These results suggest that subjects were already recovered the day after and can help coaches to better program training sessions with such protocols.
Private health insurance in South Korea: an international comparison.
Shin, Jaeun
2012-11-01
The goal of this study is to present the historical and policy background of the expansion of private health insurance in South Korea in the context of the National Health Insurance (NHI) system, and to provide empirical evidence on whether the increased role of private health insurance may counterbalance government financing, social security contributions, out-of-pocket payments, and help stabilize total health care spending. Using OECD Health Data 2011, we used a fixed effects model estimation. In this model, we allow error terms to be serially correlated over time in order to capture the association of private health insurance financing with three other components of health care financing and total health care spending. The descriptive observation of the South Korean health care financing shows that social security contributions are relatively limited in South Korea, implying that high out-of-pocket payments may be alleviated through the enhancement of NHI benefit coverage and an increase in social security contributions. Estimation results confirm that private health insurance financing is unlikely to reduce government spending on health care and social security contributions. We find evidence that out-of-pocket payments may be offset by private health insurance financing, but to a limited degree. Private health insurance financing is found to have a statistically significant positive association with total spending on health care. This indicates that the duplicated coverage effect on service demand may cancel out the potential efficiency gain from market initiatives driven by the active involvement of private health insurance. This study finds little evidence for the benefit of private insurance initiatives in coping with the fiscal challenges of the South Korean NHI program. Further studies on the managerial interplay among public and private insurers and on behavioral responses of providers and patients to a given structure of private-public financing are warranted to formulate the adequate balance between private health insurance and publicly funded universal coverage. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Naseer, Maliha; Khawaja, Ali; Pethani, Amin S; Aleem, Salik
2013-10-25
Tuberculosis (TB) is endemic in Pakistan which ranks fifth amongst the twenty two countries designated to be highly burdened by TB according to the World Health Organization. However, there is paucity of data regarding the knowledge of diagnosis of TB and its management amongst public and private practitioners. In this study, we endeavor to identify this gap in knowledge regarding the diagnosis and management of TB between public and private doctors and the factors affecting these knowledge scores in urban Pakistan. This cross sectional survey was conducted between June and December 2011. Doctors from public hospitals, private hospitals and private clinics scattered in all eighteen towns of Karachi were included in the study. Qualified MBBS doctors working in any specialty were eligible to participate whereas doctors working in both the public and private sectors were excluded from the study. Vignette based clinical scenarios were given to assess the knowledge score regarding the diagnosis and management of TB. A total of 196 doctors participated in the study. There was a significant difference between private and public physicians in terms of age and years of practice (p-value <0.05). Significant differences in the proportion of knowledge scores were observed between the public and private doctors and National TB Control Program trained and untrained doctors in Karachi. Factors associated with inadequate knowledge scores were being female gender [OR: 2.76 (95% CI: 1.418-5.384)], private employment status [OR: 1.50 (95% CI: 1.258-2.439)], and not trained by NTP [OR: 2.98 (95% CI: 1.286-3.225)] on multivariate logistic regression analysis. It is concluded that a knowledge gap exists between the public and private doctors in Karachi. Strengthening of currently implemented public private mix model along with improvement in the trainings of public and private practitioners is highly recommended to control TB in Pakistan.
Dekkers, Olaf M; Cevallos, Myriam; Bührer, Jonas; Poncet, Antoine; Ackermann Rau, Sabine; Perneger, Thomas V; Egger, Matthias
2015-05-01
To compare noninferiority margins defined in study protocols and trial registry records with margins reported in subsequent publications. Comparison of protocols of noninferiority trials submitted 2001 to 2005 to ethics committees in Switzerland and The Netherlands with corresponding publications and registry records. We searched MEDLINE via PubMed, the Cochrane Controlled Trials Register (Cochrane Library issue 01/2012), and Google Scholar in September 2013 to identify published reports, and the International Clinical Trials Registry Platform of the World Health Organization in March 2013 to identify registry records. Two readers recorded the noninferiority margin and other data using a standardized data-abstraction form. The margin was identical in study protocol and publication in 43 (80%) of 54 pairs of study protocols and articles. In the remaining pairs, reporting was inconsistent (five pairs, 9%), or the noninferiority margin was either not reported in the publication (five pairs, 9%) or not defined in the study protocol (one pair). The confidence interval or the exact P-value required to judge whether the result was compatible with noninferior, inferior, or superior efficacy was reported in 43 (80%) publications. Complete and consistent reporting of both noninferiority margin and confidence interval (or exact P-value) was present in 39 (72%) protocol-publication pairs. Twenty-nine trials (54%) were registered in trial registries, but only one registry record included the noninferiority margin. The reporting of noninferiority margins was incomplete and inconsistent with study protocols in a substantial proportion of published trials, and margins were rarely reported in trial registries. Copyright © 2015 Elsevier Inc. All rights reserved.
Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison.
Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram
2013-04-16
To compare between 2 and 4 d colon cleansing protocols. Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Rate of adequate colon preparation. A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children's age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the "gold standard" protocol for children.
Space Projects: Improvements Needed in Selecting Future Projects for Private Financing
NASA Technical Reports Server (NTRS)
1990-01-01
The Office of Management and Budget (OMB) and NASA jointly selected seven projects for commercialization to reduce NASA's fiscal year 1990 budget request and to help achieve the goal of increasing private sector involvement in space. However, the efforts to privately finance these seven projects did not increase the commercial sector's involvement in space to the extent desired. The General Accounting Office (GAO) determined that the projects selected were not a fair test of the potential of increasing commercial investment in space at an acceptable cost to the government, primarily because the projects were not properly screened. That is, neither their suitability for commercialization nor the economic consequences of seeking private financing for them were adequately evaluated before selection. Evaluations and market tests done after selection showed that most of the projects were not viable candidates for private financing. GAO concluded that projects should not be removed from NASA's budget for commercial development until after careful screening has been done to determine whether adequate commercial demand exists, development risks are commercially acceptable and private financing is found or judged to be highly likely, and the cost effectiveness of such a decision is acceptable. Premature removal of projects from NASA's budget ultimately can cause project delays and increased costs when unsuccessful commercialization candidates must be returned to the budget. NASA also needs to ensure appropriate comparisons of government and private financing options for future commercialization projects.
Shanee, Sam; Shanee, Noga; Monteferri, Bruno; Allgas, Nestor; Alarcon Pardo, Alejandro; Horwich, Robert H
2017-11-01
Protected areas (PAs) are a conservation mainstay and arguably the most effective conservation strategy for species protection. As a 'megadiverse' country, Peru is a priority for conservation actions. Peruvian legislation allows for the creation of state PAs and private/communal PAs. Using publicly available species distribution and protected area data sets we evaluated the coverage of Threatened terrestrial vertebrate species distributions and ecoregions provided by both kinds of PA in Peru. Peru's state PA system covers 217,879 km 2 and private/communal PAs cover 16,588 km 2 . Of the 462 species of Threatened and Data Deficient species we evaluated, 75% had distributions that overlapped with at least one PA but only 53% had ≥10% of their distributions within PAs, with inclusion much reduced at higher coverage targets. Of the species we evaluated, 118 species are only found in national PAs and 29 species only found in private/communal PAs. Of the 17 terrestrial ecoregions found in Peru all are represented in PAs; the national PA system included coverage of 16 and private/communal PAs protect 13. One ecoregion is only protected in private/communal PAs, whereas four are only covered in national PAs. Our results show the important role private/communal PAs can play in the protection of ecological diversity. Copyright © 2017 Elsevier Ltd. All rights reserved.
Zakaria, A; Schuette, W; Younan, C
2011-01-01
The preceding DIN 6800-2 (1997) protocol has been revised by a German task group and its latest version was published in March 2008 as the national standard dosimetry protocol DIN 6800-2 (2008 March). Since then, in Germany the determination of absorbed dose to water for high-energy photon and electron beams has to be performed according to this new German dosimetry protocol. The IAEA Code of Practice TRS 398 (2000) and the AAPM TG-51 are the two main protocols applied internationally. The new German version has widely adapted the methodology and dosimetric data of TRS-398. This paper investigates systematically the DIN 6800-2 protocol and compares it with the procedures and results obtained by using the international protocols. The investigation was performed with 6 MV and 18 MV photon beams as well as with electron beams from 5 MeV to 21 MeV. While only cylindrical chambers were used for photon beams, the measurements of electron beams were performed by using cylindrical and plane-parallel chambers. It was found that the discrepancies in the determination of absorbed dose to water among the three protocols were 0.23% for photon beams and 1.2% for electron beams. The determination of water absorbed dose was also checked by a national audit procedure using TLDs. The comparison between the measurements following the DIN 6800-2 protocol and the TLD audit-procedure confirmed a difference of less than 2%. The advantage of the new German protocol DIN 6800-2 lies in the renouncement on the cross calibration procedure as well as its clear presentation of formulas and parameters. In the past, the different protocols evoluted differently from time to time. Fortunately today, a good convergence has been obtained in concepts and methods. PMID:22287987
Zakaria, A; Schuette, W; Younan, C
2011-04-01
The preceding DIN 6800-2 (1997) protocol has been revised by a German task group and its latest version was published in March 2008 as the national standard dosimetry protocol DIN 6800-2 (2008 March). Since then, in Germany the determination of absorbed dose to water for high-energy photon and electron beams has to be performed according to this new German dosimetry protocol. The IAEA Code of Practice TRS 398 (2000) and the AAPM TG-51 are the two main protocols applied internationally. The new German version has widely adapted the methodology and dosimetric data of TRS-398. This paper investigates systematically the DIN 6800-2 protocol and compares it with the procedures and results obtained by using the international protocols. The investigation was performed with 6 MV and 18 MV photon beams as well as with electron beams from 5 MeV to 21 MeV. While only cylindrical chambers were used for photon beams, the measurements of electron beams were performed by using cylindrical and plane-parallel chambers. It was found that the discrepancies in the determination of absorbed dose to water among the three protocols were 0.23% for photon beams and 1.2% for electron beams. The determination of water absorbed dose was also checked by a national audit procedure using TLDs. The comparison between the measurements following the DIN 6800-2 protocol and the TLD audit-procedure confirmed a difference of less than 2%. The advantage of the new German protocol DIN 6800-2 lies in the renouncement on the cross calibration procedure as well as its clear presentation of formulas and parameters. In the past, the different protocols evoluted differently from time to time. Fortunately today, a good convergence has been obtained in concepts and methods.
Firmware Modification Analysis in Programmable Logic Controllers
2014-03-27
security and operational requirements [18, 19]. Money is a factor for the DOD but not a driving one. With private industry, money is a primary influential... functions in the original firmware. A proof-of-concept experiment demonstrates the functionality of the analysis tool using different firmware versions...Opcode Difference Comparison . . . . . . . . . . . . . . 37 3.1.2.3 Function Difference Comparison . . . . . . . . . . . . . 37 3.1.2.4 Call Graph
The Next Generation of Lab and Classroom Computing - The Silver Lining
2016-12-01
desktop infrastructure (VDI) solution, as well as the computing solutions at three universities, was selected as the basis for comparison. The research... infrastructure , VDI, hardware cost, software cost, manpower, availability, cloud computing, private cloud, bring your own device, BYOD, thin client...virtual desktop infrastructure (VDI) solution, as well as the computing solutions at three universities, was selected as the basis for comparison. The
Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A
2013-09-13
Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.
The protocol describes the Environmental Technology Verification (ETV) Program's considerations and requirements for verification of emissions reduction provided by selective catalytic reduction (SCR) technologies. The basis of the ETV will be comparison of the emissions and perf...
Two deterministic models (US EPA’s Office of Pesticide Programs Residential Standard Operating Procedures (OPP Residential SOPs) and Draft Protocol for Measuring Children’s Non-Occupational Exposure to Pesticides by all Relevant Pathways (Draft Protocol)) and four probabilistic mo...
A Field Comparison of Sampling Protocols for Measuring Lead in Drinking Water
US EPA Region 5 conducted a sampling study that demonstrates existing sampling protocols used for the Lead and Copper Rule (LCR) underestimate peak and probable mass of lead released in a system with lead service lines (LSLs). This comparative stagnation sampling was conducted i...
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
BODY-ORIENTED THERAPY IN RECOVERY FROM CHILD SEXUAL ABUSE: AN EFFICACY STUDY
Price, Cynthia
2007-01-01
Context There has been little research on body therapy for women in sexual abuse recovery. This study examines body-oriented therapy—an approach focused on body awareness and involving the combination of bodywork and the emotional processing of psychotherapy. Objective To examine the efficacy and the perceived influence on abuse recovery of body-oriented therapy. Massage therapy served as a relative control condition to address the lack of touch-based comparisons in bodywork research. Design A 2-group, repeated measures design was employed, involving randomization to either body-oriented therapy or massage group, conducted in 8, hour-long sessions by 1 of 4 research clinicians. Statistical and qualitative analysis was employed to provide both empirical and experiential perspectives on the study process. Setting Participants were seen in treatment rooms of a university in the northwestern United States and in clinician’s private offices. Participants Twenty-four adult females in psychotherapy for child sexual abuse. Interventions Body-oriented therapy protocol was delivered in three stages, involving massage, body awareness exercises, and inner-body focusing process. Massage therapy protocol was stan- dardized. Both protocols were delivered over clothes. Main Outcome Measures The outcomes reflected 3 key con-structs—psychological well being, physical well-being, and body connection. Repeated measures included: Brief Symptom Inventory, Dissociative Experiences Scale, Crime-Related Post Traumatic Stress Disorder Scale, Medical Symptoms Checklist, Scale of Body Connection and Scale of Body Investment. Results were gathered at 6 time points: baseline, 2 times during intervention, post-intervention, and at 1 month and 3 months follow-up. To examine the experiential perspective of the study process, written questionnaires were administered before and after intervention and at 1 month and 3 months follow-up. Results Repeated measures analysis of variance (ANOVA) indicated significant improvement on all outcome measures for both intervention groups, providing support for the efficacy of body therapy in recovery from childhood sexual abuse. There were no statistically significant differences between groups; however, qualitative analysis of open-ended questions about participant intervention experience revealed that the groups differed on perceived experience of the intervention and its influence on therapeutic recovery. PMID:16189948
A Comparison of the Combat Performance of Good and Poor Infantry Squad Leaders
1954-09-01
56 Knowlede and skills . . . . ... 56 Communication . . . . . . . . . ........... . 59 Awareness...situation. Personnel management principles frequently indicate that when criticism is leveled 3t subordinates, this criticism should be given privately in
Webster, Robert L; Hammond, Kevin L; Harmon, Harry A
2005-04-01
This study extends previous work concerning the market orientation culture within specialty businesses and schools of business. Specifically, member schools of the Association to Advance Collegiate Schools of Business International are separated into public and private universities. Data were collected via a mailed survey to business schools holding membership. 106 public school deans and 35 private school deans responded, for a 23% response rate. Input from the deans was sought on their perceptions of the market orientation culture within the schools. Respondents' perceptions, rated on a 7-point scale, measured four dimensions of market orientation: customer orientation, competitor orientation, organizational coordination, and overall market orientation. Data for specialty businesses were drawn from a previous study. Comparison testing between the public and private business schools' deans and business managers was conducted. Analysis indicated perceived market orientation was significantly higher for deans of private business schools than public business schools. Compared with business managers, private school deans were statistically different on only one of the four dimensions, whereas public business school deans' scores were significantly different from those of business managers on all four. Compared with each other, business school deans were statistically different on three dimensions, with private school deans reporting greater market orientation.
Hammond, Emily; Sloan, Chelsea; Newell, John D; Sieren, Jered P; Saylor, Melissa; Vidal, Craig; Hogue, Shayna; De Stefano, Frank; Sieren, Alexa; Hoffman, Eric A; Sieren, Jessica C
2017-09-01
Quantitative computed tomography (CT) measures are increasingly being developed and used to characterize lung disease. With recent advances in CT technologies, we sought to evaluate the quantitative accuracy of lung imaging at low- and ultralow-radiation doses with the use of iterative reconstruction (IR), tube current modulation (TCM), and spectral shaping. We investigated the effect of five independent CT protocols reconstructed with IR on quantitative airway measures and global lung measures using an in vivo large animal model as a human subject surrogate. A control protocol was chosen (NIH-SPIROMICS + TCM) and five independent protocols investigating TCM, low- and ultralow-radiation dose, and spectral shaping. For all scans, quantitative global parenchymal measurements (mean, median and standard deviation of the parenchymal HU, along with measures of emphysema) and global airway measurements (number of segmented airways and pi10) were generated. In addition, selected individual airway measurements (minor and major inner diameter, wall thickness, inner and outer area, inner and outer perimeter, wall area fraction, and inner equivalent circle diameter) were evaluated. Comparisons were made between control and target protocols using difference and repeatability measures. Estimated CT volume dose index (CTDIvol) across all protocols ranged from 7.32 mGy to 0.32 mGy. Low- and ultralow-dose protocols required more manual editing and resolved fewer airway branches; yet, comparable pi10 whole lung measures were observed across all protocols. Similar trends in acquired parenchymal and airway measurements were observed across all protocols, with increased measurement differences using the ultralow-dose protocols. However, for small airways (1.9 ± 0.2 mm) and medium airways (5.7 ± 0.4 mm), the measurement differences across all protocols were comparable to the control protocol repeatability across breath holds. Diameters, wall thickness, wall area fraction, and equivalent diameter had smaller measurement differences than area and perimeter measurements. In conclusion, the use of IR with low- and ultralow-dose CT protocols with CT volume dose indices down to 0.32 mGy maintains selected quantitative parenchymal and airway measurements relevant to pulmonary disease characterization. © 2017 American Association of Physicists in Medicine.
Neumann, Thomas; Baum, Anne Katrin; Baum, Ulrike; Deike, Renate; Feistner, Helmut; Hinrichs, Hermann; Stokes, Joseph; Robra, Bernt-Peter
2018-01-01
The HOME ONE study is part of the larger HOME project, which aims to provide evidence of diagnostic and therapeutic yield ("change of management") of a patient-controlled portable EEG device with dry electrodes for the purposes of EEG home-monitoring neurological outpatients. The HOME ONE study is the first step in the process of investigating whether outpatient EEG home-monitoring changes the diagnosis and treatment of patients in comparison to conventional EEG ("change of management"). Both EEG devices (conventional and portable) will be systematically compared via a two-phase intra-individual assessment.In the first phase (pilot study phase), both EEG devices will be used within neurologist practices (all other things being equal). This pilot study (involving 130 patients) will evaluate the technical usability and efficacy of the new portable dry electrode EEG recorder in comparison to conventional EEG devices. Judgements will be based on technical assessments and EEG record examinations of private practitioners and two experienced neurologists (percent of concordant readings and kappa values).The second phase (feasibility study phase) aims to assess patients' acceptability and feasibility of the EEG home-monitoring and will provide insights into the extent diagnostic and therapeutic yields can be expected.For this purpose, a conventional EEG will be recorded in neurologist practices. Thereafter, the practice staff will instruct the patients on how the portable EEG device functions. The patients will subsequently use the devices in their home environment.The evaluation will compare the before and after documented diagnostic findings and the therapeutic consequences of the private practitioners with those of two experienced neurologists. To the best of our knowledge, this will be the first study of its kind to examine new approaches to diagnosing unclear consciousness disorders or other disorders of the CNS or the cardiovascular system through the use of a patient-controlled portable EEG device with dry electrodes for the purpose of home-monitoring neurological outpatients. If the two phases of the HOME ONE study provide sufficient evidence of diagnostic and therapeutic yields, this would justify (indication-specific) full-scale randomized controlled trials or observational studies. DRKS DRKS00012685. Registered 9 August 2017, retrospectively registered.
Znati, Sami A.; Chedid, Nicholas; Miao, Houxun; Chen, Lei; Bennett, Eric E.; Wen, Han
2016-01-01
Filling high-aspect-ratio trenches with gold is a frequent requirement in the fabrication of x-ray optics as well as micro-electronic components and other fabrication processes. Conformal electrodeposition of gold in sub-micron-width silicon trenches with an aspect ratio greater than 35 over a grating area of several square centimeters is challenging and has not been described in the literature previously. A comparison of pulsed plating and constant current plating led to a gold electroplating protocol that reliably filled trenches for such structures. PMID:27042384
Caudal anesthesia in pediatric surgical practice.
Rahman, S; Siddiqui, M A; Haque, M; Majumder, S K; Ali, M S; Majid, M A; Hasan, M R
2006-07-01
Prospective study was carried out on 100 patients since May 2005 in my private practice and in the department of pediatric surgery of MMCH. Under caudal anesthesia along with or without ketaminie induction and gas inhalation all the patients underwent different surgical procedure namely anorectal surgery (eg. anoplasty, rectal polyp), urogenital surgery (Circumcision, hypospadias, meatotomy), groin surgery (hernia, hydrocele) and foot & leg surgery. Calculated dose schedule of drugs used in anesthesia and volume were maintained. Time of giving anesthesia and time of starting analgesia were recorded. Per-operative and postoperative analgesia were evaluated. Every parent was explained regarding the merit of caudal anesthesia calculated and compared with that of general anesthesia. Application of caudal anesthesia with or without ketamine & diazepam induction can be used safely and cost effectively and may be put into protocol in many of the pediatric surgical practice both in institute and also in private practice.
2001-12-01
private sector contracts for environmental remediation and apply any applicable best practices to the Department of Defense contracting system. Key findings of this study are: (1) there is no readily available process from either the commercial sector or the Department of Defense that will suffice as a template for all environmental remediation efforts, (2) the Department of Defense has no centralized repository of environmental remediation contracting knowledge, (3) Legislative and regulatory hurdles exist which impede assimilation of new initiatives in the remediation of
Applying business intelligence innovations to emergency management.
Schlegelmilch, Jeffrey; Albanese, Joseph
2014-01-01
The use of business intelligence (BI) is common among corporations in the private sector to improve business decision making and create insights for competitive advantage. Increasingly, emergency management agencies are using tools and processes similar to BI systems. With a more thorough understanding of the principles of BI and its supporting technologies, and a careful comparison to the business model of emergency management, this paper seeks to provide insights into how lessons from the private sector can contribute to the development of effective and efficient emergency management BI utilisation.
Gordon, Robert; Magee, Christopher; Frazer, Anna; Evans, Craig; McCosker, Kathryn
2010-06-01
This study compared the outcomes of an interim mechanical prosthesis program for lower limb amputees operated under a public and private model of service. Over a two-year period, 60 transtibial amputees were fitted with an interim prosthesis as part of their early amputee care. Thirty-four patients received early amputee care under a public model of service, whereby a prosthetist was employed to provide the interim mechanical prosthesis service. The remaining 26 patients received early amputee care under a private model of service, where an external company was contracted to provide the interim mechanical prosthesis service. The results suggested comparable clinical outcomes between the two patient groups. However, the public model appeared to be less expensive with the average labour cost per patient being 29.0% lower compared with the private model. The results suggest that a public model of service may provide a more comprehensive and less expensive interim prosthesis program for lower limb amputees.
South African Foundation Phase Teachers’ Perceptions of ADHD at Private and Public Schools
Kern, Anwynne; Amod, Zaytoon; Seabi, Joseph; Vorster, Adri
2015-01-01
This study investigated foundation phase teachers’ perceptions of Attention Deficit Hyperactivity Disorder (ADHD). The teachers’ views on the aetiology, appropriate interventions and incidence rates of ADHD were examined. A total of 130 foundation phase teachers from mainstream private and public schools completed a self-developed questionnaire that had been piloted by the researchers. Both descriptive and inferential statistics were used to analyse the data, specifically to determine whether there were differences in responses between public and private school teachers. Thematic content analysis was used to identify the themes that emerged from the open-ended questions. It was found that the teachers had a limited understanding of ADHD, in terms of what it is as well as the aetiology. In addition, it emerged that medication was the preferred method of intervention despite the participants’ awareness of alternative intervention methods. A comparison of the private and public school teachers’ results indicated no significant difference in their perceptions regarding the aetiology, interventions or incidence rates of ADHD. PMID:25768242
The relevance of a rules-based maize marketing policy: an experimental case study of Zambia.
Abbink, Klaus; Jayne, Thomas S; Moller, Lars C
2011-01-01
Strategic interaction between public and private actors is increasingly recognised as an important determinant of agricultural market performance in Africa and elsewhere. Trust and consultation tends to positively affect private activity while uncertainty of government behaviour impedes it. This paper reports on a laboratory experiment based on a stylised model of the Zambian maize market. The experiment facilitates a comparison between discretionary interventionism and a rules-based policy in which the government pre-commits itself to a future course of action. A simple precommitment rule can, in theory, overcome the prevailing strategic dilemma by encouraging private sector participation. Although this result is also borne out in the economic experiment, the improvement in private sector activity is surprisingly small and not statistically significant due to irrationally cautious choices by experimental governments. Encouragingly, a rules-based policy promotes a much more stable market outcome thereby substantially reducing the risk of severe food shortages. These results underscore the importance of predictable and transparent rules for the state's involvement in agricultural markets.
An empirical typology of private child and family serving agencies.
Chuang, Emmeline; Collins-Camargo, Crystal; McBeath, Bowen; Wells, Rebecca; Bunger, Alicia
2014-03-01
Differences in how services are organized and delivered can contribute significantly to variation in outcomes experienced by children and families. However, few comparative studies identify the strengths and limitations of alternative delivery system configurations. The current study provides the first empirical typology of private agencies involved with the formal child welfare system. Data collected in 2011 from a national sample of private agencies were used to classify agencies into five distinct groups based on internal management capacity, service diversification, integration, and policy advocacy. Findings reveal considerable heterogeneity in the population of private child and family serving agencies. Cross-group comparisons suggest that differences in agencies' strategic and structural characteristics correlated with agency directors' perceptions of different pressures in their external environment. Future research can use this typology to better understand local service systems and the extent to which different agency strategies affect performance and other outcomes. Such information has implications for public agency contracting decisions and could inform system-level assessment and planning of services for children and families.
Regulating self-selection into private health insurance in Chile and the United States.
Vargas Bustamante, Arturo; Méndez, Claudio A
2016-07-01
In the 1980s, Chile adopted a mixed (public and private) model for health insurance coverage similar to the one recently outlined by the Affordable Care Act in the United States (US). In such a system, a mix of public and private health plans offer nearly universal coverage using a combined approach of managed competition and subsidies for low-income individuals. This paper uses a "most different" case study design to compare policies implemented in Chile and the US to address self-selection into private insurance. We argue that the implementation of a mixed health insurance system in Chile without the appropriate regulations was complex, and it generated a series of inequities and perverse incentives. The comparison of Chile and the US healthcare reforms examines the different approaches that both countries have used to manage economic competition, address health insurance self-selection and promote solidarity. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.
Feria, Mary I; Sarrazin, Mary Vaughan; Rosenthal, Gary E
2003-01-01
Few studies have examined differences in patient perceptions of care between health care systems. This study compared the perceptions of male patients undergoing coronary artery bypass graft surgery in 43 Veterans Health Administration (VA) hospitals (N = 808) and 102 US private sector hospitals (N = 2271) from 1995 to 1998. Patient perceptions were measured by a validated survey that was mailed to patients after discharge. For 8 of the 9 dimensions assessed by the survey, VA patients were more likely (P < .001) than private sector patients to note a problem with care (eg, Coordination, 48% versus 40%; Patient Education and Communication, 50% versus 40%; Respect for Patient Preferences, 49% versus 41%). In comparisons limited to major teaching hospitals, VA patients were more likely to note a problem for 5 dimensions. The findings indicate that patient perceptions of care may be lower in VA than in private sector hospitals. Future studies should examine whether the VA's recent focus on improving patient satisfaction has narrowed these differences.
Hacking, Damian; Lau, Yan Kwan; Haricharan, Hanne Jensen; Heap, Marion
2015-11-20
Cell phone-based health information (mobile health or mHealth) campaigns are an emerging technology. This evaluation focused on the aspect of cost of two health information campaigns, one on hypertension and one on pregnancy. Researchers could either contract out the technical components of the campaigns or attempt to run the campaigns themselves, in-house. The in-house campaigns cost an estimated ZAR13 548.72 v. the private provider quotes which ranged from ZAR27 542.97 to ZAR34 227.59. Running the campaigns in-house was more labour intensive and required more technical expertise, but had a reduced delivery failure rate (9.2% in-house v. 30.0% private provider). Running small to medium SMS (text message) campaigns for evaluative purposes proved advantageous over contracting out to private providers. Larger-scale evaluations and full-scale roll-out will require the services of private providers, but it is still essential that researchers actively engage with and monitor the technical aspects of these campaigns.
An empirical typology of private child and family serving agencies
Collins-Camargo, Crystal; McBeath, Bowen; Wells, Rebecca; Bunger, Alicia
2014-01-01
Differences in how services are organized and delivered can contribute significantly to variation in outcomes experienced by children and families. However, few comparative studies identify the strengths and limitations of alternative delivery system configurations. The current study provides the first empirical typology of private agencies involved with the formal child welfare system. Data collected in 2011 from a national sample of private agencies were used to classify agencies into five distinct groups based on internal management capacity, service diversification, integration, and policy advocacy. Findings reveal considerable heterogeneity in the population of private child and family serving agencies. Cross-group comparisons suggest that differences in agencies’ strategic and structural characteristics correlated with agency directors’ perceptions of different pressures in their external environment. Future research can use this typology to better understand local service systems and the extent to which different agency strategies affect performance and other outcomes. Such information has implications for public agency contracting decisions and could inform system-level assessment and planning of services for children and families. PMID:24648603
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
Peters, David H; Mirchandani, Gita G; Hansen, Peter M
2004-10-01
The private health sector provides a significant portion of sexual and reproductive health (SRH) services in developing countries. Yet little is known about which strategies for intervening with private providers can improve quality or coverage of services. We conducted a systematic review of the literature through PubMed from 1980 to 2003 to assess the effectiveness of private sector strategies for SRH services in developing countries. The strategies examined were regulating, contracting, financing, franchising, social marketing, training and collaborating. Over 700 studies were examined, though most were descriptive papers, with only 71 meeting our inclusion criteria of having a private sector strategy for one or more SRH services and the measurement of an outcome in the provider or the beneficiary. Nearly all studies (96%) had at least one positive association between SRH and the private sector strategy. About three-quarters of the studies involved training private providers, though combinations of strategies tended to give better results. Maternity services were most commonly addressed (55% of studies), followed by prevention and treatment of sexually transmitted diseases (32%). Using study design to rate the strength of evidence, we found that the evidence about effectiveness of private sector strategies on SRH services is weak. Most studies did not use comparison groups, or they relied on cross-sectional designs. Nearly all studies examined short-term effects, largely measuring changes in providers rather than changes in health status or other effects on beneficiaries. Five studies with more robust designs (randomized controlled trials) demonstrated that contraceptive use could be increased through supporting private providers, and showed cases where the knowledge and practices of private providers could be improved through training, regulation and incentives. Although tools to work with the private sector offer considerable promise, without stronger research designs, key questions regarding their feasibility and impact remain unanswered. Copyright 2004 Oxford University Press
Sukhabogi, JR; Shekar, CBR; Hameed, IA; Ramana, IV; Sandhu, G
2014-01-01
Background: The assessment of oral health status of children in government and private schools provide data on the oral health status of children from different socio-economic background. Aim: The aim of the following study is to assess and to compare the oral hygiene status, gingival status and caries experience between children from government and private schools in Andhra Pradesh, India. Subjects and Methods: A combination of cluster and stratified random sampling was employed to select the study participants. Oral hygiene status, gingival status and caries experience was assessed and compared among 12- and 15-year-old children from three government and private schools each. The examination was carried out by three trained and calibrated investigators using a mouth mirror and explorer under natural daylight. Results: A total of 604 children (331 government and 273 private) were examined in the study. The mean oral hygiene index-simplified (OHI-S) was higher among government school children (2.9 [1.1]) compared private school children (0.6 [0.4]). The mean gingival score and mean decayed missing filled teeth were also higher among government school children compared with private school children. A significantly higher number of children in the government schools had poor oral hygiene status, moderate to severe gingivitis and caries experience. Conclusion: The prevalence of oral diseases was relatively less among children from private schools in comparison with those from government schools. Hence, the children from government schools should be given the priority compared with private school children in any school dental health programs planned on a statewide basis. PMID:25364601
A functional comparison of basic restraint systems.
DOT National Transportation Integrated Search
1967-06-01
The availability of information necessary to provide realistic solutions for personal safety problems in public and private transportation systems is found to be inadequate and incomplete. The problem of body restraint during the accident event is pu...
Benefit transfer protocol for long-term health risk valuation: A case of surface water contamination
NASA Astrophysics Data System (ADS)
Kask, Susan B.; Shogren, Jason F.
1994-10-01
In response to scarce financial resources, economists have promoted the concept of benefit transfer as a cost-effective alternative to new nonmarket valuation studies. Recent discussion on benefit transfer for improved water quality has focused on recreational benefits. While useful, the discussion must now be expanded to include another key benefit from improved water quality: the reduction in risk to public health. This paper develops a protocol for benefit transfer of long-term health risk reduction and presents a case study for surface water contamination. Challenges such as the multiple sources of risk, the mortality and morbidity effects indicated by a variety of symptoms, the long latency period between cause and effect, and an individual's ability to privately or collectively reduce the probability or severity of the risk are discussed.
Application of Blind Quantum Computation to Two-Party Quantum Computation
NASA Astrophysics Data System (ADS)
Sun, Zhiyuan; Li, Qin; Yu, Fang; Chan, Wai Hong
2018-06-01
Blind quantum computation (BQC) allows a client who has only limited quantum power to achieve quantum computation with the help of a remote quantum server and still keep the client's input, output, and algorithm private. Recently, Kashefi and Wallden extended BQC to achieve two-party quantum computation which allows two parties Alice and Bob to perform a joint unitary transform upon their inputs. However, in their protocol Alice has to prepare rotated single qubits and perform Pauli operations, and Bob needs to have a powerful quantum computer. In this work, we also utilize the idea of BQC to put forward an improved two-party quantum computation protocol in which the operations of both Alice and Bob are simplified since Alice only needs to apply Pauli operations and Bob is just required to prepare and encrypt his input qubits.
Application of Blind Quantum Computation to Two-Party Quantum Computation
NASA Astrophysics Data System (ADS)
Sun, Zhiyuan; Li, Qin; Yu, Fang; Chan, Wai Hong
2018-03-01
Blind quantum computation (BQC) allows a client who has only limited quantum power to achieve quantum computation with the help of a remote quantum server and still keep the client's input, output, and algorithm private. Recently, Kashefi and Wallden extended BQC to achieve two-party quantum computation which allows two parties Alice and Bob to perform a joint unitary transform upon their inputs. However, in their protocol Alice has to prepare rotated single qubits and perform Pauli operations, and Bob needs to have a powerful quantum computer. In this work, we also utilize the idea of BQC to put forward an improved two-party quantum computation protocol in which the operations of both Alice and Bob are simplified since Alice only needs to apply Pauli operations and Bob is just required to prepare and encrypt his input qubits.
Ridesharing: Transportation demand management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Valdez, R.; Wang, J.; Flynn, C.P.
1989-01-01
The 13 papers in the report deal with the following areas: Comparison of transportation demand management market research study results and transportation management association development in three suburban activity centers; Ten cities' strategies for transportation demand management; Key considerations for developing local government transportation system management programs; First Hill Action Plan: A unique public/private approach to transportation demand management; Comparison of travel behavior before and after the opening of HOV lanes in a suburban travel corridor; Evaluation of Springfield instant carpooling; George Washington Bridge bus-carpool lane: 1-Year Operational Report; Guaranteed Ride Home: An insurance program for HOV users; Evaluation ofmore » Ridefinders and Central Richmond Association's transportation and parking information service; Vanpools: Pricing and market penetration; Cost-effectiveness of private employer ridesharing programs: An employer's assessment; Temporal analysis of handicapped ridership in specialized transportation service: Lexington/Fayette County experience; Characterization of the 'publico' system of Puerto Rico.« less
Globalizing animal care and use: making the dream a reality
NASA Technical Reports Server (NTRS)
Bielitzki, J. T.
1999-01-01
What will drive the globalization of animal care in the 21st century? Will targeted concerns from privately funded groups be the motivating factors? Will the threat of disease, and the concomitant hue and cry from a threatened public, be responsible for bringing nations together to collaborate on rules and regulations? The author, who is responsible for the animal use protocols on NASA's space station, explains why globalization on Planet Earth may be guided by what happens in outer space.
2010-06-01
Ron’s Code 4 . . . . . . . . . . . . . . . . . . . 18 2.3.3 Virtual Private Network and Secure Shell Tunnels 19 2.3.4 Darknets ...created using Iodine. 2.2 Analyzing and Classifying Network Traffic Before the advent of Darknets and anonymizers like Tor (see Section 2.3), ana... darknets , and the Tor network. 2.3.1 Byte Padding. Byte padding is the most primitive obfuscation method used to hide payloads in network traffic. When byte
Globalizing animal care and use: making the dream a reality.
Bielitzki, J T
1999-11-01
What will drive the globalization of animal care in the 21st century? Will targeted concerns from privately funded groups be the motivating factors? Will the threat of disease, and the concomitant hue and cry from a threatened public, be responsible for bringing nations together to collaborate on rules and regulations? The author, who is responsible for the animal use protocols on NASA's space station, explains why globalization on Planet Earth may be guided by what happens in outer space.
Database integration of protocol-specific neurological imaging datasets
Pacurar, Emil E.; Sethi, Sean K.; Habib, Charbel; Laze, Marius O.; Martis-Laze, Rachel; Haacke, E. Mark
2016-01-01
For many years now, Magnetic Resonance Innovations (MR Innovations), a magnetic resonance imaging (MRI) software development, technology, and research company, has been aggregating a multitude of MRI data from different scanning sites through its collaborations and research contracts. The majority of the data has adhered to neuroimaging protocols developed by our group which has helped ensure its quality and consistency. The protocols involved include the study of: traumatic brain injury, extracranial venous imaging for multiple sclerosis and Parkinson's disease, and stroke. The database has proven invaluable in helping to establish disease biomarkers, validate findings across multiple data sets, develop and refine signal processing algorithms, and establish both public and private research collaborations. Myriad Masters and PhD dissertations have been possible thanks to the availability of this database. As an example of a project that cuts across diseases, we have used the data and specialized software to develop new guidelines for detecting cerebral microbleeds. Ultimately, the database has been vital in our ability to provide tools and information for researchers and radiologists in diagnosing their patients, and we encourage collaborations and welcome sharing of similar data in this database. PMID:25959660
Comparison of public and private bariatric surgery services in Canada.
Martin, Allan R; Klemensberg, Jason; Klein, Laz V; Urbach, David; Bell, Chaim M
2011-06-01
Surgical treatment of obesity is cost-effective and improves life expectancy. Roux-en-Y gastric bypass (RYGB) and adjustable gastric banding (AGB) are dominant surgical techniques, but RYGB is the only publicly insured procedure in all Canadian provinces. Private clinics currently offer AGB with minimal wait times. We sought to compare RYGB in public facilities with AGB in private clinics in terms of cost, wait times and certain aspects of patient care. We conducted telephone interviews of all bariatric surgery providers across Canada (100% response rate). We asked about various aspects of care, such as wait time, cost, pre- and postoperative care and surgeon experience. The median out-of-pocket cost for AGB at private facilities is $16,000 (range $13,160-$18,375). Private clinics have much shorter wait times for AGB than public facilities do for RYGB (1 v. 21 mo, p < 0.001). Private clinics provide significantly fewer preoperative visits with multidisciplinary health professionals (2.7 v. 4.3, p = 0.045), and 5 of 12 (42%) private clinics conduct AGB surgeries without on-site critical care for high-risk (based on the respondents' definitions) patients. Private clinics performing AGB offer short wait times, but the cost is high. We found a great deal of variation between pre- and postoperative care among bariatric surgery facilities, and in some cases patient care appears to be less comprehensive. Our findings suggest that further research on obesity treatment is needed to inform policy so that all Canadians can have equitable and timely access to proven, evidence-based care.
Weiss, Jakob; Martirosian, Petros; Notohamiprodjo, Mike; Kaufmann, Sascha; Othman, Ahmed E; Grosse, Ulrich; Nikolaou, Konstantin; Gatidis, Sergios
2018-03-01
The aims of this study were to establish a 5-minute magnetic resonance (MR) screening protocol for prostate cancer in men before biopsy and to evaluate effects on Prostate Imaging Reporting and Data System (PI-RADS) V2 scoring in comparison to a conventional, fully diagnostic multiparametric MR imaging (mpMRI) approach. Fifty-two patients with elevated prostate-specific antigen levels and without prior biopsy were prospectively included in this institutional review board-approved study. In all patients, an mpMRI protocol according to the PI-RADS recommendations was acquired on a 3 T MRI system. In addition, an accelerated diffusion-weighted imaging sequence was acquired using simultaneous multislice technique (DW-EPISMS). Two readers independently evaluated the images for the presence/absence of prostate cancer according to the PI-RADS criteria and for additional findings. In a first reading session, only the screening protocol consisting of axial T2-weighted and DW-EPISMS images was made available. In a subsequent reading session, the mpMRI protocol was assessed blinded to the results of the first reading, serving as reference standard. Both readers successfully established a final diagnosis according to the PI-RADS criteria in the screening and mpMRI protocol. Mean lesion size was 1.2 cm in the screening and 1.4 cm in the mpMRI protocol (P = 0.4) with 35% (18/52) of PI-RADS IV/V lesions. Diagnostic performance of the screening protocol was excellent with a sensitivity and specificity of 100% for both readers with no significant differences in comparison to the mpMRI standard (P = 1.0). In 3 patients, suspicious lymph nodes were reported as additional finding, which were equally detectable in the screening and mpMRI protocol. A 5-minute MR screening protocol for prostate cancer in men with elevated prostate-specific antigen levels before biopsy is applicable for clinical routine with similar diagnostic performance as the full diagnostic mpMRI approach.
ERIC Educational Resources Information Center
Bride, Brian E.; Kintzle, Sara; Abraham, Amanda J.; Roman, Paul M.
2012-01-01
The purpose of this study was to examine factors that may be associated with variation in social workers' perceptions of effectiveness, perceptions of acceptability, and use of psychosocial evidence-based practices (EBPs) for the treatment of substance use disorders (SUD) in comparison to other SUD counselors who are non-social workers. A national…
2006-09-30
allocated to intangible assets. With Proctor & Gamble’s $53.5 billion acquisition of Gillette , $31.5 billion or 59% of the total purchase price was... outsourcing , alliances, joint ventures) • Compound Option (platform options) • Sequential Options (stage-gate development, R&D, phased...Comparisons • RO/KVA could enhance outsourcing comparisons between the Government’s Most Efficient Organization (MEO) and private-sector
BIASES IN CASTNET FILTER PACK RESULTS ASSOCIATED WITH SAMPLING PROTOCOL
In the current study, single filter weekly (w) results are compared with weekly results aggregated from day and night (dn) weekly samples. Comparisons of the two sampling protocols for all major constituents (SO42-, NO3-, NH4+, HNO3, and SO2) show median bias (MB) of < 5 nmol m-3...
A Posteriori Comparison of Natural and Surgical Destabilization Models of Canine Osteoarthritis
Pelletier, Jean-Pierre; d'Anjou, Marc-André; Blond, Laurent; Pelletier, Johanne-Martel; del Castillo, Jérôme R. E.
2013-01-01
For many years Canis familiaris, the domestic dog, has drawn particular interest as a model of osteoarthritis (OA). Here, we optimized the dog model of experimental OA induced by cranial cruciate ligament sectioning. The usefulness of noninvasive complementary outcome measures, such as gait analysis for the limb function and magnetic resonance imaging for structural changes, was demonstrated in this model. Relationships were established between the functional impairment and the severity of structural changes including the measurement of cartilage thinning. In the dog model of naturally occurring OA, excellent test-retest reliability was denoted for the measurement of the limb function. A criterion to identify clinically meaningful responders to therapy was determined for privately owned dogs undergoing clinical trials. In addition, the recording of accelerometer-based duration of locomotor activity showed strong and complementary agreement with the biomechanical limb function. The translation potential of these models to the human OA condition is underlined. A preclinical testing protocol which combines the dog model of experimental OA induced by cranial cruciate ligament transection and the Dog model of naturally occurring OA offers the opportunity to further investigate the structural and functional benefits of disease-modifying strategies. Ultimately, a better prediction of outcomes for human clinical trials would be brought. PMID:24288664
Audit cycle of documentation in laser hair removal.
Cohen, S N; Lanigan, S W
2005-09-01
Lasercare clinics are one of the largest providers of skin laser treatment in the United Kingdom, in both private sector and National Health Service. Laser hair removal is performed by trained nurses following written protocols. Choice of laser and fluence is tailored to Fitzpatrick skin type. We audited and re-audited documentation of six criteria in patients receiving laser hair removal (signed consent, Fitzpatrick skin type, use of appropriate laser, appropriate fluence, patient satisfaction and objective assessment) across 13 clinics at different points in time. Data were obtained on 772 treatments. Overall findings revealed excellent documentation of consent, use of appropriate laser and fluence (median 100%), good documentation of skin type (median 90%) and poor documentation of patient satisfaction and objective assessment (median 67% and 53%, respectively). Comparison between baseline and repeat audit at 6-8 months (nine clinics) showed significant improvement across clinics in these latter two criteria [patient satisfaction: odds ratio (OR) 0.38, 95% confidence interval (CI) 0.15-0.78, P=0.01; objective assessment: OR 0.23, 95% CI 0.07-0.50, P=0.0003 (Mantel-Haenszel weighted odds ratios)]. We conclude that quality of documentation was generally and consistently high in multiple clinics and that re-auditing led to significant improvement in poor scores. This simple measure could easily be implemented more widely across many disciplines.
Bennett, Charles R; DiAngelo, Denis J; Kelly, Brian P
2015-01-01
Extremely few in-vitro biomechanical studies have incorporated shear loads leaving a gap for investigation, especially when applied in combination with compression and bending under dynamic conditions. The objective of this study was to biomechanically compare sagittal plane application of two standard protocols, pure moment (PM) and follower load (FL), with a novel trunk weight (TW) loading protocol designed to induce shear in combination with compression and dynamic bending in a neutrally potted human cadaveric L4-L5 motion segment unit (MSU) model. A secondary objective and novelty of the current study was the application of all three protocols within the same testing system serving to reduce artifacts due to testing system variability. Six L4-L5 segments were tested in a Cartesian load controlled system in flexion-extension to 8Nm under PM, simulated ideal 400N FL, and vertically oriented 400N TW loading protocols. Comparison metrics used were rotational range of motion (RROM), flexibility, neutral zone (NZ) range of motion, and L4 vertebral body displacements. Significant differences in vertebral body translations were observed with different initial force applications but not with subsequent bending moment application. Significant reductions were observed in combined flexion-extension RROM, in flexibility during extension, and in NZ region flexibility with the TW loading protocol as compared to PM loading. Neutral zone ranges of motion were not different between all protocols. The combined compression and shear forces applied across the spinal joint in the trunk weight protocol may have a small but significantly increased stabilizing effect on segment flexibility and kinematics during sagittal plane flexion and extension.
Bennett, Charles R.; DiAngelo, Denis J.
2015-01-01
Background Extremely few in-vitro biomechanical studies have incorporated shear loads leaving a gap for investigation, especially when applied in combination with compression and bending under dynamic conditions. The objective of this study was to biomechanically compare sagittal plane application of two standard protocols, pure moment (PM) and follower load (FL), with a novel trunk weight (TW) loading protocol designed to induce shear in combination with compression and dynamic bending in a neutrally potted human cadaveric L4-L5 motion segment unit (MSU) model. A secondary objective and novelty of the current study was the application of all three protocols within the same testing system serving to reduce artifacts due to testing system variability. Methods Six L4-L5 segments were tested in a Cartesian load controlled system in flexion-extension to 8Nm under PM, simulated ideal 400N FL, and vertically oriented 400N TW loading protocols. Comparison metrics used were rotational range of motion (RROM), flexibility, neutral zone (NZ) range of motion, and L4 vertebral body displacements. Results Significant differences in vertebral body translations were observed with different initial force applications but not with subsequent bending moment application. Significant reductions were observed in combined flexion-extension RROM, in flexibility during extension, and in NZ region flexibility with the TW loading protocol as compared to PM loading. Neutral zone ranges of motion were not different between all protocols. Conclusions The combined compression and shear forces applied across the spinal joint in the trunk weight protocol may have a small but significantly increased stabilizing effect on segment flexibility and kinematics during sagittal plane flexion and extension. PMID:26273551
Rosito, G; Sum, K; Chorne, N
2010-10-01
Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.
Polyethylene glycol 3350 based colon cleaning protocol: 2 d vs 4 d head to head comparison
Elitsur, Rotem; Butcher, Lisa; Vicki, Lund; Elitsur, Yoram
2013-01-01
AIM: To compare between 2 and 4 d colon cleansing protocols. METHODS: Children who were scheduled for colonoscopy procedure (2010-2012) for various medical reasons, were recruited from the pediatric gastroenterology clinic at Marshall University School of Medicine, Huntington, WV. Exclusion criteria were patients who were allergic to the medication used in the protocols [polyethylene glycol (PEG) 3350, Bisacodyl], or children with metabolic or renal diseases. Two PEG 3350 protocols for 4 d (A) and 2 d (B) were prescribed as previously described. A questionnaire describing the volume of PEG consumed, clinical data, and side effects were recorded. Colon preparation was graded by two observers according to previously described method. Main outcome measurements: Rate of adequate colon preparation. RESULTS: A total of 78 patients were considered for final calculation (group A: 40, group B: 38). Age and stool consistency at the last day was comparable in both groups, but the number of stools/day was significantly higher in group B (P = 0.001). Adequate colon preparation was reached in 57.5% (A) and 73.6% (B), respectively (P = 0.206). Side effects were minimal and comparable in both groups. There was no difference in children’s age, stool characteristics, or side effects between the children with adequate or inadequate colon preparation. Correlation and agreement between observers was excellent (Pearson correlation = 0.972, kappa = 1.0). CONCLUSION: No difference between protocols was observed, but the 2 d protocol was superior for its shorter time. Direct comparison between different colon cleansing protocols is crucial in order to establish the “gold standard” protocol for children. PMID:23596539
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Mohd Suki, Norazah; Chwee Lian, Jennifer Chiam; Suki, Norbayah Mohd
2009-01-01
In today's highly competitive health care environment, many private health care settings are now looking into customer service indicators to learn customers' perceptions and determine whether they are meeting customers' expectations in order to ensure that their customers are satisfied with the services. This research paper aims to investigate whether the human elements were more important than the nonhuman elements in private health care settings. We used the internationally renowned SERVQUAL five-dimension model plus three additional dimensions-courtesy, communication, and understanding of customers of the human element-when evaluating health care services. A total of 191 respondents from three private health care settings in the Klang Valley region of Malaysia were investigated. Descriptive statistics were calculated by the Statistical Package for Social Sciences (SPSS) computer program, version 15. Interestingly, the results suggested that customers nowadays have very high expectations especially when it comes to the treatment they are receiving. Overall, the research indicated that the human elements were more important than the nonhuman element in private health care settings. Hospital management should look further to improve on areas that have been highlighted. Implications for management practice and directions for future research are discussed.
Nugent, Gary; Grippen, Glen; Parris, Y C; Mitchell, Mary
2003-06-01
To reapportion Veterans Health Administration (VA) annual expenditures into benefit categories for comparison with estimated payments by private sector providers. Total expenditures for six VA medical centers for federal fiscal year 1999 were reapportioned by benefit category using the cost distribution report (CDR). Health benefit categories were based on those of health care insurers. Cost reapportionment was based on CDR data and reviews of source accounting and payroll documents. Actual expenditures for many benefits can be accurately identified and reapportioned using CDR data, but other expenditures were not identifiable in the CDR and required inspection of source documents. Inpatient expenditures amounting to $75,110,094 US dollars and outpatient expenditures amounting to $73,594,284 US dollars were reapportioned into other benefit categories, primarily professional fees. Expenditures for some VA benefits could not be identified because of differences in accounting and clinical practice between the VA and the community. Revisions to bring the CDR more in line with private sector payment categories would improve effectiveness for internal VA analyses and external expenditure comparisons. CDR revisions would require changes in recording some clinical workload (eg, rehabilitation and extended care) and classifying residential and domiciliary programs separate from inpatient care. Benefits that were not assigned expenditures for comparison with payments represent a potential liability if the VA were to purchase health care services in the marketplace. Variation among hospitals on expenditures not clearly identified in the CDR was significant and raises questions about the effectiveness of capitated budget methodologies using either the CDR or the decision support system.
Subak
2000-09-01
/ Costa Rica has recently established a program that provides funds for reforestation and forest protection on private lands, partly through the sale of carbon certificates to industrialized countries. Countries purchasing these carbon offsets hope one day to receive credit against their own commitments to limit emissions of greenhouse gases. Costa Rica has used the proceeds of the sale of carbon offsets to Norway to help finance this forest incentive program, called the Private Forestry Project, which pays thousands of participants to reforest or protect forest on their lands. The Private Forestry Project is accompanied by a monitoring program conducted by Costa Rican forest engineers that seeks to determine net carbon storage accomplished on these lands each year. The Private Forestry Project, which is officially registered as an Activity Implemented Jointly, is a possible model for bundled projects funded by the Clean Development Mechanism (CDM) established by the 1997 Kyoto Protocol to the UN Framework Convention on Climate Change. It also serves as an interesting example for the CDM because it was designed by a developing country host-not by an industrialized country investor. Accordingly, it reflects the particular "sustainable development" objectives of the host country or at least the host planners. Early experience in implementing the Private Forestry Project is evaluated in light of the main objectives of the CDM and its precursor-Activities Implemented Jointly. It is concluded that the project appears to meet the criteria of global cost-effectiveness and financing from non-ODA sources. The sustainable development implications of the project are specific to the region and would not necessarily match the ideals of all investing and developing countries. The project may be seen to achieve additional greenhouse gas abatement when compared against some (although not all) baselines.
Mitha, Madhu M; Nijesh, J E; Chaly, Preetha Elizabeth; Priyadharshini, Indra; Junaid, Mohammed; Vaishnavi, S
2016-01-01
Dental caries is as ancient as humankind and has the longest association with the dental profession, an association that is punctuated with agony and ecstasy. The agonizing fact is that despite several efforts toward total eradication, this disease is still prevalent. Nevertheless, an ecstatic success of the profession is the global decline in the incidence compared to the yesteryears' epidemics. Hence, predicting dental caries earlier is a boon. One such model to predict is cariogram developed by Bratthall in 1996. The aim of this study was to assess the caries risk among 12-13 year old school-going children of government and private schools of Tirupur district in Tamil Nadu using cariogram computer model. A cross-sectional survey was carried out among 136 study subjects of 12-13 year of age, who fulfilled the inclusion and exclusion criteria. Data were collected using a predesigned questionnaire and scored according to a standardized protocol. The Chi-square test was used to find differences between caries-related factors and cariogram group. The correlation was acquired using Spearman's correlation. Government school study subjects had 56% of chance of avoiding caries whereas the private school study subjects had 66% of chance of avoiding caries in future and the differences were statistically significant (P = 0.001). A negative correlation was observed between the chance to avoid dental caries and cariogram sectors. The majority of the study subjects from government school belonged to medium-risk category and private school subjects belonged to low-risk category which inferred that private school students have high chance to avoid dental caries compared to government study subjects.
Keane, Sheila; Lincoln, Michelle; Rolfe, Margaret; Smith, Tony
2013-01-27
Policy initiatives to improve retention of the rural health workforce have relied primarily on evidence for rural doctors, most of whom practice under a private business model. Much of the literature for rural allied health (AH) workforce focuses on the public sector. The AH professions are diverse, with mixed public, private or combined practice settings. This study explores sector differences in factors affecting retention of rural AH professionals. This study compared respondents from the 2008 Rural Allied Health Workforce (RAHW) survey recruiting all AH professionals in rural New South Wales. Comparisons between public (n = 833) and private (n = 756) groups were undertaken using Chi square analysis to measure association for demographics, job satisfaction and intention to leave. The final section of the RAHW survey comprised 33 questions relating to retention. A factor analysis was conducted for each cohort. Factor reliability was assessed and retained factors were included in a binary logistic regression analysis for each cohort predicting intention to leave. Six factors were identified: professional isolation, participation in community, clinical demand, taking time away from work, resources and 'specialist generalist' work. Factors differed slightly between groups. A seventh factor (management) was present only in the public cohort. Gender was not a significant predictor of intention to leave. Age group was the strongest predictor of intention to leave with younger and older groups being significantly more likely to leave than middle aged.In univariate logistic analysis (after adjusting for age group), the ability to get away from work did not predict intention to leave in either group. In multivariate analysis, high clinical demand predicted intention to leave in both the public (OR = 1.40, 95% CI = 1.08, 1.83) and private (OR = 1.61, 95% CI = 1.15, 2.25) cohorts. Professional isolation (OR = 1.39. 95% CI = 1.11, 1.75) and Participation in community (OR = 1.57, 95% CI = 1.13, 2.19) also contributed to the model in the public cohort. This paper demonstrates differences between those working in public versus private sectors and suggests that effectiveness of policy initiatives may be improved through better targeting.
Report: Hospital waste management--awareness and practices: a study of three states in India.
Rao, P Hanumantha
2008-06-01
The study was conducted in Andhra Pradesh, Maharashtra and Uttar Pradesh in India. Hospitals/nursing homes and private medical practitioners in urban as well as rural areas and those from the private as well as the government sector were covered. Information on (a) awareness of bio-medical waste management rules, (b) training undertaken and (c) practices with respect to segregation, use of colour coding, sharps management, access to common waste management facilities and disposal was collected. Awareness of Bio-medical Waste Management Rules was better among hospital staff in comparison with private medical practitioners and awareness was marginally higher among those in urban areas in comparison with those in rural areas. Training gained momentum only after the dead-line for compliance was over. Segregation and use of colour codes revealed gaps, which need correction. About 70% of the healthcare facilities used a needle cutter/destroyer for sharps management. Access to Common Waste Management facilities was low at about 35%. Dumping biomedical waste on the roads outside the hospital is still prevalent and access to Common Waste facilities is still limited. Surveillance, monitoring and penal machinery was found to be deficient and these require strengthening to improve compliance with the Bio-medical Waste Management Rules and to safeguard the health of employees, patients and communities.
Plomp, H N
2000-06-10
To describe the development of the second-line Occupational Health Services and the role of private insurance companies in it over the period 1994-1999. Descriptive cross-sectional study. Data were collected in 1999 from written documents and supplementary interviews with the five largest private providers of disability insurance, the National Insurance Institute, nine Occupational Health Services of different natures and 24 institutions for second-line occupational health service. After the privatization of the Health Law in 1996 and parts of the Law on disability Insurance, most employers covered the risk of continued payment of wages in case of disability with private insurers. These attempted to keep claims down by active engagement in arbitration, treatment and diagnostics of disabled employees so as to counteract avoidable absenteeism. Under the influence of the insurance companies, a trend developed toward integrated nation-wide chains in which the services provided by insurers, by occupational health services and by implementing institutions are geared for one another. Commercial provision of Occupational Health Service is a new, demand-active form of care provision in which the financier plays a key part. This provision of services supplied important innovating impulses for health care in its entirety because of its large scale, strong protocolling of processes and management on the basis of continuous cost-benefit analyses. A lucid and socially acceptable regulation of commercial providers of occupational health services was lacking.
Fallah, F; Minaei Chenar, H; Amiri, H; Omodipour, S; Shirbande Ghods, F; Kahrizi, D; Sohrabi, M; Ghorbani, T; Kazemi, E
2017-02-28
High quality DNA is essential for molecular research. Secondary metabolites can affect the quantity and quality DNA. In current research two DNA isolation methods including CTAB and Delaporta (protocols 1 & 2 respectively) were applied in three leave samples from Cotinus coggygria, Citrus sinensis and Genus juglans that their leaves are rich of secondary metabolites. We successfully isolated DNA from C. coggygria, C. sinensis and Genus Juglans using the two protocols described above. Good quality DNA was isolated from C. coggygria, C. sinensis and Genus Juglans using protocol 1, while protocol 2 failed to produce usable DNA from these sources. The highest amount of DNA (1.3-1.6) was obtained from them using protocol 1. As we discovered, procedure 1 may work better for plants with secondary metabolites.
Elsholtz, Fabian Henry Jürgen; Kamp, Julia Evi-Katrin; Vahldiek, Janis Lucas; Hamm, Bernd; Niehues, Stefan Markus
2018-06-18
CT-guided periradicular infiltration of the cervical spine is an effective symptomatic treatment in patients with radiculopathy-associated pain syndromes. This study evaluates the robustness and safety of a low-dose protocol on a CT scanner with iterative reconstruction software. A total of 183 patients who underwent periradicular infiltration therapy of the cervical spine were included in this study. 82 interventions were performed on a new CT scanner with a new intervention protocol using an iterative reconstruction algorithm. Spot scanning was implemented for planning and a basic low-dose setup of 80 kVp and 5 mAs was established during intermittent fluoroscopy. The comparison group included 101 prior interventions on a scanner without iterative reconstruction. The dose-length product (DLP), number of acquisitions, pain reduction on a numeric analog scale, and protocol changes to achieve a safe intervention were recorded. The median DLP for the whole intervention was 24.3 mGy*cm in the comparison group and 1.8 mGy*cm in the study group. The median pain reduction was -3 in the study group and -2 in the comparison group. A 5 mAs increase in the tube current-time product was required in 5 patients of the study group. Implementation of a new scanner and intervention protocol resulted in a 92.6 % dose reduction without a compromise in safety and pain relief. The dose needed here is more than 75 % lower than doses used for similar interventions in published studies. An increase of the tube current-time product was needed in only 6 % of interventions. · The presented ultra-low-dose protocol allows for a significant dose reduction without compromising outcome.. · The protocol includes spot scanning for planning purposes and a basic setup of 80 kVp and 5 mAs.. · The iterative reconstruction algorithm is activated during fluoroscopy.. · Elsholtz FH, Kamp JE, Vahldiek JL et al. Periradicular Infiltration of the Cervical Spine: How New CT Scanner Techniques and Protocol Modifications Contribute to the Achievement of Low-Dose Interventions. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-3930. © Georg Thieme Verlag KG Stuttgart · New York.
Abisa, Michael
2017-01-01
To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors' feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other.
Establishing security of quantum key distribution without monitoring disturbance
NASA Astrophysics Data System (ADS)
Koashi, Masato
2015-10-01
In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.
NASA Astrophysics Data System (ADS)
Panteliadis, P.; Hafkenscheid, T.; Cary, B.; Diapouli, E.; Fischer, A.; Favez, O.; Quincey, P.; Viana, M.; Hitzenberger, R.; Vecchi, R.; Saraga, D.; Sciare, J.; Jaffrezo, J. L.; John, A.; Schwarz, J.; Giannoni, M.; Novak, J.; Karanasiou, A.; Fermo, P.; Maenhaut, W.
2015-02-01
A comparison exercise on thermal-optical elemental carbon/organic carbon (ECOC) analysers was carried out among 17 European laboratories. Contrary to previous comparison exercises, the 17 participants made use of an identical instrument set-up, after correcting for temperature offsets with the application of a recently developed temperature calibration kit (Sunset Laboratory Inc, OR, US). Temperature offsets reported by participants ranged from -93 to +100 °C per temperature step. Five filter samples and two sucrose solutions were analysed with both the EUSAAR2 and NIOSH870 thermal protocols. z scores were calculated for total carbon (TC); nine outliers and three stragglers were identified. Three outliers and eight stragglers were found for EC. Overall, the participants provided results between the warning levels with the exception of two laboratories that showed poor performance, the causes of which were identified and corrected through the course of the comparison exercise. The TC repeatability and reproducibility (expressed as relative standard deviations) were 11 and 15% for EUSAAR2 and 9.2 and 12% for NIOSH870; the standard deviations for EC were 15 and 20% for EUSAAR2 and 20 and 26% for NIOSH870. TC was in good agreement between the two protocols, TCNIOSH870 = 0.98 × TCEUSAAR2 (R2 = 1.00, robust means). Transmittance (TOT) calculated EC for NIOSH870 was found to be 20% lower than for EUSAAR2, ECNIOSH870 = 0.80 × ECEUSAAR2 (R2 = 0.96, robust means). The thermograms and laser signal values were compared and similar peak patterns were observed per sample and protocol for most participants. Notable deviations from the typical patterns indicated either the absence or inaccurate application of the temperature calibration procedure and/or pre-oxidation during the inert phase of the analysis. Low or zero pyrolytic organic carbon (POC), as reported by a few participants, is suggested as an indicator of an instrument-specific pre-oxidation. A sample-specific pre-oxidation effect was observed for filter G, for all participants and both thermal protocols, indicating the presence of oxygen donors on the suspended particulate matter. POC (TOT) levels were lower for NIOSH870 than for EUSAAR2, which is related to the heating profile differences of the two thermal protocols.
Wong, Charlene A; Kulhari, Sajal; McGeoch, Ellen J; Jones, Arthur T; Weiner, Janet; Polsky, Daniel; Baker, Tom
2018-05-29
The design of the Affordable Care Act's (ACA) health insurance marketplaces influences complex health plan choices. To compare the choice environments of the public health insurance exchanges in the fourth (OEP4) versus third (OEP3) open enrollment period and to examine online marketplace run by private companies, including a total cost estimate comparison. In November-December 2016, we examined the public and private online health insurance exchanges. We navigated each site for "real-shopping" (personal information required) and "window-shopping" (no required personal information). Public (n = 13; 12 state-based marketplaces and HealthCare.gov ) and private (n = 23) online health insurance exchanges. Features included consumer decision aids (e.g., total cost estimators, provider lookups) and plan display (e.g., order of plans). We examined private health insurance exchanges for notable features (i.e., those not found on public exchanges) and compared the total cost estimates on public versus private exchanges for a standardized consumer. Nearly all studied consumer decision aids saw increased deployment in the public marketplaces in OEP4 compared to OEP3. Over half of the public exchanges (n = 7 of 13) had total cost estimators (versus 5 of 14 in OEP3) in window-shopping and integrated provider lookups (window-shopping: 7; real-shopping: 8). The most common default plan orders were by premium or total cost estimate. Notable features on private health insurance exchanges were unique data presentation (e.g., infographics) and further personalized shopping (e.g., recommended plan flags). Health plan total cost estimates varied substantially between the public and private exchanges (average difference $1526). The ACA's public health insurance exchanges offered more tools in OEP4 to help consumers select a plan. While private health insurance exchanges presented notable features, the total cost estimates for a standardized consumer varied widely on public versus private exchanges.
Comparison of VDL Modes in the Aeronautical Telecommunications Network
NASA Technical Reports Server (NTRS)
Bretmersky, Steven; Konangi, Vijay K.; Kerczewski, Robert J.
2002-01-01
VHF Digital Link (VDL) has been identified as a method of communication between aircraft and ground stations in the Aeronautical Telecommunications Network (ATN). Three different modes of VDL have been suggested for implementation. Simulations were conducted to compare the data transfer capabilities of VDL Modes 2, 3, and 4. These simulations focus on up to 50 aircraft communicating with a single VDL ground station. The data traffic is generated by the standard File Transfer Protocol (FTP) and Hyper Text Transfer Protocol (HTTP) applications in the aircraft. Comparisons of the modes are based on the number of files and pages transferred and the response time.
Standardizing Quality Assessment of Fused Remotely Sensed Images
NASA Astrophysics Data System (ADS)
Pohl, C.; Moellmann, J.; Fries, K.
2017-09-01
The multitude of available operational remote sensing satellites led to the development of many image fusion techniques to provide high spatial, spectral and temporal resolution images. The comparison of different techniques is necessary to obtain an optimized image for the different applications of remote sensing. There are two approaches in assessing image quality: 1. Quantitatively by visual interpretation and 2. Quantitatively using image quality indices. However an objective comparison is difficult due to the fact that a visual assessment is always subject and a quantitative assessment is done by different criteria. Depending on the criteria and indices the result varies. Therefore it is necessary to standardize both processes (qualitative and quantitative assessment) in order to allow an objective image fusion quality evaluation. Various studies have been conducted at the University of Osnabrueck (UOS) to establish a standardized process to objectively compare fused image quality. First established image fusion quality assessment protocols, i.e. Quality with No Reference (QNR) and Khan's protocol, were compared on varies fusion experiments. Second the process of visual quality assessment was structured and standardized with the aim to provide an evaluation protocol. This manuscript reports on the results of the comparison and provides recommendations for future research.
The value of citizen science for ecological monitoring of mammals.
Parsons, Arielle Waldstein; Goforth, Christine; Costello, Robert; Kays, Roland
2018-01-01
Citizen science approaches are of great interest for their potential to efficiently and sustainably monitor wildlife populations on both public and private lands. Here we present two studies that worked with volunteers to set camera traps for ecological surveys. The photographs recorded by these citizen scientists were archived and verified using the eMammal software platform, providing a professional grade, vouchered database of biodiversity records. Motivated by managers' concern with perceived high bear activity, our first example enlisted the help of homeowners in a short-term study to compare black bear activity inside a National Historic Site with surrounding private land. We found similar levels of bear activity inside and outside the NHS, and regional comparisons suggest the bear population is typical. Participants benefited from knowing their local bear population was normal and managers refocused bear management given this new information. Our second example is a continuous survey of wildlife using the grounds of a nature education center that actively manages habitat to maintain a grassland prairie. Center staff incorporated the camera traps into educational programs, involving visitors with camera setup and picture review. Over two years and 5,968 camera-nights this survey has collected 41,393 detections of 14 wildlife species. Detection rates and occupancy were higher in open habitats compared to forest, suggesting that the maintenance of prairie habitat is beneficial to some species. Over 500 volunteers of all ages participated in this project over two years. Some of the greatest benefits have been to high school students, exemplified by a student with autism who increased his communication and comfort level with others through field work with the cameras. These examples show how, with the right tools, training and survey design protocols, citizen science can be used to answer a variety of applied management questions while connecting participants with their secretive mammal neighbors.
The value of citizen science for ecological monitoring of mammals
Goforth, Christine; Costello, Robert; Kays, Roland
2018-01-01
Citizen science approaches are of great interest for their potential to efficiently and sustainably monitor wildlife populations on both public and private lands. Here we present two studies that worked with volunteers to set camera traps for ecological surveys. The photographs recorded by these citizen scientists were archived and verified using the eMammal software platform, providing a professional grade, vouchered database of biodiversity records. Motivated by managers’ concern with perceived high bear activity, our first example enlisted the help of homeowners in a short-term study to compare black bear activity inside a National Historic Site with surrounding private land. We found similar levels of bear activity inside and outside the NHS, and regional comparisons suggest the bear population is typical. Participants benefited from knowing their local bear population was normal and managers refocused bear management given this new information. Our second example is a continuous survey of wildlife using the grounds of a nature education center that actively manages habitat to maintain a grassland prairie. Center staff incorporated the camera traps into educational programs, involving visitors with camera setup and picture review. Over two years and 5,968 camera-nights this survey has collected 41,393 detections of 14 wildlife species. Detection rates and occupancy were higher in open habitats compared to forest, suggesting that the maintenance of prairie habitat is beneficial to some species. Over 500 volunteers of all ages participated in this project over two years. Some of the greatest benefits have been to high school students, exemplified by a student with autism who increased his communication and comfort level with others through field work with the cameras. These examples show how, with the right tools, training and survey design protocols, citizen science can be used to answer a variety of applied management questions while connecting participants with their secretive mammal neighbors. PMID:29610706
International online survey to assess current practice in equine anaesthesia.
Wohlfender, F D; Doherr, M G; Driessen, B; Hartnack, S; Johnston, G M; Bettschart-Wolfensberger, R
2015-01-01
Multicentre Confidential Enquiries into Perioperative Equine Fatalities (CEPEF) have not been conducted since the initial CEPEF Phases 1-3, 20 years ago. To collect data on current practice in equine anaesthesia and to recruit participants for CEPEF-4. Online questionnaire survey. An online questionnaire was prepared and the link distributed internationally to veterinarians possibly performing equine anaesthesia, using emails, posters, flyers and an editorial. The questionnaire included 52 closed, semiclosed and open questions divided into 8 subgroups: demographic data, anaesthetist, anaesthesia management (preoperative, technical equipment, monitoring, drugs, recovery), areas of improvements and risks and motivation for participation in CEPEF-4. Descriptive statistics and Chi-squared tests for comparison of categorical variables were performed. A total of 199 questionnaires were completed by veterinarians from 14 different countries. Of the respondents, 43% worked in private hospitals, 36% in private practices and 21% in university teaching hospitals. In 40 institutions (23%) there was at least one diplomate of the European or American colleges of veterinary anaesthesia and analgesia on staff. Individual respondents reported routinely employ the following anaesthesia monitoring modalities: electrocardiography (80%), invasive arterial blood pressures (70%), pulse oximetry (60%), capnography (55%), arterial blood gases (47%), composition of inspired and expired gases (45%) and body temperature (35%). Drugs administered frequently or routinely as part of a standard protocol were: acepromazine (44%), xylazine (68%), butorphanol (59%), ketamine (96%), diazepam (83%), isoflurane (76%), dobutamine (46%), and, as a nonsteroidal anti-inflammatory drug, phenylbutazone (73%) or flunixin meglumine (66%). Recovery was routinely assisted by 40%. The main factors perceived by the respondents to affect outcome of equine anaesthesia were the preoperative health status of the animal and training of the anaesthetist. Current practice in equine anaesthesia varies widely, and the study has highlighted important topics relevant for designing a future prospective multicentre cohort study (CEPEF-4). The Summary is available in Chinese - see Supporting information. © 2014 EVJ Ltd.
ERIC Educational Resources Information Center
Kavale, Kenneth A.
Sixteen sixth-grade students participated in a study of the reasoning strategies employed by good and poor readers. Students, trained in applying introspective procedures, completed instruments that measured verbal reasoning, determining cause and effect, reading for inference, and determining main idea. Protocols obtained during five consecutive…
ERIC Educational Resources Information Center
Lovett, Sadie; Rehfeldt, Ruth Anne; Garcia, Yors; Dunning, Johnna
2011-01-01
This study compared the effects of a computer-based stimulus equivalence protocol to a traditional lecture format in teaching single-subject experimental design concepts to undergraduate students. Participants were assigned to either an equivalence or a lecture group, and performance on a paper-and-pencil test that targeted relations among the…
Cook, Devon R; Harris, Edward F; Vaden, James L
2005-06-01
Treatment outcomes and duration of treatment for patients treated in university graduate orthodontic programs and private orthodontic practices were assessed and compared with the ABO objective grading system. The treatment records of 139 randomly selected adolescents who had received comprehensive orthodontic treatment were examined. Seventy-seven subjects had been treated in 3 postgraduate orthodontic clinics, and 62 had been treated in 3 private orthodontic practices. Pretreatment, all subjects had Class II Division 1 malocclusions and ANB angles equal to or greater than 4 degrees . All patients were treated with premolar extractions. Posttreatment dental casts were measured and scored with the ABO objective grading system. No significant differences were found between the groups in the alignment, buccolingual inclination, and overjet components. Patients treated in private practice had significantly lower scores for marginal ridge height and occlusal relationship. Patients treated in the university programs had significantly lower scores for occlusal contact and interproximal contact components. There was no significant difference in the overall score, thus no significant difference in the overall quality of orthodontic treatment outcome between patients treated in university programs and private practices. However, the university group had a significantly larger sample variance for the overall score. There was no significant difference in the duration of the treatment between patients treated in a university setting and in a private practice.
2014-01-01
Background High fertility rates, unwanted pregnancies, low modern contraceptive prevalence and a huge unmet need for contraception adversely affect women’s health in Pakistan and this problem is compounded by limited access to reliable information and quality services regarding birth spacing especially in rural and underserved areas. This paper presents a study protocol that describes an evaluation of a demand-side financing (DSF) voucher approach which aims to increase the uptake of modern contraception among women of the lowest two wealth quintiles in Punjab Province, Pakistan. Methods/Design This study will use quasi-experimental design with control arm and be implemented in: six government clinics from the Population Welfare Department; 24 social franchise facilities branded as ‘Suraj’ (Sun), led by Marie Stopes Society (a local non-governmental organization); and 12 private sector clinics in Chakwal, Mianwali and Bhakkar districts. The study respondents will be interviewed at baseline and endline subject to voluntary acceptance and medical eligibility. In addition, health service data will record each client visit during the study period. Discussion The study will examine the impact of vouchers in terms of increasing the uptake of modern contraception by engaging private and public sector service providers (mid-level and medical doctors). If found effective, this approach can be a viable solution to satisfying the current demand and meeting the unmet need for contraception, particularly among the poorest socio-economic group. PMID:24885657
Wall, Stephen P; Kaufman, Bradley J; Williams, Nicholas; Norman, Elizabeth M; Gilbert, Alexander J; Munjal, Kevin G; Maikhor, Shana; Goldstein, Michael J; Rivera, Julia E; Lerner, Harvey; Meyers, Chad; Machado, Marion; Montella, Susan; Pressman, Marcy; Teperman, Lewis W; Dubler, Nancy N; Goldfrank, Lewis R
2016-04-01
In 2006, the Institute of Medicine emphasized substantial potential to expand organ donation opportunities through uncontrolled donation after circulatory determination of death (uDCDD). We pilot an out-of-hospital uDCDD kidney program for New York City in partnership with communities that it was intended to benefit. We evaluate protocol process and outcomes while identifying barriers to success and means for improvement. We conducted a prospective, participatory action research study in Manhattan from December 2010 to May 2011. Daily from 4 to 12 pm, our organ preservation unit monitored emergency medical services (EMS) frequencies for cardiac arrests occurring in private locations. After EMS providers independently ordered termination of resuscitation, organ preservation unit staff determined clinical eligibility and donor status. Authorized parties, persons authorized to make organ donation decisions, were approached about in vivo preservation. The study population included organ preservation unit staff, authorized parties, passersby, and other New York City agency personnel. Organ preservation unit staff independently documented shift activities with daily operations notes and teleconference summaries that we analyzed with mixed qualitative and quantitative methods. The organ preservation unit entered 9 private locations; all the deceased lacked previous registration, although 4 met clinical screening eligibility. No kidneys were recovered. We collected 837 notes from 35 organ preservation unit staff. Despite frequently recounting protocol breaches, most responses from passersby including New York City agencies were favorable. No authorized parties were offended by preservation requests, yielding a Bayesian posterior median 98% (95% credible interval 76% to 100%). In summary, the New York City out-of-hospital uDCDD program was not feasible. There were frequent protocol breaches and confusion in determining clinical eligibility. In the small sample of authorized persons we encountered during the immediate grieving period, negative reactions were infrequent. Copyright © 2015 American College of Emergency Physicians. Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suckling, Tara; Smith, Tony; Reed, Warren
2013-06-15
Optimal arterial opacification is crucial in imaging the pulmonary arteries using computed tomography (CT). This poses the challenge of precisely timing data acquisition to coincide with the transit of the contrast bolus through the pulmonary vasculature. The aim of this quality assurance exercise was to investigate if a change in CT pulmonary angiography (CTPA) scanning protocol resulted in improved opacification of the pulmonary arteries. Comparison was made between the smart prep protocol (SPP) and the test bolus protocol (TBP) for opacification in the pulmonary trunk. A total of 160 CTPA examinations (80 using each protocol) performed between January 2010 andmore » February 2011 were assessed retrospectively. CT attenuation coefficients were measured in Hounsfield Units (HU) using regions of interest at the level of the pulmonary trunk. The average pixel value, standard deviation (SD), maximum, and minimum were recorded. For each of these variables a mean value was then calculated and compared for these two CTPA protocols. Minimum opacification of 200 HU was achieved in 98% of the TBP sample but only 90% of the SPP sample. The average CT attenuation over the pulmonary trunk for the SPP was 329 (SD = ±21) HU, whereas for the TBP it was 396 (SD = ±22) HU (P = 0.0017). The TBP also recorded higher maximum (P = 0.0024) and minimum (P = 0.0039) levels of opacification. This study has found that a TBP resulted in significantly better opacification of the pulmonary trunk than the SPP.« less
Shastri, Shefali M; Barbieri, Elizabeth; Kligman, Isaac; Schoyer, Katherine D; Davis, Owen K; Rosenwaks, Zev
2011-02-01
To evaluate in vitro fertilization (IVF) cycle outcomes in young poor responders treated with a luteal estradiol/gonadotropin-releasing hormone antagonist (E(2)/ANT) protocol versus an oral contraceptive pill microdose leuprolide protocol (OCP-MDL). Retrospective cohort. Academic practice. Poor responders: 186 women, aged <35 years undergoing IVF with either E(2)/ANT or OCP-MDL protocols. None. Clinical pregnancies, oocytes retrieved, cancellation rate. Patients in the E(2)/ANT group had a greater gonadotropin requirement (71.9 ± 22.2 vs. 57.6 ± 25.7) and lower E(2) level (1,178.6 ± 668 vs. 1,627 ± 889), yet achieved similar numbers of oocytes retrieved and fertilized, and a greater number of embryos transferred (2.3 ± 0.9 vs. 2.0 ± 1.1) with a better mean grade (2.14 ± .06 vs. 2.7 ± 1.8) compared with the OCP/MDL group. The E2/ANT group exhibited a trend toward improved implantation rates (30.5% vs. 21.1%) and ongoing pregnancy rates per started cycle: 44 out of 117 (37%) versus 17 out of 69 (25%). Poor responders aged <35 years may be treated with the aggressive E(2)/ANT protocol to improve cycle outcomes. Both protocols remain viable options for this group. Adequately powered, randomized clinical comparison appears justified. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
Pomey, Marie-Pascale; Forest, Pierre-Gerlier; Palley, Howard A; Martin, Elisabeth
2007-09-01
In January 1997, the government of Quebec, Canada, implemented a public/private prescription drug program that covered the entire population of the province. Under this program, the public sector collaborates with private insurers to protect all Quebecers from the high cost of drugs. This article outlines the principal features and history of the Quebec plan and draws parallels between the factors that led to its emergence and those that led to the passage of the Medicare Prescription Drug, Improvement and Modernization Act (MMA) in the United States. It also discusses the challenges and similarities of both programs and analyzes Quebec's ten years of experience to identify adjustments that may help U.S. policymakers optimize the MMA.
Pomey, Marie-Pascale; Forest, Pierre-Gerlier; Palley, Howard A; Martin, Elisabeth
2007-01-01
In January 1997, the government of Quebec, Canada, implemented a public/private prescription drug program that covered the entire population of the province. Under this program, the public sector collaborates with private insurers to protect all Quebecers from the high cost of drugs. This article outlines the principal features and history of the Quebec plan and draws parallels between the factors that led to its emergence and those that led to the passage of the Medicare Prescription Drug, Improvement and Modernization Act (MMA) in the United States. It also discusses the challenges and similarities of both programs and analyzes Quebec's ten years of experience to identify adjustments that may help U.S. policymakers optimize the MMA. PMID:17718665
Trochesset, Denise A; Serchuk, Richard B; Colosi, Dan C
2014-03-01
Identification of unknown individuals using dental comparison is well established in the forensic setting. The identification technique can be time and resource consuming if many individuals need to be identified at once. Medical CT (MDCT) for dental profiling has had limited success, mostly due to artifact from metal-containing dental restorations and implants. The authors describe a CBCT reformatting technique that creates images, which closely approximate conventional dental images. Using a i-CAT Platinum CBCT unit and standard issue i-CAT Vision software, a protocol is developed to reproducibly and reliably reformat CBCT volumes. The reformatted images are presented with conventional digital images from the same anatomic area for comparison. The authors conclude that images derived from CBCT volumes following this protocol are similar enough to conventional dental radiographs to allow for dental forensic comparison/identification and that CBCT offers a superior option over MDCT for this purpose. © 2013 American Academy of Forensic Sciences.
Comparison of COAP and UW-19 protocols for dogs with multicentric lymphoma.
Hosoya, Kenji; Kisseberth, William C; Lord, Linda K; Alvarez, Francisco J; Lara-Garcia, Ana; Kosarek, Carrie E; London, Cheryl A; Couto, C Guillermo
2007-01-01
Various chemotherapy protocols for treating lymphoma in dogs have been published; however, comparison of protocols from different studies is difficult, especially when evaluating survival time and toxicoses. The choice of COAP (C, cyclophosphamide; O, vincristine; A, cytosine arabinoside; P, prednisone) and a modified University of Wisconsin 19-week (UW-19) induction protocol has no influence on overall survival times in dogs with lymphoma. One hundred and one dogs with multicentric lymphoma. Retrospective study (2001-2006). Dogs induced with either an 8-week COP-based protocol (C, cyclophosphamide; O, vincristine; and P, prednisone) with maintenance therapy (COAP group) or a 19-week CHOP (C, cyclophosphamide; H, doxorubicin; O, vincristine; and P, prednisone) based protocol (UW-19 group) were compared in terms of the duration of first remission, survival time, toxicoses, and cost. There were 71 dogs in the COAP group and 30 dogs in the UW-19 group. Various protocols were used after the first relapse. The median duration of the first remission for the COAP and UW-19 groups were 94 days (range, 6-356 days) and 174 days (28-438 days), respectively (P < .01). The median survival times for dogs in the COAP and UW-19 groups were 309 days (6-620 days) and 275 days (70-1102+ days), respectively (P = .09). Dogs in the COAP group had a hazard ratio of 1.9 (95% CI 1.1-3.4) for death relative to the UW-19 group (P = .03), after controlling for the confounders (World Health Organization clinical stage, age, sex, use of doxorubicin during reinduction). The severity of neutropenia and gastrointestinal toxicoses were significantly higher in the UW-19 group than in the COAP group (P = .01 and P < .01, respectively). Use of a long-term doxorubicin-containing sequential combination chemotherapy protocol is associated with a decreased risk of relapse and death relative to a non-doxorubicin-containing protocol.
Herts, Brian R; Baker, Mark E; Obuchowski, Nancy; Primak, Andrew; Schneider, Erika; Rhana, Harpreet; Dong, Frank
2013-06-01
The purpose of this article is to determine the decrease in volume CT dose index (CTDI(vol)) and dose-length product (DLP) achieved by switching from fixed quality reference tube current protocols with automatic tube current modulation to protocols adjusting the quality reference tube current, slice collimation, and peak kilovoltage according to patient weight. All adult patients who underwent CT examinations of the abdomen or abdomen and pelvis during 2010 using weight-based protocols who also underwent a CT examination in 2008 or 2009 using fixed quality reference tube current protocols were identified from the radiology information system. Protocol pages were electronically retrieved, and the CT model, examination date, scan protocol, CTDI(vol), and DLP were extracted from the DICOM header or by optical character recognition. There were 15,779 scans with dose records for 2700 patients. Changes in CTDI(vol) and DLP were compared only between examinations of the same patient and same CT system model for examinations performed in 2008 or 2009 and those performed in 2010. The final analysis consisted of 1117 comparisons in 1057 patients, and 1209 comparisons in 988 patients for CTDI(vol) and DLP, respectively. The change to a weight-based protocol resulted in a statistically significant reduction in CTDI(vol) and DLP on three MDCT system models (p < 0.001). The largest average CTDI(vol) decrease was 13.9%, and the largest average DLP decrease was 16.1% on a 64-MDCT system. Both the CTDI(vol) and DLP decreased the most for patients who weighed less than 250 lb (112.5 kg). Adjusting the CT protocol by selecting parameters according to patient weight is a viable method for reducing CT radiation dose. The largest reductions occurred in the patients weighing less than 250 lb.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Jonker, Dirk; Gustafsson, Ewa; Rolander, Bo; Arvidsson, Inger; Nordander, Catarina
2015-01-01
A new health surveillance protocol for work-related upper-extremity musculoskeletal disorders has been validated by comparing the results with a reference protocol. The studied protocol, Health Surveillance in Adverse Ergonomics Conditions (HECO), is a new version of the reference protocol modified for application in the Occupational Health Service (OHS). The HECO protocol contains both a screening part and a diagnosing part. Sixty-three employees were examined. The screening in HECO did not miss any diagnosis found when using the reference protocol, but in comparison to the reference protocol considerable time savings could be achieved. Fair to good agreement between the protocols was obtained for one or more diagnoses in neck/shoulders (86%, k = 0.62) and elbow/hands (84%, k = 0.49). Therefore, the results obtained using the HECO protocol can be compared with a reference material collected with the reference protocol, and thus provide information of the magnitude of disorders in an examined work group. Practitioner Summary: The HECO protocol is a relatively simple physical examination protocol for identification of musculoskeletal disorders in the neck and upper extremities. The protocol is a reliable and cost-effective tool for the OHS to use for occupational health surveillance in order to detect workplaces at high risk for developing musculoskeletal disorders.
Homaie Rad, Enayatollah; Vahedi, Sajad; Teimourizad, Abedin; Esmaeilzadeh, Firooz; Hadian, Mohamad; Torabi Pour, Amin
2013-01-01
Background: Health expenditures are divided in two parts of public and private health expenditures. Public health expenditures contain social security spending, taxing to private and public sectors, and foreign resources like loans and subventions. On the other hand, private health expenditures contain out of pocket expenditures and private insurances. Each of these has different effects on the health status. The present study aims to compare the effects of these expenditures on health in Eastern Mediterranean Region (EMR). Methods: In this study, infant mortality rate was considered as an indicator of health status. We estimated the model using the panel data of EMR countries between 1995 and 2010. First, we used Pesaran CD test followed by Pesaran’s CADF unit root test. After the confirmation of having unit root, we used Westerlund panel cointegration test and found that the model was cointegrated and then after using Hausman and Breusch-Pagan tests, we estimated the model using the random effects. Results: The results showed that the public health expenditures had a strong negative relationship with infant mortality rate. However, a positive relationship was found between the private health expenditures and infant mortality rate (IMR). The relationship for public health expenditures was significant, but for private health expenditures was not. Conclusion: The study findings showed that the public health expenditures in the EMR countries improved health outcome, while the private health expenditures did not have any significant relationship with health status, so often increasing the public health expenditures leads to reduce IMR. But this relationship was not significant because of contradictory effects for poor and wealthy peoples. PMID:24596857
Homaie Rad, Enayatollah; Vahedi, Sajad; Teimourizad, Abedin; Esmaeilzadeh, Firooz; Hadian, Mohamad; Torabi Pour, Amin
2013-08-01
Health expenditures are divided in two parts of public and private health expenditures. Public health expenditures contain social security spending, taxing to private and public sectors, and foreign resources like loans and subventions. On the other hand, private health expenditures contain out of pocket expenditures and private insurances. Each of these has different effects on the health status. The present study aims to compare the effects of these expenditures on health in Eastern Mediterranean Region (EMR). In this study, infant mortality rate was considered as an indicator of health status. We estimated the model using the panel data of EMR countries between 1995 and 2010. First, we used Pesaran CD test followed by Pesaran's CADF unit root test. After the confirmation of having unit root, we used Westerlund panel cointegration test and found that the model was cointegrated and then after using Hausman and Breusch-Pagan tests, we estimated the model using the random effects. The results showed that the public health expenditures had a strong negative relationship with infant mortality rate. However, a positive relationship was found between the private health expenditures and infant mortality rate (IMR). The relationship for public health expenditures was significant, but for private health expenditures was not. The study findings showed that the public health expenditures in the EMR countries improved health outcome, while the private health expenditures did not have any significant relationship with health status, so often increasing the public health expenditures leads to reduce IMR. But this relationship was not significant because of contradictory effects for poor and wealthy peoples.
Moodley, Selvarani; Störbeck, Claudine
2016-12-01
Within the Early Hearing Detection and Intervention (EHDI) pathway, which includes the processes of screening, diagnosis and intervention for paediatric hearing loss, paediatric diagnostic audiology involves a battery of specific tests and procedures. International studies have highlighted a golden standard for diagnosis of paediatric hearing loss as based on the Joint Committee of Infant Hearing (2007) diagnostic guidelines, closely resembling the HPCSA diagnostic guidelines. There are limited South African studies on the processes and protocols followed in diagnostic paediatric audiology. This study aims to provide a comparison for how the tests used for diagnosis of paediatric hearing loss in South Africa (within both the public and private healthcare sectors) compare to the HPCSA recommended diagnostic guidelines. A retrospective record review of paediatric clients with hearing loss (recruited through nonprobability convenience sampling) was conducted. This study is part of a longitudinal study of 711 deaf or hard of hearing children referred to the HI HOPES early intervention programme from September 2006 to December 2011. Diagnostic data from audiology reports of 117 children between 0 and 36 months were coded and analysed. Large variation was found in the tests included in the diagnostic audiology reports. For 22 children (19%) a comprehensive test battery was used. Health Professions Council of South Africa (HPCSA) recommended guidelines for diagnostic testing were not followed in any of the records analysed. Components of the HPCSA recommended test battery most frequently omitted was bone conduction testing. For both electrophysiology and behavioural testing, there was limited frequency specificity information. This exclusion of information is evidence of deficiencies in data recording and management, as well as having an effect on accuracy of classification of degree and type of hearing loss. There are gaps in age-appropriate assessment protocols, which will have an effect on accurate differential diagnosis of paediatric hearing loss. Reasons for not including all testing components of the HPCSA recommended guidelines, as well as the possibility of developing guidelines more relevant to a developing world context, should be explored. There might be a need for. The impact of South African specific factors that have an effect on provision of accurate paediatric diagnostic audiology services should be determined. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Experimental demonstration of blind quantum computing
NASA Astrophysics Data System (ADS)
Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joe; Zeilinger, Anton; Walther, Philip
2012-02-01
Quantum computers are among the most promising applications of quantum-enhanced technologies. Quantum effects such as superposition and entanglement enable computational speed-ups that are unattainable using classical computers. The challenges in realising quantum computers suggest that in the near future, only a few facilities worldwide will be capable of operating such devices. In order to exploit these computers, users would seemingly have to give up their privacy. It was recently shown that this is not the case and that, via the universal blind quantum computation protocol, quantum mechanics provides a way to guarantee that the user's data remain private. Here, we demonstrate the first experimental version of this protocol using polarisation-entangled photonic qubits. We demonstrate various blind one- and two-qubit gate operations as well as blind versions of the Deutsch's and Grover's algorithms. When the technology to build quantum computers becomes available, this will become an important privacy-preserving feature of quantum information processing.
Communication complexity and information complexity
NASA Astrophysics Data System (ADS)
Pankratov, Denis
Information complexity enables the use of information-theoretic tools in communication complexity theory. Prior to the results presented in this thesis, information complexity was mainly used for proving lower bounds and direct-sum theorems in the setting of communication complexity. We present three results that demonstrate new connections between information complexity and communication complexity. In the first contribution we thoroughly study the information complexity of the smallest nontrivial two-party function: the AND function. While computing the communication complexity of AND is trivial, computing its exact information complexity presents a major technical challenge. In overcoming this challenge, we reveal that information complexity gives rise to rich geometrical structures. Our analysis of information complexity relies on new analytic techniques and new characterizations of communication protocols. We also uncover a connection of information complexity to the theory of elliptic partial differential equations. Once we compute the exact information complexity of AND, we can compute exact communication complexity of several related functions on n-bit inputs with some additional technical work. Previous combinatorial and algebraic techniques could only prove bounds of the form theta( n). Interestingly, this level of precision is typical in the area of information theory, so our result demonstrates that this meta-property of precise bounds carries over to information complexity and in certain cases even to communication complexity. Our result does not only strengthen the lower bound on communication complexity of disjointness by making it more exact, but it also shows that information complexity provides the exact upper bound on communication complexity. In fact, this result is more general and applies to a whole class of communication problems. In the second contribution, we use self-reduction methods to prove strong lower bounds on the information complexity of two of the most studied functions in the communication complexity literature: Gap Hamming Distance (GHD) and Inner Product mod 2 (IP). In our first result we affirm the conjecture that the information complexity of GHD is linear even under the uniform distribution. This strengthens the O(n) bound shown by Kerenidis et al. (2012) and answers an open problem by Chakrabarti et al. (2012). We also prove that the information complexity of IP is arbitrarily close to the trivial upper bound n as the permitted error tends to zero, again strengthening the O(n) lower bound proved by Braverman and Weinstein (2011). More importantly, our proofs demonstrate that self-reducibility makes the connection between information complexity and communication complexity lower bounds a two-way connection. Whereas numerous results in the past used information complexity techniques to derive new communication complexity lower bounds, we explore a generic way, in which communication complexity lower bounds imply information complexity lower bounds in a black-box manner. In the third contribution we consider the roles that private and public randomness play in the definition of information complexity. In communication complexity, private randomness can be trivially simulated by public randomness. Moreover, the communication cost of simulating public randomness with private randomness is well understood due to Newman's theorem (1991). In information complexity, the roles of public and private randomness are reversed: public randomness can be trivially simulated by private randomness. However, the information cost of simulating private randomness with public randomness is not understood. We show that protocols that use only public randomness admit a rather strong compression. In particular, efficient simulation of private randomness by public randomness would imply a version of a direct sum theorem in the setting of communication complexity. This establishes a yet another connection between the two areas. (Abstract shortened by UMI.).
Chaimani, Anna; Caldwell, Deborah M; Li, Tianjing; Higgins, Julian P T; Salanti, Georgia
2017-03-01
The number of systematic reviews that aim to compare multiple interventions using network meta-analysis is increasing. In this study, we highlight aspects of a standard systematic review protocol that may need modification when multiple interventions are to be compared. We take the protocol format suggested by Cochrane for a standard systematic review as our reference and compare the considerations for a pairwise review with those required for a valid comparison of multiple interventions. We suggest new sections for protocols of systematic reviews including network meta-analyses with a focus on how to evaluate their assumptions. We provide example text from published protocols to exemplify the considerations. Standard systematic review protocols for pairwise meta-analyses need extensions to accommodate the increased complexity of network meta-analysis. Our suggested modifications are widely applicable to both Cochrane and non-Cochrane systematic reviews involving network meta-analyses. Copyright © 2017 Elsevier Inc. All rights reserved.
Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications
NASA Technical Reports Server (NTRS)
Carek, David A.
2005-01-01
This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.
Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.
Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng
2017-11-01
The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.
Machen, Alexandra; Kobayashi, Miwako; Connelly, Mary Robin
2013-01-01
Two novel protocols for inactivation and extraction were developed and used to identify 107 Mycobacterium clinical isolates, including Mycobacterium tuberculosis complex, from solid cultures using Vitek matrix-assisted laser desorption ionization–time of flight (MALDI-TOF) mass spectrometry. The protocol using heat inactivation with sonication and cell disruption with glass beads resulted in 82.2% and 88.8% species and genus level identifications, respectively. PMID:24068013
Adolescents' Attitudes toward Women's Roles: A Comparison between Israeli Jews and Arabs.
ERIC Educational Resources Information Center
Seginer, Rachel; And Others
1990-01-01
Male and female Arab and Jewish private high school students in Israel were questioned on their attitudes toward women's roles. Finds that ambitious Arab females may experience less support from their male peers than may Jewish females. (DM)
Community Businesses--Lessons from Liverpool, UK.
ERIC Educational Resources Information Center
Leeming, Karen
2002-01-01
Comparison of community business development in two neighborhoods in Liverpool, England, resulted in the following implications for economic development strategy: (1) social entrepreneurs do not access the same infrastructure as business entrepreneurs; (2) community businesses differ from private enterprise; (3) displacement effects must be…
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Jenett, Arnim; Schindelin, Johannes E; Heisenberg, Martin
2006-01-01
Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB) protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc.) [1]. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy) to a common coordinate system and computes average intensities for each voxel (volume pixel) the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at [2] PMID:17196102
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-06-21
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.
The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios
Tian, Bin; Hou, Kun Mean; Zhou, Haiying
2016-01-01
The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393
Estimating implied rates of discount in healthcare decision-making.
West, R R; McNabb, R; Thompson, A G H; Sheldon, T A; Grimley Evans, J
2003-01-01
To consider whether implied rates of discounting from the perspectives of individual and society differ, and whether implied rates of discounting in health differ from those implied in choices involving finance or "goods". The study comprised first a review of economics, health economics and social science literature and then an empirical estimate of implied rates of discounting in four fields: personal financial, personal health, public financial and public health, in representative samples of the public and of healthcare professionals. Samples were drawn in the former county and health authority district of South Glamorgan, Wales. The public sample was a representative random sample of men and women, aged over 18 years and drawn from electoral registers. The health professional sample was drawn at random with the cooperation of professional leads to include doctors, nurses, professions allied to medicine, public health, planners and administrators. The literature review revealed few empirical studies in representative samples of the population, few direct comparisons of public with private decision-making and few direct comparisons of health with financial discounting. Implied rates of discounting varied widely and studies suggested that discount rates are higher the smaller the value of the outcome and the shorter the period considered. The relationship between implied discount rates and personal attributes was mixed, possibly reflecting the limited nature of the samples. Although there were few direct comparisons, some studies found that individuals apply different rates of discount to social compared with private comparisons and health compared with financial. The present study also found a wide range of implied discount rates, with little systematic effect of age, gender, educational level or long-term illness. There was evidence, in both samples, that people chose a lower rate of discount in comparisons made on behalf of society than in comparisons made for themselves. Both public and health professional samples tended to choose lower discount rates in health-related comparisons than in finance-related comparisons. It was also suggested that implied rates of discount, derived from responses to hypothetical questions, can be influenced by detail of question framing. The study suggested that both the lay public and healthcare professionals consider that the discount rate appropriate for public decisions is lower than that for private decisions. This finding suggests that lay people as well as healthcare professionals, used to making decisions on behalf of others, recognise that society is not simply an aggregate of individuals. It also implies a general appreciation that society is more stable and has a more predictable future than does the individual. There is fairly general support for this view in the theoretical literature and limited support in the few previous direct comparisons. Further research is indicated, possibly involving more in-depth interviewing and drawing inference on real, rather than hypothetical choices.
ACIX: Atmospheric Correction Inter-comparison Exercise
NASA Astrophysics Data System (ADS)
Doxani, Georgia; Gascon, Ferran; Vermote, Éric; Roger, Jean-Claude
2017-04-01
The free and open data access policy to Sentinel-2 (S-2) and Landsat-8 (L-8) satellite imagery has stimulated the development of atmospheric correction (AC) processors for generating Bottom-of-Atmosphere (BOA) products. Several entities have started to generate (or plan to generate in the short term) BOA reflectance products at global scale for S-2 and L-8 missions. To this end, the European Space Agency (ESA) and NASA are organizing an exercise on AC processors inter-comparison. The results of the exercise are expected to point out the strengths and weaknesses, as well as communalities and discrepancies of various AC processors, in order to suggest and define ways for their further improvement. In particular, 13 atmospheric processors from five different countries participate in ACIX with the aim to inter-compare their performance when applied to L-8 and S-2 data. A protocol describing the inter-comparison process and the test dataset, which is based on the AERONET sites, will be presented. The protocol has been defined according to what was agreed among the participants during the 1st ACIX workshop held in June 2016. It includes the comparison of aerosol optical thickness and water vapour products of the processors with the AERONET measurements. Moreover, concerning the surface reflectances, the protocol describes the inter-comparison among the processors, as well as the comparison with the MODIS surface reflectance and with a reference surface reflectance product. Such a reference product will be obtained using the AERONET characterization of the aerosol (size distribution and refractive indices) and an accurate radiative transfer code. The inter-comparison outcomes will be presented and discussed among the participants in the 2nd ACIX workshop, which will be held on 11-12 April 2017 (ESRIN/ESA). The proposed presentation is an opportunity for the user community to be informed for the first time about the ACIX results and conclusions.
Barbosa, Arnaldo Prata; Cunha, Antônio José Ledo Alves da
2011-01-01
The objective of this study was to describe the characteristics of neonatal and pediatric intensive care units (ICU) and beds in Rio de Janeiro, correlating with population demands in 1997 and 2007. All neonatal and pediatric ICUs were visited, identifying the availability and type of beds. Comparisons were made between: supply and demand using projected need for beds for the population; public and private ICUs; and geographical regions. In 2007, 95 units were included totaling 1,094 beds (74 units and 1,080 beds in 1997): 51% public and 48% private (47% and 52% in 1997); 47% neonatal, 18% pediatric and 35% mixed units. Most units were located in the metropolitan area. The distribution of public and private beds was similar in the metropolitan area in both periods; in the interior, public beds tripled. Access has improved, mainly in the interior, but there is still no equity in the distribution of and accessibility to the available beds, with a shortage in the public sector, an excess in the private sector, and a great concentration in the metropolitan area.
A major use of multi-walled carbon nanotubes (MWCNTs) is as functional fillers embedded in a solid matrix, such as plastics or coatings. Weathering and abrasion of the solid matrix during use can lead to environmental releases of the MWCNTs. Here we focus on a protocol to identif...
Zakaria, Golam Abu; Schuette, Wilhelm
2007-01-01
For the determination of the absorbed dose to water for high-energy photon and electron beams the IAEA code of practice TRS-398 (2000) is applied internationally. In Germany, the German dosimetry protocol DIN 6800-2 (1997) is used. Recently, the DIN standard has been revised and published as Draft National Standard DIN 6800-2 (2006). It has adopted widely the methodology and dosimetric data of the code of practice. This paper compares these three dosimetry protocols systematically and identifies similarities as well as differences. The investigation was done with 6 and 18 MV photon as well as 5 to 21 MeV electron beams. While only cylindrical chambers were used for photon beams, measurements of electron beams were performed using cylindrical as well as plane-parallel chambers. The discrepancies in the determination of absorbed dose to water between the three protocols were 0.4% for photon beams and 1.5% for electron beams. Comparative measurements showed a deviation of less than 0.5% between our measurements following protocol DIN 6800-2 (2006) and TLD inter-comparison procedure in an external audit. PMID:21217912
Zakaria, Golam Abu; Schuette, Wilhelm
2007-01-01
For the determination of the absorbed dose to water for high-energy photon and electron beams the IAEA code of practice TRS-398 (2000) is applied internationally. In Germany, the German dosimetry protocol DIN 6800-2 (1997) is used. Recently, the DIN standard has been revised and published as Draft National Standard DIN 6800-2 (2006). It has adopted widely the methodology and dosimetric data of the code of practice. This paper compares these three dosimetry protocols systematically and identifies similarities as well as differences. The investigation was done with 6 and 18 MV photon as well as 5 to 21 MeV electron beams. While only cylindrical chambers were used for photon beams, measurements of electron beams were performed using cylindrical as well as plane-parallel chambers. The discrepancies in the determination of absorbed dose to water between the three protocols were 0.4% for photon beams and 1.5% for electron beams. Comparative measurements showed a deviation of less than 0.5% between our measurements following protocol DIN 6800-2 (2006) and TLD inter-comparison procedure in an external audit.
Comparison of PCR methods for the detection of genetic variants of carp edema virus.
Adamek, Mikolaj; Matras, Marek; Jung-Schroers, Verena; Teitge, Felix; Heling, Max; Bergmann, Sven M; Reichert, Michal; Way, Keith; Stone, David M; Steinhagen, Dieter
2017-09-20
The infection of common carp and its ornamental variety, koi, with the carp edema virus (CEV) is often associated with the occurrence of a clinical disease called 'koi sleepy disease'. The disease may lead to high mortality in both koi and common carp populations. To prevent further spread of the infection and the disease, a reliable detection method for this virus is required. However, the high genetic variability of the CEV p4a gene used for PCR-based diagnostics could be a serious obstacle for successful and reliable detection of virus infection in field samples. By analysing 39 field samples from different geographical origins obtained from koi and farmed carp and from all 3 genogroups of CEV, using several recently available PCR protocols, we investigated which of the protocols would allow the detection of CEV from all known genogroups present in samples from Central European carp or koi populations. The comparison of 5 different PCR protocols showed that the PCR assays (both end-point and quantitative) developed in the Centre for Environment, Fisheries and Aquaculture Science exhibited the highest analytical inclusivity and diagnostic sensitivity. Currently, this makes them the most suitable protocols for detecting viruses from all known CEV genogroups.
Aksan, Hediye A D; Ergin, Işıl; Ocek, Zeliha
2010-11-01
Substantial regional health inequalities have been shown to exist in Turkey for major health indicators. Turkish data on hospitals deserves a closer examination with a special emphasis on the regional differences in the context of the rapid privatization of the secondary or tertiary level health services.This study aims to evaluate the change in capacity and service delivery at public and private hospitals in Turkey between 2001-2006 and to determine the regional differences. Data for this retrospective study was provided from Statistical Almanacs of Inpatient Services (2001-2006). Hospitals in each of the 81 provinces were grouped into two categories: public and private. Provinces were grouped into six regions according to a development index composed by the State Planning Organisation. The number of facilities, hospital beds, outpatient admissions, inpatient admissions (per 100 000), number of deliveries and surgical operations (per 10 000) were calculated for public and private hospitals in each province and region. Regional comparisons were based on calculation of ratios for Region 1(R1) to Region 6(R6). Public facilities had a fundamental role in service delivery. However, private sector grew rapidly in Turkey between 2001-2006 in capacity and service delivery. In public sector, there were 2.3 fold increase in the number of beds in R1 to R6 in 2001. This ratio was 69.9 fold for private sector. The substantial regional inequalities in public and private sector decreased for the private sector enormously while a little decrease was observed for the public sector. In 2001 in R1, big surgical operations were performed six times more than R6 at the public sector whereas the difference was 117.7 fold for the same operations in the same regions for the private sector. These ratios decreased to 3.6 for the public sector and 13.9 for the private sector in 2006. The private health sector has grown enormously between 2001-2006 in Turkey including the less developed regions of the country. Given the fact that majority of people living in these underdeveloped regions are uninsured, the expansion of the private sector may not contribute in reducing the inequalities in access to health care. In fact, it may widen the existing gap for access to health between high and low income earners in these underdeveloped regions.
Buregyeya, Esther; Rutebemberwa, Elizeus; LaRussa, Phillip; Lal, Sham; Clarke, Sîan E; Hansen, Kristian S; Magnussen, Pascal; Mbonye, Anthony K
2017-05-02
Public health facilities are usually the first to receive interventions compared to private facilities, yet majority of health seeking care is first done with the latter. This study compared the capacity to manage acute febrile illnesses in children below 5 years in private vs public health facilities in order to design interventions to improve quality of care. A survey was conducted within 57 geographical areas (parishes), from August to October 2014 in Mukono district, central Uganda. The survey comprised both facility and health worker assessment. Data were collected on drug stocks, availability of treatment guidelines, diagnostic equipment, and knowledge in management of malaria, pneumonia and diarrhoea, using a structured questionnaire. A total of 53 public and 241 private health facilities participated in the study. While similar proportions of private and public health facilities stocked Coartem, the first-line anti-malarial drug, (98 vs 95%, p = 0.22), significantly more private than public health facilities stocked quinine (85 vs 53%, p < 0.01). Stocks of obsolete anti-malarial drugs, such as chloroquine, were reported in few public and private facilities (3.7 vs 12.5%, p = 0.06). Stocks of antibiotics-amoxycillin and gentamycin were similar in both sectors (≥90% for amoxicillin; ≥50 for gentamycin). Training in malaria was reported by 65% of public health facilities vs 56% in the private sector, p = 0.25), while, only 21% in the public facility and 12% in the private facilities, p = 0.11, reported receiving training in pneumonia. Only 55% of public facilities had microscopes. Malaria treatment guidelines were significantly lacking in the private sector, p = 0.01. Knowledge about first-line management of uncomplicated malaria, pneumonia and diarrhoea was significantly better in the public facilities compared to the private ones, though still sub-optimal. Deficiencies of equipment, supplies and training exist even in public health facilities. In order to significantly improve the capacity to handle acute febrile illness among children under five, training in proper case management, availability of supplies and diagnostics need to be addressed in both sectors.
[Datanet 1 and the convergence of the computer and telecommunications].
de Wit, Onno
2008-01-01
This article describes the efforts of the Dutch national company for telecommunication, PTT, in introducing and developing a public network for data communication in the Netherlands in the last decades of the twentieth century. As early as the 1960s, private companies started to connect their local computers. As a result, small private computer networks started to emerge. As the state company offering general access to public services in telephony, the PTT strove to develop a public data network, accessible to every user and telephone subscriber. This ambition was realized with Datanet 1, the public data network which was officially opened in 1982. In the years that followed, Datanet became the dominant network for data transmission, despite competing efforts by private companies and computer manufacturers. The large-scale application of Datanet in public municipal administration serves as a case study for the development of data communication in practice, that shows that there was a gradual migration from X-25 to TCP/IP protocols. The article concludes by stating that the introduction and development of data transmission transformed the role of the PTT in Dutch society, brought new working practices, new services and new responsibilities, and resulted in a whole new phase in the history of the computer.
Coelho, F; Aguiar, L F; Cunha, G S P; Cardinot, N; Lucena, E
2014-01-01
The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.
Network protocols for real-time applications
NASA Technical Reports Server (NTRS)
Johnson, Marjory J.
1987-01-01
The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.
Lopane, Giovanna; Mellone, Sabato; Corzani, Mattia; Chiari, Lorenzo; Cortelli, Pietro; Calandra-Buonaura, Giovanna; Contin, Manuela
2018-06-01
We aimed to assess the intrasubject reproducibility of a technology-based levodopa (LD) therapeutic monitoring protocol administered in supervised versus unsupervised conditions in patients with Parkinson's disease (PD). The study design was pilot, intrasubject, single center, open and prospective. Twenty patients were recruited. Patients performed a standardized monitoring protocol instrumented by an ad hoc embedded platform after their usual first morning LD dose in two different randomized ambulatory sessions: one under a physician's supervision, the other self-administered. The protocol is made up of serial motor and non-motor tests, including alternate finger tapping, Timed Up and Go test, and measurement of blood pressure. Primary motor outcomes included comparisons of intrasubject LD subacute motor response patterns over the 3-h test in the two experimental conditions. Secondary outcomes were the number of intrasession serial test repetitions due to technical or handling errors and patients' satisfaction with the unsupervised LD monitoring protocol. Intrasubject LD motor response patterns were concordant between the two study sessions in all patients but one. Platform handling problems averaged 4% of total planned serial tests for both sessions. Ninety-five percent of patients were satisfied with the self-administered LD monitoring protocol. To our knowledge, this study is the first to explore the potential of unsupervised technology-based objective motor and non-motor tasks to monitor subacute LD dosing effects in PD patients. The results are promising for future telemedicine applications.
Herrera, Cristian A; Rada, Gabriel; Kuhn-Barrientos, Lucy; Barrios, Ximena
2014-01-01
Ownership of healthcare providers has been considered as one factor that might influence their health and healthcare related performance. The aim of this article was to provide an overview of what is known about the effects on economic, administrative and health related outcomes of different types of ownership of healthcare providers--namely public, private non-for-profit (PNFP) and private for-profit (PFP)--based on the findings of systematic reviews (SR). An overview of systematic reviews was performed. Different databases were searched in order to select SRs according to an explicit comprehensive criterion. Included SRs were assessed to determine their methodological quality. Of the 5918 references reviewed, fifteen SR were included, but six of them were rated as having major limitations, so they weren't incorporated in the analyses. According to the nine analyzed SR, ownership does seem to have an effect on health and healthcare related outcomes. In the comparison of PFP and PNFP providers, significant differences in terms of mortality of patients and payments to facilities have been found, both being higher in PFP facilities. In terms of quality and economic indicators such as efficiency, there are no concluding results. When comparing PNFP and public providers, as well as for PFP and public providers, no clear differences were found. PFP providers seem to have worst results than their PNFP counterparts, but there are still important evidence gaps in the literature that needs to be covered, including the comparison between public and both PFP and PNFP providers. More research is needed in low and middle income countries to understand the impact on and development of healthcare delivery systems.
Herrera, Cristian A.; Rada, Gabriel; Kuhn-Barrientos, Lucy; Barrios, Ximena
2014-01-01
Introduction Ownership of healthcare providers has been considered as one factor that might influence their health and healthcare related performance. The aim of this article was to provide an overview of what is known about the effects on economic, administrative and health related outcomes of different types of ownership of healthcare providers -namely public, private non-for-profit (PNFP) and private for-profit (PFP)- based on the findings of systematic reviews (SR). Methods and Findings An overview of systematic reviews was performed. Different databases were searched in order to select SRs according to an explicit comprehensive criterion. Included SRs were assessed to determine their methodological quality. Of the 5918 references reviewed, fifteen SR were included, but six of them were rated as having major limitations, so they weren't incorporated in the analyses. According to the nine analyzed SR, ownership does seem to have an effect on health and healthcare related outcomes. In the comparison of PFP and PNFP providers, significant differences in terms of mortality of patients and payments to facilities have been found, both being higher in PFP facilities. In terms of quality and economic indicators such as efficiency, there are no concluding results. When comparing PNFP and public providers, as well as for PFP and public providers, no clear differences were found. Conclusion PFP providers seem to have worst results than their PNFP counterparts, but there are still important evidence gaps in the literature that needs to be covered, including the comparison between public and both PFP and PNFP providers. More research is needed in low and middle income countries to understand the impact on and development of healthcare delivery systems. PMID:25437212
Twidwell, Dirac; Wonkka, Carissa L; Sindelar, Michael T; Weir, John R
2015-01-01
Fire is widely recognized as a critical ecological and evolutionary driver that needs to be at the forefront of land management actions if conservation targets are to be met. However, the prevailing view is that prescribed fire is riskier than other land management techniques. Perceived risks associated with the application of fire limits its use and reduces agency support for prescribed burning in the private sector. As a result, considerably less cost-share support is given for prescribed fire compared to mechanical techniques. This study tests the general perception that fire is a riskier technique relative to other land management options. Due to the lack of data available to directly test this notion, we use a combination of approaches including 1) a comparison of fatalities resulting from different occupations that are proxies for techniques employed in land management, 2) a comparison of fatalities resulting from wildland fire versus prescribed fire, and 3) an exploration of causal factors responsible for wildland fire-related fatalities. This approach establishes a first approximation of the relative risk of fatality to private citizens using prescribed fire compared to other management techniques that are readily used in ecosystem management. Our data do not support using risks of landowner fatalities as justification for the use of alternative land management techniques, such as mechanical (machine-related) equipment, over prescribed fire. Vehicles and heavy machinery are consistently leading reasons for fatalities within occupations selected as proxies for management techniques employed by ranchers and agricultural producers, and also constitute a large proportion of fatalities among firefighters. Our study provides the foundation for agencies to establish data-driven decisions regarding the degree of support they provide for prescribed burning on private lands.
Twidwell, Dirac; Wonkka, Carissa L.; Sindelar, Michael T.; Weir, John R.
2015-01-01
Fire is widely recognized as a critical ecological and evolutionary driver that needs to be at the forefront of land management actions if conservation targets are to be met. However, the prevailing view is that prescribed fire is riskier than other land management techniques. Perceived risks associated with the application of fire limits its use and reduces agency support for prescribed burning in the private sector. As a result, considerably less cost-share support is given for prescribed fire compared to mechanical techniques. This study tests the general perception that fire is a riskier technique relative to other land management options. Due to the lack of data available to directly test this notion, we use a combination of approaches including 1) a comparison of fatalities resulting from different occupations that are proxies for techniques employed in land management, 2) a comparison of fatalities resulting from wildland fire versus prescribed fire, and 3) an exploration of causal factors responsible for wildland fire-related fatalities. This approach establishes a first approximation of the relative risk of fatality to private citizens using prescribed fire compared to other management techniques that are readily used in ecosystem management. Our data do not support using risks of landowner fatalities as justification for the use of alternative land management techniques, such as mechanical (machine-related) equipment, over prescribed fire. Vehicles and heavy machinery are consistently leading reasons for fatalities within occupations selected as proxies for management techniques employed by ranchers and agricultural producers, and also constitute a large proportion of fatalities among firefighters. Our study provides the foundation for agencies to establish data-driven decisions regarding the degree of support they provide for prescribed burning on private lands. PMID:26465329
The Groningen Protocol: what is it, how do the Dutch use it, and do we use it here?
Catlin, Anita; Novakovich, Renee
2008-01-01
In this article, a sensitive, complex and provocative issue is discussed. It will undoubtedly stimulate a variety of opinions. What do you think? Post your comments about this topic on the Pediatric Nursing Web site and read what others have to say as well. Visit our homepage at www.pediatricnursing.net and click on "Discussions." The opinions and assertions contained herein are the private views of the contributors and do not necessarily reflect the views of Pediatric Nursing or the publisher.
Clinical Space Medicine Products as Developed by the Medical Operations Support Team (MOST)
NASA Technical Reports Server (NTRS)
Polk, James D.; Doerr, Harold K.; Hurst, Victor W., IV; Schmid, Josef
2007-01-01
Medical Operations Support Team (MOST) is introducing/integrating teaching practices associated with high fidelity human patient simulation into the NASA culture, in particular, into medical training sessions and medical procedure evaluations. Current/Future Products iclude: a) Development of Sub-optimal Airway Protocols for the International Space Station (ISS) using the ILMA; b) Clinical Core Competency Training for NASA Flight Surgeons (FS); c) Post-Soyuz Landing Clinical Training for NASA FS; d) Experimental Integrated Training for Astronaut Crew Medical Officers and NASA FS; and e) Private Clinical Refresher Training.
Making the decoy-state measurement-device-independent quantum key distribution practically useful
NASA Astrophysics Data System (ADS)
Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin
2016-04-01
The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
Cache-based error recovery for shared memory multiprocessor systems
NASA Technical Reports Server (NTRS)
Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.
1989-01-01
A multiprocessor cache-based checkpointing and recovery scheme for of recovering from transient processor errors in a shared-memory multiprocessor with private caches is presented. New implementation techniques that use checkpoint identifiers and recovery stacks to reduce performance degradation in processor utilization during normal execution are examined. This cache-based checkpointing technique prevents rollback propagation, provides for rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions that take error latency into account are presented.
COMPARISON OF CFC-114 AND HFC-236EA PERFORMANCE IN SHIPBOARD VAPOR COMPRESSION SYSTEMS
The report gives results of a comparison of the performance of two refrigerants - 1,1,1,2,3,3-hexafluoropropane (HFC-236ea) and 1,2-dichloro-tetrafluoroethane (CFC-114) - in shipboard vapor compression refrigeration systems. (NOTE: In compliance with the Montreal Protocol and Dep...
Education's Love-Hate Relationship.
ERIC Educational Resources Information Center
Hay, Tina M.
1992-01-01
Although higher education institutions dislike rankings published in the mass media, they like the attention the rankings create and prefer to be included rather than excluded. Common criticisms of the methodology include emphasis on inappropriate criteria, unfair comparison of private and public institutions, faulty assumptions, inaccurate data,…
2004-03-01
Narratives Phenomenologies Ethnographies Grounded Theory Case Studies Mixed Methods Sequential Concurrent Transformative Creswell... ethnographies , grounded theory studies and case studies (Creswell, 2003:18). The methods used in qualitative study provide the framework for...Definition Grounded theory provides a structured
Hastrup, N; Hou-Jensen, K
1993-11-01
This study reviews a total of 1000 melanocytic lesions--two separate 500 consecutive sample groupings from 1980 and 1989, respectively--diagnosed in a private non-hospital-associated pathology practice. Lesions were classified as lentigo simplex, congenital nevus, "common" nevus, dysplastic nevus, blue nevus, Spitz's nevus or malignant melanoma. A comparison of the two periods reveals an increase in dysplastic nevi from one in 1980 to nine in 1989. The histologic changes in these nevi were compared to those of the other tumors. Pronounced cytologic atypia was seen in the melanocytes of a few "common" nevi, but more often in the dysplastic nevi and in all of the melanomas. Slight nuclear atypia was usual in "common" nevi and lentigines, and also fibroplasia, lymphocytic infiltration, vessel proliferation and pigment incontinence were seen in both "common" nevi and dysplastic nevi. It is concluded that no single histologic variable was specific for dysplastic nevi.
Telehealth Protocol to Prevent Readmission Among High-Risk Patients With Congestive Heart Failure.
Rosen, Daniel; McCall, Janice D; Primack, Brian A
2017-11-01
Congestive heart failure is the leading cause of hospital readmissions. We aimed to assess adherence to and effectiveness of a telehealth protocol designed to prevent hospital admissions for congestive heart failure. We recruited a random sample of 50 patients with congestive heart failure (mean age 61 years) from a managed care organization. We developed a telehealth platform allowing for daily, real-time reporting of health status and video conferencing. We defined adherence as the percentage of days on which the patient completed the daily check-in protocol. To assess efficacy, we compared admission and readmission rates between the 6-month intervention period and the prior 6 months. Primary outcomes were admissions and readmissions due to congestive heart failure, and secondary outcomes were admissions and readmissions due to any cause. Forty-eight patients (96%) completed the protocol. Approximately half (46%) were at high risk for readmission according to standardized measures. Median 120-day adherence was 96% (interquartile range, 92%-98%), and adherence did not significantly differ across sex, race, age, living situation, depression, cognitive ability, or risk for readmission. Approximately equal proportions of patients were admitted for all causes during the 6-month intervention period versus the comparison period (37% vs 43%; P = .32). Half as many patients were admitted for congestive heart failure during the 6-month intervention period compared with the comparison period (12% vs 25%; P = .11). Adherence to this telehealth protocol was excellent and consistent, even among high-risk patients. Future research should test the protocol using a more rigorous randomized design. Copyright © 2017 Elsevier Inc. All rights reserved.
Quality assurance strategies for investigating IAQ problems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Collett, C.W.; Ross, J.A.; Sterling, E.M.
Thousands of buildings have now been investigated throughout North America and western Europe. The evaluative strategies and protocols used by various investigators have been described in the scientific and protocols used by various investigators have been described in the scientific and technical literature, including those used by government agencies, private consultants, researchers, and physicians. Review of these strategies shows a consistency and commonly in approach, despite differences in terminology and organization. Most of the published protocols recognize the need to employ a multidisciplinary approach to the evaluation of indoor environmental problems, an approach that views buildings as complex, dynamic systems.more » The multidisciplinary approaches advocated by investigators gather information about the physical building (architectural), the mechanical systems that control indoor environmental conditions (engineering), the type and extent of occupant health and comfort concerns (medical), the objective quality of the air (industrial hygiene) and the occupants subjective perceptions of conditions in their work environment (social science). These components have generally been organized into a series of steps or phases, with each phase extending the information gathered from the preceding phase until a point when the causes of problems may be identified.« less
Design and implementation of a high performance network security processor
NASA Astrophysics Data System (ADS)
Wang, Haixin; Bai, Guoqiang; Chen, Hongyi
2010-03-01
The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.
Computational Biology Methods for Characterization of Pluripotent Cells.
Araúzo-Bravo, Marcos J
2016-01-01
Pluripotent cells are a powerful tool for regenerative medicine and drug discovery. Several techniques have been developed to induce pluripotency, or to extract pluripotent cells from different tissues and biological fluids. However, the characterization of pluripotency requires tedious, expensive, time-consuming, and not always reliable wet-lab experiments; thus, an easy, standard quality-control protocol of pluripotency assessment remains to be established. Here to help comes the use of high-throughput techniques, and in particular, the employment of gene expression microarrays, which has become a complementary technique for cellular characterization. Research has shown that the transcriptomics comparison with an Embryonic Stem Cell (ESC) of reference is a good approach to assess the pluripotency. Under the premise that the best protocol is a computer software source code, here I propose and explain line by line a software protocol coded in R-Bioconductor for pluripotency assessment based on the comparison of transcriptomics data of pluripotent cells with an ESC of reference. I provide advice for experimental design, warning about possible pitfalls, and guides for results interpretation.
Jonker, Dirk; Gustafsson, Ewa; Rolander, Bo; Arvidsson, Inger; Nordander, Catarina
2015-01-01
A new health surveillance protocol for work-related upper-extremity musculoskeletal disorders has been validated by comparing the results with a reference protocol. The studied protocol, Health Surveillance in Adverse Ergonomics Conditions (HECO), is a new version of the reference protocol modified for application in the Occupational Health Service (OHS). The HECO protocol contains both a screening part and a diagnosing part. Sixty-three employees were examined. The screening in HECO did not miss any diagnosis found when using the reference protocol, but in comparison to the reference protocol considerable time savings could be achieved. Fair to good agreement between the protocols was obtained for one or more diagnoses in neck/shoulders (86%, k = 0.62) and elbow/hands (84%, k = 0.49). Therefore, the results obtained using the HECO protocol can be compared with a reference material collected with the reference protocol, and thus provide information of the magnitude of disorders in an examined work group. Practitioner Summary: The HECO protocol is a relatively simple physical examination protocol for identification of musculoskeletal disorders in the neck and upper extremities. The protocol is a reliable and cost-effective tool for the OHS to use for occupational health surveillance in order to detect workplaces at high risk for developing musculoskeletal disorders. PMID:25761380
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Out-of-pocket expenses for maternity care in rural Bangladesh: a public-private comparison.
Rahman, Moshiur; Rob, Ubaidur; Noor, Forhana Rahman; Bellows, Benjamin
Out-of-pocket expenses incurred by women for availing maternal healthcare services at public and private health facilities in Bangladesh were examined using a baseline household survey evaluating the impact of demand side financing vouchers on utilization and service delivery for maternal healthcare. The survey was conducted in 2010 among 3,300 women who gave birth in the previous 12 months from the start of data collection. Information on costs incurred to receive antenatal, delivery, and postnatal care services was collected. Findings reveal that the majority of women reported paying out-of-pocket expenses for availing maternal healthcare services both at public and private health facilities. Out-of-pocket expenses include registration, consultation, laboratory examination, medicine, transportation, and other associated costs incurred for receiving maternal healthcare services. On average, women paid US$3.60 out-of-pocket expenses for receiving antenatal care at public health facilities and US$12.40 at private health facilities. Similarly, women paid one and half times more for normal (US$42.30) and cesarean deliveries (US$136.20) at private health facilities compared to public health facilities. On the other hand, costs for postnatal care services did not vary significantly between public and private health facilities. Utilization of maternal healthcare services can be improved if out-of-pocket expenses can be minimized. At the same time, effective demand generation strategies are necessary to encourage women to utilize health facilities.
O'Grady, Catherine L; Surratt, Hilary L; Kurtz, Steven P; Levi-Minzi, Maria A
2014-02-04
Little is known regarding the demographic and behavioral characteristics of nonmedical prescription drug users (NMPDUs) entering substance abuse treatment settings, and information on the HIV-related risk profiles of NMPDUs is especially lacking. Participation in substance abuse treatment provides a critical opportunity for HIV prevention and intervention, but successful initiatives will require services appropriately tailored for the needs of NMPDUs. This paper compares the HIV risk profiles of NMPDUs in public (n = 246) and private (n = 249) treatment facilities. Participants included in the analysis reported five or more recent episodes of nonmedical prescription drug use, a prior HIV negative test result, and current enrollment in a substance abuse treatment facility. A standardized questionnaire was administered by trained interviewers with questions about demographics, HIV risk, and substance use. Private treatment clients were more likely to be non-Hispanic White, younger, and opioid and heroin users. Injection drug use was higher among private treatment clients, whereas public clients reported higher likelihood of trading or selling sex. Public treatment clients reported higher rates of HIV testing and availability at their treatment facilities compared to private clients. Findings suggest differing demographics, substance use patterns, profiles of HIV risk and access to HIV testing between the two treatment samples. Population tailored HIV interventions, and increased access to HIV testing in both public and private substance treatment centers, appear to be warranted.
Accessing files in an Internet: The Jade file system
NASA Technical Reports Server (NTRS)
Peterson, Larry L.; Rao, Herman C.
1991-01-01
Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.
Accessing files in an internet - The Jade file system
NASA Technical Reports Server (NTRS)
Rao, Herman C.; Peterson, Larry L.
1993-01-01
Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.
NASA Astrophysics Data System (ADS)
Evans, David J.
2002-11-01
The documentary standards defining internationally adopted methodologies and protocols for calibrating transducers used to measure vibration are currently developed under the International Organization for Standardization (ISO) Technical Committee 108 Sub Committee 3 (Use and calibration of vibration and shock measuring instruments). Recent revisions of the documentary standards on primary methods for the calibration of accelerometers used to measure rectilinear motion have been completed. These standards can be, and have been, used as references in the technical protocols of key international and regional comparisons between National Measurement Institutes (NMIs) on the calibration of accelerometers. These key comparisons are occurring in part as a result of the creation of the Mutual Recognition Arrangement between NMIs which has appendices that document the uncertainties, and the comparisons completed in support of the uncertainties, claimed by the National Laboratories that are signatories of the MRA. The measurements for the first international and the first Interamerican System of Metrology (SIM) regional key comparisons in vibration have been completed. These intercomparisons were promulgated via the relatively new Consultative Committee for Acoustics, Ultrasound and Vibration (CCAUV) of the International Committee for Weights and Measures (CIPM) and SIM Metrology Working Group (MWG) 9, respectively.
2017-01-01
Objectives To explore the challenges Health Information Technology (HIT) vendors face to satisfy the requirements for Meaningful Use (MU) and Electronic Laboratory Reporting (ELR) of reportable diseases to the public health departments in Kentucky. Methodology A survey was conducted of Health Information Exchange (HIE) vendors in Kentucky through the Kentucky Health Information Exchange (KHIE). The survey was cross-sectional. Data were collected between February and March 2014. Participants were recruited from KHIE vendors. Participants received online survey link and by email and asked to submit their responses. Vendors’ feedback were summarized and analyzed to identify their challenges. Out of the 55 vendors who received the survey, 35(63.64%) responded. Results Of the seven transport protocol options for ELR, vendors selected virtual private network (VPN) as the most difficult to implement (31.7%). Secure File Transfer Protocol (SFTP) was selected as preferred ELR transport protocol (31.4%). Most of the respondents, 80% responded that they do not have any challenge with the Health Level 7 (HL7) standard implementation guide required by MU for 2014 ELR certification. Conclusion The study found that the most difficult transport protocol to implement for ELR is VPN and if vendors have preference, they would use SFTP for ELR over KHIE choice of VPN and Simple Object Access Protocol (SOAP). KHIE vendors do not see any variability in what is reportable by different jurisdiction and also it is not difficult for them to detect what is reportable from one jurisdiction verse the other PMID:29403575
Mechanical versus manual manipulation for low back pain: An observational cohort study
Schneider, Michael J; Brach, Jennifer; Irrgang, James J.; Abbott, Katherine Verdolini; Wisniewski, Stephen R.; Delitto, Anthony
2010-01-01
Objective This is an observational prospective cohort study to explore the treatment effect of mechanical vs. manual manipulation for acute low back pain. Methods Ninety two patients with a history of acute low back pain were recruited from 3 private chiropractic offices, 2 of which utilized manual lumbar manipulation and 1 used mechanical instrument manipulation (Activator) as their primary modes of treatment. The chiropractors used their “treatment as usual” protocols for a maximum of 8 visits or 4 weeks, which ever occurred first. Primary outcome measures were changes in Numeric Pain Rating Scale (NPRS) and Oswestry Disability Index (ODI) scores from baseline to 4 weeks. The linear regression models were adjusted for baseline NPRS and ODI scores, age, and treatment expectancy. Results Comparison of baseline characteristics did not show any significant differences between the groups except for age (38.4 vs. 49.7 years; p < .001) and treatment expectancy (5.7 vs. 6.3; p = .003). Linear regression revealed significantly lower NPRS scores in the manual manipulation group at four weeks [β = −1.2; 95% CI (−2.1, −.28)] but no significant difference in ODI scores between the two groups at four weeks [β = 1.5; 95% CI (−8.3, 2.4)]. Treatment expectancy, but not age, was found to have a significant main effect on both NPRS and ODI scores at 4 weeks. Exploratory analysis of the clinical patterns of care between the clinicians revealed significant differences in treatment frequency, duration, modality and radiograph usage between the 2 cohorts. Conclusions This study highlights the challenges inherent with conducting research that allows for “treatment-as-usual”. The data and experience derived from this investigational study will be used to design a future randomized clinical trial in which tighter controls will be imposed on the treatment protocol. PMID:20350672
Some demographic issues affecting private health insurance.
Hanning, Brian
2004-01-01
There will be significant changes in the demography of persons with Private Health Insurance (PHI). Two methods of projecting PHI coverage are discussed in this paper. The first assumes the only factors affecting PHI coverage are demographic change and mortality and facilitates comparisons between actual and projected PHI coverage. The second projects the percentage of the population insured in each five year age cohort, and makes allowance for changes in PHI coverage due to all factors. Demographic change will increase Registered Health Benefit Organization (RHBO) premiums by 1.7% per annum. The role of these projections in analysing the effect of future premium increases on PHI retention rates is also discussed.
An Analysis of the Commercial and Industrial Type Activities Program within the United States Army.
1980-06-01
potential Federal Income Tax revenues which would be paid by the contractor are deducted from contracting-out costs. A tax table is provided in the CCH ...head of each federal agency. Past policy had been built on only one precept: reliance on the private sector. Revised A-76 provided a new guiding ...Comparisons To support the increased emphasis on economy of Govern- ment and contract performance, a comprehensive Cost Comparison Handbook ( CCH ) was prepared
[Audit of general hospitals and private surgical clinics in Israel].
Freund, Ruth; Dor, Michael; Lotan, Yoram; Haver, Eitan
2007-12-01
Supervision and inspection of medical facilities are among the responsibilities of the Ministry of Health (MOH) anchored in the "Public Health Act 1940". In order to implement the law, the General Medical Division of the MOH began the process of auditing hospitals and private surgical clinics prior to considering the reissue of their license. The audit aimed to implement the law, activate supervision on general hospitals and private surgical clinics, provide feed-back to the audited institution and upgrade quality assurance, regulate medical activities according to the activities elaborated in the license and recommend the license renewal. Prior to the audits, 20 areas of activity were chosen for inspection. For each activity a check list was developed as a tool for inspection. Each area was inspected during a 4-5 hour visit by a MOH expert, accompanied by the local service manager in the institution under inspection. A comprehensive report, summarizing the findings was sent to the medical institute, requesting correction in those areas where improvements were needed. Recommendation for license renewal was sent to the Director of Licensing Division Ministry of Health. Between June 2003 and July 2006, 91 structured audits took place. A total of 47 general hospitals and 24 private surgical clinics were visited at least once. Most general hospitals were found abiding, functioning according to the required standards and eligible for license renewal. Licenses of institutions that complied with the standards determined by the audit teams, were renewed. Two private hospitals in central Israel, that were given an overall poor evaluation, were issued with a temporary license and subsequently re-audited 4 times over the next two years. Generally, the standards in private surgical clinics were lower than those found in general public hospitals. In one clinic the license was not renewed, and in another an order was issued to cease surgical procedures requiring general anesthesia. The evaluations were mainly qualitative, deliberately avoiding numerical rating. In order to improve the process in the future and facilitate common scale rating to establish an equitable comparison system between institutions, it will be necessary to develop more quality measures and compulsory standards, based on the measures used during the first round of audits. Publication of the results of such comparisons, will elevate medical performance, and ultimately improve the quality of services and medical care in Israel.
Comparison of point intercept and image analysis for monitoring rangeland transects
USDA-ARS?s Scientific Manuscript database
Amidst increasing workloads and static or declining budgets, both public and private land management agencies face the need to adapt resource-monitoring techniques or risk falling behind on resource monitoring volume and quality with old techniques. Image analysis of nadir plot images, acquired with...
A Comparison of Findings from Projects Employing User-Side Subsidies for Taxi and Bus Travel
DOT National Transportation Integrated Search
1979-08-01
This paper presents results from 13 applications of user-side subsidies; in most cases as a means of improving the mobility of transit dependent persons. Examples of public and private providers, paratransit and fixed-route services, small to medium ...
ERIC Educational Resources Information Center
Plotnick, Robert D.
1997-01-01
Reviews programs for increasing earnings of parents with low market skills to prevent pretransfer poverty and discusses three types of income supplementation (public cash transfers, private child support payments, and tax credits) and how successful they are in reducing poverty. Also provides international comparisons of policies to reduce child…
12 CFR 1770.1 - Authority and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... used for comparison purposes include publicly held financial institutions or major financial services... Housing Enterprises Financial Safety and Soundness Act of 1992 (“the Act”) (12 U.S.C. 4501 et seq... benefits that are comparable to benefits provided by other public or private entities involved in financial...
Learners' Uses of Two Types of Written Feedback on a L2 Writing Revision Task
ERIC Educational Resources Information Center
Sachs, Rebecca; Polio, Charlene
2007-01-01
This study examines the effectiveness of written error corrections versus reformulations of second language learners' writing as two means of improving learners' grammatical accuracy on a three-stage composition-comparison-revision task. Concurrent verbal protocols were employed during the comparison stage in order to study the learners' reported…
Application of Game Theory Approaches in Routing Protocols for Wireless Networks
NASA Astrophysics Data System (ADS)
Javidi, Mohammad M.; Aliahmadipour, Laya
2011-09-01
An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.
Davey, Sanjeev; Raghav, Santosh Kumar; Singh, Jai Vir; Davey, Anuradha; Singh, Nirankar
2015-01-01
Background: The evaluation of primary healthcare services provided by health training centers of a private medical college has not been studied in comparison with government health facilities in Indian context. Data envelopment analysis (DEA) is one such technique of operations research, which can be used on health facilities for identifying efficient operating practices and strategies for relatively efficient or inefficient health centers by calculating their efficiency scores. Materials and Methods: This study was carried out by DEA technique by using basic radial models (constant ratio to scale (CRS)) in linear programming via DEAOS free online Software among four decision making units (DMUs; by comparing efficiency of two private health centers of a private medical college of India with two public health centers) in district Muzaffarnagar of state Uttar Pradesh. The input and output records of all these health facilities (two from private and two from Government); for 6 months duration from 1st Jan 2014 to 1st July 2014 was taken for deciding their efficiency scores. Results: The efficiency scores of primary healthcare services in presence of doctors (100 vs 30%) and presence of health staff (100 vs 92%) were significantly better from government health facilities as compared to private health facilities (P < 0.0001). Conclusions: The evaluation of primary healthcare services delivery by DEA technique reveals that the government health facilities group were more efficient in delivery of primary healthcare services as compared to private training health facilities group, which can be further clarified in by more in-depth studies in future. PMID:26435598
Contracting with private providers for primary care services: evidence from urban China.
Wang, Yan; Eggleston, Karen; Yu, Zhenjie; Zhang, Qiong
2013-01-17
Controversy surrounds the role of the private sector in health service delivery, including primary care and population health services. China's recent health reforms call for non-discrimination against private providers and emphasize strengthening primary care, but formal contracting-out initiatives remain few, and the associated empirical evidence is very limited. This paper presents a case study of contracting with private providers for urban primary and preventive health services in Shandong Province, China. The case study draws on three primary sources of data: administrative records; a household survey of over 1600 community residents in Weifang and City Y; and a provider survey of over 1000 staff at community health stations (CHS) in both Weifang and City Y. We supplement the quantitative data with one-on-one, in-depth interviews with key informants, including local officials in charge of public health and government finance.We find significant differences in patient mix: Residents in the communities served by private community health stations are of lower socioeconomic status (more likely to be uninsured and to report poor health), compared to residents in communities served by a government-owned CHS. Analysis of a household survey of 1013 residents shows that they are more willing to do a routine health exam at their neighborhood CHS if they are of low socioeconomic status (as measured either by education or income). Government and private community health stations in Weifang did not statistically differ in their performance on contracted dimensions, after controlling for size and other CHS characteristics. In contrast, the comparison City Y had lower performance and a large gap between public and private providers. We discuss why these patterns arose and what policymakers and residents considered to be the main issues and concerns regarding primary care services.
Benova, Lenka; Macleod, David; Footman, Katharine; Cavallaro, Francesca; Lynch, Caroline A; Campbell, Oona M R
2015-12-01
Maternal mortality rates have decreased globally but remain off track for Millennium Development Goals. Good-quality delivery care is one recognised strategy to address this gap. This study examines the role of the private (non-public) sector in providing delivery care and compares the equity and quality of the sectors. The most recent Demographic and Health Survey (2000-2013) for 57 countries was used to analyse delivery care for most recent birth among >330 000 women. Wealth quintiles were used for equity analysis; skilled birth attendant (SBA) and Caesarean section rates served as proxies for quality of care in cross-sectoral comparisons. The proportion of women who used appropriate delivery care (non-facility with a SBA or facility-based births) varied across regions (49-84%), but wealth-related inequalities were seen in both sectors in all regions. One-fifth of all deliveries occurred in the private sector. Overall, 36% of deliveries with appropriate care occurred in the private sector, ranging from 9% to 46% across regions. The presence of a SBA was comparable between sectors (≥93%) in all regions. In every region, Caesarean section rate was higher in the private compared to public sector. The private sector provided between 13% (Latin America) and 66% (Asia) of Caesarean section deliveries. This study is the most comprehensive assessment to date of coverage, equity and quality indicators of delivery care by sector. The private sector provided a substantial proportion of delivery care in low- and middle-income countries. Further research is necessary to better understand this heterogeneous group of providers and their potential to equitably increase the coverage of good-quality intrapartum care. © 2015 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.
AN ANALYSIS OF THE INEQUALITIES BETWEEN THE PUBLIC AND PRIVATE SECTOR IN SOUTH AFRICA.
Dell, A; Kahn, D; Klopper, J
2017-09-01
The full extent of the global burden of surgical disease is largely unknown, however, the scope of the problem is thought to be large. Despite the substantial burden of surgical disease, surgical services are inaccessible to many of those who need them most. There are disparities between public and private sectors in South Africa, which compounds inequitable access to surgical care. This study involved a descriptive analysis of surgical resources and included the total number of hospitals, of hospital beds, the number of surgical beds, the number of general surgeons (specialist and non-specialist), and the number of functional operating theatres in South Africa. A comparison was performed between the public and private sectors. Hospitals were contacted during the period from the 1st October 2014 until the 31st of December 2014. Surgical resources were concentrated in metropolitan areas of urban provinces. There were striking differences between the public and private sectors, where private resources were comparable to those available in high income countries (HICs). Improving access to surgical services in lower middle income countries (LMICs) requires addressing gaps between the public and private sector regarding infrastructure, personnel, as well as equipment. South Africa is unique in that although it is classified as an upper middle income country (UMIC), is comprises of two sectors; a public sector which has resources similar to other LMICs, and a private sector which has resources similar to HICs. These data identified disparities between geographic regions which may be contributing to ongoing inequity in South Africa, and by doing so allows for evidence-based planning towards improving surgical infrastructure and workforce.
Contracting with private providers for primary care services: evidence from urban China
2013-01-01
Controversy surrounds the role of the private sector in health service delivery, including primary care and population health services. China’s recent health reforms call for non-discrimination against private providers and emphasize strengthening primary care, but formal contracting-out initiatives remain few, and the associated empirical evidence is very limited. This paper presents a case study of contracting with private providers for urban primary and preventive health services in Shandong Province, China. The case study draws on three primary sources of data: administrative records; a household survey of over 1600 community residents in Weifang and City Y; and a provider survey of over 1000 staff at community health stations (CHS) in both Weifang and City Y. We supplement the quantitative data with one-on-one, in-depth interviews with key informants, including local officials in charge of public health and government finance. We find significant differences in patient mix: Residents in the communities served by private community health stations are of lower socioeconomic status (more likely to be uninsured and to report poor health), compared to residents in communities served by a government-owned CHS. Analysis of a household survey of 1013 residents shows that they are more willing to do a routine health exam at their neighborhood CHS if they are of low socioeconomic status (as measured either by education or income). Government and private community health stations in Weifang did not statistically differ in their performance on contracted dimensions, after controlling for size and other CHS characteristics. In contrast, the comparison City Y had lower performance and a large gap between public and private providers. We discuss why these patterns arose and what policymakers and residents considered to be the main issues and concerns regarding primary care services. PMID:23327666
NASA Astrophysics Data System (ADS)
Sternberg, Ernest
1990-01-01
Photonics arose in the 1980s as a revolutionary technological development encompassing lasers, fiber optics, sensing devices, imaging systems, and optical applications in computing. It achieved worldwide commercial significance, affecting the productive activities of numerous industries. Despite considerable domestic investment, US industrial performance in the technology deteriorated in comparison to that of other nations, particularly Japan. This study examines the US public policy response to photonics. Photonics exemplifies a technological paradigm with integral properties: it comprises a body of knowledge and skill, systems of technical devices, and sets of technological interrelationships among industrial sectors. This study argues that private firms in themselves respond inefficiently to such technological interdependencies. Firms would operate more efficiently in the presence of industrial policies that recognize the integral properties of technology and plan for massive technological changes in the economy. Amid a widespread rejection of industrial policy as faulty economics, the US response to photonics occurred not through explicit policy but through a privatization of policy making. This privatization relegated technology policy making to private and unaccountable realms. Privatization took three forms. First, through disaggregation, government dispersed assets to interested parties through pork-barrel appropriations, business participation in agency operations, and review committees representing eventual beneficiaries. Second, through collaboration, committees of university faculty and corporate affiliates made technology policy decisions. Third, through sheltering, technological research was conducted under the military establishment. Privatization made for debilitating policy. Operating in the absence of vision, strategy, or plan, it failed to respond to the integral characteristics of photonics understood as a technological paradigm. US industrial retrogression in photonics reflected the domestic policy making inability to respond coherently to technological change.
Torabipour, Amin; Gharacheh, Laleh; Lorestani, Leila; Salehi, Reza
2017-09-01
Responsiveness is a main goal of health systems. Responsiveness focus on the non-medical aspects of health services delivery. This study was aimed to assess responsiveness level in public and private physiography clinics. In this multicenter cross sectional study, 403 patients refers to 16 public and 64 private physical therapy clinics were studied randomly in Ahvaz, Iran, from 2013 to 2014. Data were collected based on a valid health system responsiveness questionnaire that was developed by WHO. Health system responsiveness questionnaire for outpatients care includes seven components and 25 questions. Statistical relationship between responsiveness level of centers and patients characteristics was analyzed using Pearson coefficient, Independent t-test and one-way ANOVA. Out of 403 patients, 299 (74.19%) patients were women. The mean (±SD) age of the patients was 42(±14.18) years and 92.1% of patients were 65> years. Responsiveness status in private and public physiotherapy clinics was assessed excellent (26.93±5.2) and very well (21.08±5.8) respectively. In private clinics, the mean score of communication dimension (3.96±1) and autonomy dimension (3.95±0.9) was higher than other dimensions. In public clinics the mean score of dignity (3.30±0.8), autonomy (3.16±0.9), and prompt attention (3.12±1) was higher than other areas respectively. In public and private clinics, quality of basic amenities area had the lowest score. The results showed that the some patients and center characteristics such as gender and work shift were factors affecting assessment of responsiveness. Responsiveness level in private centers was better than publics.
Comparison of thromboprophylaxis patterns in arthroplasty in public and private hospitals
Cortada, Aline Pinheiro dos Santos; da Silva, Telma Gomes; da Silva, André Campos; Golmia, Ricardo Prado; Guerra, Renata Leborato; Takemoto, Maíra Libertad Soligo; Monteiro, Roberta Dyonisio Canaveira; Scheinberg, Morton Aaron
2015-01-01
Objective To compare therapy for prophylaxis of venous thromboembolism and costs related to hospitalization of patients undergoing total knee and hip replacement within the context of the Brazilian health system. Methods A retrospective study of patients undergoing arthroplasty in 2010 in a public hospital and two private hospitals in the state of São Paulo, conducted by means of medical record review. Costs were estimated based on the use of health care resources during hospitalization. A descriptive analysis was performed using frequency and mean (standard deviation) according to the type of care delivered (by public or private organization). Results A total of 215 patients were evaluated, and 56.3% were submitted to knee surgery and 43.7%, to hip replacement. Approximately 88% and 98% of patients from public and private health services, respectively, received some form of venous thromboembolism prophylaxis, and enoxaparin was the drug most widely used in both systems. The total cost of prophylaxis was R$ 1,873.01 (R$ 26.38 per patient) in the public service and R$ 21,559.73 (R$ 163.33 per patient) in the private service. For the individuals who presented with thromboembolism, the average cost of hospitalization was R$ 6,210.80 and R$ 43,792.59 per patient in public and private health services, respectively. Conclusion Thromboembolism prophylaxis in patients undergoing arthroplasty is most commonly used in the private health services than public organizations, despite its high costs in both services. The cost per patient with thrombosis during hospitalization was higher than the total cost of prophylaxis, suggesting that prevention is associated to better cost-benefit ratio. PMID:26313439
Kawaguchi, Naoto; Kurata, Akira; Kido, Teruhito; Nishiyama, Yoshiko; Kido, Tomoyuki; Miyagawa, Masao; Ogimoto, Akiyoshi; Mochizuki, Teruhito
2014-01-01
The purpose of this study was to evaluate a personalized protocol with diluted contrast material (CM) for coronary computed tomography angiography (CTA). One hundred patients with suspected coronary artery disease underwent retrospective electrocardiogram-gated coronary CTA on a 256-slice multidetector-row CT scanner. In the diluted CM protocol (n=50), the optimal scan timing and CM dilution rate were determined by the timing bolus scan, with 20% CM dilution (5ml/s during 10s) being considered suitable to achieve the target arterial attenuation of 350 Hounsfield units (HU). In the body weight (BW)-adjusted protocol (n=50, 222mg iodine/kg), only the optimal scan timing was determined by the timing bolus scan. The injection rate and volume in the timing bolus scan and real scan were identical between the 2 protocols. We compared the means and variations in coronary attenuation between the 2 protocols. Coronary attenuation (mean±SD) in the diluted CM and BW-adjusted protocols was 346.1±23.9 HU and 298.8±45.2 HU, respectively. The diluted CM protocol provided significantly higher coronary attenuation and lower variance than did the BW-adjusted protocol (P<0.05, in each). The diluted CM protocol facilitates more uniform attenuation on coronary CTA in comparison with the BW-adjusted protocol.
Aguiar, L. F.; Cunha, G. S. P.; Cardinot, N.; Lucena, E.
2014-01-01
The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate. PMID:25763398
Gabr, Mahmoud M; Zakaria, Mahmoud M; Refaie, Ayman F; Khater, Sherry M; Ashamallah, Sylvia A; Ismail, Amani M; El-Badri, Nagwa; Ghoneim, Mohamed A
2014-01-01
Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), and β -mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. By immunolabeling, the proportion of generated IPCs was modest ( ≃ 3%) in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.
Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F
2018-03-22
To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.
NASA Astrophysics Data System (ADS)
Emmerson, S. R.; Veeraraghavan, M.; Chen, S.; Ji, X.
2015-12-01
Results of a pilot deployment of a major new version of the Unidata Local Data Manager (LDM-7) are presented. The Unidata LDM was developed by the University Corporation for Atmospheric Research (UCAR) and comprises a suite of software for the distribution and local processing of data in near real-time. It is widely used in the geoscience community to distribute observational data and model output, most notably as the foundation of the Unidata Internet Data Distribution (IDD) system run by UCAR, but also in private networks operated by NOAA, NASA, USGS, etc. The current version, LDM-6, uses at least one unicast TCP connection per receiving host. With over 900 connections, the bit-rate of total outgoing IDD traffic from UCAR averages approximately 3.0 GHz, with peak data rates exceeding 6.6 GHz. Expected increases in data volume suggest that a more efficient distribution mechanism will be required in the near future. LDM-7 greatly reduces the outgoing bandwidth requirement by incorporating a recently-developed "semi-reliable" IP multicast protocol while retaining the unicast TCP mechanism for reliability. During the summer of 2015, UCAR and the University of Virginia conducted a pilot deployment of the Unidata LDM-7 among U.S. university participants with access to the Internet2 network. Results of this pilot program, along with comparisons to the existing Unidata LDM-6 system, are presented.
A standardized test battery for the study of synesthesia
Eagleman, David M.; Kagan, Arielle D.; Nelson, Stephanie S.; Sagaram, Deepak; Sarma, Anand K.
2014-01-01
Synesthesia is an unusual condition in which stimulation of one modality evokes sensation or experience in another modality. Although discussed in the literature well over a century ago, synesthesia slipped out of the scientific spotlight for decades because of the difficulty in verifying and quantifying private perceptual experiences. In recent years, the study of synesthesia has enjoyed a renaissance due to the introduction of tests that demonstrate the reality of the condition, its automatic and involuntary nature, and its measurable perceptual consequences. However, while several research groups now study synesthesia, there is no single protocol for comparing, contrasting and pooling synesthetic subjects across these groups. There is no standard battery of tests, no quantifiable scoring system, and no standard phrasing of questions. Additionally, the tests that exist offer no means for data comparison. To remedy this deficit we have devised the Synesthesia Battery. This unified collection of tests is freely accessible online (http://www.synesthete.org). It consists of a questionnaire and several online software programs, and test results are immediately available for use by synesthetes and invited researchers. Performance on the tests is quantified with a standard scoring system. We introduce several novel tests here, and offer the software for running the tests. By presenting standardized procedures for testing and comparing subjects, this endeavor hopes to speed scientific progress in synesthesia research. PMID:16919755
Rosapep, Lauren; Sanders, Emily; Banke, Kathryn
2017-05-01
In 2004, the World Health Organization (WHO) and United Nations Children's Fund (UNICEF) jointly revised the recommended treatment for acute paediatric diarrhoea to specify supplementing reduced osmolarity oral rehydration salts (ORS) with zinc. In many countries, however, a significant knowledge-practice gap persists in appropriate diarrhoea management among private healthcare providers. For example, the United States Agency for International Development (USAID)-funded Strengthening Health Outcomes through the Private Sector (SHOPS) project recently demonstrated that over-the-counter medicine sellers (MS) in Ghana recommended inappropriate diarrhoea treatments, despite their demonstrated knowledge of appropriate treatment protocols. To explore and explain these results, we conducted 26 focus groups with MS and their customers using an indirect elicitation approach, presenting simulated drug shop transaction scenarios for each group to analyze and discuss. Through inductive and deductive data analysis, we found that the pattern of customer-MS interactions within the transactional context plays a critical role in shaping dispensing outcomes, not only in diarrhoea management but in other contexts as well. MS who engaged and negotiated with their customers were better able to introduce and promote the appropriate diarrhoea treatment protocol. Several factors hinder optimal interactions. Although MS in fact serve as frontline medical providers, they lack the perceived status of a clinician. Moreover, the need to maintain their customer base creates a power imbalance that favours accommodating customer requests and discourages educational interaction. Finally, many MS lack a complete understanding of the recommended treatment, limiting their ability to educate and negotiate. These findings have important implications for efforts to position community-level private providers to improve outcomes across a number of health areas; the study recommends three broad approaches related to training design, marketing, and professional linkages. More generally, behaviour change initiatives should recognize the potential impact of provider interaction dynamics in facilitating or impeding desired health outcomes. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Auto-Configuration Protocols in Mobile Ad Hoc Networks
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Enhanced just-in-time plus protocol for optical burst switching networks
NASA Astrophysics Data System (ADS)
Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.
2010-07-01
We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675