Expression and analysis of exogenous proteins in epidermal cells.
Dagnino, Lina; Ho, Ernest; Chang, Wing Y
2010-01-01
In this chapter we review protocols for transient transfection of primary keratinocytes. The ability to transfect primary epidermal cells regardless of their differentiation status allows the biochemical and molecular characterization of multiple proteins. We review methods to analyze exogenous protein abundance in transfected keratinocytes by immunoblot and immunoprecipitation. We also present protocols to determine the subcellular distribution of these proteins by indirect immunofluorescence microscopy approaches.
On entropy change measurements around first order phase transitions in caloric materials.
Caron, Luana; Ba Doan, Nguyen; Ranno, Laurent
2017-02-22
In this work we discuss the measurement protocols for indirect determination of the isothermal entropy change associated with first order phase transitions in caloric materials. The magneto-structural phase transitions giving rise to giant magnetocaloric effects in Cu-doped MnAs and FeRh are used as case studies to exemplify how badly designed protocols may affect isothermal measurements and lead to incorrect entropy change estimations. Isothermal measurement protocols which allow correct assessment of the entropy change around first order phase transitions in both direct and inverse cases are presented.
A protocol for lifetime energy and environmental impact assessment of building insulation materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shrestha, Som S., E-mail: shresthass@ornl.gov; Biswas, Kaushik; Desjarlais, Andre O.
This article describes a proposed protocol that is intended to provide a comprehensive list of factors to be considered in evaluating the direct and indirect environmental impacts of building insulation materials, as well as detailed descriptions of standardized calculation methodologies to determine those impacts. The energy and environmental impacts of insulation materials can generally be divided into two categories: (1) direct impact due to the embodied energy of the insulation materials and other factors and (2) indirect or environmental impacts avoided as a result of reduced building energy use due to addition of insulation. Standards and product category rules exist,more » which provide guidelines about the life cycle assessment (LCA) of materials, including building insulation products. However, critical reviews have suggested that these standards fail to provide complete guidance to LCA studies and suffer from ambiguities regarding the determination of the environmental impacts of building insulation and other products. The focus of the assessment protocol described here is to identify all factors that contribute to the total energy and environmental impacts of different building insulation products and, more importantly, provide standardized determination methods that will allow comparison of different insulation material types. Further, the intent is not to replace current LCA standards but to provide a well-defined, easy-to-use comparison method for insulation materials using existing LCA guidelines. - Highlights: • We proposed a protocol to evaluate the environmental impacts of insulation materials. • The protocol considers all life cycle stages of an insulation material. • Both the direct environmental impacts and the indirect impacts are defined. • Standardized calculation methods for the ‘avoided operational energy’ is defined. • Standardized calculation methods for the ‘avoided environmental impact’ is defined.« less
A decentralized software bus based on IP multicas ting
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd
1995-01-01
We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.
Energy expenditure estimation during daily military routine with body-fixed sensors.
Wyss, Thomas; Mäder, Urs
2011-05-01
The purpose of this study was to develop and validate an algorithm for estimating energy expenditure during the daily military routine on the basis of data collected using body-fixed sensors. First, 8 volunteers completed isolated physical activities according to an established protocol, and the resulting data were used to develop activity-class-specific multiple linear regressions for physical activity energy expenditure on the basis of hip acceleration, heart rate, and body mass as independent variables. Second, the validity of these linear regressions was tested during the daily military routine using indirect calorimetry (n = 12). Volunteers' mean estimated energy expenditure did not significantly differ from the energy expenditure measured with indirect calorimetry (p = 0.898, 95% confidence interval = -1.97 to 1.75 kJ/min). We conclude that the developed activity-class-specific multiple linear regressions applied to the acceleration and heart rate data allow estimation of energy expenditure in 1-minute intervals during daily military routine, with accuracy equal to indirect calorimetry.
A Protocol for Lifetime Energy and Environmental Impact Assessment of Building Insulation Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shrestha, Som S; Biswas, Kaushik; Desjarlais, Andre Omer
This article describes a proposed protocol that is intended to provide a comprehensive list of factors to be considered in evaluating the direct and indirect environmental impacts of building insulation materials, as well as detailed descriptions of standardized calculation methodologies to determine those impacts. The energy and environmental impacts of insulation materials can generally be divided into two categories: (1) direct impact due to the embodied energy of the insulation materials and other factors, and (2) indirect or environmental impacts avoided as a result of reduced building energy use due to addition of insulation. Standards and product category rules existmore » that provide guidelines about the life cycle assessment (LCA) of materials, including building insulation products. However, critical reviews have suggested that these standards fail to provide complete guidance to LCA studies and suffer from ambiguities regarding the determination of the environmental impacts of building insulation and other products. The focus of the assessment protocol described here is to identify all factors that contribute to the total energy and environmental impacts of different insulation products and, more importantly, provide standardized determination methods that will allow comparison of different insulation material types. Further, the intent is not to replace current LCA standards but to provide a well-defined, easy-to-use comparison method for insulation materials using existing LCA guidelines.« less
Immunofluorescence Analysis of Endogenous and Exogenous Centromere-kinetochore Proteins
Niikura, Yohei; Kitagawa, Katsumi
2016-01-01
"Centromeres" and "kinetochores" refer to the site where chromosomes associate with the spindle during cell division. Direct visualization of centromere-kinetochore proteins during the cell cycle remains a fundamental tool in investigating the mechanism(s) of these proteins. Advanced imaging methods in fluorescence microscopy provide remarkable resolution of centromere-kinetochore components and allow direct observation of specific molecular components of the centromeres and kinetochores. In addition, methods of indirect immunofluorescent (IIF) staining using specific antibodies are crucial to these observations. However, despite numerous reports about IIF protocols, few discussed in detail problems of specific centromere-kinetochore proteins.1-4 Here we report optimized protocols to stain endogenous centromere-kinetochore proteins in human cells by using paraformaldehyde fixation and IIF staining. Furthermore, we report protocols to detect Flag-tagged exogenous CENP-A proteins in human cells subjected to acetone or methanol fixation. These methods are useful in detecting and quantifying endogenous centromere-kinetochore proteins and Flag-tagged CENP-A proteins, including those in human cells. PMID:26967065
Optimized in vitro procedure for assessing the cytocompatibility of magnesium-based biomaterials.
Jung, Ole; Smeets, Ralf; Porchetta, Dario; Kopp, Alexander; Ptock, Christoph; Müller, Ute; Heiland, Max; Schwade, Max; Behr, Björn; Kröger, Nadja; Kluwe, Lan; Hanken, Henning; Hartjen, Philip
2015-09-01
Magnesium (Mg) is a promising biomaterial for degradable implant applications that has been extensively studied in vitro and in vivo in recent years. In this study, we developed a procedure that allows an optimized and uniform in vitro assessment of the cytocompatibility of Mg-based materials while respecting the standard protocol DIN EN ISO 10993-5:2009. The mouse fibroblast line L-929 was chosen as the preferred assay cell line and MEM supplemented with 10% FCS, penicillin/streptomycin and 4mM l-glutamine as the favored assay medium. The procedure consists of (1) an indirect assessment of effects of soluble Mg corrosion products in material extracts and (2) a direct assessment of the surface compatibility in terms of cell attachment and cytotoxicity originating from active corrosion processes. The indirect assessment allows the quantification of cell-proliferation (BrdU-assay), viability (XTT-assay) as well as cytotoxicity (LDH-assay) of the mouse fibroblasts incubated with material extracts. Direct assessment visualizes cells attached to the test materials by means of live-dead staining. The colorimetric assays and the visual evaluation complement each other and the combination of both provides an optimized and simple procedure for assessing the cytocompatibility of Mg-based biomaterials in vitro. Copyright © 2015 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.
SpermCheck: a simplified screening assay for immunological infertility.
McClure, R D; Tom, R A; Watkins, M; Murthy, S
1989-10-01
SpermCheck (Bio-Rad Laboratories, Hercules, CA), a new screening test for regional surface antibodies on motile sperm, uses monodispersed latex microspheres of uniform size as a vehicle to link rabbit antihuman immunoglobulins (IgA, IgG, IgM) and provides both negative and positive control sera, as well as sufficient buffer for sperm preparation in ambient CO2 atmosphere. When compared with reference data available for the immunobead test (IBT), the direct protocol (semen) for SpermCheck yielded 94.4% sensitivity with 100% specificity; the indirect protocol (serum) provided a sensitivity of 100% with 94.7% specificity. The microspheres of SpermCheck maintain a nearly uniform concentration per volume, with none to negligible clumping. The greater difference between the optical densities of latex and cytoplasm allows use of a light microscope for the rapid assessment of the percent of regional binding rather than the phase-contrast microscope required for the IBT. SpermCheck eliminates many difficulties encountered with the IBT, making SpermCheck a convenient screening assay for use in the physician's office.
van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel
2014-06-25
The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed care was significantly associated with better process in terms of diabetes care, fewer secondary care consultations and lower health care costs. The same trends were seen for protocolized care, however they were not statistically significant. Current Controlled trials: ISRCTN66124817.
2014-01-01
Background The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. Methods In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Results Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Conclusions Compared to usual care, managed care was significantly associated with better process in terms of diabetes care, fewer secondary care consultations and lower health care costs. The same trends were seen for protocolized care, however they were not statistically significant. Trial registration Current Controlled trials: ISRCTN66124817. PMID:24966055
A scoping review of indirect comparison methods and applications using individual patient data.
Veroniki, Areti Angeliki; Straus, Sharon E; Soobiah, Charlene; Elliott, Meghan J; Tricco, Andrea C
2016-04-27
Several indirect comparison methods, including network meta-analyses (NMAs), using individual patient data (IPD) have been developed to synthesize evidence from a network of trials. Although IPD indirect comparisons are published with increasing frequency in health care literature, there is no guidance on selecting the appropriate methodology and on reporting the methods and results. In this paper we examine the methods and reporting of indirect comparison methods using IPD. We searched MEDLINE, Embase, the Cochrane Library, and CINAHL from inception until October 2014. We included published and unpublished studies reporting a method, application, or review of indirect comparisons using IPD and at least three interventions. We identified 37 papers, including a total of 33 empirical networks. Of these, only 9 (27 %) IPD-NMAs reported the existence of a study protocol, whereas 3 (9 %) studies mentioned that protocols existed without providing a reference. The 33 empirical networks included 24 (73 %) IPD-NMAs and 9 (27 %) matching adjusted indirect comparisons (MAICs). Of the 21 (64 %) networks with at least one closed loop, 19 (90 %) were IPD-NMAs, 13 (68 %) of which evaluated the prerequisite consistency assumption, and only 5 (38 %) of the 13 IPD-NMAs used statistical approaches. The median number of trials included per network was 10 (IQR 4-19) (IPD-NMA: 15 [IQR 8-20]; MAIC: 2 [IQR 3-5]), and the median number of IPD trials included in a network was 3 (IQR 1-9) (IPD-NMA: 6 [IQR 2-11]; MAIC: 2 [IQR 1-2]). Half of the networks (17; 52 %) applied Bayesian hierarchical models (14 one-stage, 1 two-stage, 1 used IPD as an informative prior, 1 unclear-stage), including either IPD alone or with aggregated data (AD). Models for dichotomous and continuous outcomes were available (IPD alone or combined with AD), as were models for time-to-event data (IPD combined with AD). One in three indirect comparison methods modeling IPD adjusted results from different trials to estimate effects as if they had come from the same, randomized, population. Key methodological and reporting elements (e.g., evaluation of consistency, existence of study protocol) were often missing from an indirect comparison paper.
Esthetic Rehabilitation of Anterior Teeth with Laminates Composite Veneers
Riva, Giancarlo
2014-01-01
No- or minimal-preparation veneers associated with enamel preservation offer predictable results in esthetic dentistry; indirect additive anterior composite restorations represent a quick, minimally invasive, inexpensive, and repairable option for a smile enhancement treatment plan. Current laboratory techniques associated with a strict clinical protocol satisfy patients' restorative and esthetic needs. The case report presented describes minimal invasive treatment of four upper incisors with laminate nanohybrid resin composite veneers. A step-by-step protocol is proposed for diagnostic evaluation, mock-up fabrication and trial, teeth preparation and impression, and adhesive cementation. The resolution of initial esthetic issues, patient satisfaction, and nice integration of indirect restorations confirmed the success of this anterior dentition rehabilitation. PMID:25013730
Ravelo, Kristine M; Andersen, Natalia D; Monje, Paula V
2018-01-01
To date, magnetic-activated cell sorting (MACS) remains a powerful method to isolate distinct cell populations based on differential cell surface labeling. Optimized direct and indirect MACS protocols for cell immunolabeling are presented here as methods to divest Schwann cell (SC) cultures of contaminating cells (specifically, fibroblast cells) and isolate SC populations at different stages of differentiation. This chapter describes (1) the preparation of single-cell suspensions from established human and rat SC cultures, (2) the design and application of cell selection strategies using SC-specific (p75 NGFR , O4, and O1) and fibroblast-specific (Thy-1) markers, and (3) the characterization of both the pre- and post-sorting cell populations. A simple protocol for the growth of hybridoma cell cultures as a source of monoclonal antibodies for cell surface immunolabeling of SCs and fibroblasts is provided as a cost-effective alternative for commercially available products. These steps allow for the timely and efficient recovery of purified SC populations without compromising the viability and biological activity of the cells.
Optimization of a Sample Processing Protocol for Recovery of ...
Journal Article Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps.
Capillary and venous samples of total creatine kinase are similar after eccentric exercise.
Knoblauch, Mark A; O'Connor, Daniel P; Clarke, Mark S F
2010-12-01
Circulating creatine kinase (CK) levels are often monitored as an indirect biomarker of muscle damage after resistive exercise. The purpose of the present investigation was to evaluate whether capillary whole-blood sampling, a simpler and less invasive method for obtaining a venous blood sample, would allow for a reliable measurement of total CK compared to venipuncture. Fifteen untrained subjects performed 50 maximal eccentric elbow extensions to induce muscle damage of the biceps brachii. Capillary (fingerstick) and venous whole-blood samples were collected contemporaneously at baseline and again at 24, 48, 72, and 96 hours post-exercise. Using a commercial CK analysis kit with a protocol modification to account for a reduced sample size, total CK activity of the capillary and venous samples was analyzed concurrently via spectrophotometry. Results indicated a 0.997 correlation between sampling sites for total CK, with disagreement between the venous and capillary samples estimated at <12% across the range of CK values. These findings indicate capillary sampling for total CK activity provides a valid alternative to venipuncture and should be considered by researchers, clinicians, and strength and conditioning specialists as an alternate sampling technique when indirectly evaluating muscle damage after exercise.
Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter
2017-01-01
Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale. PMID:28243453
Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter
2017-01-01
Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale .
The Potential Neural Mechanisms of Acute Indirect Vibration
2011-01-01
There is strong evidence to suggest that acute indirect vibration acts on muscle to enhance force, power, flexibility, balance and proprioception suggesting neural enhancement. Nevertheless, the neural mechanism(s) of vibration and its potentiating effect have received little attention. One proposal suggests that spinal reflexes enhance muscle contraction through a reflex activity known as tonic vibration stretch reflex (TVR), which increases muscle activation. However, TVR is based on direct, brief, and high frequency vibration (>100 Hz) which differs to indirect vibration, which is applied to the whole body or body parts at lower vibration frequency (5-45 Hz). Likewise, muscle tuning and neuromuscular aspects are other candidate mechanisms used to explain the vibration phenomenon. But there is much debate in terms of identifying which neural mechanism(s) are responsible for acute vibration; due to a number of studies using various vibration testing protocols. These protocols include: different methods of application, vibration variables, training duration, exercise types and a range of population groups. Therefore, the neural mechanism of acute vibration remain equivocal, but spinal reflexes, muscle tuning and neuromuscular aspects are all viable factors that may contribute in different ways to increasing muscular performance. Additional research is encouraged to determine which neural mechanism(s) and their contributions are responsible for acute vibration. Testing variables and vibration applications need to be standardised before reaching a consensus on which neural mechanism(s) occur during and post-vibration. Key points There is strong evidence to suggest that acute indirect vibration acts on muscle to enhance force, power, flexibility, balance and proprioception, but little attention has been given to the neural mechanism(s) of acute indirect vibration. Current findings suggest that acute vibration exposure may cause a neural response, but there is little consensus on identifying which neural mechanism(s) are specifically responsible. This is due to a number of studies using various vibration testing protocols (i.e.varying frequencies, amplitudes, durations, and methods of application). Spinal reflexes, muscle tuning and neuromuscular aspects and central motor command are all viable neuromechanical factors that may contribute at different stages to transiently increasing muscular performance. Additional research is encouraged to determine when (pre, during and post) the different neural mechanism(s) respond to direct and indirect vibration stimuli. PMID:24149291
Farnum, C E; Wilsman, N J
1984-06-01
A postembedment method for the localization of lectin-binding glycoconjugates was developed using Epon-embedded growth plate cartilage from Yucatan miniature swine. By testing a variety of etching, blocking, and incubation procedures, a standard protocol was developed for 1 micron thick sections that allowed visualization of both intracellular and extracellular glycoconjugates with affinity for wheat germ agglutinin and concanavalin A. Both fluorescent and peroxidase techniques were used, and comparisons were made between direct methods and indirect methods using the biotin-avidin bridging system. Differential extracellular lectin binding allowed visualization of interterritorial , territorial, and pericellular matrices. Double labeling experiments showed the precision with which intracellular binding could be localized to specific cytoplasmic compartments, with resolution of binding to the Golgi apparatus, endoplasmic reticulum, and nuclear membrane at the light microscopic level. This method allows the localization of both intracellular and extracellular lectin-binding glycoconjugates using fixation and embedment procedures that are compatible with simultaneous ultrastructural analysis. As such it should have applicability both to the morphological analysis of growth plate organization during normal endochondral ossification, as well as to the diagnostic pathology of matrix abnormalities in disease states of growing cartilage.
Viola, Anna; Costantino, Giuseppe; Privitera, Antonino Carlo; Bossa, Fabrizio; Lauria, Angelo; Grossi, Laurino; Principi, Maria Beatrice; Della Valle, Nicola; Cappello, Maria
2017-01-01
AIM To assess the impact of short infliximab (IFX) infusion on hospital resource utilization and costs. METHODS All inflammatory bowel diseases (IBD) patients who received IFX 1 h infusion from March 2007 to September 2014 in eight centers from Southern Italy were included in the analysis. Demographic, clinical and infusion related data were collected. The potential benefits related to the short infusion protocol were assessed both in terms of time saving and increased infusion unit capacity. In addition, indirect patient-related cost savings were evaluated. RESULTS One hundred and twenty-five patients were recruited (64 with ulcerative colitis and 61 with Crohn’s disease). Median duration of disease was of 53 mo and mean age of pts at diagnosis was of 34 years (SD: ± 13). Adverse infusion reactions were reported in less than 4% both before and after short infusion. The total number of infusions across the selected centers was of 2501 (30.5% short infusions). In the analyzed cohort, 1143 h were saved (762 in the infusion and 381 in observation phases) through the rapid IFX infusion protocol. This time saving (-15% compared to the standard protocol in infusion phase) represents, from the hospital perspective, an opportunity to optimize infusion unit capacity by allocating the saved time in alternative cost-effective treatments. This is the case of opportunity cost that represents the value of forgone benefit which could be obtained from a resource in its next-best alternative use. Hence, an extra hour of infusion in the case of standard 2-h IFX represents a loss in opportunity to provide other cost effective services. The analysis showed that the short infusion increased the infusion units capacity up to 50% on days when the IFX infusions were scheduled (infusion phase). Furthermore, the analysis showed that the short IFX infusion protocol leads to time savings also in the post-infusion phase (observation) leading to a time saving of 10% on average among the analyzed centers. Finally, the short infusion protocol has been demonstrated to lead to indirect cost savings of €138/patient (average -€17.300 on the whole cohort). CONCLUSION A short IFX infusion protocol can be considered time and cost saving in comparison to the standard infusion protocol both from the hospital’s perspective, as it contributes to increase infusion units capacity, and the patients’ perspective, as it reduces indirect costs and the impact of treatment on everyday life and work productivity. PMID:28533923
DOE Office of Scientific and Technical Information (OSTI.GOV)
Utturkar, Sagar M.; Cude, W. Nathan; Robeson, Jr., Michael S.
Bacterial endophytes that colonize Populus trees contribute to nutrient acquisition, prime immunity responses, and directly or indirectly increase both above- and below-ground biomasses. Endophytes are embedded within plant material, so physical separation and isolation are difficult tasks. Application of culture-independent methods, such as metagenome or bacterial transcriptome sequencing, has been limited due to the predominance of DNA from the plant biomass. In this paper, we present a modified differential and density gradient centrifugation-based protocol for the separation of endophytic bacteria from Populus roots. This protocol achieved substantial reduction in contaminating plant DNA, allowed enrichment of endophytic bacteria away from themore » plant material, and enabled single-cell genomics analysis. Four single-cell genomes were selected for whole-genome amplification based on their rarity in the microbiome (potentially uncultured taxa) as well as their inferred abilities to form associations with plants. Bioinformatics analyses, including assembly, contamination removal, and completeness estimation, were performed to obtain single-amplified genomes (SAGs) of organisms from the phyla Armatimonadetes, Verrucomicrobia, and Planctomycetes, which were unrepresented in our previous cultivation efforts. Finally, comparative genomic analysis revealed unique characteristics of each SAG that could facilitate future cultivation efforts for these bacteria.« less
Enrichment of Root Endophytic Bacteria from Populus deltoides and Single-Cell-Genomics Analysis
Utturkar, Sagar M.; Cude, W. Nathan; Robeson, Jr., Michael S.; ...
2016-07-15
Bacterial endophytes that colonize Populus trees contribute to nutrient acquisition, prime immunity responses, and directly or indirectly increase both above- and below-ground biomasses. Endophytes are embedded within plant material, so physical separation and isolation are difficult tasks. Application of culture-independent methods, such as metagenome or bacterial transcriptome sequencing, has been limited due to the predominance of DNA from the plant biomass. In this paper, we present a modified differential and density gradient centrifugation-based protocol for the separation of endophytic bacteria from Populus roots. This protocol achieved substantial reduction in contaminating plant DNA, allowed enrichment of endophytic bacteria away from themore » plant material, and enabled single-cell genomics analysis. Four single-cell genomes were selected for whole-genome amplification based on their rarity in the microbiome (potentially uncultured taxa) as well as their inferred abilities to form associations with plants. Bioinformatics analyses, including assembly, contamination removal, and completeness estimation, were performed to obtain single-amplified genomes (SAGs) of organisms from the phyla Armatimonadetes, Verrucomicrobia, and Planctomycetes, which were unrepresented in our previous cultivation efforts. Finally, comparative genomic analysis revealed unique characteristics of each SAG that could facilitate future cultivation efforts for these bacteria.« less
Hammerstingl, R M; Schwarz, W; Hochmuth, K; Staib-Sebler, E; Lorenz, M; Vogl, T J
2001-01-01
The development in oncologic liver surgery as well as modified interventional therapy strategies of the liver have resulted in improved diagnostic imaging. The evolution of contrast agents for MR imaging of the liver has proceeded along several different paths with the common goal of improving liver-lesion contrast. In MRI contrast agents act indirectly by their effects on relaxation times. Contrast agents used for hepatic MR imaging can be categorized in those that target the extracellular space, the hepatobiliary system, and the reticuloendothelial system. The first two result in a positive enhancement, the last one in a negative enhancement. Positive enhancers allow a better characterization of liver metastases using dynamic sequence protocols. Detection rate of liver metastases is increased using hepatobiliary contrast-enhanced MRI compared to unenhanced MRI. Negative enhancers, iron oxide particles, significantly increase tumor-to-liver contrast and allow detection of more lesions than other diagnostic methods. Iron-oxide enhanced MRI enables differential diagnosis of liver metastases comparing morphologic features using T2 and T1-weighted sequences.
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-01-01
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-12-04
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.
Modification of Fox protocol for prediction of maximum oxygen uptake in male university students.
Bandyopadhyay, Amit; Pal, Sangita
2015-01-01
Direct estimation of VO₂max involves labourious, exhaustive, hazardous, time consuming and expensive experimental protocols. Hence, application of various indirect protocols for prediction of VO₂max has become popular, subject to proper population-specific standardisation of the indirect protocol. Application of Fox (1973) protocol in male sedentary university students of Kolkata, India led to premature fatigue in their leg muscles that hindered the muscular activity leading to inability in completing the exercise. The present study was aimed at modifying and validating the Fox (1973) protocol with a convenient workload of 110 W (i.e., modified Fox test or MFT) in the said population. Ninety (90) sedentary male students were recruited by simple random sampling from the University of Calcutta, India and they were randomly assigned into study group (n=60) and confirmatory group (n=30). VO₂max was directly estimated by Scholander micro-gas analysis after incremental bicycle exercise. Predicted VO₂max (PVO₂max) was computed from MFT by using the submaximal heart rate (HR(sub). In the Study Group VO₂max (2216.63 ± 316.77 mL.min⁻¹ was significantly different (P< 0.001) from PVO₂max (3131.73 ± 234.32 mL.min⁻¹ measured by using the equation of Fox (1973). Simple and multiple regression equations have been computed for prediction of VO₂max from HR(sub) and physical parameters. Application of these norms in the confirmatory group depicted insignificant difference between VO₂max and PVO₂max with substantially small limits of agreement and lower values of SEE. The modified regression norms are therefore recommended for use in MFT for accurate assessment of VO₂max in the studied population.
Video Allows Young Scientists New Ways to Be Seen
ERIC Educational Resources Information Center
Park, John C.
2009-01-01
Science is frequently a visual endeavor, dependent on direct or indirect observations. Teachers have long employed motion pictures in the science classroom to allow students to make indirect observations, but the capabilities of digital video offer opportunities to engage students in active science learning. Not only can watching a digital video…
A Three-way Decomposition of a Total Effect into Direct, Indirect, and Interactive Effects
VanderWeele, Tyler J.
2013-01-01
Recent theory in causal inference has provided concepts for mediation analysis and effect decomposition that allow one to decompose a total effect into a direct and an indirect effect. Here, it is shown that what is often taken as an indirect effect can in fact be further decomposed into a “pure” indirect effect and a mediated interactive effect, thus yielding a three-way decomposition of a total effect (direct, indirect, and interactive). This three-way decomposition applies to difference scales and also to additive ratio scales and additive hazard scales. Assumptions needed for the identification of each of these three effects are discussed and simple formulae are given for each when regression models allowing for interaction are used. The three-way decomposition is illustrated by examples from genetic and perinatal epidemiology, and discussion is given to what is gained over the traditional two-way decomposition into simply a direct and an indirect effect. PMID:23354283
2010-11-01
CDMA base stations are each synchronized by GPS receivers, they provide an indirect link to GPS system time and UTC time . The major stock...antenna synchronizes the Local Area Network (LAN) to within 10 microseconds of UTC using the IEEE-1588 Precision Time Protocol (PTP). This is an...activities. Understanding and measuring latency on the LAN is key to the success of HFTs. Without precise time synchronization below 1 millisecond
Measuring mitochondrial uncoupling protein-2 level and activity in insulinoma cells.
Barlow, Jonathan; Hirschberg, Verena; Brand, Martin D; Affourtit, Charles
2013-01-01
Mitochondrial uncoupling protein-2 (UCP2) regulates glucose-stimulated insulin secretion (GSIS) by pancreatic beta cells-the physiological role of the beta cell UCP2 remains a subject of debate. Experimental studies informing this debate benefit from reliable measurements of UCP2 protein level and activity. In this chapter, we describe how UCP2 protein can be detected in INS-1 insulinoma cells and how it can be knocked down by RNA interference. We demonstrate briefly that UCP2 knockdown lowers glucose-induced rises in mitochondrial respiratory activity, coupling efficiency of oxidative phosphorylation, levels of mitochondrial reactive oxygen species, and insulin secretion. We provide protocols for the detection of the respective UCP2 phenotypes, which are indirect, but invaluable measures of UCP2 activity. We also introduce a convenient method to normalize cellular respiration to cell density allowing measurement of UCP2 effects on specific mitochondrial oxygen consumption. Copyright © 2013 Elsevier Inc. All rights reserved.
Codony, Francesc; Pérez, Leonardo Martín; Adrados, Bárbara; Agustí, Gemma; Fittipaldi, Mariana; Morató, Jordi
2012-01-01
Culture-based methods for fecal indicator microorganisms are the standard protocol to assess potential health risk from drinking water systems. However, these traditional fecal indicators are inappropriate surrogates for disinfection-resistant fecal pathogens and the indigenous pathogens that grow in drinking water systems. There is now a range of molecular-based methods, such as quantitative PCR, which allow detection of a variety of pathogens and alternative indicators. Hence, in addition to targeting total Escherichia coli (i.e., dead and alive) for the detection of fecal pollution, various amoebae may be suitable to indicate the potential presence of pathogenic amoeba-resisting microorganisms, such as Legionellae. Therefore, monitoring amoeba levels by quantitative PCR could be a useful tool for directly and indirectly evaluating health risk and could also be a complementary approach to current microbial quality control strategies for drinking water systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... period some quantity of consumption that the nation is permitted under the Montreal Protocol. (2) Trade... Party to the Protocol as set forth in this paragraph (b). A person may only receive consumption from... maximum consumption that the nation is allowed under the Protocol minus the quantity (in kilograms) traded...
Code of Federal Regulations, 2011 CFR
2011-07-01
... period some quantity of consumption that the nation is permitted under the Montreal Protocol. (2) Trade... Party to the Protocol as set forth in this paragraph (b). A person may only receive consumption from... maximum consumption that the nation is allowed under the Protocol minus the quantity (in kilograms) traded...
Code of Federal Regulations, 2013 CFR
2013-07-01
... period some quantity of consumption that the nation is permitted under the Montreal Protocol. (2) Trade... Party to the Protocol as set forth in this paragraph (b). A person may only receive consumption from... maximum consumption that the nation is allowed under the Protocol minus the quantity (in kilograms) traded...
Code of Federal Regulations, 2012 CFR
2012-07-01
... period some quantity of consumption that the nation is permitted under the Montreal Protocol. (2) Trade... Party to the Protocol as set forth in this paragraph (b). A person may only receive consumption from... maximum consumption that the nation is allowed under the Protocol minus the quantity (in kilograms) traded...
Code of Federal Regulations, 2014 CFR
2014-07-01
... period some quantity of consumption that the nation is permitted under the Montreal Protocol. (2) Trade... Party to the Protocol as set forth in this paragraph (b). A person may only receive consumption from... maximum consumption that the nation is allowed under the Protocol minus the quantity (in kilograms) traded...
Wisniewski, Michael; Neuner, Gilbert; Gusta, Lawrence V.
2015-01-01
Freezing events that occur when plants are actively growing can be a lethal event, particularly if the plant has no freezing tolerance. Such frost events often have devastating effects on agricultural production and can also play an important role in shaping community structure in natural populations of plants, especially in alpine, sub-arctic, and arctic ecosystems. Therefore, a better understanding of the freezing process in plants can play an important role in the development of methods of frost protection and understanding mechanisms of freeze avoidance. Here, we describe a protocol to visualize the freezing process in plants using high-resolution infrared thermography (HRIT). The use of this technology allows one to determine the primary sites of ice formation in plants, how ice propagates, and the presence of ice barriers. Furthermore, it allows one to examine the role of extrinsic and intrinsic nucleators in determining the temperature at which plants freeze and evaluate the ability of various compounds to either affect the freezing process or increase freezing tolerance. The use of HRIT allows one to visualize the many adaptations that have evolved in plants, which directly or indirectly impact the freezing process and ultimately enables plants to survive frost events. PMID:25992743
Wisniewski, Michael; Neuner, Gilbert; Gusta, Lawrence V
2015-05-08
Freezing events that occur when plants are actively growing can be a lethal event, particularly if the plant has no freezing tolerance. Such frost events often have devastating effects on agricultural production and can also play an important role in shaping community structure in natural populations of plants, especially in alpine, sub-arctic, and arctic ecosystems. Therefore, a better understanding of the freezing process in plants can play an important role in the development of methods of frost protection and understanding mechanisms of freeze avoidance. Here, we describe a protocol to visualize the freezing process in plants using high-resolution infrared thermography (HRIT). The use of this technology allows one to determine the primary sites of ice formation in plants, how ice propagates, and the presence of ice barriers. Furthermore, it allows one to examine the role of extrinsic and intrinsic nucleators in determining the temperature at which plants freeze and evaluate the ability of various compounds to either affect the freezing process or increase freezing tolerance. The use of HRIT allows one to visualize the many adaptations that have evolved in plants, which directly or indirectly impact the freezing process and ultimately enables plants to survive frost events.
Advances in Imaging and Management Trends of Traumatic Aortic Injuries.
Nagpal, Prashant; Mullan, Brian F; Sen, Indrani; Saboo, Sachin S; Khandelwal, Ashish
2017-05-01
Acute traumatic aortic injury (ATAI) is a life-threatening injury. CT is the imaging tool of choice, and the knowledge of direct and indirect signs of injury, grading system, and current management protocol helps the emergency radiologist to better identify and classify the injury and provide additional details that can impact management options. Newer dual-source CT technology with ultrafast acquisition speed has also influenced the appropriate protocol for imaging in patients with suspected ATAI. This review highlights the imaging protocol in patients with blunt trauma, CT appearance and grading systems of ATAI, management options, and the role of the multidisciplinary team in the management of these patients. We also briefly review the current literature on the definition, treatment, and follow-up protocol in patients with minimal aortic injury.
O'Neil, Margaret E; Fragala-Pinkham, Maria; Lennon, Nancy; George, Ameeka; Forman, Jeffrey; Trost, Stewart G
2016-01-01
Physical therapy for youth with cerebral palsy (CP) who are ambulatory includes interventions to increase functional mobility and participation in physical activity (PA). Thus, reliable and valid measures are needed to document PA in youth with CP. The purpose of this study was to evaluate the inter-instrument reliability and concurrent validity of 3 accelerometer-based motion sensors with indirect calorimetry as the criterion for measuring PA intensity in youth with CP. Fifty-seven youth with CP (mean age=12.5 years, SD=3.3; 51% female; 49.1% with spastic hemiplegia) participated. Inclusion criteria were: aged 6 to 20 years, ambulatory, Gross Motor Function Classification System (GMFCS) levels I through III, able to follow directions, and able to complete the full PA protocol. Protocol activities included standardized activity trials with increasing PA intensity (resting, writing, household chores, active video games, and walking at 3 self-selected speeds), as measured by weight-relative oxygen uptake (in mL/kg/min). During each trial, participants wore bilateral accelerometers on the upper arms, waist/hip, and ankle and a portable indirect calorimeter. Intraclass coefficient correlations (ICCs) were calculated to evaluate inter-instrument reliability (left-to-right accelerometer placement). Spearman correlations were used to examine concurrent validity between accelerometer output (activity and step counts) and indirect calorimetry. Friedman analyses of variance with post hoc pair-wise analyses were conducted to examine the validity of accelerometers to discriminate PA intensity across activity trials. All accelerometers exhibited excellent inter-instrument reliability (ICC=.94-.99) and good concurrent validity (rho=.70-.85). All accelerometers discriminated PA intensity across most activity trials. This PA protocol consisted of controlled activity trials. Accelerometers provide valid and reliable measures of PA intensity among youth with CP. © 2016 American Physical Therapy Association.
Space Wire Upper Layer Protocols
NASA Technical Reports Server (NTRS)
Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve
2004-01-01
This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.
Network meta-analysis: a technique to gather evidence from direct and indirect comparisons
2017-01-01
Systematic reviews and pairwise meta-analyses of randomized controlled trials, at the intersection of clinical medicine, epidemiology and statistics, are positioned at the top of evidence-based practice hierarchy. These are important tools to base drugs approval, clinical protocols and guidelines formulation and for decision-making. However, this traditional technique only partially yield information that clinicians, patients and policy-makers need to make informed decisions, since it usually compares only two interventions at the time. In the market, regardless the clinical condition under evaluation, usually many interventions are available and few of them have been studied in head-to-head studies. This scenario precludes conclusions to be drawn from comparisons of all interventions profile (e.g. efficacy and safety). The recent development and introduction of a new technique – usually referred as network meta-analysis, indirect meta-analysis, multiple or mixed treatment comparisons – has allowed the estimation of metrics for all possible comparisons in the same model, simultaneously gathering direct and indirect evidence. Over the last years this statistical tool has matured as technique with models available for all types of raw data, producing different pooled effect measures, using both Frequentist and Bayesian frameworks, with different software packages. However, the conduction, report and interpretation of network meta-analysis still poses multiple challenges that should be carefully considered, especially because this technique inherits all assumptions from pairwise meta-analysis but with increased complexity. Thus, we aim to provide a basic explanation of network meta-analysis conduction, highlighting its risks and benefits for evidence-based practice, including information on statistical methods evolution, assumptions and steps for performing the analysis. PMID:28503228
Advances in Imaging and Management Trends of Traumatic Aortic Injuries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nagpal, Prashant, E-mail: drprashantnagpal@gmail.com, E-mail: Prashant-nagpal@uiowa.edu; Mullan, Brian F.; Sen, Indrani
Acute traumatic aortic injury (ATAI) is a life-threatening injury. CT is the imaging tool of choice, and the knowledge of direct and indirect signs of injury, grading system, and current management protocol helps the emergency radiologist to better identify and classify the injury and provide additional details that can impact management options. Newer dual-source CT technology with ultrafast acquisition speed has also influenced the appropriate protocol for imaging in patients with suspected ATAI. This review highlights the imaging protocol in patients with blunt trauma, CT appearance and grading systems of ATAI, management options, and the role of the multidisciplinary teammore » in the management of these patients. We also briefly review the current literature on the definition, treatment, and follow-up protocol in patients with minimal aortic injury.« less
Direct Measurement of Pyroelectric and Electrocaloric Effects in Thin Films
NASA Astrophysics Data System (ADS)
Pandya, Shishir; Wilbur, Joshua D.; Bhatia, Bikram; Damodaran, Anoop R.; Monachon, Christian; Dasgupta, Arvind; King, William P.; Dames, Chris; Martin, Lane W.
2017-03-01
An understanding of polarization-heat interactions in pyroelectric and electrocaloric thin-film materials requires that the electrothermal response is reliably characterized. While most work, particularly in electrocalorics, has relied on indirect measurement protocols, here we report a direct technique for measuring both pyroelectric and electrocaloric effects in epitaxial ferroelectric thin films. We demonstrate an electrothermal test platform where localized high-frequency (approximately 1 kHz) periodic heating and highly sensitive thin-film resistance thermometry allow the direct measurement of pyrocurrents (<10 pA ) and electrocaloric temperature changes (<2 mK ) using the "2-omega" and an adapted "3-omega" technique, respectively. Frequency-domain, phase-sensitive detection permits the extraction of the pyrocurrent from the total current, which is often convoluted by thermally-stimulated currents. The wide-frequency-range measurements employed in this study further show the effect of secondary contributions to pyroelectricity due to the mechanical constraints of the substrate. Similarly, measurement of the electrocaloric effect on the same device in the frequency domain (at approximately 100 kHz) allows for the decoupling of Joule heating from the electrocaloric effect. Using one-dimensional, analytical heat-transport models, the transient temperature profile of the heterostructure is characterized to extract pyroelectric and electrocaloric coefficients.
Direct and Indirect Pulp Capping: A Brief History, Material Innovations, and Clinical Case Report.
Alex, Gary
2018-03-01
Among the goals of pulp capping are to manage bacteria, arrest caries progression, stimulate pulp cells to form new dentin, and produce a durable seal that protects the pulp complex. This article will provide a general discussion of direct and indirect pulp capping procedures, offering practitioners a pragmatic and science-based clinical protocol for treatment of vital pulp exposures. A clinical case will be presented in which a novel light-cured resin-modified mineral trioxide aggregate hybrid material was used to manage a mechanical vital pulp exposure that occurred during deep caries excavation.
NASA Astrophysics Data System (ADS)
Dorow, C. J.; Hasling, M. W.; Calman, E. V.; Butov, L. V.; Wilkes, J.; Campman, K. L.; Gossard, A. C.
2017-06-01
We present the direct measurements of magnetoexciton transport. Excitons give the opportunity to realize the high magnetic-field regime for composite bosons with magnetic fields of a few tesla. Long lifetimes of indirect excitons allow the study of kinetics of magnetoexciton transport with time-resolved optical imaging of exciton photoluminescence. We performed spatially, spectrally, and time-resolved optical imaging of transport of indirect excitons in high magnetic fields. We observed that an increasing magnetic field slows down magnetoexciton transport. The time-resolved measurements of the magnetoexciton transport distance allowed for an experimental estimation of the magnetoexciton diffusion coefficient. An enhancement of the exciton photoluminescence energy at the laser excitation spot was found to anticorrelate with the exciton transport distance. A theoretical model of indirect magnetoexciton transport is presented and is in agreement with the experimental data.
Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil
Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W
2016-01-01
Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.
Pinker, Steven; Nowak, Martin A.; Lee, James J.
2008-01-01
When people speak, they often insinuate their intent indirectly rather than stating it as a bald proposition. Examples include sexual come-ons, veiled threats, polite requests, and concealed bribes. We propose a three-part theory of indirect speech, based on the idea that human communication involves a mixture of cooperation and conflict. First, indirect requests allow for plausible deniability, in which a cooperative listener can accept the request, but an uncooperative one cannot react adversarially to it. This intuition is supported by a game-theoretic model that predicts the costs and benefits to a speaker of direct and indirect requests. Second, language has two functions: to convey information and to negotiate the type of relationship holding between speaker and hearer (in particular, dominance, communality, or reciprocity). The emotional costs of a mismatch in the assumed relationship type can create a need for plausible deniability and, thereby, select for indirectness even when there are no tangible costs. Third, people perceive language as a digital medium, which allows a sentence to generate common knowledge, to propagate a message with high fidelity, and to serve as a reference point in coordination games. This feature makes an indirect request qualitatively different from a direct one even when the speaker and listener can infer each other's intentions with high confidence. PMID:18199841
Nutritional Informatics: Mining Supermarket Sales Data as a Nutritional Assessment Method
ERIC Educational Resources Information Center
Brinkerhoff, Kristina Michelle
2012-01-01
Many nutritional assessment techniques, including food frequency questionnaires (FFQs) and 24-hour dietary recalls have innate limitations such as expensive protocols, high respondent burden, and self-reporting biases. Supermarket sales data have shown promise as a new, indirect, inexpensive nutritional assessment method in recent studies. The…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... Fuel Burning Equipment Used for Indirect Heating AGENCY: Environmental Protection Agency (EPA). ACTION...) Emissions from Fuel Burning Equipment Used for Indirect Heating. The new rule consolidates four pre-existing...
Horner, N K; Lampe, J W; Patterson, R E; Neuhouser, M L; Beresford, S A; Prentice, R L
2001-08-01
An objective measure of energy intake is needed in epidemiologic studies to evaluate random and systematic error associated with dietary self-report tools. Total energy expenditure in weight-stable humans is accepted as a measure of energy intake, but doubly labeled water remains cost prohibitive for large studies. Our purpose was to develop a practical indirect calorimetry (IC) protocol for estimating resting metabolic rate (RMR) in free-living, postmenopausal women. We conducted duplicate IC measures 1 wk apart using a canopy system on 102 women ages 50-79 y from the Seattle area. We compared RMR for 0-5, 5-10, 5-15, 5-20, 5-25, 5-30, and 0- to 30-min IC segments and segments meeting stability criteria. The mean RMR for the first 5 min was significantly higher than other time segments (P = 0.001). Correlation coefficients between duplicate measures were high (r = 0.90). Use of defined stability criteria produced RMR measures that were 10-30 kcal (42-126 kJ) higher than the 5- to 10-min RMR measures and 40-60% of subjects did not achieve these stability criteria. For protocols including IC to assess RMR as a component of total energy expenditure in free-living, postmenopausal women, a single 10-min canopy study, excluding the first 5 min of data, produces reliable results with minimal subject burden.
Non-invasive and non-destructive measurements of confluence in cultured adherent cell lines.
Busschots, Steven; O'Toole, Sharon; O'Leary, John J; Stordal, Britta
2015-01-01
Many protocols used for measuring the growth of adherent monolayer cells in vitro are invasive, destructive and do not allow for the continued, undisturbed growth of cells within flasks. Protocols often use indirect methods for measuring proliferation. Microscopy techniques can analyse cell proliferation in a non-invasive or non-destructive manner but often use expensive equipment and software algorithms. In this method images of cells within flasks are captured by photographing under a standard inverted phase contract light microscope using a digital camera with a camera lens adaptor. Images are analysed for confluence using ImageJ freeware resulting in a measure of confluence known as an Area Fraction (AF) output. An example of the AF method in use on OVCAR8 and UPN251 cell lines is included. •Measurements of confluence from growing adherent cell lines in cell culture flasks is obtained in a non-invasive, non-destructive, label-free manner.•The technique is quick, affordable and eliminates sample manipulation.•The technique provides an objective, consistent measure of when cells reach confluence and is highly correlated to manual counting with a haemocytometer. The average correlation co-efficient from a Spearman correlation (n = 3) was 0.99 ± 0.008 for OVCAR8 (p = 0.01) and 0.99 ± 0.01 for UPN251 (p = 0.01) cell lines.
Selma-Soriano, Estela; Artero, Rubén; Llamusi, Beatriz
2018-03-31
Muscle mass wasting, known as muscle atrophy, is a common phenotype in Drosophila models of neuromuscular diseases. We have used the indirect flight muscles (IFMs) of flies, specifically the dorso-longitudinal muscles (DLM), as the experimental subject to measure the atrophic phenotype brought about by different genetic causes. In this protocol, we describe how to embed fly thorax muscles for semi thin sectioning, how to obtain a good contrast between muscle and the surrounding tissue, and how to process optical microscope images for semiautomatic acquisition of quantifiable data and analysis. We describe three specific applications of the methodological pipeline. First, we show how the method can be applied to quantify muscle degeneration in a myotonic dystrophy fly model; second, measurement of muscle cross-sectional area can help to identify genes that either promote or prevent muscle atrophy and/or muscle degeneration; third, this protocol can be applied to determine whether a candidate compound is able to significantly modify a given atrophic phenotype induced by a disease-causing mutation or by an environmental trigger.
RNase-assisted RNA chromatography
Michlewski, Gracjan; Cáceres, Javier F.
2010-01-01
RNA chromatography combined with mass spectrometry represents a widely used experimental approach to identify RNA-binding proteins that recognize specific RNA targets. An important drawback of most of these protocols is the high background due to direct or indirect nonspecific binding of cellular proteins to the beads. In many cases this can hamper the detection of individual proteins due to their low levels and/or comigration with contaminating proteins. Increasing the salt concentration during washing steps can reduce background, but at the cost of using less physiological salt concentrations and the likely loss of important RNA-binding proteins that are less stringently bound to a given RNA, as well as the disassembly of protein or ribonucleoprotein complexes. Here, we describe an improved RNA chromatography method that relies on the use of a cocktail of RNases in the elution step. This results in the release of proteins specifically associated with the RNA ligand and almost complete elimination of background noise, allowing a more sensitive and thorough detection of RNA-binding proteins recognizing a specific RNA transcript. PMID:20571124
Perales, Francisco
2015-01-01
Comparable survey data on Indigenous and non-Indigenous Australians are highly sought after by policymakers to inform policies aimed at closing ethnic socio-economic gaps. However, collection of such data is compromised by group differences in socio-economic status and cultural norms. We use data from the Household, Income and Labour Dynamics in Australia Survey and multiple-membership multilevel regression models that allow for individual and interviewer effects to examine differences between Indigenous and non-Indigenous Australians in approximate measures of the quality of the interview process. We find that there are both direct and indirect ethnic effects on different dimensions of interview process quality, with Indigenous Australians faring worse than non-Indigenous Australians in all outcomes ceteris paribus . This indicates that nationwide surveys must feature interview protocols that are sensitive to the needs and culture of Indigenous respondents to improve the quality of the survey information gathered from this subpopulation. PMID:26091283
Development of a method of clozapine dosage by selective electrode to the iodides.
Teyeb, Hassen; Douki, Wahiba; Najjar, Mohamed Fadhel
2012-07-01
Clozapine (Leponex(®)), the main neuroleptic indicated in the treatment of resistant schizophrenia, requires therapeutic monitoring because of its side effects and the individual variability in metabolism. In addition, several cases of intoxication by this drug were described in the literature. In this work, we studied the indirect dosage of clozapine by selective electrode to the iodides for the optimization of an analytical protocol allowing therapeutic monitoring and the diagnosis of intoxication and/or overdose. Our results showed that the developed method is linear between 0.05 and 12.5 µg/mL (r = 0.980), with a limit of detection of 0.645.10(-3) µg/mL. It presents good precision (coefficient of variation less than 4%) and accuracy (coefficient less than 10%) for all the studied concentrations. With a domain of linearity covering a wide margin of concentrations, this method can be applicable to the dosage of clozapine in tablets and in different biological matrices, such as plasma, urines, and postmortem samples.
Code of Federal Regulations, 2012 CFR
2012-07-01
... listed in appendix C to this subpart (Parties to the Montreal Protocol) must agree either to transfer to... permitted under the Montreal Protocol or to receive from the person for the current control period some... by the United States to the Secretariat of the Montreal Protocol for an essential use exemption may...
Code of Federal Regulations, 2013 CFR
2013-07-01
... listed in appendix C to this subpart (Parties to the Montreal Protocol) must agree either to transfer to... permitted under the Montreal Protocol or to receive from the person for the current control period some... by the United States to the Secretariat of the Montreal Protocol for an essential use exemption may...
Code of Federal Regulations, 2011 CFR
2011-07-01
... quantity of production that the nation is permitted under the Montreal Protocol or to receive from the... Article 5 allowances, for a specified control period through trades with another Party to the Protocol as... this subpart that is also listed in Appendix C, Annex 1 of the Protocol as having ratified the Beijing...
Code of Federal Regulations, 2011 CFR
2011-07-01
... listed in appendix C to this subpart (Parties to the Montreal Protocol) must agree either to transfer to... permitted under the Montreal Protocol or to receive from the person for the current control period some... by the United States to the Secretariat of the Montreal Protocol for an essential use exemption may...
Code of Federal Regulations, 2012 CFR
2012-07-01
... quantity of production that the nation is permitted under the Montreal Protocol or to receive from the... Article 5 allowances, for a specified control period through trades with another Party to the Protocol as... this subpart that is also listed in Appendix C, Annex 1 of the Protocol as having ratified the Beijing...
Code of Federal Regulations, 2014 CFR
2014-07-01
... listed in appendix C to this subpart (Parties to the Montreal Protocol) must agree either to transfer to... permitted under the Montreal Protocol or to receive from the person for the current control period some... by the United States to the Secretariat of the Montreal Protocol for an essential use exemption may...
Code of Federal Regulations, 2010 CFR
2010-07-01
... this subpart (Parties to the Montreal Protocol) must agree to transfer to the person for the current control period some amount of production that the nation is permitted under the Montreal Protocol. If the... Protocol for class I, Group I through Group V and Group VII controlled substances until January 1, 1996 and...
Code of Federal Regulations, 2011 CFR
2011-07-01
... this subpart (Parties to the Montreal Protocol) must agree to transfer to the person for the current control period some amount of production that the nation is permitted under the Montreal Protocol. If the... Protocol for class I, Group I through Group V and Group VII controlled substances until January 1, 1996 and...
Code of Federal Regulations, 2013 CFR
2013-07-01
... quantity of production that the nation is permitted under the Montreal Protocol or to receive from the... Article 5 allowances, for a specified control period through trades with another Party to the Protocol as... this subpart that is also listed in Appendix C, Annex 1 of the Protocol as having ratified the Beijing...
Code of Federal Regulations, 2014 CFR
2014-07-01
... this subpart (Parties to the Montreal Protocol) must agree to transfer to the person for the current control period some amount of production that the nation is permitted under the Montreal Protocol. If the... Protocol for class I, Group I through Group V and Group VII controlled substances until January 1, 1996 and...
Code of Federal Regulations, 2013 CFR
2013-07-01
... this subpart (Parties to the Montreal Protocol) must agree to transfer to the person for the current control period some amount of production that the nation is permitted under the Montreal Protocol. If the... Protocol for class I, Group I through Group V and Group VII controlled substances until January 1, 1996 and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... quantity of production that the nation is permitted under the Montreal Protocol or to receive from the... Article 5 allowances, for a specified control period through trades with another Party to the Protocol as... this subpart that is also listed in Appendix C, Annex 1 of the Protocol as having ratified the Beijing...
Code of Federal Regulations, 2012 CFR
2012-07-01
... this subpart (Parties to the Montreal Protocol) must agree to transfer to the person for the current control period some amount of production that the nation is permitted under the Montreal Protocol. If the... Protocol for class I, Group I through Group V and Group VII controlled substances until January 1, 1996 and...
Utilizing optical coherence tomography for CAD/CAM of indirect dental restorations
NASA Astrophysics Data System (ADS)
Chityala, Ravishankar; Vidal, Carola; Jones, Robert
Optical Coherence Tomography (OCT) has seen broad application in dentistry including early carious lesion detection and imaging defects in resin composite restorations. This study investigates expanding the clinical usefulness by investigating methods to use OCT for obtaining three-dimensional (3D) digital impressions, which can be integrated to CAD/CAM manufacturing of indirect restorations. 3D surface topography `before' and `after' a cavity preparation was acquired by an intraoral cross polarization swept source OCT (CP-OCT) system with a Micro-Electro-Mechanical System (MEMS) scanning mirror. Image registration and segmentation methods were used to digitally construct a replacement restoration that modeled the original surface morphology of a hydroxyapatite sample. After high resolution additive manufacturing (e.g. polymer 3D printing) of the replacement restoration, micro-CT imaging was performed to examine the marginal adaptation. This study establishes the protocol for further investigation of integrating OCT with CAD/CAM of indirect dental restorations.
De Pinho, Joao Correia; Aghajanova, Lusine; Herndon, Christopher N
2016-01-01
Gynecomastia is a disorder of the endocrine system characterized by an abnormal presence of a palpable unilateral or bilateral enlargement and proliferation of glandular ductal benign breast tissue in male individuals. This case discusses the medical implications of an unregulated, indirect exposure to nonformulary, bioidentical hormone replacement therapy in male children. An 8-year-old boy presented with prepubertal gynecomastia secondary to estrogen exposure from maternal use of bioidentical hormonal replacement therapy (the Wiley protocol). We review the literature on prepubertal gynecomastia secondary to exogenous estrogen exposure, evaluation, clinical surveillance of the pubertal development, and relevant short- and long-term implications. Indirect exposure to nonformulary hormonal replacement in our case report was an etiologic factor in the development of prepubertal gynecomastia. This novel estrogen exposure source has important implications in the differential diagnosis of prepubertal gynecomastia and potential adverse effects secondary to precocious hormonal exposure.
The Tangle of Student Allowances.
ERIC Educational Resources Information Center
Thomson, Norman J.
1980-01-01
A discussion of the distribution of student financial aid in Australia focuses on these issues: direct vs. indirect payment to students; inequality in living allowances given to secondary and postsecondary students; and distribution of expense allowances by state government and living allowances by the Commonwealth. (MSE)
Using generalizability theory to develop clinical assessment protocols.
Preuss, Richard A
2013-04-01
Clinical assessment protocols must produce data that are reliable, with a clinically attainable minimal detectable change (MDC). In a reliability study, generalizability theory has 2 advantages over classical test theory. These advantages provide information that allows assessment protocols to be adjusted to match individual patient profiles. First, generalizability theory allows the user to simultaneously consider multiple sources of measurement error variance (facets). Second, it allows the user to generalize the findings of the main study across the different study facets and to recalculate the reliability and MDC based on different combinations of facet conditions. In doing so, clinical assessment protocols can be chosen based on minimizing the number of measures that must be taken to achieve a realistic MDC, using repeated measures to minimize the MDC, or simply based on the combination that best allows the clinician to monitor an individual patient's progress over a specified period of time.
Indirect addressing and load balancing for faster solution to Mandelbrot Set on SIMD architectures
NASA Technical Reports Server (NTRS)
Tomboulian, Sherryl
1989-01-01
SIMD computers with local indirect addressing allow programs to have queues and buffers, making certain kinds of problems much more efficient. Examined here are a class of problems characterized by computations on data points where the computation is identical, but the convergence rate is data dependent. Normally, in this situation, the algorithm time is governed by the maximum number of iterations required by each point. Using indirect addressing allows a processor to proceed to the next data point when it is done, reducing the overall number of iterations required to approach the mean convergence rate when a sufficiently large problem set is solved. Load balancing techniques can be applied for additional performance improvement. Simulations of this technique applied to solving Mandelbrot Sets indicate significant performance gains.
Confocal imaging of butterfly tissue.
Brunetti, Craig R
2014-01-01
To understand the molecular events responsible for morphological change requires the ability to examine gene expression in a wide range of organisms in addition to model systems to determine how the differences in gene expression correlate with phenotypic differences. There are approximately 12,000 species of butterflies, most, with distinct patterns on their wings. The most important tool for studying gene expression in butterflies is confocal imaging of butterfly tissue by indirect immunofluorescence using either cross-reactive antibodies from closely related species such as Drosophila or developing butterfly-specific antibodies. In this report, we describe how indirect immunofluorescence protocols can be used to visualize protein expression patterns on the butterfly wing imaginal disc and butterfly embryo.
The role of veterinarian in the monitoring programs of mastitis control
NASA Astrophysics Data System (ADS)
Maletić, M.; Magaš, V.; Maletić, J.
2017-09-01
Mastitis is the most common and the most expensive disease of dairy cows. It is followed by a large number of direct and indirect costs that burden the farm’s budget and lead to major economic and health losses. The veterinarian at the farm plays a key role in implementing a protocol of biosecurity measures, a protocol of control, therapy, and the suppression of clinical and subclinical mastitis. In order to successfully implement these measures, a good communication between a veterinarian and a farm staff who performs milking procedures is necessary in order to detect and treat all cases of mastitis in time.
Comparison of protocols measuring diffusion and partition coefficients in the stratum corneum
Rothe, H.; Obringer, C.; Manwaring, J.; Avci, C.; Wargniez, W.; Eilstein, J.; Hewitt, N.; Cubberley, R.; Duplan, H.; Lange, D.; Jacques‐Jamin, C.; Klaric, M.; Schepky, A.
2017-01-01
Abstract Partition (K) and diffusion (D) coefficients are important to measure for the modelling of skin penetration of chemicals through the stratum corneum (SC). We compared the feasibility of three protocols for the testing of 50 chemicals in our main studies, using three cosmetics‐relevant model chemicals with a wide range of logP values. Protocol 1: SC concentration‐depth profile using tape‐stripping (measures KSC/v and DSC/HSC 2, where HSC is the SC thickness); Protocol 2A: incubation of isolated SC with chemical (direct measurement of KSC/v only) and Protocol 2B: diffusion through isolated SC mounted on a Franz cell (measures KSC/v and DSC/HSC 2, and is based on Fick's laws). KSC/v values for caffeine and resorcinol using Protocol 1 and 2B were within 30% of each other, values using Protocol 2A were ~two‐fold higher, and all values were within 10‐fold of each other. Only indirect determination of KSC/v by Protocol 2B was different from the direct measurement of KSC/v by Protocol 2A and Protocol 1 for 7‐EC. The variability of KSC/v for all three chemicals using Protocol 2B was higher compared to Protocol 1 and 2A. DSC/HSC 2 values for the three chemicals were of the same order of magnitude using all three protocols. Additionally, using Protocol 1, there was very little difference between parameters measured in pig and human SC. In conclusion, KSC/v, and DSC values were comparable using different methods. Pig skin might be a good surrogate for human skin for the three chemicals tested. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd. PMID:28139006
The public health value of vaccines beyond efficacy: methods, measures and outcomes.
Wilder-Smith, A; Longini, I; Zuber, P L; Bärnighausen, T; Edmunds, W J; Dean, N; Spicher, V Masserey; Benissa, M R; Gessner, B D
2017-07-26
Assessments of vaccine efficacy and safety capture only the minimum information needed for regulatory approval, rather than the full public health value of vaccines. Vaccine efficacy provides a measure of proportionate disease reduction, is usually limited to etiologically confirmed disease, and focuses on the direct protection of the vaccinated individual. Herein, we propose a broader scope of methods, measures and outcomes to evaluate the effectiveness and public health impact to be considered for evidence-informed policymaking in both pre- and post-licensure stages. Pre-licensure: Regulatory concerns dictate an individually randomised clinical trial. However, some circumstances (such as the West African Ebola epidemic) may require novel designs that could be considered valid for licensure by regulatory agencies. In addition, protocol-defined analytic plans for these studies should include clinical as well as etiologically confirmed endpoints (e.g. all cause hospitalisations, pneumonias, acute gastroenteritis and others as appropriate to the vaccine target), and should include vaccine-preventable disease incidence and 'number needed to vaccinate' as outcomes. Post-licensure: There is a central role for phase IV cluster randomised clinical trials that allows for estimation of population-level vaccine impact, including indirect, total and overall effects. Dynamic models should be prioritised over static models as the constant force of infection assumed in static models will usually underestimate the effectiveness and cost-effectiveness of the immunisation programme by underestimating indirect effects. The economic impact of vaccinations should incorporate health and non-health benefits of vaccination in both the vaccinated and unvaccinated populations, thus allowing for estimation of the net social value of vaccination. The full benefits of vaccination reach beyond direct prevention of etiologically confirmed disease and often extend across the life course of a vaccinated person, prevent outcomes in the wider community, stabilise health systems, promote health equity, and benefit local and national economies. The degree to which vaccinations provide broad public health benefits is stronger than for other preventive and curative interventions.
34 CFR 608.40 - What are allowable costs and what are the limitations on allowable costs?
Code of Federal Regulations, 2010 CFR
2010-07-01
... BLACK COLLEGES AND UNIVERSITIES PROGRAM What Conditions Must a Grantee Meet? § 608.40 What are allowable... classroom, library, laboratory, or other instructional facility; or (2) Use an indirect cost rate to...
48 CFR 52.216-15 - Predetermined Indirect Cost Rates.
Code of Federal Regulations, 2010 CFR
2010-10-01
.... (c) Allowability of costs and acceptability of cost allocation methods shall be determined in...) the period for which the rates apply, and (4) the specific items treated as direct costs or any changes in the items previously agreed to be direct costs. The indirect cost rate agreement shall not...
Code of Federal Regulations, 2014 CFR
2014-07-01
... permitted under the Montreal Protocol or to receive from the person for the current control period some... production quantities: (A) The maximum production that the nation is allowed under the Protocol minus the...
Suwantarat, Nuntra; Supple, Laura A; Cadnum, Jennifer L; Sankar, Thriveen; Donskey, Curtis J
2017-11-01
In an observational study, we demonstrated that hospitalized patients frequently had direct or indirect interactions with medical equipment and other fomites that are shared among patients, and these items were often contaminated with health care-associated pathogens. There is a need for protocols to ensure routine cleaning of shared portable equipment. Published by Elsevier Inc.
Determination of the V- I characteristic of NbTi wires in a wide resistivity range
NASA Astrophysics Data System (ADS)
Musenich, R.; Fabbricatore, P.; Farinon, S.; Greco, M.
2004-01-01
The voltage-current curve of superconducting wires and cables is generally directly measured within the resistivity range 10 -15-10 -12 Ω m being limited by the sensitivity and the Joule dissipation. Indirect measurements, based on the current decay in a superconducting loop, allow the determination of the curve in lower resistivity regions. Using a loop made with a Cu-NbTi wire we performed indirect V- I measurements in the range 10 -19-10 -16 Ω m. The comparison of the curves obtained by the direct and indirect method allows the experimental verification of the power law describing the transition of the superconducting wire to the normal state in a wide resistivity range. The law is discussed and justified on the basis of the superconductor behaviour in the flux creep dynamic regime.
NASA Astrophysics Data System (ADS)
Habenicht, Carsten; Schuster, Roman; Knupfer, Martin; Büchner, Bernd
2018-05-01
We have investigated indirect excitons in bulk 2H-MoS2 using transmission electron energy-loss spectroscopy. The electron energy-loss spectra were measured for various momentum transfer values parallel to the and directions of the Brillouin zone. The results allowed the identification of the indirect excitons between the valence band K v and conduction band Λc points, the Γv and K c points as well as adjacent K v and points. The energy-momentum dispersions for the K v-Λc, Γv-K c and K v1- excitons along the line are presented. The former two transitions exhibit a quadratic dispersion which allowed calculating their effective exciton masses based on the effective mass approximation. The K v1- transition follows a more linear dispersion relationship.
Indirect latex glove contamination and its inhibitory effect on vinyl polysiloxane polymerization.
Kimoto, Katsuhiko; Tanaka, Kinya; Toyoda, Minoru; Ochiai, Kent T
2005-05-01
The inhibitory effect of indirect latex contamination on the polymerization of vinyl polysiloxane (VPS) impression material has been previously reported. However, the transfer of specific elements that cause inhibition has not been confirmed, nor has the removal of such contaminants been reported. This study examined the surfaces of materials commonly used in restorative procedures that were contaminated by indirect latex glove contact and then evaluated for inhibition of polymerization of VPS. The effect of selected cleansing procedures was then studied. Four experimental groups (n = 8) were prepared: (1) clean vinyl gloves (control), (2) clean gingival retraction cords (control), (3) contaminated vinyl gloves, and (4) contaminated gingival retraction cord. Microscopic evaluation of the appearance and the characterization of surface particulate contamination were performed for each. Three cleansing protocols were then evaluated for efficacy in cleaning vinyl glove surfaces contaminated by latex contact (n = 10): (1) brushing with water, (2) brushing with soap/rinsing with water, (3) cleansing with rubbing alcohol. The subsequent degree of VPS polymerization inhibition was evaluated subjectively. A chi-square test was used for data analysis (alpha=.05). Particulate sulfur elements and sulfur-chloride compounds were present on the contaminated substrates. None of the 3 cleansing procedures eliminated polymerization inhibition (P =.33). Residual elemental sulfur remained on all tested surfaces. Particulate sulfur and sulfur-chloride compounds were identified as the particulate contamination that resulted in polymerization inhibition of the tested VPS dental impression material. Removal of these contaminants from the tested vinyl gloves and gingival retraction cord was not possible with the 3 cleansing protocols tested in this study.
2 CFR Appendix A to Part 225 - General Principles for Determining Allowable Costs
Code of Federal Regulations, 2010 CFR
2010-01-01
... department or agency 15. Indirect cost rate proposal 16. Local government 17. Public assistance cost... plan, public assistance cost allocation plan, and indirect cost rate proposal. Each of these terms is..., or any agency or instrumentality of a local government. 17. “Public assistance cost allocation plan...
26 CFR 301.6224(c)-3 - Consistent settlements.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., in the case of an indirect partner, of the pass-thru partner through which the indirect partner holds... imposes a penalty for negligence related to the $8,000 loss disallowance. Partner Y requests settlement... Service must offer Y settlement terms allowing a $6,000 loss, a negligence penalty on the $4,000...
[Development of an Excel spreadsheet for meta-analysis of indirect and mixed treatment comparisons].
Tobías, Aurelio; Catalá-López, Ferrán; Roqué, Marta
2014-01-01
Meta-analyses in clinical research usually aimed to evaluate treatment efficacy and safety in direct comparison with a unique comparator. Indirect comparisons, using the Bucher's method, can summarize primary data when information from direct comparisons is limited or nonexistent. Mixed comparisons allow combining estimates from direct and indirect comparisons, increasing statistical power. There is a need for simple applications for meta-analysis of indirect and mixed comparisons. These can easily be conducted using a Microsoft Office Excel spreadsheet. We developed a spreadsheet for indirect and mixed effects comparisons of friendly use for clinical researchers interested in systematic reviews, but non-familiarized with the use of more advanced statistical packages. The use of the proposed Excel spreadsheet for indirect and mixed comparisons can be of great use in clinical epidemiology to extend the knowledge provided by traditional meta-analysis when evidence from direct comparisons is limited or nonexistent.
FTP Extensions for Variable Protocol Specification
NASA Technical Reports Server (NTRS)
Allman, Mark; Ostermann, Shawn
2000-01-01
The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.
Automating Security Protocol Analysis
2004-03-01
language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java
TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, J; Chan, F; Newman, B
2014-06-15
Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze themore » scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds.« less
Innovations in energy expenditure assessment.
Achamrah, Najate; Oshima, Taku; Genton, Laurence
2018-06-15
Optimal nutritional therapy has been associated with better clinical outcomes and requires providing energy as closed as possible to measured energy expenditure. We reviewed the current innovations in energy expenditure assessment in humans, focusing on indirect calorimetry and other new alternative methods. Although considered the reference method to measure energy expenditure, the use of indirect calorimetry is currently limited by the lack of an adequate device. However, recent technical developments may allow a broader use of indirect calorimetry for in-patients and out-patients. An ongoing international academic initiative to develop a new indirect calorimeter aimed to provide innovative and affordable technical solutions for many of the current limitations of indirect calorimetry. New alternative methods to indirect calorimetry, including CO2 measurements in mechanically ventilated patients, isotopic approaches and accelerometry-based fitness equipments, show promises but have been either poorly studied and/or are not accurate compared to indirect calorimetry. Therefore, to date, energy expenditure measured by indirect calorimetry remains the gold standard to guide nutritional therapy. Some new innovative methods are demonstrating promises in energy expenditure assessment, but still need to be validated. There is an ongoing need for easy-to-use, accurate and affordable indirect calorimeter for daily use in in-patients and out-patients.
Indirect exposure to a family planning mass media campaign in Nepal.
Boulay, Marc; Storey, J Douglas; Sood, Suruchi
2002-01-01
It is often noted that some individuals become aware of a mass media program's messages through discussions with other individuals. However, the extent to which indirect exposure occurs, and its influence on behavior, are somewhat unclear. This study examines the role of indirect exposure in extending the reach of a family planning mass media campaign in Nepal. Sociometric data, gathered from nearly all women between the ages of 15 and 49 years living in six villages in Dang District, Nepal (N = 667), assessed indirect exposure to the radio program. Indirect exposure was extensive; half of all respondents were indirectly exposed to the program's messages and the overall reach of the program increased from 50% to 75% when indirect exposure was considered. Members of community groups had higher levels of direct exposure to the radio program and more extensive and diverse social networks, allowing them to serve as a conduit for these messages into the wider community. While direct exposure to the radio program appeared to influence family planning knowledge, indirect exposure was more strongly associated with contraceptive use. These findings suggest that program evaluations that ignore indirect exposure underestimate the impact of a mass media program on behavior.
Numerical approach for unstructured quantum key distribution
Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert
2016-01-01
Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739
Dipole-allowed direct band gap silicon superlattices
Oh, Young Jun; Lee, In-Ho; Kim, Sunghyun; Lee, Jooyoung; Chang, Kee Joo
2015-01-01
Silicon is the most popular material used in electronic devices. However, its poor optical properties owing to its indirect band gap nature limit its usage in optoelectronic devices. Here we present the discovery of super-stable pure-silicon superlattice structures that can serve as promising materials for solar cell applications and can lead to the realization of pure Si-based optoelectronic devices. The structures are almost identical to that of bulk Si except that defective layers are intercalated in the diamond lattice. The superlattices exhibit dipole-allowed direct band gaps as well as indirect band gaps, providing ideal conditions for the investigation of a direct-to-indirect band gap transition. The fact that almost all structural portions of the superlattices originate from bulk Si warrants their stability and good lattice matching with bulk Si. Through first-principles molecular dynamics simulations, we confirmed their thermal stability and propose a possible method to synthesize the defective layer through wafer bonding. PMID:26656482
Habenicht, Carsten; Schuster, Roman; Knupfer, Martin; Büchner, Bernd
2018-05-23
We have investigated indirect excitons in bulk 2H-MoS 2 using transmission electron energy-loss spectroscopy. The electron energy-loss spectra were measured for various momentum transfer values parallel to the [Formula: see text] and [Formula: see text] directions of the Brillouin zone. The results allowed the identification of the indirect excitons between the valence band K v and conduction band Λ c points, the Γ v and K c points as well as adjacent K v and [Formula: see text] points. The energy-momentum dispersions for the K v -Λ c , Γ v -K c and K v1 -[Formula: see text] excitons along the [Formula: see text] line are presented. The former two transitions exhibit a quadratic dispersion which allowed calculating their effective exciton masses based on the effective mass approximation. The K v1 -[Formula: see text] transition follows a more linear dispersion relationship.
An overview of the DII-HEP OpenStack based CMS data analysis
NASA Astrophysics Data System (ADS)
Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.
2015-05-01
An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.
Minimizing irreversible losses in quantum systems by local counterdiabatic driving
Sels, Dries; Polkovnikov, Anatoli
2017-01-01
Counterdiabatic driving protocols have been proposed [Demirplak M, Rice SA (2003) J Chem Phys A 107:9937–9945; Berry M (2009) J Phys A Math Theor 42:365303] as a means to make fast changes in the Hamiltonian without exciting transitions. Such driving in principle allows one to realize arbitrarily fast annealing protocols or implement fast dissipationless driving, circumventing standard adiabatic limitations requiring infinitesimally slow rates. These ideas were tested and used both experimentally and theoretically in small systems, but in larger chaotic systems, it is known that exact counterdiabatic protocols do not exist. In this work, we develop a simple variational approach allowing one to find the best possible counterdiabatic protocols given physical constraints, like locality. These protocols are easy to derive and implement both experimentally and numerically. We show that, using these approximate protocols, one can drastically suppress heating and increase fidelity of quantum annealing protocols in complex many-particle systems. In the fast limit, these protocols provide an effective dual description of adiabatic dynamics, where the coupling constant plays the role of time and the counterdiabatic term plays the role of the Hamiltonian. PMID:28461472
Optimization of OSPF Routing in IP Networks
NASA Astrophysics Data System (ADS)
Bley, Andreas; Fortz, Bernard; Gourdin, Eric; Holmberg, Kaj; Klopfenstein, Olivier; Pióro, Michał; Tomaszewski, Artur; Ümit, Hakan
The Internet is a huge world-wide packet switching network comprised of more than 13,000 distinct subnetworks, referred to as Autonomous Systems (ASs)
Separating astrophysical sources from indirect dark matter signals
Siegal-Gaskins, Jennifer M.
2015-01-01
Indirect searches for products of dark matter annihilation and decay face the challenge of identifying an uncertain and subdominant signal in the presence of uncertain backgrounds. Two valuable approaches to this problem are (i) using analysis methods which take advantage of different features in the energy spectrum and angular distribution of the signal and backgrounds and (ii) more accurately characterizing backgrounds, which allows for more robust identification of possible signals. These two approaches are complementary and can be significantly strengthened when used together. I review the status of indirect searches with gamma rays using two promising targets, the Inner Galaxy and the isotropic gamma-ray background. For both targets, uncertainties in the properties of backgrounds are a major limitation to the sensitivity of indirect searches. I then highlight approaches which can enhance the sensitivity of indirect searches using these targets. PMID:25304638
Comparison of protocols measuring diffusion and partition coefficients in the stratum corneum.
Rothe, H; Obringer, C; Manwaring, J; Avci, C; Wargniez, W; Eilstein, J; Hewitt, N; Cubberley, R; Duplan, H; Lange, D; Jacques-Jamin, C; Klaric, M; Schepky, A; Grégoire, S
2017-07-01
Partition (K) and diffusion (D) coefficients are important to measure for the modelling of skin penetration of chemicals through the stratum corneum (SC). We compared the feasibility of three protocols for the testing of 50 chemicals in our main studies, using three cosmetics-relevant model chemicals with a wide range of logP values. Protocol 1: SC concentration-depth profile using tape-stripping (measures K SC/v and D SC /H SC 2 , where H SC is the SC thickness); Protocol 2A: incubation of isolated SC with chemical (direct measurement of K SC/v only) and Protocol 2B: diffusion through isolated SC mounted on a Franz cell (measures K SC/v and D SC /H SC 2 , and is based on Fick's laws). K SC/v values for caffeine and resorcinol using Protocol 1 and 2B were within 30% of each other, values using Protocol 2A were ~two-fold higher, and all values were within 10-fold of each other. Only indirect determination of K SC/v by Protocol 2B was different from the direct measurement of K SC/v by Protocol 2A and Protocol 1 for 7-EC. The variability of K SC/v for all three chemicals using Protocol 2B was higher compared to Protocol 1 and 2A. D SC /H SC 2 values for the three chemicals were of the same order of magnitude using all three protocols. Additionally, using Protocol 1, there was very little difference between parameters measured in pig and human SC. In conclusion, K SC/v, and D SC values were comparable using different methods. Pig skin might be a good surrogate for human skin for the three chemicals tested. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd.
SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.
Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T
2009-09-23
SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs.
Research into alternative network approaches for space operations
NASA Technical Reports Server (NTRS)
Kusmanoff, Antone L.; Barton, Timothy J.
1990-01-01
The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.
Dandanell, Sune; Præst, Charlotte Boslev; Søndergård, Stine Dam; Skovborg, Camilla; Dela, Flemming; Larsen, Steen; Helge, Jørn Wulff
2017-04-01
Maximal fat oxidation (MFO) and the exercise intensity that elicits MFO (Fat Max ) are commonly determined by indirect calorimetry during graded exercise tests in both obese and normal-weight individuals. However, no protocol has been validated in individuals with obesity. Thus, the aims were to develop a graded exercise protocol for determination of Fat Max in individuals with obesity, and to test validity and inter-method reliability. Fat oxidation was assessed over a range of exercise intensities in 16 individuals (age: 28 (26-29) years; body mass index: 36 (35-38) kg·m -2 ; 95% confidence interval) on a cycle ergometer. The graded exercise protocol was validated against a short continuous exercise (SCE) protocol, in which Fat Max was determined from fat oxidation at rest and during 10 min of continuous exercise at 35%, 50%, and 65% of maximal oxygen uptake. Intraclass and Pearson correlation coefficients between the protocols were 0.75 and 0.72 and within-subject coefficient of variation (CV) was 5 (3-7)%. A Bland-Altman plot revealed a bias of -3% points of maximal oxygen uptake (limits of agreement: -12 to 7). A tendency towards a systematic difference (p = 0.06) was observed, where Fat Max occurred at 42 (40-44)% and 45 (43-47)% of maximal oxygen uptake with the graded and the SCE protocol, respectively. In conclusion, there was a high-excellent correlation and a low CV between the 2 protocols, suggesting that the graded exercise protocol has a high inter-method reliability. However, considerable intra-individual variation and a trend towards systematic difference between the protocols reveal that further optimization of the graded exercise protocol is needed to improve validity.
Indirect reciprocity provides a narrow margin of efficiency for costly punishment
Iwasa, Yoh; Nowak, Martin A.
2008-01-01
Indirect reciprocity1-5 is a key mechanism for the evolution of human cooperation. Our behavior toward other people depends not only on what they have done to us, but also on what they have done to others. Indirect reciprocity works via reputation5-17. The standard model of indirect reciprocity offers a binary choice: people can either cooperate or defect. Cooperation implies a cost for the donor and a benefit for the recipient. Defection has no cost and yields no benefit. Currently there is considerable interest in studying the effect of costly (or altruistic) punishment on human behavior18-25. Punishment implies a cost for the punished person. Costly punishment means that the punisher also pays a cost. It has been suggested that costly punishment between individuals can promote cooperation. Here we study the role of costly punishment in an explicit model of indirect reciprocity. We analyze all social norms, which depend on the action of the donor and the reputation of the recipient. We allow errors in assigning reputation and study gossip as a mechanism for establishing coherence. We characterize all strategies that allow the evolutionary stability of cooperation. Some of those strategies use costly punishment, while others do not. We find that punishment strategies typically reduce the average payoff of the population. Consequently, there is only a small parameter region where costly punishment leads to an efficient equilibrium. In most cases, the population does better by not using costly punishment. The efficient strategy for indirect reciprocity is to withhold help for defectors rather than punish them. PMID:19122640
A cost minimization analysis of early correction of anterior crossbite—a randomized controlled trial
Norlund, Anders; Petrén, Sofia; Bondemark, Lars
2016-01-01
Summary Objective: Economic evaluations provide an important basis for allocation of resources and health services planning. The aim of this study was to evaluate and compare the costs of correcting anterior crossbite with functional shift, using fixed or removable appliances (FA or RA) and to relate the costs to the effects, using cost-minimization analysis. Design, Setting, and Participants: Sixty-two patients with anterior crossbite and functional shift were randomized in blocks of 10. Thirty-one patients were randomized to be treated with brackets and arch wire (FA) and 31 with an acrylic plate (RA). Duration of treatment and number and estimated length of appointments and cancellations were registered. Direct costs (premises, staff salaries, material, and laboratory costs) and indirect costs (the accompanying parents’ loss of income while absent from work) were calculated and evaluated with reference to successful outcome alone, to successful and unsuccessful outcomes and to re-treatment when required. Societal costs were defined as the sum of direct and indirect costs. Interventions: Treatment with FA or RA. Results: There were no significant differences between FA and RA with respect to direct costs for treatment time, but both indirect costs and direct costs for material were significantly lower for FA. The total societal costs were lower for FA than for RA. Limitations: Costs depend on local factors and should not be directly extrapolated to other locations. Conclusion: The analysis disclosed significant economic benefits for FA over RA. Even when only successful outcomes were assessed, treatment with RA was more expensive. Trial registration: This trial was not registered. Protocol: The protocol was not published before trial commencement. PMID:25940585
Stem Cell Monitoring with a Direct or Indirect Labeling Method.
Kim, Min Hwan; Lee, Yong Jin; Kang, Joo Hyun
2016-12-01
The molecular imaging techniques allow monitoring of the transplanted cells in the same individuals over time, from early localization to the survival, migration, and differentiation. Generally, there are two methods of stem cell labeling: direct and indirect labeling methods. The direct labeling method introduces a labeling agent into the cell, which is stably incorporated or attached to the cells prior to transplantation. Direct labeling of cells with radionuclides is a simple method with relatively fewer adverse events related to genetic responses. However, it can only allow short-term distribution of transplanted cells because of the decreasing imaging signal with radiodecay, according to the physical half-lives, or the signal becomes more diffuse with cell division and dispersion. The indirect labeling method is based on the expression of a reporter gene transduced into the cell before transplantation, which is then visualized upon the injection of an appropriate probe or substrate. In this review, various imaging strategies to monitor the survival and behavior change of transplanted stem cells are covered. Taking these new approaches together, the direct and indirect labeling methods may provide new insights on the roles of in vivo stem cell monitoring, from bench to bedside.
SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services
Gessler, Damian DG; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T
2009-01-01
Background SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. Results There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at , developer tools at , and a portal to third-party ontologies at (a "swap meet"). Conclusion SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs. PMID:19775460
[Euthanasia and the doctrine of double effect].
Klein, Martin
2005-01-01
Direct active euthanasia is prohibited in most countries while passive and indirect is not. However, many arguments against the legalization of voluntary active euthanasia are flawed. Ethical differences between active and passive or indirect euthanasia are difficult to maintain especially when the passivity of the actor causes death. The crucial point is not activity or passivity but respect for the autonomy of individual human beings. In particular there appears to be little ethical difference between active and indirect euthanasia. Indirect euthanasia has often been justified by the principle of double effect, which traces back to Thomas Aquinas. But resorting to this rule contains a logical fallacy. The principle of double effect does not allow foreseen and unwanted adverse effects of an action to occur when they are avoidable. In terminal sedation, an example for indirect euthanasia, hypoxemia and dehydration can easily be prevented by respirator therapy and fluid administration. Therefore the rule of double effect is not applicable. Indirect and direct active euthanasia cannot be ethically distinguished by resorting to the principle of double effect.
Collocott, Shirley Jf; Kelly, Edel; Ellis, Richard F
2018-03-01
Early mobilisation protocols after repair of extensor tendons in zone V and VI provide better outcomes than immobilisation protocols. This systematic review investigated different early active mobilisation protocols used after extensor tendon repair in zone V and VI. The purpose was to determine whether any one early active mobilisation protocol provides superior results. An extensive literature search was conducted to identify articles investigating the outcomes of early active mobilisation protocols after extensor tendon repair in zone V and VI. Databases searched were AMED, Embase, Medline, Cochrane and CINAHL. Studies were included if they involved participants with extensor tendon repairs in zone V and VI in digits 2-5 and described a post-operative rehabilitation protocol which allowed early active metacarpophalangeal joint extension. Study designs included were randomised controlled trials, observational studies, cohort studies and case series. The Structured Effectiveness Quality Evaluation Scale was used to evaluate the methodological quality of the included studies. Twelve articles met the inclusion criteria. Two types of early active mobilisation protocols were identified: controlled active motion protocols and relative motion extension splinting protocols. Articles describing relative motion extension splinting protocols were more recent but of lower methodological quality than those describing controlled active motion protocols. Participants treated with controlled active motion and relative motion extension splinting protocols had similar range of motion outcomes, but those in relative motion extension splinting groups returned to work earlier. The evidence reviewed suggested that relative motion extension splinting protocols may allow an earlier return to function than controlled active motion protocols without a greater risk of complication.
Ambardekar, Shubha; Shochet, Tara; Bracken, Hillary; Coyaji, Kurus; Winikoff, Beverly
2014-08-15
Trials of interventions for PPH prevention and treatment rely on different measurement methods for the quantification of blood loss and identification of PPH. This study's objective was to compare measures of blood loss obtained from two different measurement protocols frequently used in studies. Nine hundred women presenting for vaginal delivery were randomized to a direct method (a calibrated delivery drape) or an indirect method (a shallow bedpan placed below the buttocks and weighing the collected blood and blood-soaked gauze/pads). Blood loss was measured from immediately after delivery for at least one hour or until active bleeding stopped. Significantly greater mean blood loss was recorded by the direct than by the indirect measurement technique (253.9 mL and 195.3 mL, respectively; difference = 58.6 mL (95% CI: 31-86); p < 0.001). Almost twice as many women in the direct than in the indirect group measured blood loss > 500 mL (8.7% vs. 4.7%, p = 0.02). The study suggests a real and significant difference in blood loss measurement between these methods. Research using blood loss measurement as an endpoint needs to be interpreted taking measurement technique into consideration. This study has been registered at clinicaltrials.gov as NCT01885845.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hendrick, G.K.; Frizzell, R.T.; Cherrington, A.D.
In the 7-days fasted conscious dog, unlike the postabsorptive conscious dog, somatostatin infusion results in decreased levels of nonesterified fatty acids (NEFA) and increased glucose utilization (R{sub d}) even when insulin and glucagon levels are held constant. The aim of this study was to determine whether NEFA replacement in such animals would prevent the increase in R{sub d}. In each of three protocols there was an 80-min tracer equilibration period, a 40-min basal period, and a 3-h test period. During the test period in the first protocol saline was infused, in the second protocol somatostatin was infused along with intraportalmore » replacement amounts of insulin and glucagon (hormone replacement), while in the third protocol somatostatin plus the pancreatic hormones were infused with concurrent heparin plus Intralipid infusion. Glucose turnover was assessed using (3-{sup 3}H)glucose. The peripheral levels of insulin, glucagon, and glucose were similar and constant in all three protocols; however, during somatostatin infusion, exogenous glucose infusion was necessary to maintain euglycemia. The NEFA level was constant during saline infusion and decreased in the hormone replacement protocol. In the hormone replacement plus NEFA protocol, the NEFA level did not change during the first 90-min period and then increased during the second 90-min period. After a prolonged fast in the dog, (1) somatostatin directly or indirectly inhibits adipose tissue NEFA release and causes a decrease in the plasma NEFA level, and (2) this decrease in the NEFA level causes an increase in R{sub d}.« less
Alba, Annia; Marcet, Ricardo; Otero, Oscar; Hernández, Hilda M; Figueredo, Mabel; Sarracent, Jorge
2016-02-01
Purification of immunoglobulin M (IgM) antibodies could be challenging, and is often characterized by the optimization of the purification protocol to best suit the particular features of the molecule. Here, two different schemes were compared to purify, from ascites, the 1E4 IgM monoclonal antibody (mAb) previously raised against the stage of redia of the trematode Fasciola hepatica. This immunoglobulin is used as capture antibody in an immunoenzymatic assay to detect parasite ongoing infection in its intermediate hosts. The first purification protocol of the 1E4 mAb involved two chromatographic steps: an affinity chromatography on a Concanavalin A matrix followed by size exclusion chromatography. An immunoaffinity chromatography was selected as the second protocol for one-step purification of the antibody using the crude extract of adult parasites coupled to a commercial matrix. Immunoreactivity of the fractions during purification schemes was assessed by indirect immunoenzymatic assays against the crude extract of F. hepatica rediae, while purity was estimated by protein electrophoresis. Losses on the recovery of the antibody isolated by the first purification protocol occurred due to protein precipitation during the concentration of the sample and to low resolution of the size exclusion molecular chromatography step regarding this particular immunoglobulin. The immunoaffinity chromatography using F. hepatica antigens as ligands proved to be the most suitable protocol yielding a pure and immunoreactive antibody. The purification protocols used are discussed regarding efficiency and difficulties.
Popularity and Resource Control Goals as Predictors of Adolescent Indirect Aggression.
Dyches, Karmon D; Mayeux, Lara
2015-01-01
Resource Control Theory conceptualizes aggression as a behavior that allows access to, and control of, limited resources (P. H. Hawley, 1999 ). This study investigated the associations of adolescents' indirect aggression with their resource control goals, or goals related to controlling social resources such as dating opportunities and peer status, and with their levels of popularity and social intelligence. Participants were 109 seventh-graders (52% girls) who completed a resource control goals measure, the Tromsø Social Intelligence Scale, and peer nominations of popularity and indirect aggression. Results indicated positive associations between resource control goals and peer-nominated indirect aggression, with popularity further moderating these associations. These findings suggest that the resource control goals of adolescents can be a motivating force to engage in hurtful behaviors. They provide a context from which peer relations researchers can improve their understanding and prevention of adolescents' indirect aggression.
EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards
In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers o...
Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software
NASA Astrophysics Data System (ADS)
Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg
2017-09-01
100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.
Increased cardiac output elicits higher V̇O2max in response to self-paced exercise.
Astorino, Todd Anthony; McMillan, David William; Edmunds, Ross Montgomery; Sanchez, Eduardo
2015-03-01
Recently, a self-paced protocol demonstrated higher maximal oxygen uptake versus the traditional ramp protocol. The primary aim of the current study was to further explore potential differences in maximal oxygen uptake between the ramp and self-paced protocols using simultaneous measurement of cardiac output. Active men and women of various fitness levels (N = 30, mean age = 26.0 ± 5.0 years) completed 3 graded exercise tests separated by a minimum of 48 h. Participants initially completed progressive ramp exercise to exhaustion to determine maximal oxygen uptake followed by a verification test to confirm maximal oxygen uptake attainment. Over the next 2 sessions, they performed a self-paced and an additional ramp protocol. During exercise, gas exchange data were obtained using indirect calorimetry, and thoracic impedance was utilized to estimate hemodynamic function (stroke volume and cardiac output). One-way ANOVA with repeated measures was used to determine differences in maximal oxygen uptake and cardiac output between ramp and self-paced testing. Results demonstrated lower (p < 0.001) maximal oxygen uptake via the ramp (47.2 ± 10.2 mL·kg(-1)·min(-1)) versus the self-paced (50.2 ± 9.6 mL·kg(-1)·min(-1)) protocol, with no interaction (p = 0.06) seen for fitness level. Maximal heart rate and cardiac output (p = 0.02) were higher in the self-paced protocol versus ramp exercise. In conclusion, data show that the traditional ramp protocol may underestimate maximal oxygen uptake compared with a newly developed self-paced protocol, with a greater cardiac output potentially responsible for this outcome.
Song, Fujian; Xiong, Tengbin; Parekh-Bhurke, Sheetal; Loke, Yoon K; Sutton, Alex J; Eastwood, Alison J; Holland, Richard; Chen, Yen-Fu; Glenny, Anne-Marie; Deeks, Jonathan J; Altman, Doug G
2011-08-16
To investigate the agreement between direct and indirect comparisons of competing healthcare interventions. Meta-epidemiological study based on sample of meta-analyses of randomised controlled trials. Data sources Cochrane Database of Systematic Reviews and PubMed. Inclusion criteria Systematic reviews that provided sufficient data for both direct comparison and independent indirect comparisons of two interventions on the basis of a common comparator and in which the odds ratio could be used as the outcome statistic. Inconsistency measured by the difference in the log odds ratio between the direct and indirect methods. The study included 112 independent trial networks (including 1552 trials with 478,775 patients in total) that allowed both direct and indirect comparison of two interventions. Indirect comparison had already been explicitly done in only 13 of the 85 Cochrane reviews included. The inconsistency between the direct and indirect comparison was statistically significant in 16 cases (14%, 95% confidence interval 9% to 22%). The statistically significant inconsistency was associated with fewer trials, subjectively assessed outcomes, and statistically significant effects of treatment in either direct or indirect comparisons. Owing to considerable inconsistency, many (14/39) of the statistically significant effects by direct comparison became non-significant when the direct and indirect estimates were combined. Significant inconsistency between direct and indirect comparisons may be more prevalent than previously observed. Direct and indirect estimates should be combined in mixed treatment comparisons only after adequate assessment of the consistency of the evidence.
Xiong, Tengbin; Parekh-Bhurke, Sheetal; Loke, Yoon K; Sutton, Alex J; Eastwood, Alison J; Holland, Richard; Chen, Yen-Fu; Glenny, Anne-Marie; Deeks, Jonathan J; Altman, Doug G
2011-01-01
Objective To investigate the agreement between direct and indirect comparisons of competing healthcare interventions. Design Meta-epidemiological study based on sample of meta-analyses of randomised controlled trials. Data sources Cochrane Database of Systematic Reviews and PubMed. Inclusion criteria Systematic reviews that provided sufficient data for both direct comparison and independent indirect comparisons of two interventions on the basis of a common comparator and in which the odds ratio could be used as the outcome statistic. Main outcome measure Inconsistency measured by the difference in the log odds ratio between the direct and indirect methods. Results The study included 112 independent trial networks (including 1552 trials with 478 775 patients in total) that allowed both direct and indirect comparison of two interventions. Indirect comparison had already been explicitly done in only 13 of the 85 Cochrane reviews included. The inconsistency between the direct and indirect comparison was statistically significant in 16 cases (14%, 95% confidence interval 9% to 22%). The statistically significant inconsistency was associated with fewer trials, subjectively assessed outcomes, and statistically significant effects of treatment in either direct or indirect comparisons. Owing to considerable inconsistency, many (14/39) of the statistically significant effects by direct comparison became non-significant when the direct and indirect estimates were combined. Conclusions Significant inconsistency between direct and indirect comparisons may be more prevalent than previously observed. Direct and indirect estimates should be combined in mixed treatment comparisons only after adequate assessment of the consistency of the evidence. PMID:21846695
Anonymity-preserving Reputation Management System for health sector
Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz
2018-01-01
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267
Privacy-preserving record linkage using Bloom filters
2009-01-01
Background Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. Methods A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Results Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. Conclusion We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage. PMID:19706187
Privacy-preserving record linkage using Bloom filters.
Schnell, Rainer; Bachteler, Tobias; Reiher, Jörg
2009-08-25
Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage.
Chan, Jocelyn; Nguyen, Cattram D; Lai, Jana Y R; Dunne, Eileen M; Andrews, Ross; Blyth, Christopher C; Datta, Siddhartha; Fox, Kim; Ford, Rebecca; Hinds, Jason; La Vincente, Sophie; Lehmann, Deborah; Lim, Ruth; Mungun, Tuya; Newton, Paul N; Phetsouvanh, Rattanaphone; Pomat, Willam S; Xeuatvongsa, Anonh; von Mollendorf, Claire; Dance, David A B; Satzke, Catherine; Muholland, Kim; Russell, Fiona M
2018-05-18
Pneumococcal conjugate vaccines (PCVs) prevent disease through both direct protection of vaccinated individuals and indirect protection of unvaccinated individuals by reducing nasopharyngeal (NP) carriage and transmission of vaccine-type (VT) pneumococci. While the indirect effects of PCV vaccination are well described, the PCV coverage required to achieve the indirect effects is unknown. We will investigate the relationship between PCV coverage and VT carriage among undervaccinated children using hospital-based NP pneumococcal carriage surveillance at three sites in Asia and the Pacific. We are recruiting cases, defined as children aged 2-59 months admitted to participating hospitals with acute respiratory infection in Lao People's Democratic Republic, Mongolia and Papua New Guinea. Thirteen-valent PCV status is obtained from written records. NP swabs are collected according to standard methods, screened using lytA qPCR and serotyped by microarray. Village-level vaccination coverage, for the resident communities of the recruited cases, is determined using administrative data or community survey. Our analysis will investigate the relationship between VT carriage among undervaccinated cases (indirect effects) and vaccine coverage using generalised estimating equations. Ethical approval has been obtained from the relevant ethics committees at participating sites. The results are intended for publication in open-access peer-reviewed journals and will demonstrate methods suitable for low- and middle-income countries to monitor vaccine impact and inform vaccine policy makers about the PCV coverage required to achieve indirect protection. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers of...
Nonblocking and orphan free message logging protocols
NASA Technical Reports Server (NTRS)
Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith
1992-01-01
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.
Nonblocking and orphan free message logging protocols
NASA Astrophysics Data System (ADS)
Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith
1992-12-01
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.
Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex
2011-04-15
In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.
Bovali, Efstathia; Kiliaridis, Stavros; Cornelis, Marie A
2014-12-01
The objective of this 2-arm parallel single-center trial was to compare placement time and numbers of failures of mandibular lingual retainers bonded with an indirect procedure vs a direct bonding procedure. Sixty-four consecutive patients at the postgraduate orthodontic clinic of the University of Geneva in Switzerland scheduled for debonding and mandibular fixed retainer placement were randomly allocated to either an indirect bonding procedure or a traditional direct bonding procedure. Eligibility criteria were the presence of the 4 mandibular incisors and the 2 mandibular canines, and no active caries, restorations, fractures, or periodontal disease of these teeth. The patients were randomized in blocks of 4; the randomization sequence was generated using an online randomization service (www.randomization.com). Allocation concealment was secured by contacting the sequence generator for treatment assignment; blinding was possible for outcome assessment only. Bonding time was measured for each procedure. Unpaired t tests were used to assess differences in time. Patients were recalled at 1, 2, 4, and 6 months after bonding. Mandibular fixed retainers having at least 1 composite pad debonded were considered as failures. The log-rank test was used to compare the Kaplan-Meier survival curves of both procedures. A test of proportion was applied to compare the failures at 6 months between the treatment groups. Sixty-four patients were randomized in a 1:1 ratio. One patient dropped out at baseline after the bonding procedure, and 3 patients did not attend the recalls at 4 and 6 months. Bonding time was significantly shorter for the indirect procedure (321 ± 31 seconds, mean ± SD) than for the direct procedure (401 ± 40 seconds) (per protocol analysis of 63 patients: mean difference = 80 seconds; 95% CI = 62.4-98.1; P <0.001). The 6-month numbers of failures were 10 of 31 (32%) with the indirect technique and 7 of 29 (24%) with the direct technique (log rank: P = 0.35; test of proportions: risk difference = 0.08; 95% CI = -0.15 to 0.31; P = 0.49). No serious harm was observed except for plaque accumulation. Indirect bonding was statistically significantly faster than direct bonding, with both techniques showing similar risks of failure. This trial was not registered. The protocol was not published before trial commencement. No funding or conflict of interest to be declared. Copyright © 2014 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.
(13)C-(15)N correlation via unsymmetrical indirect covariance NMR: application to vinblastine.
Martin, Gary E; Hilton, Bruce D; Blinov, Kirill A; Williams, Antony J
2007-12-01
Unsymmetrical indirect covariance processing methods allow the derivation of hyphenated 2D NMR data from the component 2D spectra, potentially circumventing the acquisition of the much lower sensitivity hyphenated 2D NMR experimental data. Calculation of HSQC-COSY and HSQC-NOESY spectra from GHSQC, COSY, and NOESY spectra, respectively, has been reported. The use of unsymmetrical indirect covariance processing has also been applied to the combination of (1)H- (13)C GHSQC and (1)H- (15)N long-range correlation data (GHMBC, IMPEACH, or CIGAR-HMBC). The application of unsymmetrical indirect covariance processing to spectra of vinblastine is now reported, specifically the algorithmic extraction of (13)C- (15)N correlations via the unsymmetrical indirect covariance processing of the combination of (1)H- (13)C GHSQC and long-range (1)H- (15)N GHMBC to produce the equivalent of a (13)C- (15)N HSQC-HMBC correlation spectrum. The elimination of artifact responses with aromatic solvent-induced shifts (ASIS) is shown in addition to a method of forecasting potential artifact responses through the indirect covariance processing of the GHSQC spectrum used in the unsymmetrical indirect covariance processing.
Roccia, Fabio; Boffano, Paolo; Guglielmi, Valeria; Forni, Paolo; Cassarino, Emanuele; Nadalin, Juri; Fea, Antonio; Gerbino, Giovanni
2011-01-01
Aim: This study was designed to evaluate the incidence of severe ocular injuries associated to maxillofacial fractures and report their management in the Emergency Department. Patients and Methods: Among the 1779 patients admitted for maxillofacial fractures, those with partial or total loss of vision at the time of emergency consultation were included in the study. Data collected from the patients’ medical records included age, gender, mechanism of injury, location and type of facial fractures, type of ocular injuries and cause of blindness, methods of treatment, and days of hospitalization. Results: Forty patients (2.2%), 32 men and 8 women, ranging from 17 to 85 years of age, presented with severely reduced vision or blindness associated to fractures of the facial middle third with involvement of one or more orbital walls, mainly caused by motor vehicle and work accidents. In 18 patients, severe ocular injuries were determined by direct lesion of the globe, in 14 by direct or indirect traumatic optic neuropathy and in 8 by a retrobulbar hematoma. Direct lesion of the eyeball was treated by prompt repair or enucleation of the globe, though no or little recovery of vision was obtained. Ophthalmologic and/or maxillofacial treatment of the anterior compartment lesions of the eye allowed a partial or total recovery of the vision. A partial or total recovery of the vision was observed in almost all the patients with indirect traumatic optic neuropathy after administration of steroids according to NASCIS II protocol. Likewise, an evident improvement of the vision was obtained by immediate drainage of retrobulbar hematoma. Conclusions: Early diagnosis of the nature of the ophthalmic injury and treatment are important, and involvement of the ophthalmologist is mandatory. PMID:21769204
Coma Auli, Núria; Mejía-Lancheros, Cília; Berenguera, Anna; Mayans, Martí Vall; Lasagabaster, Maider Arando; Pujol-Ribera, Enriqueta
2013-01-01
Introduction Sexually transmitted infections (STIs) and HIV are a serious global public health issue. These diseases are largely preventable, as they are directly and indirectly associated with potentially modifiable factors, including socioeconomic conditions. Sexual transmission is responsible for over 75% of new HIV infections worldwide. Moreover, commercial sex workers and their clients are two of the groups at the highest risk of acquiring and transmitting these infectious diseases, due to an extensive number of sexual encounters and the various factors related to commercial sex situations. This qualitative study aims to deepen the understanding of the risk perception of STIs and HIV and their associated factors in Nigerian commercial sex workers in the city of Barcelona. Methods and analysis This is a qualitative, descriptive, interpretive study based on a social constructivist and phenomenological perspective conducted on a saturated sample of Nigerian commercial sex workers in the city of Barcelona. Data will be collected through semistructured individual and triangular group interviews. Information will be examined using a sociological discourse analysis, allowing us to understand the social and individual factors related to the risk perception of STIs and HIV in commercial sex workers. Discussion Qualitative studies are an important element in identifying individual, social and contextual factors directly or indirectly related to the health/disease process. This qualitative study will provide essential knowledge to improve health promotion, prevention strategies and effective management of STIs both for commercial sex workers and their clients. Ethics This study has been approved by the clinical research ethics committee (CEIC) of IDIAP Jordi Gol in Barcelona, 2012. PMID:23901029
Molnár, Péter K; Dobson, Andrew P; Kutz, Susan J
2013-11-01
Climate change is expected to alter the dynamics of host-parasite systems globally. One key element in developing predictive models for these impacts is the life cycle of the parasite. It is, for example, commonly assumed that parasites with an indirect life cycle would be more sensitive to changing environmental conditions than parasites with a direct life cycle due to the greater chance that at least one of their obligate host species will go extinct. Here, we challenge this notion by contrasting parasitic nematodes with a direct life cycle against those with an indirect life cycle. Specifically, we suggest that behavioral thermoregulation by the intermediate host may buffer the larvae of indirectly transmitted parasites against temperature extremes, and hence climate warming. We term this the 'shelter effect'. Formalizing each life cycle in a comprehensive model reveals a fitness advantage for the direct life cycle over the indirect life cycle at low temperatures, but the shelter effect reverses this advantage at high temperatures. When examined for seasonal environments, the models suggest that climate warming may in some regions create a temporal niche in mid-summer that excludes parasites with a direct life cycle, but allows parasites with an indirect life cycle to persist. These patterns are amplified if parasite larvae are able to manipulate their intermediate host to increase ingestion probability by definite hosts. Furthermore, our results suggest that exploiting the benefits of host sheltering may have aided the evolution of indirect life cycles. Our modeling framework utilizes the Metabolic Theory of Ecology to synthesize the complexities of host behavioral thermoregulation and its impacts on various temperature-dependent parasite life history components in a single measure of fitness, R0 . It allows quantitative predictions of climate change impacts, and is easily generalized to many host-parasite systems. © 2013 John Wiley & Sons Ltd.
Bayesian adaptive survey protocols for resource management
Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.
2011-01-01
Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of conservation concern.
A versatile indirect detector design for hard X-ray microimaging
NASA Astrophysics Data System (ADS)
Douissard, P.-A.; Cecilia, A.; Rochet, X.; Chapel, X.; Martin, T.; van de Kamp, T.; Helfen, L.; Baumbach, T.; Luquot, L.; Xiao, X.; Meinhardt, J.; Rack, A.
2012-09-01
Indirect X-ray detectors are of outstanding importance for high resolution imaging, especially at synchrotron light sources: while consisting mostly of components which are widely commercially available, they allow for a broad range of applications in terms of the X-ray energy employed, radiation dose to the detector, data acquisition rate and spatial resolving power. Frequently, an indirect detector consists of a thin-film single crystal scintillator and a high-resolution visible light microscope as well as a camera. In this article, a novel modular-based indirect design is introduced, which offers several advantages: it can be adapted for different cameras, i.e. different sensor sizes, and can be trimmed to work either with (quasi-)monochromatic illumination and the correspondingly lower absorbed dose or with intense white beam irradiation. In addition, it allows for a motorized quick exchange between different magnifications / spatial resolutions. Developed within the European project SCINTAX, it is now commercially available. The characteristics of the detector in its different configurations (i.e. for low dose or for high dose irradiation) as measured within the SCINTAX project will be outlined. Together with selected applications from materials research, non-destructive evaluation and life sciences they underline the potential of this design to make high resolution X-ray imaging widely available.
Electrical stimulation systems for cardiac tissue engineering
Tandon, Nina; Cannizzaro, Christopher; Chao, Pen-Hsiu Grace; Maidhof, Robert; Marsano, Anna; Au, Hoi Ting Heidi; Radisic, Milica; Vunjak-Novakovic, Gordana
2009-01-01
We describe a protocol for tissue engineering of synchronously contractile cardiac constructs by culturing cardiac cells with the application of pulsatile electrical fields designed to mimic those present in the native heart. Tissue culture is conducted in a customized chamber built to allow for cultivation of (i) engineered three-dimensional (3D) cardiac tissue constructs, (ii) cell monolayers on flat substrates or (iii) cells on patterned substrates. This also allows for analysis of the individual and interactive effects of pulsatile electrical field stimulation and substrate topography on cell differentiation and assembly. The protocol is designed to allow for delivery of predictable electrical field stimuli to cells, monitoring environmental parameters, and assessment of cell and tissue responses. The duration of the protocol is 5 d for two-dimensional cultures and 10 d for 3D cultures. PMID:19180087
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-03
... assess the performance of an approved sampling protocol and to allow for continued sample collection and... developmental sampling protocol. While this application was being reviewed and was available for public comment, the sampling protocol being tested was adopted into the National Shellfish Sanitation Program by the...
Quantum cryptography as a retrodiction problem.
Werner, A H; Franz, T; Werner, R F
2009-11-27
We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and key distribution.
A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets
ERIC Educational Resources Information Center
Lee, Kevin M.; Nicoll, Gayle; Brooks, David W.
2004-01-01
This paper compares two protocols for web-based instruction using simulations in an introductory physics class. The Inquiry protocol allowed students to control input parameters while the Worked Example protocol did not. Students in the Worked Example group performed significantly higher on a common assessment. The ramifications of this study are…
Asynchronous reference frame agreement in a quantum network
NASA Astrophysics Data System (ADS)
Islam, Tanvirul; Wehner, Stephanie
2016-03-01
An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.
"We need a mechanism to report abuses of women's human rights".
Facio, A
1996-01-01
This article discusses the Optional Protocol of the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW). This convention is the only instrument protecting the human rights of women at the international level. However, even if the convention was the best possible women's human rights documentation, there was no mechanism for reporting the abuses. The women's movement has long been pressing for the approval of the mechanism like the Optional Protocol, because they believe that the Protocol would fulfill the need in allowing the individual and collective accusations of human rights abuses. It means that a woman or a group of women can go to the committee and denounce an action as discriminatory. The committee can only receive reports and make recommendations, whereas having a Protocol would allow the committee to direct complaints, be able to investigate them, and make more specific recommendations. Those countries ratifying the CEDAW don't automatically agree to the Protocol, thus it is the country's discretion to either comply with the Protocol or not. There are also those who are against the Protocol and claim ironically that an Optional Protocol for Political and Civil rights already exists. But such mechanisms do not work for women's rights. What is most needed now is to lobby all national delegations to push the 5th Commission of the United Nations' General Assembly to approve the budget for the protocol.
Atencia, Rebeca; Stöhr, Eric J; Drane, Aimee L; Stembridge, Mike; Howatson, Glyn; Del Rio, Pablo Rodriguez Lopez; Feltrer, Yedra; Tafon, Babila; Redrobe, Sharon; Peck, Bruce; Eng, Jaclyn; Unwin, Steve; Sanchez, Carlos R; Shave, Rob E
2017-09-01
Limited data are available on hemodynamic responses to anesthetic protocols in wild-born chimpanzees (Pan troglodytes). Accordingly, this study characterized the heart rate (HR) and blood pressure responses to four anesthetic protocols in 176 clinically healthy, wild-born chimpanzees undergoing routine health assessments. Animals were anesthetized with medetomidine-ketamine (MK) (n = 101), tiletamine-zolazepam (TZ) (n = 30), tiletamine-zolazepam-medetomidine (TZM) (n = 24), or medetomidine-ketamine (maintained with isoflurane) (MKI) (n = 21). During each procedure, HR, systolic blood pressure (SBP), and diastolic blood pressure (DBP) were regularly recorded. Data were grouped according to anesthetic protocol, and mean HR, SBP, and DBP were calculated. Differences between mean HR, SBP, and DBP for each anesthetic protocol were assessed using the Kruskall-Wallis test and a Dunn multiple comparisons post hoc analysis. To assess the hemodynamic time course response to each anesthetic protocol, group mean data (±95% confidence interval [CI]) were plotted against time postanesthetic induction. Mean HR (beats/min [CI]) was significantly higher in TZ (86 [80-92]) compared to MKI (69 [61-78]) and MK (62 [60-64]) and in TZM (73 [68-78]) compared to MK. The average SBP and DBP values (mm Hg [CI]) were significantly higher in MK (130 [126-134] and 94 [91-97]) compared to TZ (104 [96-112] and 58 [53-93]) and MKI (113 [103-123] and 78 [69-87]) and in TZM (128 [120-135] and 88 [83-93]) compared to TZ. Time course data were markedly different between protocols, with MKI showing the greatest decline over time. Both the anesthetic protocol adopted and the timing of measurement after injection influence hemodynamic recordings in wild-born chimpanzees and need to be considered when monitoring or assessing cardiovascular health.
Nieto, Sonia; Dragna, Justin M.; Anslyn, Eric V.
2010-01-01
A protocol for the rapid determination of the absolute configuration and enantiomeric excess of α-chiral primary amines with potential applications in asymmetric reaction discovery has been developed. The protocol requires derivatization of α-chiral primary amines via condensation with pyridine carboxaldehyde to quantitatively yield the corresponding imine. The Cu(I) complex with 2,2'-bis (diphenylphosphino)-1,1'-dinaphthyl (BINAP -CuI) with the imine yields a metal-to-ligand-charge-transfer band (MLCT) in the visible region of the circular dichroism spectrum upon binding. Diastereomeric host-guest complexes give CD signals of the same signs, but different amplitudes, allowing for differentiation of enantiomers. Processing the primary optical data from the CD spectrum with linear discriminant analysis (LDA) allows for the determination of absolute configuration and identification of the amines, and processing with a supervised multi-layer perceptron artifical neural network (MLP-ANN) allows for the simultaneous determination of ee and concentration. The primary optical data necessary to determine the ee of unknown samples is obtained in 2 minutes per sample. To demonstrate the utility of the protocol in asymmetric reaction discovery, the ee's and concentrations for an asymmetric metal catalyzed reaction are determined. The potential of the protocol's application in high-throughput screening (HTS) of ee is discussed. PMID:19946914
Schneller, Mikkel B; Pedersen, Mogens T; Gupta, Nidhi; Aadahl, Mette; Holtermann, Andreas
2015-03-13
We compared the accuracy of five objective methods, including two newly developed methods combining accelerometry and activity type recognition (Acti4), against indirect calorimetry, to estimate total energy expenditure (EE) of different activities in semi-standardized settings. Fourteen participants performed a standardized and semi-standardized protocol including seven daily life activity types, while having their EE measured by indirect calorimetry. Simultaneously, physical activity was quantified by an ActivPAL3, two ActiGraph GT3X+'s and an Actiheart. EE was estimated by the standard ActivPAL3 software (ActivPAL), ActiGraph GT3X+ (ActiGraph) and Actiheart (Actiheart), and by a combination of activity type recognition via Acti4 software and activity counts per minute (CPM) of either a hip- or thigh-worn ActiGraph GT3X+ (AGhip + Acti4 and AGthigh + Acti4). At group level, estimated physical activities EE by Actiheart (MSE = 2.05) and AGthigh + Acti4 (MSE = 0.25) were not significantly different from measured EE by indirect calorimetry, while significantly underestimated by ActiGraph, ActivPAL and AGhip + Acti4. AGthigh + Acti4 and Actiheart explained 77% and 45%, of the individual variations in measured physical activity EE by indirect calorimetry, respectively. This study concludes that combining accelerometer data from a thigh-worn ActiGraph GT3X+ with activity type recognition improved the accuracy of activity specific EE estimation against indirect calorimetry in semi-standardized settings compared to previously validated methods using CPM only.
Geomapping of Traumatic Spinal Cord Injury in Canada and Factors Related to Triage Pattern
Noonan, Vanessa K.; Shurgold, Jayson; Chen, Jason; Rivers, Carly S.; Khaleghi Hamedani, Hamid; Humphreys, Suzanne; Bailey, Christopher S.; Attabib, Najmedden; Mac Thiong, Jean-Marc; Goytan, Michael; Paquet, Jerome; Fox, Richard; Ahn, Henry; Kwon, Brian K.; Fourney, Daryl R.
2017-01-01
Abstract Current research indicates that more than half of patients with traumatic spinal cord injury (tSCI) experience delays in transfer and receive surgery >24 h post-injury. The objectives of this study were to determine the geographic distribution of tSCI in Canada relative to specialized treatment facilities, to assess clinical and logistical factors at play for indirect admissions to those facilities, and to explore differences in current time to admission and simulated scenarios in an attempt to assess the potential impact of changes to triage protocols. This study included data from 876 patients with tSCI enrolled in the prospectively collected acute Rick Hansen Spinal Cord Injury Registry (RHSCIR) between January 1, 2010 and December 31, 2013 for whom there were data on the location of their injury. Patients transported directly to a RHSCIR acute facility were more likely to reach the facility within 1 h of injury, whereas those transported indirectly were more likely to arrive 7 h later. Considering the injuries occurring within 40 km of a RHSCIR acute facility (n = 323), 249 patients (77%) were directly and 74 (23%) were indirectly admitted. In the multivariate regression analysis, only older age and longer road distance remained significantly associated with being indirectly admitted to a RHSCIR facility. Compared with the current status, the median time to admission decreased by 20% (3.5 h) in the 100% direct admission scenario, and increased by 102% (8.9 h) in the 100% indirect admission scenario. PMID:28325105
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.
NASA Technical Reports Server (NTRS)
Shepard, Timothy J.; Partridge, Craig; Coulter, Robert
1997-01-01
The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.
Optical micromanipulation of active cells with minimal perturbations: direct and indirect pushing.
Wang, Chenlu; Chowdhury, Sagar; Gupta, Satyandra K; Losert, Wolfgang
2013-04-01
The challenge to wide application of optical tweezers in biological micromanipulation is the photodamage caused by high-intensity laser exposure to the manipulated living systems. While direct exposure to infrared lasers is less likely to kill cells, it can affect cell behavior and signaling. Pushing cells with optically trapped objects has been introduced as a less invasive alternative, but the technique includes some exposure of the biological object to parts of the optical tweezer beam. To keep the cells farther away from the laser, we introduce an indirect pushing-based technique for noninvasive manipulation of sensitive cells. We compare how cells respond to three manipulation approaches: direct manipulation, pushing, and indirect pushing. We find that indirect manipulation techniques lessen the impact of manipulation on cell behavior. Cell survival increases, as does the ability of cells to maintain shape and wiggle. Our experiments also demonstrate that indirect pushing allows cell-cell contacts to be formed in a controllable way, while retaining the ability of cells to change shape and move.
Spectrally Resolved Fiber Photometry for Multi-component Analysis of Brain Circuits.
Meng, Chengbo; Zhou, Jingheng; Papaneri, Amy; Peddada, Teja; Xu, Karen; Cui, Guohong
2018-04-25
To achieve simultaneous measurement of multiple cellular events in molecularly defined groups of neurons in vivo, we designed a spectrometer-based fiber photometry system that allows for spectral unmixing of multiple fluorescence signals recorded from deep brain structures in behaving animals. Using green and red Ca 2+ indicators differentially expressed in striatal direct- and indirect-pathway neurons, we were able to simultaneously monitor the neural activity in these two pathways in freely moving animals. We found that the activities were highly synchronized between the direct and indirect pathways within one hemisphere and were desynchronized between the two hemispheres. We further analyzed the relationship between the movement patterns and the magnitude of activation in direct- and indirect-pathway neurons and found that the striatal direct and indirect pathways coordinately control the dynamics and fate of movement. Published by Elsevier Inc.
Frébet, Elise; Abraham, Julie; Geneviève, Franck; Lepelley, Pascale; Daliphard, Sylvie; Bardet, Valérie; Amsellem, Sophie; Guy, Julien; Mullier, Francois; Durrieu, Francoise; Venon, Marie-Dominique; Leleu, Xavier; Jaccard, Arnaud; Faucher, Jean-Luc; Béné, Marie C; Feuillard, Jean
2011-05-01
Flow cytometry is the sole available technique for quantification of tumor plasma-cells in plasma-cell disorders, but so far, no consensus technique has been proposed. Here, we report on a standardized, simple, robust five color flow cytometry protocol developed to characterize and quantify bone marrow tumor plasma-cells, validated in a multicenter manner. CD36 was used to exclude red blood cell debris and erythroblasts, CD38 and CD138 to detect plasma-cells, immunoglobulin light chains, CD45, CD56, CD19, and CD117 + CD34 to simultaneously characterize abnormal plasma-cells and quantify bone marrow precursors. This approach was applied in nine centers to 229 cases, including 25 controls. Tumor plasma-cells were detected in 96.8% of cases, all exhibiting an immunoglobulin peak over 1g/L. Calculation of a plasma-cells/precursors (PC/P) ratio allowed quantification of the plasma-cell burden independently from bone marrow hemodilution. The PC/P ratio yielded the best results in terms of sensitivity (81%) and specificity (84%) for differential diagnosis between MGUS and myeloma, when compared with other criteria. Combination of both the PC/P ratio and percentage of abnormal plasma-cells allowed the best differential diagnosis, but these criteria were discordant in 25% cases. Indirect calculation of CD19 negative PC/R ratio gave the best results in terms of sensitivity (87%). This standardized multiparameter flow cytometric approach allows for the detection and quantification of bone marrow tumor plasma-cell infiltration in nearly all cases of MGUS and myeloma, independently of debris and hemodilution. This approach may also prove useful for the detection of minimal residual disease. Copyright © 2010 International Clinical Cytometry Society.
The Tuskegee Syphilis Experiment: biotechnology and the administrative state.
Roy, B
1995-01-01
The central issue of the Tuskegee Syphilis Experiment was property: property in the body and intellectual property. Once removed from the body, tissue and body fluids were not legally the property of the Tuskegee subjects. Consequently, there was not a direct relationship between a patient and research that used his sera. The Public Health Service (PHS) was free to exercise its property right in Tuskegee sera to develop serologic tests for syphilis with commercial potential. To camouflage the true meaning, the PHS made a distinction between direct clinical studies and indirect studies of tissue and body fluids. This deception caused all reviews to date to limit their examination to documents labeled by the PHS as directly related to the Tuskegee Syphilis Experiment. This excluded other information in the public domain. Despite the absence of a clinical protocol, this subterfuge led each to falsely conclude that the Tuskagee Syphilis Experiment was a clinical study. Based on publications of indirect research using sera and cerebrospinal fluid, this article conceives a very history of the Tuskagee Syphilis Experiment. Syphilis could only cultivate in living beings. As in slavery, the generative ability of the body made the Tuskegee subjects real property and gave untreated syphilis and the sera of the Tuskegee subjects immense commercial value. Published protocols exploited the Tuskegee Syphilis Experiment to invent and commercialize biotechnology for the applied science of syphilis serology.
The Tuskegee Syphilis Experiment: biotechnology and the administrative state.
Roy, B.
1995-01-01
The central issue of the Tuskegee Syphilis Experiment was property: property in the body and intellectual property. Once removed from the body, tissue and body fluids were not legally the property of the Tuskegee subjects. Consequently, there was not a direct relationship between a patient and research that used his sera. The Public Health Service (PHS) was free to exercise its property right in Tuskegee sera to develop serologic tests for syphilis with commercial potential. To camouflage the true meaning, the PHS made a distinction between direct clinical studies and indirect studies of tissue and body fluids. This deception caused all reviews to date to limit their examination to documents labeled by the PHS as directly related to the Tuskegee Syphilis Experiment. This excluded other information in the public domain. Despite the absence of a clinical protocol, this subterfuge led each to falsely conclude that the Tuskagee Syphilis Experiment was a clinical study. Based on publications of indirect research using sera and cerebrospinal fluid, this article conceives a very history of the Tuskagee Syphilis Experiment. Syphilis could only cultivate in living beings. As in slavery, the generative ability of the body made the Tuskegee subjects real property and gave untreated syphilis and the sera of the Tuskegee subjects immense commercial value. Published protocols exploited the Tuskegee Syphilis Experiment to invent and commercialize biotechnology for the applied science of syphilis serology. PMID:7869408
Blind quantum computation over a collective-noise channel
NASA Astrophysics Data System (ADS)
Takeuchi, Yuki; Fujii, Keisuke; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki
2016-05-01
Blind quantum computation (BQC) allows a client (Alice), who only possesses relatively poor quantum devices, to delegate universal quantum computation to a server (Bob) in such a way that Bob cannot know Alice's inputs, algorithm, and outputs. The quantum channel between Alice and Bob is noisy, and the loss over the long-distance quantum communication should also be taken into account. Here we propose to use decoherence-free subspace (DFS) to overcome the collective noise in the quantum channel for BQC, which we call DFS-BQC. We propose three variations of DFS-BQC protocols. One of them, a coherent-light-assisted DFS-BQC protocol, allows Alice to faithfully send the signal photons with a probability proportional to a transmission rate of the quantum channel. In all cases, we combine the ideas based on DFS and the Broadbent-Fitzsimons-Kashefi protocol, which is one of the BQC protocols, without degrading unconditional security. The proposed DFS-based schemes are generic and hence can be applied to other BQC protocols where Alice sends quantum states to Bob.
Symmetrically private information retrieval based on blind quantum computing
NASA Astrophysics Data System (ADS)
Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling
2015-05-01
Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.
2012-01-01
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486
Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen
2012-12-27
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.
Measurement of relative density of tissue using wavelet analysis and neural nets
NASA Astrophysics Data System (ADS)
Suyatinov, Sergey I.; Kolentev, Sergey V.; Buldakova, Tatyana I.
2001-01-01
Development of methods for indirect measurement of substance's consistence and characteristics is highly actual problem of medical diagnostics. Many diseases bring about changes of tissue density or appearances of alien bodies (e.g. stones in kidneys or gallbladders). Propose to use wavelet-analysis and neural nets for indirect measurement of relative density of tissue by images of internal organs. It shall allow to reveal a disease on early stage.
Update on diagnostic value of breath test in gastrointestinal and liver diseases
Siddiqui, Imran; Ahmed, Sibtain; Abid, Shahab
2016-01-01
In the field of gastroenterology, breath tests (BTs) are used intermittently as diagnostic tools that allow indirect, non-invasive and relatively less cumbersome evaluation of several disorders by simply quantifying the appearance in exhaled breath of a metabolite of a specific substrate administered. The aim of this review is to have an insight into the principles, methods of analysis and performance parameters of various hydrogen, methane and carbon BTs which are available for diagnosing gastrointestinal disorders such as Helicobacter pylori infection, small intestinal bacterial overgrowth, and carbohydrate malabsorption. Evaluation of gastric emptying is routinely performed by scintigraphy which is however, difficult to perform and not suitable for children and pregnant women, this review has abridged the 13C-octanoic acid test in comparison to scintigraphy and has emphasized on its working protocol and challenges. A new development such as electronic nose test is also highlighted. Moreover we have also explored the limitations and constraints restraining the wide use of these BT. We conclude that breath testing has an enormous potential to be used as a diagnostic modality. In addition it offers distinct advantages over the traditional invasive methods commonly employed. PMID:27574563
Coda, Rossana; Rizzello, Carlo Giuseppe; Trani, Antonio; Gobbetti, Marco
2011-05-01
Autochthonous lactic acid bacteria from emmer flour were screened based on the kinetic of acidification and used to ferment beverages containing emmer flour, emmer gelatinized flour, and emmer malt at percentages ranging 5-30% (wt/wt). Preliminarily, the concentration of raw flour and malt was selected based on sensory analysis. Different protocols were set up for the manufacture of four different beverages which used Lactobacillus plantarum 6E as the starter. Emmer beverages were mainly differentiated based on the concentration of organic acids, carbohydrates, amino acids, dietary fibers, vitamins, antioxidant and phytase activities, and volatiles and sensory profiles. Wheat flour bread was used as the control to determine the hydrolysis index (HI=100), as an indirect estimation of the glycemic index. The beverage made with 30% (wt/wt) of gelatinized flour showed an HI of 56%, its viscosity was improved by using an EPS-producing strain and it allowed the survival of the potential probiotic Lactobacillus rhamnosus SP1 at cell density of ca. 5 × 10(8) cfu/ml throughout storage at 4 °C. Among the exploited biotechnological options, this latter beverage could be considered as a promising novel functional food. Copyright © 2010 Elsevier Ltd. All rights reserved.
Facing negative reactions to sexuality education through a Multicultural Human Rights framework.
Paiva, Vera; Silva, Valeria N
2015-11-01
Sexuality education, its protocols and planning are contingent on an ever-changing political environment that characterizes the field of sexuality in most countries. In Brazil, human rights perspectives shaped the country's response to the AIDS epidemic, and indirectly influenced the public acceptability of sexuality education in schools. Since 2011, however, as multiple fundamentalist movements emerged in the region, leading to recurrent waves of backlashes in all matters related to sexuality, both health and educational policies have begun to crawl backwards. This article explores human rights-based approaches to health, focusing on a multicultural rights-based framework and on productive approaches to broadening the dialogue about sustained consent to sexuality education. Multicultural human rights (MHR) approaches are dialogical in two domains: the communication process that guarantees consent and community agreements and the constructionist psychosocial-educational methodologies. In its continuous process of consent, the MHR approach allowed for distinct values translation and diffused the resistance to sexuality education in the participant schools/cities, successfully sustaining notions of equality and protection of the right to a comprehensive sexuality education that does not break group solidarity and guarantees acceptability of differences. Copyright © 2015 Elsevier Inc. All rights reserved.
Covariance NMR Processing and Analysis for Protein Assignment.
Harden, Bradley J; Frueh, Dominique P
2018-01-01
During NMR resonance assignment it is often necessary to relate nuclei to one another indirectly, through their common correlations to other nuclei. Covariance NMR has emerged as a powerful technique to correlate such nuclei without relying on error-prone peak peaking. However, false-positive artifacts in covariance spectra have impeded a general application to proteins. We recently introduced pre- and postprocessing steps to reduce the prevalence of artifacts in covariance spectra, allowing for the calculation of a variety of 4D covariance maps obtained from diverse combinations of pairs of 3D spectra, and we have employed them to assign backbone and sidechain resonances in two large and challenging proteins. In this chapter, we present a detailed protocol describing how to (1) properly prepare existing 3D spectra for covariance, (2) understand and apply our processing script, and (3) navigate and interpret the resulting 4D spectra. We also provide solutions to a number of errors that may occur when using our script, and we offer practical advice when assigning difficult signals. We believe such 4D spectra, and covariance NMR in general, can play an integral role in the assignment of NMR signals.
How I do it: combined direct (STA-MCA) and indirect (EDAS) EC-IC bypass.
Nossek, Erez; Langer, David J
2014-11-01
EC-IC bypass for the treatment of a hypoperfused hemisphere is currently the treatment of choice for symptomatic moyamoya patients. Use of the combination of direct (STA-MCA) and indirect (an STA branch lay-on bypass and flipped dural flaps; EDAS) EC-IC bypass is advocated as the optimal treatment option as it allows immediate augmentation of flow in the postoperative period while allowing the brain to acquire additional indirect flow in the long term. We describe the technical nuances of a combined direct and indirect bypass in a 41-year-old woman with moyamoya syndrome diagnosed with transient ischemic attacks (TIAs) and cognitive decline. Combined direct and indirect bypass option should become a familiar treatment modality among vascular neurosurgeons. (1) Pay critical attention to not injuring the Superficial Temporal Artery, Parietal branch (STApb) while turning the skin incision anteriorly. Use the operating microscope to dissect the STApb. (2) Always mark the origin of the Superficial Temporal Artery, Frontal branch (STAfb) on the skin so that its location can be anticipated during STApb dissection. (3) When no frontal branch is available or if the frontal branch is of poor quality, the STApb can be used as a direct or indirect graft. (4) A craniotomy should be done 2-3 cm posterior to the course of the STApb to allow for adequate exposure for an indirect graft. (5) Manipulation of the donor vessels should be done with extreme care as spasm of the artery or intraluminal thrombosis may occur. Low cut flow in the direct graft should be interpreted with caution as vasospasm can result in significant temporary reduction of flow. (6) Aggressive distal dissection of the direct donor is a must. The distal 1-2 cm of the vessel should be cleaned of any loose tissue and be fishmouthed prior to anastomosis. (7) A blood-free field is mandatory. Perforators on the backside of the recipient should be sacrificed and cut to avoid backbleeding into the anastomotic segment during temporary occlusion. (8) When recirculating after the anastomosis has been completed, open the temporary clips on the recipient first. Backflow into the donor segment confirms a patent anastomosis. (9) Utilization of intraoperative angiography is not necessary as long as one utilizes flow measurements and ICG angiography. (10) Take great care with the bone flap reconstruction and the skin closure as the grafts can easily be compressed or sutured. Create a generous craniectomy in the bone flap to avoid any graft compression.
A distance limited method for sampling downed coarse woody debris
Jeffrey H. Gove; Mark J. Ducey; Harry T. Valentine; Michael S. Williams
2012-01-01
A new sampling method for down coarse woody debris is proposed based on limiting the perpendicular distance from individual pieces to a randomly chosen sample point. Two approaches are presented that allow different protocols to be used to determine field measurements; estimators for each protocol are also developed. Both protocols are compared via simulation against...
van der Roer, Nicole; van Tulder, Maurits W; Barendse, Johanna M; van Mechelen, Willem; Franken, Willemien K; Ooms, Arjan C; de Vet, Henrica CW
2004-01-01
Background Low back pain is a common disorder in western industrialised countries and the type of treatments for low back pain vary considerably. Methods In a randomised controlled trial the cost-effectiveness and cost-utility of an intensive group training protocol versus physiotherapy guideline care for sub-acute and chronic low back pain patients is evaluated. Patients with back pain for longer than 6 weeks who are referred to physiotherapy care by their general practitioner or medical specialist are included in the study. The intensive group training protocol combines exercise therapy with principles of behavioural therapy ("graded activity") and back school. This training protocol is compared to physiotherapy care according to the recently published Low Back Pain Guidelines of the Royal Dutch College for Physiotherapy. Primary outcome measures are general improvement, pain intensity, functional status, work absenteeism and quality of life. The direct and indirect costs will be assessed using cost diaries. Patients will complete questionnaires at baseline and 6, 13, 26 and 52 weeks after randomisation. Discussion No trials are yet available that have evaluated the effect of an intensive group training protocol including behavioural principles and back school in a primary physiotherapy care setting and no data on cost-effectiveness and cost-utility are available. PMID:15560843
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
Immunocytochemical detection of astrocytes in brain slices in combination with Nissl staining.
Korzhevskii, D E; Otellin, V A
2005-07-01
The present study was performed to develop a simple and reliable method for the combined staining of specimens to allow the advantages of immunocytochemical detection of astrocytes and assessment of the functional state of neurons by the Nissl method to be assessed simultaneously. The protocol suggested for processing paraffin sections allows preservation of tissue structure at high quality and allows the selective identification of astrocytes with counterstaining of neurons by the Nissl method. The protocol can be used without modification for processing brain specimens from humans and various mammals--except mice and rabbits.
Domain Name Server Security (DNSSEC) Protocol Deployment
2014-10-01
all the time. For mobile devices, end-system validation is much more difficult due to the state of their networks, many of which do not allow...way to distribute keying information than the current public-key infrastructure (PKI) allows. In addition, it will take work to convince CDNs and...Control Protocol (TCP) or even DNS over Secure Sockets Layer (SSL). One of the important outcomes of our work is the realization that that a " mobile
Remote control of the industry processes. POWERLINK protocol application
NASA Astrophysics Data System (ADS)
Wóbel, A.; Paruzel, D.; Paszkiewicz, B.
2017-08-01
The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.
Transport of Indirect Excitons in High Magnetic Fields
NASA Astrophysics Data System (ADS)
Dorow, C. J.; Kuznetsova, Y. Y.; Calman, E. V.; Butov, L. V.; Wilkes, J.; Campman, K. L.; Gossard, A. C.
Spatially- and spectrally-resolved photoluminescence measurements of indirect excitons in high magnetic fields are presented. The high magnetic field regime for excitons is realized when the cyclotron splitting compares to the exciton binding energy. Due to small mass and binding energy, the high magnetic field regime for excitons is achievable in lab, requiring a few Tesla. Long indirect exciton lifetimes allow large exciton transport distances before recombination, giving an opportunity to study transport and relaxation kinetics of indirect magnetoexcitons via optical imaging. Indirect excitons in several Landau level states are realized. 0e -0h indirect magnetoexcitons (formed from electrons and holes at zeroth Landau levels) travel over large distances and form an emission ring around the excitation spot. In contrast, the 1e -1h and 2e -2h states do not exhibit long transport distances, and the spatial profiles of the emission closely follow the laser excitation. The 0e -0h indirect magnetoexciton transport distance reduces with increasing magnetic field. Accompanying theoretical work explains these effects in terms of magnetoexciton energy relaxation and effective mass enhancement. Supported by NSF Grant No. 1407277. J.W. was supported by the EPSRC (Grant EP/L022990/1). C.J.D. was supported by the NSF Graduate Research Fellowship Program under Grant No. DGE-1144086.
Brodin, N. Patrik; Chen, Yong; Yaparpalvi, Ravindra; Guha, Chandan; Tomé, Wolfgang A.
2015-01-01
Shielded 137Cs irradiators are routinely used in pre-clinical radiation research to perform in vitro or in vivo investigations. Without appropriate dosimetry and irradiation protocols in place, there can be large uncertainty in the delivered dose of radiation between irradiated subjects that could lead to inaccurate and possibly misleading results. Here, a dosimetric evaluation of the JL Shepard Mark I-68A 137Cs irradiator and an irradiation technique for whole-body irradiation of small animals that allows one to limit the between subject variation in delivered dose to ±3% are provided. Mathematical simulation techniques and Gafchromic EBT film were used to describe the region within the irradiation cavity with homogeneous dose distribution (100% ±5%), the dosimetric impact of varying source-to-subject distance, and the variation in attenuation thickness due to turntable rotation. Furthermore, an irradiation protocol and dosimetry formalism that allows calculation of irradiation time for whole-body irradiation of small animals is proposed, that is designed to ensure a more consistent dose delivery between irradiated subjects. To compare this protocol with the conventional irradiation protocol suggested by the vendor, high-resolution film dosimetry measurements evaluating the dose difference between irradiation subjects and the dose distribution throughout subjects was performed, using phantoms resembling small animals. Based on these results, there can be considerable variation in the delivered dose of > ±5% using the conventional irradiation protocol for whole-body irradiation doses below 5 Gy. Using the proposed irradiation protocol this variability can be reduced to within ±3% and the dosimetry formalism allows for more accurate calculation of the irradiation time in relation to the intended prescription dose. PMID:26710162
Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
NASA Technical Reports Server (NTRS)
Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)
2014-01-01
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
Advanced orbiting systems test-bedding and protocol verification
NASA Technical Reports Server (NTRS)
Noles, James; De Gree, Melvin
1989-01-01
The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.
NASA Astrophysics Data System (ADS)
Kittang, Ann-Iren; Kvaløy, Brita; Winge, Per; Iversen, Tor-Henning
2010-11-01
Gene expression analysis using microarrays has proved to be an important method in life science. The opportunity to grow higher plants on the International Space Station (ISS) opens up the possibility for gene expression profiling of plants grown in microgravity. The work presented focuses on how to meet the scientific requirements of plant growth and the sample preservation, given the technical and operational constraints associated with space research. The growth chamber (Multigen-2 Science Testing Unit) and a protocol suggested to be used in the European Modular Cultivation System (EMCS) Multigen-2 experiment on the ISS to grow and later preserve Arabidopsis seedlings, were tested on ground. The results showed that most of the plants developed normally. In order to avoid high population stress the number of seedlings per growth area should be reduced. The RNAlater preservation method to be used in the space experiment was compared with a quick freeze in Liquid Nitrogen (LN2). The RNA from samples preserved in RNAlater at room temperature for 24 h was slightly more degraded than the RNA from the LN2 preserved samples (RNA integrity number, RIN: 7.7 and 8.6, respectively). However, the RNA quality and quantity was satisfactory for microarray analysis. Of the genes analysed, 74 genes (0.28%) were significantly differentially expressed, most of them showing moderate to low regulation. Among the genes induced in the RNAlater preserved samples, three salt inducible transcription factors (ZAT10, SZF1 and SZF2) were identified, suggesting that the high salt concentration in RNAlater causes salt stress before the transcription stopped. In conclusion, the Multigen-2 preservation protocol tested here will allow for the genes regulated by microgravity in the space experiment to be revealed. The results do indicate that not all the biological processes are stopped instantly by the RNAlater. The limited diffusion indirectly caused by the microgravity may potentially result in a different degree of salt stress in the test compared to the 1 × g control during the space experiment. This has to be accounted for during the evaluation of the results. Since slightly degraded RNA was observed, further optimalisation of the preservation protocol will be performed.
Khaliluev, M R; Bogoutdinova, L R; Baranova, G B; Baranova, E N; Kharchenko, P N; Dolgov, S V
2014-01-01
The influence of explant type as well as of the type of growth regulators and concentration on callus induction processes and somatic organogenesis of shoots was studied in vitro on four tomato genotypes of Russian breeding. Cytological study of callus tissue was conducted. It was established that tomato varieties possess a substantially greater ability to indirect shoot organogenesis compared with the F1 hybrid. The highest frequency of somatic organogenesis of shoots, as well as their number per explant, was observed for most of the genotypes studied during the cultivation of cotyledons on Murashige-Skoog culture medium containing 2 mg/l of zeatin in combination with 0.1 mg/l of 3-indoleacetic acid. An effective protocol of indirect somatic organogenesis of shoots from different explants of tomato varieties with a frequency of more than 80% was developed.
Secure quantum private information retrieval using phase-encoded queries
NASA Astrophysics Data System (ADS)
Olejnik, Lukasz
2011-08-01
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.
Secure quantum private information retrieval using phase-encoded queries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olejnik, Lukasz
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
Quantitative and Qualitative Analysis of Bacteria in Er(III) Solution by Thin-Film Magnetopheresis
Zborowski, Maciej; Tada, Yoko; Malchesky, Paul S.; Hall, Geraldine S.
1993-01-01
Magnetic deposition, quantitation, and identification of bacteria reacting with the paramagnetic trivalent lanthanide ion, Er3+, was evaluated. The magnetic deposition method was dubbed thin-film magnetopheresis. The optimization of the magnetic deposition protocol was accomplished with Escherichia coli as a model organism in 150 mM NaCl and 5 mM ErCl3 solution. Three gram-positive bacteria, Staphylococcus epidermidis, Staphylococcus saprophyticus, and Enterococcus faecalis, and four gram-negative bacteria, E. coli, Pseudomonas aeruginosa, Proteus mirabilis, and Klebsiella pneumoniae, were subsequently investigated. Quantitative analysis consisted of the microscopic cell count and a scattered-light scanning of the magnetically deposited material aided by the computer data acquisition system. Qualitative analysis consisted of Gram stain differentiation and fluorescein isothiocyanate staining in combination with selected antisera against specific types of bacteria on the solid substrate. The magnetic deposition protocol allowed quantitative detection of E. coli down to the concentration of 105 CFU ml-1, significant in clinical diagnosis applications such as urinary tract infections. Er3+ did not interfere with the typical appearance of the Gram-stained bacteria nor with the antigen recognition by the antibody in the immunohistological evaluations. Indirect antiserum-fluorescein isothiocyanate labelling correctly revealed the presence of E. faecalis and P. aeruginosa in the magnetically deposited material obtained from the mixture of these two bacterial species. On average, the reaction of gram-positive organisms was significantly stronger to the magnetic field in the presence of Er3+ than the reaction of gram-negative organisms. The thin-film magnetophoresis offers promise as a rapid method for quantitative and qualitative analysis of bacteria in solutions such as urine or environmental water. Images PMID:16348916
Soriano-Arandes, Antoni; Sulleiro, Elena; Zarzuela, Francesc; Ruiz, Edurne; Clavería, Isabel; Espasa, Mateu
2016-03-01
infectious diseases screening of international adoptees is complex because of the concurrence of different pathogens in a child at same time. We describe an international adopted child born at Ethiopia infected by 5 different pathogens (Hymenolepis nana, Giardia intestinalis, Entamoeba histolytica, Strongyloides stercoralis, and Trichuris trichiura), 2 of them S. stercoralis and E. histolytica with a capacity to develop severe clinical complications if not detected promptly with appropriate diagnosis tests.Concerns of the patient: according to the screening protocol a stool sample is always processed for culture addressed to find out protozoan and helminthic pathogens but not specifically for S. stercoralis. Only, when eosinophilia is detected 3 serial stool samples are collected to rule out intestinal parasitic infection including S. stercoralis. in our case, S. stercoralis would not have been detected if we had followed the protocol because eosinophilia was absent and its specific serology was negative. Fortunately, the initial inclusion of the feces charcoal culture for S. stercoralis allowed us to detect this infection. discordances between direct methods such as culture and indirect as serology or antigen test forces us to be very cautious before ruling out S. stercoralis or E. histolytica infection, respectively. Also, if a child from tropical areas has persistent symptoms (such as diarrhea or fever) that have not been treated we have to rule out other infections that have not been detected yet.Main lessons: The introduction of different sequencing tests and the insistence to find out pathogens such as S. stercoralis or E. histolytica was determinant to be able to cure this symptomatic child and to prevent potential severe clinical forms in case of immunosuppression.
Soriano-Arandes, Antoni; Sulleiro, Elena; Zarzuela, Francesc; Ruiz, Edurne; Clavería, Isabel; Espasa, Mateu
2016-01-01
Abstract Rationale: infectious diseases screening of international adoptees is complex because of the concurrence of different pathogens in a child at same time. We describe an international adopted child born at Ethiopia infected by 5 different pathogens (Hymenolepis nana, Giardia intestinalis, Entamoeba histolytica, Strongyloides stercoralis, and Trichuris trichiura), 2 of them S. stercoralis and E. histolytica with a capacity to develop severe clinical complications if not detected promptly with appropriate diagnosis tests. Concerns of the patient: according to the screening protocol a stool sample is always processed for culture addressed to find out protozoan and helminthic pathogens but not specifically for S. stercoralis. Only, when eosinophilia is detected 3 serial stool samples are collected to rule out intestinal parasitic infection including S. stercoralis. Interventions: in our case, S. stercoralis would not have been detected if we had followed the protocol because eosinophilia was absent and its specific serology was negative. Fortunately, the initial inclusion of the feces charcoal culture for S. stercoralis allowed us to detect this infection. Outcomes: discordances between direct methods such as culture and indirect as serology or antigen test forces us to be very cautious before ruling out S. stercoralis or E. histolytica infection, respectively. Also, if a child from tropical areas has persistent symptoms (such as diarrhea or fever) that have not been treated we have to rule out other infections that have not been detected yet. Main lessons: The introduction of different sequencing tests and the insistence to find out pathogens such as S. stercoralis or E. histolytica was determinant to be able to cure this symptomatic child and to prevent potential severe clinical forms in case of immunosuppression. PMID:26962825
Calibrated work function mapping by Kelvin probe force microscopy
NASA Astrophysics Data System (ADS)
Fernández Garrillo, Pablo A.; Grévin, Benjamin; Chevalier, Nicolas; Borowik, Łukasz
2018-04-01
We propose and demonstrate the implementation of an alternative work function tip calibration procedure for Kelvin probe force microscopy under ultrahigh vacuum, using monocrystalline metallic materials with known crystallographic orientation as reference samples, instead of the often used highly oriented pyrolytic graphite calibration sample. The implementation of this protocol allows the acquisition of absolute and reproducible work function values, with an improved uncertainty with respect to unprepared highly oriented pyrolytic graphite-based protocols. The developed protocol allows the local investigation of absolute work function values over nanostructured samples and can be implemented in electronic structures and devices characterization as demonstrated over a nanostructured semiconductor sample presenting Al0.7Ga0.3As and GaAs layers with variable thickness. Additionally, using our protocol we find that the work function of annealed highly oriented pyrolytic graphite is equal to 4.6 ± 0.03 eV.
Tradeoff Analysis of Removing Dependents from USAREUR.
1980-06-01
discussed in the Family Housing section. Remaining are cost of living allowances (COLA), housing allowance to those residing on the economy ( HOLA ), and...regardless of where the family in Europe resides. HOLA , on the other hand, would be eliminated completely because there would be no require- ment for...economy for entertainment, hous- ing payments with their associated HOLA , most of the cost of living (COLA) allowance, and indirect payments such as
Dynamic Spectrum Management for Military Wireless Networks
2010-09-01
auctions, and protocols and etiquettes . Command and control assignments are provided by the regulatory agency by reviewing specific licensing...devices and amateur licensees do not have specific frequency assignments. The Protocols and Etiquettes methods allow these devices to operate within a...with Collision Avoidance (CSMA/CA) a protocol . Etiquettes are rules that are followed without explicit interaction between devices. Simple etiquettes
The Effects of Cognitive Jamming on Wireless Sensor Networks Used for Geolocation
2012-03-01
continuously sends out random bits to the channel without following any MAC-layer etiquette [31]. Normally, the underlying MAC protocol allows...23 UDP User Datagram Protocol . . . . . . . . . . . . . . . . . . . 30 MIMO Multiple Input Multiple Output . . . . . . . . . . . . . . . 70...information is packaged and distributed on the network layer, only the physical measurements are considered. This protocol is used to detect faulty nodes
Pointing System Simulation Toolbox with Application to a Balloon Mission Simulator
NASA Technical Reports Server (NTRS)
Maringolo Baldraco, Rosana M.; Aretskin-Hariton, Eliot D.; Swank, Aaron J.
2017-01-01
The development of attitude estimation and pointing-control algorithms is necessary in order to achieve high-fidelity modeling for a Balloon Mission Simulator (BMS). A pointing system simulation toolbox was developed to enable this. The toolbox consists of a star-tracker (ST) and Inertial Measurement Unit (IMU) signal generator, a UDP (User Datagram Protocol) communication le (bridge), and an indirect-multiplicative extended Kalman filter (imEKF). This document describes the Python toolbox developed and the results of its implementation in the imEKF.
Dudek, Magda; Adams, Jessica; Swain, Martin; Hegarty, Matthew; Huws, Sharon; Gallagher, Joe
2014-10-20
This study investigated the microbial diversity associated with the digestive tract of the seaweed grazing marine limpet Patella pellucida. Using a modified indirect DNA extraction protocol and performing metagenomic profiling based on specific prokaryotic marker genes, the abundance of bacterial groups was identified from the analyzed metagenome. The members of three significantly abundant phyla of Proteobacteria, Firmicutes and Bacteroidetes were characterized through the literature and their predicted functions towards the host, as well as potential applications in the industrial environment assessed.
Chothia, Muhammed; Doeltgen, Sebastian; Bradnam, Lynley V
2016-01-01
Coordinated muscle synergies in the human upper limb are controlled, in part, by a neural distribution network located in the cervical spinal cord, known as the cervical propriospinal system. Studies in the cat and non-human primate indicate the cerebellum is indirectly connected to this system via output pathways to the brainstem. Therefore, the cerebellum may indirectly modulate excitability of putative propriospinal neurons (PNs) in humans during upper limb coordination tasks. This study aimed to test whether anodal direct current stimulation (DCS) of the cerebellum modulates PNs and upper limb coordination in healthy adults. The hypothesis was that cerebellar anodal DCS would reduce descending facilitation of PNs and improve upper limb coordination. Transcranial magnetic stimulation (TMS), paired with peripheral nerve stimulation, probed activity in facilitatory and inhibitory descending projections to PNs following an established protocol. Coordination was tested using a pursuit rotor task performed by the non-dominant (ipsilateral) hand. Anodal and sham DCS were delivered over the cerebellum ipsilateral to the non-dominant hand in separate experimental sessions. Anodal DCS was applied to a control site lateral to the vertex in a third session. Twelve right-handed healthy adults participated. Pairing TMS with sub-threshold peripheral nerve stimulation facilitated motor evoked potentials at intensities just above threshold in accordance with the protocol. Anodal cerebellar DCS reduced facilitation without influencing inhibition, but the reduction in facilitation was not associated with performance of the pursuit rotor task. The results of this study indicate dissociated indirect control over cervical PNs by the cerebellum in humans. Anodal DCS of the cerebellum reduced excitability in the facilitatory descending pathway with no effect on the inhibitory pathway to cervical PNs. The reduction in PN excitability is likely secondary to modulation of primary motor cortex or brainstem nuclei, and identifies a neuroanatomical pathway for the cerebellum to assist in coordination of upper limb muscle synergies in humans. Copyright © 2016 Elsevier Inc. All rights reserved.
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
Bapodra, Priya; Cracknell, Jonathan; Wolfe, Barbara A
2014-03-01
Three adult and two subadult greater one-horned rhinoceroses (Rhinoceros unicornis) were sedated a total of nine times using two different intramuscular sedative combinations in order to compare the effectiveness of these combinations in inducing consistent standing sedation in this species. The sedation protocols compared were butorphanol tartrate (50-60 mg) and detomidine hydrochloride (20-30 mg; BD) versus butorphanol tartrate (80-120 mg) and azaperone (80-120 mg; BA). Specific doses were adjusted according to age and sex class, and based on previous experience. Parameters compared included time to achieve defined levels of sedation, time to recovery following antagonism, physiological parameters including heart rate, respiratory rate, indirect arterial blood pressure, and venous blood gas values. A hydraulic restraint chute was utilized to mechanically restrain animals during the procedures, and blood collection and ophthalmic examinations were conducted on all animals. Both protocols resulted in standing sedation for > or = 22.3 +/- 2.9 min or until antagonists were administered. The BD protocol resulted in deeper and more consistent sedation, compared to the BA protocol. Naltrexone hydrochloride (250-300 mg) and tolazoline hydrochloride (1,500-2,000 mg) were administered intramuscularly to antagonize protocol BD, whereas naltrexone alone (200-500 mg) was used to antagonize BA. Time to full antagonism, defined as normal mentation and ambulation following administration of antagonists, was prolonged in the BD protocol (132.3 +/- 17.2 min) compared with the BA protocol (7.5 +/- 2.5 min). Venous blood gas analysis did not reveal any significant blood gas deviations during sedation when compared with either conscious equine or white rhinoceros (Ceratotherium simum) venous reference ranges. In summary, both combinations resulted in adequate standing sedation for minimally invasive procedures, although BD resulted in more profound and consistent sedation.
van der Roer, Nicole; van Tulder, Maurits; van Mechelen, Willem; de Vet, Henrica
2008-02-15
Economic evaluation from a societal perspective conducted alongside a randomized controlled trial with a follow-up of 52 weeks. To evaluate the cost effectiveness and cost utility of an intensive group training protocol compared with usual care physiotherapy in patients with nonspecific chronic low back pain. The intensive group training protocol combines exercise therapy, back school, and behavioral principles. Two studies found a significant reduction in absenteeism for a graded activity program in occupational health care. This program has not yet been evaluated in a primary care physiotherapy setting. Participating physical therapists in primary care recruited 114 patients with chronic nonspecific low back pain. Eligible patients were randomized to either the protocol group or the guideline group. Outcome measures included functional status (Roland Morris Disability Questionnaire), pain intensity (11-point numerical rating scale), general perceived effect and quality of life (EuroQol-5D). Cost data were measured with cost diaries and included direct and indirect costs related to low back pain. After 52 weeks, the direct health care costs were significantly higher for patients in the protocol group, largely due to the costs of the intervention. The mean difference in total costs amounted to [Euro sign] 233 (95% confidence interval: [Euro sign] -2.185; [Euro sign] 2.764). The cost-effectiveness planes indicated no significant differences in cost effectiveness between the 2 groups. The results of this economic evaluation showed no difference in total costs between the protocol group and the guideline group. The differences in effects were small and not statistically significant. At present, national implementation of the protocol is not recommended.
Indirect monitoring shot-to-shot shock waves strength reproducibility during pump-probe experiments
NASA Astrophysics Data System (ADS)
Pikuz, T. A.; Faenov, A. Ya.; Ozaki, N.; Hartley, N. J.; Albertazzi, B.; Matsuoka, T.; Takahashi, K.; Habara, H.; Tange, Y.; Matsuyama, S.; Yamauchi, K.; Ochante, R.; Sueda, K.; Sakata, O.; Sekine, T.; Sato, T.; Umeda, Y.; Inubushi, Y.; Yabuuchi, T.; Togashi, T.; Katayama, T.; Yabashi, M.; Harmand, M.; Morard, G.; Koenig, M.; Zhakhovsky, V.; Inogamov, N.; Safronova, A. S.; Stafford, A.; Skobelev, I. Yu.; Pikuz, S. A.; Okuchi, T.; Seto, Y.; Tanaka, K. A.; Ishikawa, T.; Kodama, R.
2016-07-01
We present an indirect method of estimating the strength of a shock wave, allowing on line monitoring of its reproducibility in each laser shot. This method is based on a shot-to-shot measurement of the X-ray emission from the ablated plasma by a high resolution, spatially resolved focusing spectrometer. An optical pump laser with energy of 1.0 J and pulse duration of ˜660 ps was used to irradiate solid targets or foils with various thicknesses containing Oxygen, Aluminum, Iron, and Tantalum. The high sensitivity and resolving power of the X-ray spectrometer allowed spectra to be obtained on each laser shot and to control fluctuations of the spectral intensity emitted by different plasmas with an accuracy of ˜2%, implying an accuracy in the derived electron plasma temperature of 5%-10% in pump-probe high energy density science experiments. At nano- and sub-nanosecond duration of laser pulse with relatively low laser intensities and ratio Z/A ˜ 0.5, the electron temperature follows Te ˜ Ilas2/3. Thus, measurements of the electron plasma temperature allow indirect estimation of the laser flux on the target and control its shot-to-shot fluctuation. Knowing the laser flux intensity and its fluctuation gives us the possibility of monitoring shot-to-shot reproducibility of shock wave strength generation with high accuracy.
Blind quantum computing with weak coherent pulses.
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-18
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.
Blind Quantum Computing with Weak Coherent Pulses
NASA Astrophysics Data System (ADS)
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-01
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Blagojević Zagorac, Gordana; Mahmutefendić, Hana; Maćešić, Senka; Karleuša, Ljerka; Lučin, Pero
2017-03-01
In this report, we present an analysis of several recycling protocols based on labeling of membrane proteins with specific monoclonal antibodies (mAbs). We analyzed recycling of membrane proteins that are internalized by clathrin-dependent endocytosis, represented by the transferrin receptor, and by clathrin-independent endocytosis, represented by the Major Histocompatibility Class I molecules. Cell surface membrane proteins were labeled with mAbs and recycling of mAb:protein complexes was determined by several approaches. Our study demonstrates that direct and indirect detection of recycled mAb:protein complexes at the cell surface underestimate the recycling pool, especially for clathrin-dependent membrane proteins that are rapidly reinternalized after recycling. Recycling protocols based on the capture of recycled mAb:protein complexes require the use of the Alexa Fluor 488 conjugated secondary antibodies or FITC-conjugated secondary antibodies in combination with inhibitors of endosomal acidification and degradation. Finally, protocols based on the capture of recycled proteins that are labeled with Alexa Fluor 488 conjugated primary antibodies and quenching of fluorescence by the anti-Alexa Fluor 488 displayed the same quantitative assessment of recycling as the antibody-capture protocols. J. Cell. Physiol. 232: 463-476, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Jansen, Jeroen P; Fleurence, Rachael; Devine, Beth; Itzler, Robbin; Barrett, Annabel; Hawkins, Neil; Lee, Karen; Boersma, Cornelis; Annemans, Lieven; Cappelleri, Joseph C
2011-06-01
Evidence-based health-care decision making requires comparisons of all relevant competing interventions. In the absence of randomized, controlled trials involving a direct comparison of all treatments of interest, indirect treatment comparisons and network meta-analysis provide useful evidence for judiciously selecting the best choice(s) of treatment. Mixed treatment comparisons, a special case of network meta-analysis, combine direct and indirect evidence for particular pairwise comparisons, thereby synthesizing a greater share of the available evidence than a traditional meta-analysis. This report from the ISPOR Indirect Treatment Comparisons Good Research Practices Task Force provides guidance on the interpretation of indirect treatment comparisons and network meta-analysis to assist policymakers and health-care professionals in using its findings for decision making. We start with an overview of how networks of randomized, controlled trials allow multiple treatment comparisons of competing interventions. Next, an introduction to the synthesis of the available evidence with a focus on terminology, assumptions, validity, and statistical methods is provided, followed by advice on critically reviewing and interpreting an indirect treatment comparison or network meta-analysis to inform decision making. We finish with a discussion of what to do if there are no direct or indirect treatment comparisons of randomized, controlled trials possible and a health-care decision still needs to be made. Copyright © 2011 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
Minimizing losses by variational counter-diabatic driving
NASA Astrophysics Data System (ADS)
Sels, Dries; Polkovnikov, Anatoli
Despite the time-reversal symmetry of the microscopic dynamics of isolated systems, losses are ubiquitous in any process that tries to manipulate them. Whether it's the heat produced in a car engine or the decoherence of a qubit, all losses arise from our lack of control on the microscopic degrees of freedom of the system. Counter-diabatic driving protocols were proposed as a means to do fast changes in the Hamiltonian without exciting transitions. Such driving in principle allows one to realize arbitrarily fast annealing protocols or implement fast dissipationless driving, circumventing standard adiabatic limitations requiring infinitesimally slow rates. These ideas were tested and used both experimentally and theoretically in small systems, but in larger chaotic systems it is known that exact counter-diabatic protocols do not exist. Here we will present a simple variational approach allowing one to find best physical counter-diabatic protocols. We will show that, while they do not get rid of all transitions, the variational protocols are able to significantly reduce the induced fluctuations in the system. D.S. acknowledges support by the FWO.
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
NASA Astrophysics Data System (ADS)
Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta
2017-08-01
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-30
... aggregate IR&D costs or the costs of an individual IR&D project. The threshold for triggering the reporting... Agency auditor to support the allowability of the costs. Contractors that do not meet the threshold as a... provide in-process information from IR&D projects, for which reimbursement, as an allowable indirect cost...
Code of Federal Regulations, 2013 CFR
2013-07-01
... for by-product coke plants which have wet desulfurization systems but only to the extent such systems... limitations, are allowed for by-product coke plants which include indirect ammonia recovery systems but only..., are allowed for by-product coke plants which have wet desulfurization systems but only to the extent...
Code of Federal Regulations, 2011 CFR
2011-07-01
... loadings, not to exceed 11 percent of the above limitations, are allowed for by-product coke plants which...-product coke plants which include indirect ammonia recovery systems but only to the extent that such... allowed for by-product coke plants which have wet desulfurization systems but only to the extent such...
Code of Federal Regulations, 2014 CFR
2014-07-01
... loadings, not to exceed 11 percent of the above limitations, are allowed for by-product coke plants which...-product coke plants which include indirect ammonia recovery systems but only to the extent that such... allowed for by-product coke plants which have wet desulfurization systems but only to the extent such...
Code of Federal Regulations, 2013 CFR
2013-07-01
... loadings, not to exceed 11 percent of the above limitations, are allowed for by-product coke plants which...-product coke plants which include indirect ammonia recovery systems but only to the extent that such... allowed for by-product coke plants which have wet desulfurization systems but only to the extent such...
Code of Federal Regulations, 2014 CFR
2014-07-01
... for by-product coke plants which have wet desulfurization systems but only to the extent such systems... limitations, are allowed for by-product coke plants which include indirect ammonia recovery systems but only..., are allowed for by-product coke plants which have wet desulfurization systems but only to the extent...
Code of Federal Regulations, 2011 CFR
2011-07-01
... for by-product coke plants which have wet desulfurization systems but only to the extent such systems... limitations, are allowed for by-product coke plants which include indirect ammonia recovery systems but only..., are allowed for by-product coke plants which have wet desulfurization systems but only to the extent...
Code of Federal Regulations, 2012 CFR
2012-07-01
... loadings, not to exceed 11 percent of the above limitations, are allowed for by-product coke plants which...-product coke plants which include indirect ammonia recovery systems but only to the extent that such... allowed for by-product coke plants which have wet desulfurization systems but only to the extent such...
Code of Federal Regulations, 2012 CFR
2012-07-01
... for by-product coke plants which have wet desulfurization systems but only to the extent such systems... limitations, are allowed for by-product coke plants which include indirect ammonia recovery systems but only..., are allowed for by-product coke plants which have wet desulfurization systems but only to the extent...
NASA Astrophysics Data System (ADS)
Giorda, Paolo; Allegra, Michele
2017-07-01
Understanding how correlations can be used for quantum communication protocols is a central goal of quantum information science. While many authors have linked the global measures of correlations such as entanglement or discord to the performance of specific protocols, in general the latter may require only correlations between specific observables. In this work, we first introduce a general measure of correlations for two-qubit states, based on the classical mutual information between local observables. Our measure depends on the state’s purity and the symmetry in the correlation distribution, according to which we provide a classification of maximally mixed marginal states (MMMS). We discuss the complementarity relation between correlations and coherence. By focusing on a simple yet paradigmatic example, i.e. the remote state preparation protocol, we introduce a method to systematically define the proper protocol-tailored measures of the correlations. The method is based on the identification of those correlations that are relevant (useful) for the protocol. On the one hand, the approach allows the role of the symmetry of the correlation distribution to be discussed in determining the efficiency of the protocol, both for MMMS and general two-qubit quantum states, and on the other hand, it allows an optimized protocol for non-MMMS to be devised, which is more efficient with respect to the standard one. Overall, our findings clarify how the key resources in simple communication protocols are the purity of the state used and the symmetry of the correlation distribution.
Prediction of anaerobic power values from an abbreviated WAnT protocol.
Stickley, Christopher D; Hetzler, Ronald K; Kimura, Iris F
2008-05-01
The traditional 30-second Wingate anaerobic test (WAnT) is a widely used anaerobic power assessment protocol. An abbreviated protocol has been shown to decrease the mild to severe physical discomfort often associated with the WAnT. Therefore, the purpose of this study was to determine whether a 20-second WAnT protocol could be used to accurately predict power values of a standard 30-second WAnT. In 96 college females, anaerobic power variables were assessed using a standard 30-second WAnT protocol. Maximum power values as well as instantaneous power at 10, 15, and 20 seconds were recorded. Based on these results, stepwise regression analysis was performed to determine the accuracy with which mean power, minimum power, 30-second power, and percentage of fatigue for a standard 30-second WAnT could be predicted from values obtained during the first 20 seconds of testing. Mean power values showed the highest level of predictability (R2 = 0.99) from the 20-second values. Minimum power, 30-second power, and percentage of fatigue also showed high levels of predictability (R2 = 0.91, 0.84, and 0.84, respectively) using only values obtained during the first 20 seconds of the protocol. An abbreviated (20-second) WAnT protocol appears to effectively predict results of a standard 30-second WAnT in college-age females, allowing for comparison of data to published norms. A shortened test may allow for a decrease in unwanted side effects associated with the traditional WAnT protocol.
Reexamination of quantum bit commitment: The possible and the impossible
DOE Office of Scientific and Technical Information (OSTI.GOV)
D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Institut fuer Mathematische Physik, Technische Universitaet Braunschweig, Mendelssohnstrasse 3, 38106 Braunschweig
2007-09-15
Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed 'honest' strategy, so that 'anonymous state protocols', which were recently suggested as a possible way to beat the known no-go results, aremore » also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.« less
McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C
2014-09-01
Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.
Sinha, Rajesh; Kumar Ojha, Amit; Sarangi, Soumendra; Nair, Nirmala; Tripathy, Prasanta; Sachdev, H S; Bhattacharyya, Sanghita; Gope, Rajkumar; Rath, Shibanand; Rath, Suchitra; Srivastava, Aradhana; Pulkki-Brännström, Anni-Maria; Costello, Anthony; Copas, Andrew; Saville, Naomi; Prost, Audrey; Haghparast-Bidgoli, Hassan
2016-01-01
Introduction Undernutrition affects ∼165 million children globally and contributes up to 45% of all child deaths. India has the highest proportion of global undernutrition-related morbidity and mortality. This protocol describes the planned economic evaluation of a community-based intervention to improve growth in children under 2 years of age in two rural districts of eastern India. The intervention is being evaluated through a cluster-randomised controlled trial (cRCT, the CARING trial). Methods and analysis A cost-effectiveness and cost–utility analysis nested within a cRCT will be conducted from a societal perspective, measuring programme, provider, household and societal costs. Programme costs will be collected prospectively from project accounts using a standardised tool. These will be supplemented with time sheets and key informant interviews to inform the allocation of joint costs. Direct and indirect costs incurred by providers will be collected using key informant interviews and time use surveys. Direct and indirect household costs will be collected prospectively, using time use and consumption surveys. Incremental cost-effectiveness ratios (ICERs) will be calculated for the primary outcome measure, that is, cases of stunting prevented, and other outcomes such as cases of wasting prevented, cases of infant mortality averted, life years saved and disability-adjusted life years (DALYs) averted. Sensitivity analyses will be conducted to assess the robustness of results. Ethics and dissemination There is a shortage of robust evidence regarding the cost-effectiveness of strategies to improve early child growth. As this economic evaluation is nested within a large scale, cRCT, it will contribute to understanding the fiscal space for investment in early child growth, and the relative (in)efficiency of prioritising resources to this intervention over others to prevent stunting in this and other comparable contexts. The protocol has all necessary ethical approvals and the findings will be disseminated within academia and the wider policy sphere. Trial registration number ISRCTN51505201; pre-results. PMID:27807084
Meeting Submission Deadlines--A Shared Responsibility.
ERIC Educational Resources Information Center
Nachby, Andrew L.
1979-01-01
A research administrator is seen as one who provides an environment conducive to the performance of research by allowing the principal investigator to spend as little time as possible with administrative paperwork. A protocol routing sheet and a checklist for protocol submissions are provided. (MLW)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flewett, S.; Saintenoy, T.; Sepulveda, M.
Archeological ceramic paste material typically consists of a mix of a clay matrix and various millimeter and sub-millimeter sized mineral inclusions. Micro X-ray Fluorescence (μXRF) is a standard compositional classification tool, and in this work we propose and demonstrate an improved fluorescence map processing protocol where the mineral inclusions are automatically separated from the clay matrix to allow independent statistical analysis of the two parts. Application of this protocol allowed us to improve enhance the differentiation discrimination between different ceramic shards compared with the standard procedure of comparing working with only the spatially averaged elemental concentrations. Using the new protocol,more » we performed an initial compositional classification of a set of 83 ceramic shards from the western slopes of the south central Andean region in the Arica y Parinacota region of present-day far northern Chile. Comparing the classifications obtained using the new versus the old (average concentrations only) protocols, we found that some samples were erroneously classified with the old protocol. From an archaeological perspective, a very broad and heterogeneous sample set was used in this study due to the fact that this was the first such study to be performed on ceramics from this region. This allowed a general overview to be obtained, however further work on more specific sample sets will be necessary to extract concrete archaeological conclusions.« less
High-Performance CCSDS AOS Protocol Implementation in FPGA
NASA Technical Reports Server (NTRS)
Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson
2010-01-01
The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.
A protocol for analysing thermal stress in insects using infrared thermography.
Gallego, Belén; Verdú, José R; Carrascal, Luis M; Lobo, Jorge M
2016-02-01
The study of insect responses to thermal stress has involved a variety of protocols and methodologies that hamper the ability to compare results between studies. For that reason, the development of a protocol to standardize thermal assays is necessary. In this sense, infrared thermography solves some of the problems allowing us to take continuous temperature measurements without handling the individuals, an important fact in cold-blooded organisms like insects. Here, we present a working protocol based on infrared thermography to estimate both cold and heat thermal stress in insects. We analyse both the change in the body temperature of individuals and their behavioural response. In addition, we used partial least squares regression for the statistical analysis of our data, a technique that solves the problem of having a large number of variables and few individuals, allowing us to work with rare or endemic species. To test our protocol, we chose two species of congeneric, narrowly distributed dung beetles that are endemic to the southeastern part of the Iberian Peninsula. With our protocol we have obtained five variables in the response to cold and twelve in the response to heat. With this methodology we discriminate between the two flightless species of Jekelius through their thermal response. In response to cold, Jekelius hernandezi showed a higher rate of cooling and reached higher temperatures of stupor and haemolymph freezing than Jekelius punctatolineatus. Both species displayed similar thermoregulation ranges before reaching lethal body temperature with heat stress. Overall, we have demonstrated that infrared thermography is a suitable method to assess insect thermal responses with a high degree of sensitivity, allowing for the discrimination between closely related species. Copyright © 2016 Elsevier Ltd. All rights reserved.
Lewandowska, Dagmara W; Zagordi, Osvaldo; Geissberger, Fabienne-Desirée; Kufner, Verena; Schmutz, Stefan; Böni, Jürg; Metzner, Karin J; Trkola, Alexandra; Huber, Michael
2017-08-08
Sequence-specific PCR is the most common approach for virus identification in diagnostic laboratories. However, as specific PCR only detects pre-defined targets, novel virus strains or viruses not included in routine test panels will be missed. Recently, advances in high-throughput sequencing allow for virus-sequence-independent identification of entire virus populations in clinical samples, yet standardized protocols are needed to allow broad application in clinical diagnostics. Here, we describe a comprehensive sample preparation protocol for high-throughput metagenomic virus sequencing using random amplification of total nucleic acids from clinical samples. In order to optimize metagenomic sequencing for application in virus diagnostics, we tested different enrichment and amplification procedures on plasma samples spiked with RNA and DNA viruses. A protocol including filtration, nuclease digestion, and random amplification of RNA and DNA in separate reactions provided the best results, allowing reliable recovery of viral genomes and a good correlation of the relative number of sequencing reads with the virus input. We further validated our method by sequencing a multiplexed viral pathogen reagent containing a range of human viruses from different virus families. Our method proved successful in detecting the majority of the included viruses with high read numbers and compared well to other protocols in the field validated against the same reference reagent. Our sequencing protocol does work not only with plasma but also with other clinical samples such as urine and throat swabs. The workflow for virus metagenomic sequencing that we established proved successful in detecting a variety of viruses in different clinical samples. Our protocol supplements existing virus-specific detection strategies providing opportunities to identify atypical and novel viruses commonly not accounted for in routine diagnostic panels.
Gaudio, Carlo; Petriello, Gennaro; Pelliccia, Francesco; Tanzilli, Alessandra; Bandiera, Alberto; Tanzilli, Gaetano; Barillà, Francesco; Paravati, Vincenzo; Pellegrini, Massimo; Mangieri, Enrico; Barillari, Paolo
2018-05-08
Cardiac computed tomography (CT) is often performed in patients who are at high risk for lung cancer in whom screening is currently recommended. We tested diagnostic ability and radiation exposure of a novel ultra-low-dose CT protocol that allows concomitant coronary artery evaluation and lung screening. We studied 30 current or former heavy smoker subjects with suspected or known coronary artery disease who underwent CT assessment of both coronary arteries and thoracic area (Revolution CT, General Electric). A new ultrafast-low-dose single protocol was used for ECG-gated helical acquisition of the heart and the whole chest. A single IV iodine bolus (70-90 ml) was used. All patients with CT evidence of coronary stenosis underwent also invasive coronary angiography. All the coronary segments were assessable in 28/30 (93%) patients. Only 8 coronary segments were not assessable in 2 patients due to motion artefacts (assessability: 98%; 477/485 segments). In the assessable segments, 20/21 significant stenoses (> 70% reduction of vessel diameter) were correctly diagnosed. Pulmonary nodules were detected in 5 patients, thus requiring to schedule follow-up surveillance CT thorax. Effective dose was 1.3 ± 0.9 mSv (range: 0.8-3.2 mSv). Noteworthy, no contrast or radiation dose increment was required with the new protocol as compared to conventional coronary CT protocol. The novel ultrafast-low-dose CT protocol allows lung cancer screening at time of coronary artery evaluation. The new approach might enhance the cost-effectiveness of coronary CT in heavy smokers with suspected or known coronary artery disease.
NASA Astrophysics Data System (ADS)
Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.
2017-06-01
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.
NASA Astrophysics Data System (ADS)
Goldenberg, Lior; Vaidman, Lev; Wiesner, Stephen
1999-04-01
We present a two-party protocol for ``quantum gambling,'' a new task closely related to coin tossing. The protocol allows two remote parties to play a gambling game such that in a certain limit it becomes a fair game. No unconditionally secure classical method is known to accomplish this task.
Low pressure treatments for codling moth on fresh fruits
USDA-ARS?s Scientific Manuscript database
The primary phytosanitary treatment used for fresh fruits exported to markets requiring quarantine protocols is fumigation with methyl bromide. Quarantine and pre-shipment (QPS) treatments are currently allowable under the Montreal Protocol, but there is growing concern that the QPS exemption will e...
Consumers mediate the effects of experimental ocean acidification and warming on primary producers.
Alsterberg, Christian; Eklöf, Johan S; Gamfeldt, Lars; Havenhand, Jonathan N; Sundbäck, Kristina
2013-05-21
It is well known that ocean acidification can have profound impacts on marine organisms. However, we know little about the direct and indirect effects of ocean acidification and also how these effects interact with other features of environmental change such as warming and declining consumer pressure. In this study, we tested whether the presence of consumers (invertebrate mesograzers) influenced the interactive effects of ocean acidification and warming on benthic microalgae in a seagrass community mesocosm experiment. Net effects of acidification and warming on benthic microalgal biomass and production, as assessed by analysis of variance, were relatively weak regardless of grazer presence. However, partitioning these net effects into direct and indirect effects using structural equation modeling revealed several strong relationships. In the absence of grazers, benthic microalgae were negatively and indirectly affected by sediment-associated microalgal grazers and macroalgal shading, but directly and positively affected by acidification and warming. Combining indirect and direct effects yielded no or weak net effects. In the presence of grazers, almost all direct and indirect climate effects were nonsignificant. Our analyses highlight that (i) indirect effects of climate change may be at least as strong as direct effects, (ii) grazers are crucial in mediating these effects, and (iii) effects of ocean acidification may be apparent only through indirect effects and in combination with other variables (e.g., warming). These findings highlight the importance of experimental designs and statistical analyses that allow us to separate and quantify the direct and indirect effects of multiple climate variables on natural communities.
Indirect monitoring shot-to-shot shock waves strength reproducibility during pump–probe experiments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pikuz, T. A., E-mail: tatiana.pikuz@eie.eng.osaka-u.ac.jp; Photon Pioneers Center, Osaka University, Suita, Osaka 565-0871 Japan; Joint Institute for High Temperatures, Russian Academy of Sciences, Moscow 125412
We present an indirect method of estimating the strength of a shock wave, allowing on line monitoring of its reproducibility in each laser shot. This method is based on a shot-to-shot measurement of the X-ray emission from the ablated plasma by a high resolution, spatially resolved focusing spectrometer. An optical pump laser with energy of 1.0 J and pulse duration of ∼660 ps was used to irradiate solid targets or foils with various thicknesses containing Oxygen, Aluminum, Iron, and Tantalum. The high sensitivity and resolving power of the X-ray spectrometer allowed spectra to be obtained on each laser shot and tomore » control fluctuations of the spectral intensity emitted by different plasmas with an accuracy of ∼2%, implying an accuracy in the derived electron plasma temperature of 5%–10% in pump–probe high energy density science experiments. At nano- and sub-nanosecond duration of laser pulse with relatively low laser intensities and ratio Z/A ∼ 0.5, the electron temperature follows T{sub e} ∼ I{sub las}{sup 2/3}. Thus, measurements of the electron plasma temperature allow indirect estimation of the laser flux on the target and control its shot-to-shot fluctuation. Knowing the laser flux intensity and its fluctuation gives us the possibility of monitoring shot-to-shot reproducibility of shock wave strength generation with high accuracy.« less
Continuous-variable protocol for oblivious transfer in the noisy-storage model.
Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie
2018-04-13
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.
Security of a single-state semi-quantum key distribution protocol
NASA Astrophysics Data System (ADS)
Zhang, Wei; Qiu, Daowen; Mateus, Paulo
2018-06-01
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
A network analysis of indirect carbon emission flows among different industries in China.
Du, Qiang; Xu, Yadan; Wu, Min; Sun, Qiang; Bai, Libiao; Yu, Ming
2018-06-17
Indirect carbon emissions account for a large ratio of the total carbon emissions in processes to make the final products, and this implies indirect carbon emission flow across industries. Understanding these flows is crucial for allocating a carbon allowance for each industry. By combining input-output analysis and complex network theory, this study establishes an indirect carbon emission flow network (ICEFN) for 41 industries from 2005 to 2014 to investigate the interrelationships among different industries. The results show that the ICEFN was consistent with a small-world nature based on an analysis of the average path lengths and the clustering coefficients. Moreover, key industries in the ICEFN were identified using complex network theory on the basis of degree centrality and betweenness centrality. Furthermore, the 41 industries of the ICEFN were divided into four industrial subgroups that are related closely to one another. Finally, possible policy implications were provided based on the knowledge of the structure of the ICEFN and its trend.
Ghodbane, Ramzi; Asmar, Shady; Betzner, Marlena; Linet, Marie; Pierquin, Joseph; Raoult, Didier; Drancourt, Michel
2015-08-01
Culture remains the cornerstone of diagnosis for pulmonary tuberculosis, but the fastidiousness of Mycobacterium tuberculosis may delay culture-based diagnosis for weeks. We evaluated the performance of real-time high-resolution imaging for the rapid detection of M. tuberculosis colonies growing on a solid medium. A total of 50 clinical specimens, including 42 sputum specimens, 4 stool specimens, 2 bronchoalveolar lavage fluid specimens, and 2 bronchial aspirate fluid specimens were prospectively inoculated into (i) a commercially available Middlebrook broth and evaluated for mycobacterial growth indirectly detected by measuring oxygen consumption (standard protocol) and (ii) a home-made solid medium incubated in an incubator featuring real-time high-resolution imaging of colonies (real-time protocol). Isolates were identified by Ziehl-Neelsen staining and matrix-assisted laser desorption ionization-time of flight mass spectrometry. Use of the standard protocol yielded 14/50 (28%) M. tuberculosis isolates, which is not significantly different from the 13/50 (26%) M. tuberculosis isolates found using the real-time protocol (P = 1.00 by Fisher's exact test), and the contamination rate of 1/50 (2%) was not significantly different from the contamination rate of 2/50 (4%) using the real-time protocol (P = 1.00). The real-time imaging protocol showed a 4.4-fold reduction in time to detection, 82 ± 54 h versus 360 ± 142 h (P < 0.05). These preliminary data give the proof of concept that real-time high-resolution imaging of M. tuberculosis colonies is a new technology that shortens the time to growth detection and the laboratory diagnosis of pulmonary tuberculosis. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lipnharski, I; Carranza, C; Quails, N
Purpose: To optimize adult head CT protocol by reducing dose to an appropriate level while providing CT images of diagnostic quality. Methods: Five cadavers were scanned from the skull base to the vertex using a routine adult head CT protocol (120 kVp, 270 mA, 0.75 s rotation, 0.5 mm × 32 detectors, 70.8 mGy CTDIvol) followed by seven reduced-dose protocols with varying combinations of reduced tube current, reduced rotation time, and increased detectors with CTDIvol ranging from 38.2 to 65.6 mGy. Organ doses were directly measured with 21 OSL dosimeters placed on the surface and implanted in the head bymore » a neurosurgeon. Two neuroradiologists assessed grey-white matter differentiation, fluid space, ventricular size, midline shift, brain mass, edema, ischemia, and skull fractures on a three point scale: (1) Unacceptable, (2) Borderline Acceptable, and (3) Acceptable. Results: For the standard scan, doses to the skin, lens of the eye, salivary glands, thyroid, and brain were 37.55 mGy, 49.65 mGy, 40.67 mGy, 4.63 mGy, and 27.33 mGy, respectively. Two cadavers had cerebral edema due to changing dynamics of postmortem effects, causing the grey-white matter differentiation to appear less distinct. Two cadavers with preserved grey-white matter received acceptable scores for all image quality features for the protocol with a CTDIvol of 57.3 mGy, allowing organ dose savings ranging from 34% to 45%. One cadaver allowed for greater dose reduction for the protocol with a CTDIvol of 42 mGy. Conclusion: Efforts to optimize scan protocol should consider both dose and clinical image quality. This is made possible with postmortem subjects, whose brains are similar to patients, allowing for an investigation of ideal scan parameters. Radiologists at our institution accepted scan protocols acquired with lower scan parameters, with CTDIvol values closer to the American College of Radiology’s (ACR) Achievable Dose level of 57 mGy.« less
Narayan, Lakshmi; Dodd, Richard S.; O’Hara, Kevin L.
2015-01-01
Premise of the study: Identifying clonal lineages in asexually reproducing plants using microsatellite markers is complicated by the possibility of nonidentical genotypes from the same clonal lineage due to somatic mutations, null alleles, and scoring errors. We developed and tested a clonal identification protocol that is robust to these issues for the asexually reproducing hexaploid tree species coast redwood (Sequoia sempervirens). Methods: Microsatellite data from four previously published and two newly developed primers were scored using a modified protocol, and clones were identified using Bruvo genetic distances. The effectiveness of this clonal identification protocol was assessed using simulations and by genotyping a test set of paired samples of different tissue types from the same trees. Results: Data from simulations showed that our protocol allowed us to accurately identify clonal lineages. Multiple test samples from the same trees were identified correctly, although certain tissue type pairs had larger genetic distances on average. Discussion: The methods described in this paper will allow for the accurate identification of coast redwood clones, facilitating future studies of the reproductive ecology of this species. The techniques used in this paper can be applied to studies of other clonal organisms as well. PMID:25798341
Narayan, Lakshmi; Dodd, Richard S; O'Hara, Kevin L
2015-03-01
Identifying clonal lineages in asexually reproducing plants using microsatellite markers is complicated by the possibility of nonidentical genotypes from the same clonal lineage due to somatic mutations, null alleles, and scoring errors. We developed and tested a clonal identification protocol that is robust to these issues for the asexually reproducing hexaploid tree species coast redwood (Sequoia sempervirens). Microsatellite data from four previously published and two newly developed primers were scored using a modified protocol, and clones were identified using Bruvo genetic distances. The effectiveness of this clonal identification protocol was assessed using simulations and by genotyping a test set of paired samples of different tissue types from the same trees. Data from simulations showed that our protocol allowed us to accurately identify clonal lineages. Multiple test samples from the same trees were identified correctly, although certain tissue type pairs had larger genetic distances on average. The methods described in this paper will allow for the accurate identification of coast redwood clones, facilitating future studies of the reproductive ecology of this species. The techniques used in this paper can be applied to studies of other clonal organisms as well.
Dudek, Magda; Adams, Jessica; Swain, Martin; Hegarty, Matthew; Huws, Sharon; Gallagher, Joe
2014-01-01
This study investigated the microbial diversity associated with the digestive tract of the seaweed grazing marine limpet Patella pellucida. Using a modified indirect DNA extraction protocol and performing metagenomic profiling based on specific prokaryotic marker genes, the abundance of bacterial groups was identified from the analyzed metagenome. The members of three significantly abundant phyla of Proteobacteria, Firmicutes and Bacteroidetes were characterized through the literature and their predicted functions towards the host, as well as potential applications in the industrial environment assessed. PMID:25334059
A case against justified non-voluntary active euthanasia (the Groningen Protocol).
Jotkowitz, Alan; Glick, S; Gesundheit, B
2008-11-01
The Groningen Protocol allows active euthanasia of severely ill newborns with unbearable suffering. Defenders of the protocol insist that the protocol refers to terminally ill infants and that quality of life should not be a factor in the decision to euthanize an infant. They also argue that there should be no ethical difference between active and passive euthanasia of these infants. However, nowhere in the protocol does it refer to terminally ill infants; on the contrary, the developers of the protocol take into account the future quality of life of the infant. We also note how the Nazi Euthanasie Programm started with the premise that there is some life not worthy of living. Therefore, in our opinion, the protocol violates the traditional ethical codes of physicians and the moral values of the overwhelming majority of the citizens of the world.
[Study of allergic morbidity in children of female workers from various fields of national economy].
Khakimova, R F; Dautov, F F; Iusupova, N Z
2007-01-01
To study the factors contributing to the development of allergic disease in children has recently become of current importance. To determine the indirect influence of maternal working environmental factors on allergic morbidity in children, the authors have examined the working conditions and morbidity of female workers engaged in that or that field of national economy and the health status and allergic diseases in children. The variance analysis was made. The proposed guidelines allow one to study the indirect influence of working environmental factors on allergic morbidity in children.
NASA Astrophysics Data System (ADS)
Decho, Alan W.; Beckman, Erin M.; Chandler, G. Thomas; Kawaguchi, Tomohiro
2008-06-01
An indirect immunofluorescence approach was developed using semiconductor quantum dot nanocrystals to label and detect a specific bacterial serotype of the bacterial human pathogen Vibrio parahaemolyticus, attached to small marine animals (i.e. benthic harpacticoid copepods), which are suspected pathogen carriers. This photostable labeling method using nanotechnology will potentially allow specific serotypes of other bacterial pathogens to be detected with high sensitivity in a range of systems, and can be easily applied for sensitive detection to other Vibrio species such as Vibrio cholerae.
Indirect Measurement of Energy Density of Soft PZT Ceramic Utilizing Mechanical Stress
NASA Astrophysics Data System (ADS)
Unruan, Muangjai; Unruan, Sujitra; Inkong, Yutthapong; Yimnirun, Rattikorn
2017-11-01
This paper reports on an indirect measurement of energy density of soft PZT ceramic utilizing mechanical stress. The method works analogous to the Olsen cycle and allows for a large amount of electro-mechanical energy conversion. A maximum energy density of 350 kJ/m3/cycle was found under 0-312 MPa and 1-20 kV/cm of applied mechanical stress and electric field, respectively. The obtained result is substantially higher than the results reported in previous studies of PZT materials utilizing a direct piezoelectric effect.
Indirect genetic effects from competition in the clonal herb Sedum album (Crassulaceae).
Andersson, Stefan
2014-01-01
Recent years have seen increasing interest in indirect genetic effects, i.e. influences on the phenotype that depend on the genotype of other conspecific individuals; however, the empirical evidence for such effects is still limited, especially in wild plant species. The present study of the clonal herb Sedum album assessed direct and indirect genetic effects on performance-related traits in a 4-year experiment with clonally replicated genotypes, grown in pairs and differing in anthocyanin pigmentation to allow separation of individuals during data collection. In agreement with the existence of indirect genetic effects, the experimentally-paired plants not only expressed their own genotype but were also affected by the genotype of their pair mate. The effect of neighbour genotype explained up to one-fourth of the variation in performance and most likely resulted from competition, imposed by the close physical contact between paired individuals and the limiting conditions used in the garden environment. Indirect genetic effects from competition have the potential to enhance the efficacy of group-level selection relative to individual selection, given the nutrient-poor and spatially-confined substrate available to plants of S. album in the natural habitat.
Pulido-Olmo, Helena; Rodríguez-Sánchez, Elena; Navarro-García, José Alberto; Barderas, María G.; Álvarez-Llamas, Gloria; Segura, Julián; Fernández-Alfonso, Marisol; Ruilope, Luis M.; Ruiz-Hurtado, Gema
2017-01-01
The protocol describes a novel, rapid, and no-wash one-step immunoassay for highly sensitive and direct detection of the complexes between matrix metalloproteinases (MMPs) and their tissue inhibitor of metalloproteinases (TIMPs) based on AlphaLISA® technology. We describe two procedures: (i) one approach is used to analyze MMP-9–TIMP-1 interactions using recombinant human MMP-9 with its corresponding recombinant human TIMP-1 inhibitor and (ii) the second approach is used to analyze native or endogenous MMP-9–TIMP-1 protein interactions in samples of human plasma. Evaluating native MMP-9–TIMP-1 complexes using this approach avoids the use of indirect calculations of the MMP-9/TIMP-1 ratio for which independent MMP-9 and TIMP-1 quantifications by two conventional ELISAs are needed. The MMP-9–TIMP-1 AlphaLISA® assay is quick, highly simplified, and cost-effective and can be completed in less than 3 h. Moreover, the assay has great potential for use in basic and preclinical research as it allows direct determination of native MMP-9–TIMP-1 complexes in circulating blood as biofluid. PMID:28791014
NASA Astrophysics Data System (ADS)
Diaz, Kristians; Castañeda, Benjamín; Miranda, César; Lavarello, Roberto; Llanos, Alejandro
2010-03-01
We developed a protocol for the acquisition of digital images and an algorithm for a color-based automatic segmentation of cutaneous lesions of Leishmaniasis. The protocol for image acquisition provides control over the working environment to manipulate brightness, lighting and undesirable shadows on the injury using indirect lighting. Also, this protocol was used to accurately calculate the area of the lesion expressed in mm2 even in curved surfaces by combining the information from two consecutive images. Different color spaces were analyzed and compared using ROC curves in order to determine the color layer with the highest contrast between the background and the wound. The proposed algorithm is composed of three stages: (1) Location of the wound determined by threshold and mathematical morphology techniques to the H layer of the HSV color space, (2) Determination of the boundaries of the wound by analyzing the color characteristics in the YIQ space based on masks (for the wound and the background) estimated from the first stage, and (3) Refinement of the calculations obtained on the previous stages by using the discrete dynamic contours algorithm. The segmented regions obtained with the algorithm were compared with manual segmentations made by a medical specialist. Broadly speaking, our results support that color provides useful information during segmentation and measurement of wounds of cutaneous Leishmaniasis. Results from ten images showed 99% specificity, 89% sensitivity, and 98% accuracy.
Representing the work of medical protocols for organizational simulation.
Fridsma, D. B.
1998-01-01
Developing and implementing patient care protocols within a specific organizational setting requires knowledge of the protocol, the organization, and the way in which the organization does its work. Computer-based simulation tools have been used in many industries to provide managers with prospective insight into problems of work process and organization design mismatch. Many of these simulation tools are designed for well-understood routine work processes in which there are few contingent tasks. In this paper, we describe theoretic that make it possible to simulate medical protocols using an information-processing theory framework. These simulations will allow medical administrators to test different protocol and organizational designs before actually using them within a particular clinical setting. PMID:9929231
Bronchial provocation tests in clinical practice.
Borges, Marcos de Carvalho; Ferraz, Erica; Vianna, Elcio Oliveira
2011-01-01
Bronchial hyperresponsiveness, which consists of an exaggerated response of the airways to bronchoconstrictor stimuli, is one of the main characteristics of asthma, presented in nearly all asthmatic patients. Bronchial hyperresponsiveness may also be present in other diseases, such as allergic rhinitis, chronic obstructive pulmonary disease, cystic fibrosis, heart failure and respiratory infection, and with some medications, such as β-blockers. Bronchial provocation tests (also known as bronchial challenges) are used to evaluate bronchial responsiveness. These tests have become increasingly used over the last 20 years, with the development and validation of accurate, safe and reproducible tests, and with the publication of well-detailed protocols. Several stimuli can be used in a bronchial challenge, and they are classified as direct and indirect stimuli. There are many indications for a bronchial challenge. In this review, we discuss the main differences between direct and indirect stimuli, and the use of bronchial challenges in clinical practice, especially for confirming diagnoses of asthma, exercise-induced bronchoconstriction and cough-variant asthma, and for use among elite-level athletes.
Regulating plant/insect interactions using CO2 enrichment in model ecosystems
NASA Astrophysics Data System (ADS)
Grodzinski, B.; Schmidt, J. M.; Watts, B.; Taylor, J.; Bates, S.; Dixon, M. A.; Staines, H.
1999-01-01
The greenhouse environment is a challenging artificial ecosystem in which it is possible to study selected plant/insect interaction in a controlled environment. Due to a combination of ``direct'' and ``indirect'' effects of CO2 enrichment on plant photosynthesis and plant development, canopy productivity is generally increased. In this paper, we discuss the effects of daytime and nighttime CO2 enrichment protocols on gas exchange of pepper plants (Capsicum annuum L, cv Cubico) grown in controlled environments. In addition, we present the effects of thrips, a common insect pest, on the photosynthetic and respiratory activity of these plant canopies. Carbon dioxide has diverse effects on the physiology and mortality of insects. However, our data indicate that thrips and whiteflies, at least, are not killed ``directly'' by CO2 levels used to enhance photosynthesis and plant growth. Together the data suggest that the insect population is affected ``indirectly'' by CO2 and that the primary effect of CO2 is via its effects on plant metabolism.
Stalking Antibiotic-Resistant Bacteria in Common Vegetables
ERIC Educational Resources Information Center
Brock, David; Boeke, Caroline; Josowitz, Rebecca; Loya, Katherine
2004-01-01
The study developed a simple experimental protocol for studying antibiotic resistant bacteria that will allow students to determine the proportion of such bacteria found on common fruit and vegetable crops. This protocol can open up the world of environmental science and show how human behavior can dramatically alter ecosystems.
Sheltered Instruction Observation Protocol (SIOP). WWC Intervention Report
ERIC Educational Resources Information Center
What Works Clearinghouse, 2009
2009-01-01
The Sheltered Instruction Observation Protocol (SIOP) is a framework for planning and delivering instruction in content areas such as science, history, and mathematics to limited-English proficient students. The goal of SIOP is to help teachers integrate academic language development into their lessons, allowing students to learn and practice…
Iterative tailoring of optical quantum states with homodyne measurements.
Etesse, Jean; Kanseri, Bhaskar; Tualle-Brouri, Rosa
2014-12-01
As they can travel long distances, free space optical quantum states are good candidates for carrying information in quantum information technology protocols. These states, however, are often complex to produce and require protocols whose success probability drops quickly with an increase of the mean photon number. Here we propose a new protocol for the generation and growth of arbitrary states, based on one by one coherent adjunctions of the simple state superposition α|0〉 + β|1〉. Due to the nature of the protocol, which allows for the use of quantum memories, it can lead to high performances.
IVOA Credential Delegation Protocol Version 1.0
NASA Astrophysics Data System (ADS)
Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew
2010-02-01
The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.
Imaging of cardiac perfusion of free-breathing small animals using dynamic phase-correlated micro-CT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sawall, Stefan; Kuntz, Jan; Socher, Michaela
Purpose:Mouse models of cardiac diseases have proven to be a valuable tool in preclinical research. The high cardiac and respiratory rates of free breathing mice prohibit conventional in vivo cardiac perfusion studies using computed tomography even if gating methods are applied. This makes a sacrification of the animals unavoidable and only allows for the application of ex vivo methods. Methods: To overcome this issue the authors propose a low dose scan protocol and an associated reconstruction algorithm that allows for in vivo imaging of cardiac perfusion and associated processes that are retrospectively synchronized to the respiratory and cardiac motion ofmore » the animal. The scan protocol consists of repetitive injections of contrast media within several consecutive scans while the ECG, respiratory motion, and timestamp of contrast injection are recorded and synchronized to the acquired projections. The iterative reconstruction algorithm employs a six-dimensional edge-preserving filter to provide low-noise, motion artifact-free images of the animal examined using the authors' low dose scan protocol. Results: The reconstructions obtained show that the complete temporal bolus evolution can be visualized and quantified in any desired combination of cardiac and respiratory phase including reperfusion phases. The proposed reconstruction method thereby keeps the administered radiation dose at a minimum and thus reduces metabolic inference to the animal allowing for longitudinal studies. Conclusions: The authors' low dose scan protocol and phase-correlated dynamic reconstruction algorithm allow for an easy and effective way to visualize phase-correlated perfusion processes in routine laboratory studies using free-breathing mice.« less
NASA Astrophysics Data System (ADS)
Da Silva, Nicolas; Mailler, Sylvain; Drobinski, Philippe
2018-03-01
Aerosols affect atmospheric dynamics through their direct and semi-direct effects as well as through their effects on cloud microphysics (indirect effects). The present study investigates the indirect effects of aerosols on summer precipitation in the Euro-Mediterranean region, which is located at the crossroads of air masses carrying both natural and anthropogenic aerosols. While it is difficult to disentangle the indirect effects of aerosols from the direct and semi-direct effects in reality, a numerical sensitivity experiment is carried out using the Weather Research and Forecasting (WRF) model, which allows us to isolate indirect effects, all other effects being equal. The Mediterranean hydrological cycle has often been studied using regional climate model (RCM) simulations with parameterized convection, which is the approach we adopt in the present study. For this purpose, the Thompson aerosol-aware microphysics scheme is used in a pair of simulations run at 50 km resolution with extremely high and low aerosol concentrations. An additional pair of simulations has been performed at a convection-permitting resolution (3.3 km) to examine these effects without the use of parameterized convection. While the reduced radiative flux due to the direct effects of the aerosols is already known to reduce precipitation amounts, there is still no general agreement on the sign and magnitude of the aerosol indirect forcing effect on precipitation, with various processes competing with each other. Although some processes tend to enhance precipitation amounts, some others tend to reduce them. In these simulations, increased aerosol loads lead to weaker precipitation in the parameterized (low-resolution) configuration. The fact that a similar result is obtained for a selected area in the convection-permitting (high-resolution) configuration allows for physical interpretations. By examining the key variables in the model outputs, we propose a causal chain that links the aerosol effects on microphysics to their simulated effect on precipitation, essentially through reduction of the radiative heating of the surface and corresponding reductions of surface temperature, resulting in increased atmospheric stability in the presence of high aerosol loads.
2015-01-01
on AFRL’s small unmanned aerial vehicle (UAV) test bed . 15. SUBJECT TERMS Zero-Knowledge Proof Protocol Testing 16. SECURITY CLASSIFICATION OF...VERIFIER*** edition Version Information: Version 1.1.3 Version Details: Successful ZK authentication between two networked machines. Fixed a bug ...that causes intermittent bignum errors. Fixed a network hang bug and now allows continually authentication at the Verifier. Also now removing
Quantum-locked key distribution at nearly the classical capacity rate.
Lupo, Cosmo; Lloyd, Seth
2014-10-17
Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.
Network acceleration techniques
NASA Technical Reports Server (NTRS)
Crowley, Patricia (Inventor); Maccabe, Arthur Barney (Inventor); Awrach, James Michael (Inventor)
2012-01-01
Splintered offloading techniques with receive batch processing are described for network acceleration. Such techniques offload specific functionality to a NIC while maintaining the bulk of the protocol processing in the host operating system ("OS"). The resulting protocol implementation allows the application to bypass the protocol processing of the received data. Such can be accomplished this by moving data from the NIC directly to the application through direct memory access ("DMA") and batch processing the receive headers in the host OS when the host OS is interrupted to perform other work. Batch processing receive headers allows the data path to be separated from the control path. Unlike operating system bypass, however, the operating system still fully manages the network resource and has relevant feedback about traffic and flows. Embodiments of the present disclosure can therefore address the challenges of networks with extreme bandwidth delay products (BWDP).
Hemophilia in Sports: A Case Report and Prophylactic Protocol
Maffet, Mark; Roton, Jimmy
2017-01-01
Objective: To describe a successful prophylactic protocol for managing an athlete with hemophilia playing at a high level of contact sports. Background: Published data show that team physicians are not comfortable either treating athletes with bleeding disorders or allowing them to participate in contact sports. Much of the literature historically has recommended against allowing athletes with bleeding disorders to play sports at all and certainly against playing contact sports. Hemophilia treatment can now include prophylactic injections of recombinant factor VIII to prevent bleeding episodes. Modern treatments hold the promise of allowing athletes with hemophilia to participate in contact sports. Differential Diagnosis: Mild, moderate, or severe hemophilia; von Willebrand disease; other factor deficiencies. Treatment: A treatment protocol was developed that included prophylactic factor VIII injections on a regular basis and when the athlete was injured. Uniqueness: This is the first published case report of an athlete with known hemophilia being successfully treated and participating in National Collegiate Athletic Association collegiate basketball for 2 full seasons. Conclusions: Sports medicine teams can successfully manage an athlete with hemophilia playing a contact sport. PMID:27863189
SU-E-T-148: Benchmarks and Pre-Treatment Reviews: A Study of Quality Assurance Effectiveness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowenstein, J; Nguyen, H; Roll, J
Purpose: To determine the impact benchmarks and pre-treatment reviews have on improving the quality of submitted clinical trial data. Methods: Benchmarks are used to evaluate a site’s ability to develop a treatment that meets a specific protocol’s treatment guidelines prior to placing their first patient on the protocol. A pre-treatment review is an actual patient placed on the protocol in which the dosimetry and contour volumes are evaluated to be per protocol guidelines prior to allowing the beginning of the treatment. A key component of these QA mechanisms is that sites are provided timely feedback to educate them on howmore » to plan per the protocol and prevent protocol deviations on patients accrued to a protocol. For both benchmarks and pre-treatment reviews a dose volume analysis (DVA) was performed using MIM softwareTM. For pre-treatment reviews a volume contour evaluation was also performed. Results: IROC Houston performed a QA effectiveness analysis of a protocol which required both benchmarks and pre-treatment reviews. In 70 percent of the patient cases submitted, the benchmark played an effective role in assuring that the pre-treatment review of the cases met protocol requirements. The 35 percent of sites failing the benchmark subsequently modified there planning technique to pass the benchmark before being allowed to submit a patient for pre-treatment review. However, in 30 percent of the submitted cases the pre-treatment review failed where the majority (71 percent) failed the DVA. 20 percent of sites submitting patients failed to correct their dose volume discrepancies indicated by the benchmark case. Conclusion: Benchmark cases and pre-treatment reviews can be an effective QA tool to educate sites on protocol guidelines and to minimize deviations. Without the benchmark cases it is possible that 65 percent of the cases undergoing a pre-treatment review would have failed to meet the protocols requirements.Support: U24-CA-180803.« less
NASA Astrophysics Data System (ADS)
Martinez, Ralph; Nam, Jiseung
1992-07-01
Picture Archiving and Communication Systems (PACS) is an integration of digital image formation in a hospital, which encompasses various imaging equipment, image viewing workstations, image databases, and a high speed network. The integration requires a standardization of communication protocols to connect devices from different vendors. The American College of Radiology and the National Electrical Manufacturers Association (ACR- NEMA) standard Version 2.0 provides a point-to-point hardware interface, a set of software commands, and a consistent set of data formats for PACS. But, it is inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks and an approach were proposed to ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS''s capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI), TCP/IP protocols, and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the ISO-based protocol into a PACS prototype. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance comparison between the ISO and TCP/IP implementations are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is done by prototyping PACS on available platforms, which are Micro VAX II, DECstation and SUN Workstation.
NASA Technical Reports Server (NTRS)
Menon, Surabi; DelGenio, Anthony D.; Koch, Dorothy; Tselioudis, George; Hansen, James E. (Technical Monitor)
2001-01-01
We describe the coupling of the Goddard Institute for Space Studies (GISS) general circulation model (GCM) to an online sulfur chemistry model and source models for organic matter and sea-salt that is used to estimate the aerosol indirect effect. The cloud droplet number concentration is diagnosed empirically from field experiment datasets over land and ocean that observe droplet number and all three aerosol types simultaneously; corrections are made for implied variations in cloud turbulence levels. The resulting cloud droplet number is used to calculate variations in droplet effective radius, which in turn allows us to predict aerosol effects on cloud optical thickness and microphysical process rates. We calculate the aerosol indirect effect by differencing the top-of-the-atmosphere net cloud radiative forcing for simulations with present-day vs. pre-industrial emissions. Both the first (radiative) and second (microphysical) indirect effects are explored. We test the sensitivity of our results to cloud parameterization assumptions that control the vertical distribution of cloud occurrence, the autoconversion rate, and the aerosol scavenging rate, each of which feeds back significantly on the model aerosol burden. The global mean aerosol indirect effect for all three aerosol types ranges from -1.55 to -4.36 W m(exp -2) in our simulations. The results are quite sensitive to the pre-industrial background aerosol burden, with low pre-industrial burdens giving strong indirect effects, and to a lesser extent to the anthropogenic aerosol burden, with large burdens giving somewhat larger indirect effects. Because of this dependence on the background aerosol, model diagnostics such as albedo-particle size correlations and column cloud susceptibility, for which satellite validation products are available, are not good predictors of the resulting indirect effect.
NASA Technical Reports Server (NTRS)
Menon, Surabi; DelGenio, Anthony D.; Koch, Dorothy; Tselioudis, George; Hansen, James E. (Technical Monitor)
2001-01-01
We describe the coupling of the Goddard Institute for Space Studies (GISS) general circulation model (GCM) to an online sulfur chemistry model and source models for organic matter and sea-salt that is used to estimate the aerosol indirect effect. The cloud droplet number concentration is diagnosed empirically from field experiment datasets over land and ocean that observe droplet number and all three aerosol types simultaneously; corrections are made for implied variations in cloud turbulence levels. The resulting cloud droplet number is used to calculate variations in droplet effective radius, which in turn allows us to predict aerosol effects on cloud optical thickness and microphysical process rates. We calculate the aerosol indirect effect by differencing the top-of-the-atmosphere net cloud radiative forcing for simulations with present-day vs. pre-industrial emissions. Both the first (radiative) and second (microphysical) indirect effects are explored. We test the sensitivity of our results to cloud parameterization assumptions that control the vertical distribution of cloud occurrence, the autoconversion rate, and the aerosol scavenging rate, each of which feeds back significantly on the model aerosol burden. The global mean aerosol indirect effect for all three aerosol types ranges from -1.55 to -4.36 W/sq m in our simulations. The results are quite sensitive to the pre-industrial background aerosol burden, with low pre-industrial burdens giving strong indirect effects, and to a lesser extent to the anthropogenic aerosol burden, with large burdens giving somewhat larger indirect effects. Because of this dependence on the background aerosol, model diagnostics such as albedo-particle size correlations and column cloud susceptibility, for which satellite validation products are available, are not good predictors of the resulting indirect effect.
Oliveira, Juliana; Correia, Vitor; Sowade, Enrico; Etxebarria, Ikerne; Rodriguez, Raul D; Mitra, Kalyan Y; Baumann, Reinhard R; Lanceros-Mendez, Senentxu
2018-04-18
Organic photodetectors (PDs) based on printing technologies will allow to expand the current field of PD applications toward large-area and flexible applications in areas such as medical imaging, security, and quality control, among others. Inkjet printing is a powerful digital tool for the deposition of smart and functional materials on various substrates, allowing the development of electronic devices such as PDs on various substrates. In this work, inkjet-printed PD arrays, based on the organic thin-film transistor architecture, have been developed and applied for the indirect detection of X-ray radiation using a scintillator ink as an X-ray absorber. The >90% increase of the photocurrent of the PDs under X-ray radiation, from about 53 nA without the scintillator film to about 102 nA with the scintillator located on top of the PD, proves the suitability of the developed printed device for X-ray detection applications.
Carbon Offsets in California: What Role for Earth Scientists in the Policy Process? (Invited)
NASA Astrophysics Data System (ADS)
Cullenward, D.; Strong, A. L.
2013-12-01
This talk addresses the policy structure in California for developing and approving carbon offset protocols, which rely on findings from the environmental and earth sciences communities. In addition to providing an overview of the legal requirements of carbon offsets, we describe a series of case studies of how scientists can engage with policymakers. Based on those experiences, we suggest ways for the earth sciences community to become more involved in climate policy development. California's climate law, known as AB 32, requires that major sectors of the state's economy reduce their emissions to 1990 levels by 2020. As part of AB 32, the California Air Resources Board created a cap-and-trade market to ensure compliance with the statutory target. Under this system, regulated companies have to acquire tradable emissions permits (called 'compliance instruments') for the greenhouse gas emissions they release. The State allocates a certain number of allowances to regulated entities through a mixture of auctions and free transfers, with the total number equal to the overall emissions target; these allowances, along with approved offsets credits, are the compliance instruments that regulated entities are required to obtain by law. One of the key policy design issues in California's cap-and-trade market concerns the use of carbon offsets. Under AB 32, the Air Resources Board can issue offset credits to project developers who reduce emissions outside of the capped sectors (electricity, industry, and transportation)--or even outside of California--pursuant to approved offset protocols. Project developers then sell the credits to regulated companies in California. Essentially, offsets allow regulated entities in California to earn credit for emissions reductions that take place outside the scope of AB 32. Many regulated entities and economists are in favor of offsets because they view them as a source of low-cost compliance instruments. On the other hand, critics argue that some offset protocols award credits for activities that would have occurred anyway; by replacing a company's need to acquire an allowance in the carbon market, critics believe that poorly designed offset protocols increase greenhouse gas emissions. Thus, the effectiveness of the policy approach depends on the scientific integrity of the offset protocols. To date, California has approved offset protocols for emissions reductions in four applications: (1) forestry, (2) urban forestry, (3) livestock, and (4) destruction of ozone-depleting substances. In addition, the State is currently considering protocols that would address (5) methane emissions from mining and (6) greenhouse gas reductions from improved rice cultivation practices. These protocols rely heavily on findings from the environmental and earth sciences communities, especially when the protocol subject involves land use or land use change. Yet, due to budget constraints, the Air Resources Board is relying primarily on third-party protocol developers to design and propose the detailed structures under which offset credits will be issued. Despite the fact that any member of the public may participate in the governance regime that leads to protocol approvals, few scientists or scientific organizations provide input into the policy process. We use case studies from several of the California protocols to illustrate ways scientists can apply their skills to a crucial stage of climate policy development.
SpaceWire Protocol ID: What Does It Mean To You?
NASA Technical Reports Server (NTRS)
Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parks, Steve
2006-01-01
Spacewire is becoming a popular solution for satellite high-speed data buses because it is a simple standard that provides great flexibility for a wide range of system requirements. It is simple in packet format and protocol, allowing users to easily tailor their implementation for their specific application. Some of the attractive aspects of Spacewire that make it easy to implement also make it hard for future reuse. Protocol reuse is difficult because Spacewire does not have a defined mechanism to communicate with the higher layers of the protocol stack. This has forced users of Spacewire to define unique packet formats and define how these packets are to be processed. Each mission writes their own Interface Control Document (ICD) and tailors Spacewire for their specific requirements making reuse difficult. Part of the reason for this habit may be because engineers typically optimize designs for their own requirements in the absence of a standard. This is an inefficient use of project resources and costs more to develop missions. A new packet format for Spacewire has been defined as a solution for this problem. This new packet format is a compliment to the Spacewire standard that will support protocol development upon Spacewire. The new packet definition does not replace the current packet structure, i.e., does not make the standard obsolete, but merely extends the standard for those who want to develop protocols over Spacewire. The Spacewire packet is defined with the first part being the Destination Address, which may be one or more bytes. This is followed by the packet cargo, which is user defined. The cargo is truncated with an End-Of-Packet (EOP) marker. This packet structure offers low packet overhead and allows the user to define how the contents are to be formatted. It also provides for many different addressing schemes, which provide flexibility in the system. This packet flexibility is typically an attractive part of the Spacewire. The new extended packet format adds one new field to the packet that greatly enhances the capability of Spacewire. This new field called the Protocol Identifier (ID) is used to identify the packet contents and the associated processing for the packet. This feature along with the restriction in the packet format that uses the Protocol ID, allows a deterministic method of decoding packets that was not before possible. The first part of the packet is still the Destination Address, which still conforms to the original standard but with one restriction. The restriction is that the first byte seen at the destination by the user needs to be a logical address, independent of the addressing scheme used. The second field is defined as the Protocol ID, which is usually one byte in length. The packet cargo (user defined) follows the Protocol ID. After the packet cargo is the EOP, which defines the end of packet. The value of the Protocol ID is assigned by the Spacewire working group and the protocol description published for others to use. The development of Protocols for Spacewire is currently the area of greatest activity by the Spacewire working group. The first protocol definition by the working group has been completed and is now in the process of formal standardization. There are many other protocols in development for missions that have not yet received formal Protocol ID assignment, but even if the protocols are not formally assigned a value, this effort will provide synergism for future developments.
Sauer-Zavala, Shannon; Boswell, James F; Bentley, Kate H; Thompson-Hollands, Johanna; Farchione, Todd J; Barlow, David H
2018-04-01
Patients' outcome expectancies and the working alliance are two psychotherapy process variables that researchers have found to be associated with treatment outcome, irrespective of treatment approach and problem area. Despite this, little is known about the mechanisms accounting for this association, and whether contextual factors (e.g., psychotherapy type) impact the strength of these relationships. The primary aim of this study was to examine whether patient-rated working alliance quality mediates the relationship between outcome expectancies and pre- to post-treatment change in anxiety symptoms using data from a recent randomized clinical trial comparing a transdiagnostic treatment (the Unified Protocol [UP]; Barlow et al., 2011a; Barlow, Sauer-Zavala, et al., in press) to single diagnosis protocols (SDPs) for patients with a principal heterogeneous anxiety disorder ( n = 179). The second aim was to explore whether cognitive-behavioral treatment condition (UP versus SDP) moderated this indirect relationship. Results from mediation and moderated mediation models indicated that, when collapsing across the two treatment conditions, the relationship between expectancies and outcome was partially mediated by the working alliance ( B = .037, SE = .05, 95% CI [.005, .096]). Interestingly, within-condition analyses showed that this conditional indirect effect was only present for SDP patients, whereas in the UP condition, working alliance did not account for the association between expectancies and outcome. These findings suggest that outcome expectancies and working alliance quality may interact to influence treatment outcomes, and that the nature and strength of the relationships among these constructs may differ as a function of the specific cognitive-behavioral treatment approach utilized.
Host-Associated Metagenomics: A Guide to Generating Infectious RNA Viromes
Robert, Catherine; Pascalis, Hervé; Michelle, Caroline; Jardot, Priscilla; Charrel, Rémi; Raoult, Didier; Desnues, Christelle
2015-01-01
Background Metagenomic analyses have been widely used in the last decade to describe viral communities in various environments or to identify the etiology of human, animal, and plant pathologies. Here, we present a simple and standardized protocol that allows for the purification and sequencing of RNA viromes from complex biological samples with an important reduction of host DNA and RNA contaminants, while preserving the infectivity of viral particles. Principal Findings We evaluated different viral purification steps, random reverse transcriptions and sequence-independent amplifications of a pool of representative RNA viruses. Viruses remained infectious after the purification process. We then validated the protocol by sequencing the RNA virome of human body lice engorged in vitro with artificially contaminated human blood. The full genomes of the most abundant viruses absorbed by the lice during the blood meal were successfully sequenced. Interestingly, random amplifications differed in the genome coverage of segmented RNA viruses. Moreover, the majority of reads were taxonomically identified, and only 7–15% of all reads were classified as “unknown”, depending on the random amplification method. Conclusion The protocol reported here could easily be applied to generate RNA viral metagenomes from complex biological samples of different origins. Our protocol allows further virological characterizations of the described viral communities because it preserves the infectivity of viral particles and allows for the isolation of viruses. PMID:26431175
Major depression and fitness to fly by different aviation authorities.
Vuorio, Alpo; Laukkala, Tanja; Navathe, Pooshan
2012-09-01
Safety issues are paramount in aviation and careful treatment protocols have been developed to ensure fitness to fly among aviators recovering from major depressive episodes (MDE). Aeromedical examiners (AMEs) do not necessarily treat depressive patients frequently, so they often consult psychiatrists; however, psychiatrists are rarely familiar with aviator treatment protocols. U.S., Canadian, and Australian regulations allow several choices among antidepressant drugs for flying pilots recovering from an MDE. Symptom stability times before the possible return to flying duties vary from 4 wk to 12 mo. So far European regulations have not allowed antidepressants, but the situation may change.
Cryopreservation of Human Pluripotent Stem Cells in Defined Medium
Liu, Weiwei; Chen, Guokai
2014-01-01
This protocol describes a cryopreservation procedure using an enzyme-free dissociation method to harvest cells and preserve cells in albumin-free chemically defined E8 medium for human pluripotent stem cells (hPSCs). The dissociation by EDTA/PBS produces small cell aggregates that allow high survival efficiency in passaging and cryopreservation. The preservation in E8 medium eliminates serum or other animal products, and is suitable for the increasing demand for high quality hPSCs in translational research. In combination with the special feature of EDTA/PBS dissociation, this protocol allows efficient cryopreservation in more time-saving manner. PMID:25366897
Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia
2018-01-15
Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.
Leverrier, Anthony; Grangier, Philippe
2009-05-08
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
Concurrent Activation of Striatal Direct and Indirect Pathways During Action Initiation
Cui, Guohong; Jun, Sang Beom; Jin, Xin; Pham, Michael D.
2014-01-01
Summary The basal ganglia are subcortical nuclei that control voluntary actions, and are affected by a number of debilitating neurological disorders1–4. The prevailing model of basal ganglia function proposes that two orthogonal projection circuits originating from distinct populations of spiny projection neurons (SPNs) in the striatum5,6 - the so-called direct and indirect pathways - have opposing effects on movement: while activity of direct-pathway SPNs purportedly facilitates movement, activity of indirect-pathway SPNs inhibits movement1,2. This model has been difficult to test due to the lack of methods to selectively measure the activity of direct- and indirect-pathway SPNs in freely moving animals. We developed a novel in-vivo method that allowed us to specifically measure direct- and indirect-pathway SPN activity using Cre-dependent viral expression of the genetically encoded calcium indicator (GECI) GCAMP3 in the dorsal striatum of D1-Cre (direct-pathway specific6,7) and A2A-Cre (indirect-pathway specific8,9) mice10. Using fiber optics and time-correlated single photon counting (TCSPC) in mice performing an operant task, we observed transient increases in neural activity in both direct- and indirect-pathway SPNs when animals initiated actions, but not when they were inactive. Concurrent activation of SPNs from both pathways in one hemisphere preceded the initiation of contraversive movements, and predicted the occurrence of specific movements within 500 ms. These observations challenge the classical view of basal ganglia function, and may have implications for understanding the origin of motor symptoms in basal ganglia disorders. PMID:23354054
Cryptography in the Bounded-Quantum-Storage Model
NASA Astrophysics Data System (ADS)
Schaffner, Christian
2007-09-01
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.
22 CFR 226.81 - Prohibition against profit.
Code of Federal Regulations, 2010 CFR
2010-04-01
....81 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADMINISTRATION OF ASSISTANCE AWARDS TO U.S. NON-GOVERNMENTAL ORGANIZATIONS Additional Provisions For Awards to Commercial Organizations § 226.81... organization. Profit is any amount in excess of allowable direct and indirect costs. ...
Introduction to multiprotocol over ATM (MPOA)
NASA Astrophysics Data System (ADS)
Fredette, Andre N.
1997-10-01
Multiprotocol over ATM (MPOA) is a new protocol specified by the ATM Forum. MPOA provides a framework for effectively synthesizing bridging and routing with ATM in an environment of diverse protocols and network technologies. The primary goal of MPOA is the efficient transfer of inter-subnet unicast data in a LAN Emulation (LANE) environment. MPOA integrates LANE and the next hop resolution protocol (NHRP) to preserve the benefits of LAN Emulation, while allowing inter-subnet, internetwork layer protocol communication over ATM VCCs without requiring routers in the data path. It reduces latency and the internetwork layer forwarding load on backbone routers by enabling direct connectivity between ATM-attached edge devices (i.e., shortcuts). To establish these shortcuts, MPOA uses both routing and bridging information to locate the edge device closest to the addressed end station. By integrating LANE and NHRP, MPOA allows the physical separation of internetwork layer route calculation and forwarding, a technique known as virtual routing. This separation provides a number of key benefits including enhanced manageability and reduced complexity of internetwork layer capable edge devices. This paper provides an overview of MPOA that summarizes the goals, architecture, and key attributes of the protocol. In presenting this overview, the salient attributes of LANE and NHRP are described as well.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grant, Robert
Under this grant, three significant software packages were developed or improved, all with the goal of improving the ease-of-use of HPC libraries. The first component is a Python package, named DistArray (originally named Odin), that provides a high-level interface to distributed array computing. This interface is based on the popular and widely used NumPy package and is integrated with the IPython project for enhanced interactive parallel distributed computing. The second Python package is the Distributed Array Protocol (DAP) that enables separate distributed array libraries to share arrays efficiently without copying or sending messages. If a distributed array library supports themore » DAP, it is then automatically able to communicate with any other library that also supports the protocol. This protocol allows DistArray to communicate with the Trilinos library via PyTrilinos, which was also enhanced during this project. A third package, PyTrilinos, was extended to support distributed structured arrays (in addition to the unstructured arrays of its original design), allow more flexible distributed arrays (i.e., the restriction to double precision data was lifted), and implement the DAP. DAP support includes both exporting the protocol so that external packages can use distributed Trilinos data structures, and importing the protocol so that PyTrilinos can work with distributed data from external packages.« less
Development of a neuro early mobilisation protocol for use in a neuroscience intensive care unit.
Brissie, Megan A; Zomorodi, Meg; Soares-Sardinha, Sharmila; Jordan, J Dedrick
2017-10-01
Through evaluation of the literature and working with a team of multidisciplinary healthcare providers, our objective was to refine an interprofessional Neuro Early Mobilisation Protocol for complex patients in the Neuroscience Intensive Care Unit. Using the literature as a guide, key stakeholders, from multiple professions, designed and refined a Neuro Early Mobilisation Protocol. This project took place at a large academic medical center in the southeast United States classified as both a Level I Trauma Center and Comprehensive Stroke Center. Goals for protocol development were to: (1) simplify the protocol to allow for ease of use, (2) make the protocol more generalizable to the patient population cared for in the Neuroscience Intensive Care Unit, (3) receive feedback from those using the original protocol on ways to improve the protocol and (4) ensure patients were properly screened for inclusion and exclusion in the protocol. Using expert feedback and the evidence, an evidence-based Neuro Early Mobilisation Protocol was created for use with all patients in the Neuroscience Intensive Care Unit. Future work will consist of protocol implementation and evaluation in order to increase patient mobilisation in the Neuroscience Intensive Care Unit. Copyright © 2017 Elsevier Ltd. All rights reserved.
An accelerated diagnostic protocol for the early, safe discharge of low-risk chest pain patients.
Altherwi, Tawfeeq; Grad, Willis B
2015-07-01
Can an accelerated 2-hour diagnostic protocol using the cardiac troponin I (cTnI) measurement as the only biomarker be implemented to allow an earlier and safe discharge of low-risk chest pain patients? Than M, Cullen L, Aldous S, et al. 2-Hour accelerated diagnostic protocol to assess patients with chest pain symptoms using contemporary troponins as the only biomarker: the ADAPT trial. J Am Coll Cardiol 2012;59(23):2091-8. To determine whether an accelerated diagnostic protocol (ADP) for possible cardiac chest pain could identify low-risk patients suitable for early discharge using cTnI as the sole biomarker.
Minding the MeV gap: The indirect detection of low mass dark matter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boddy, Kimberly K.; Kumar, Jason, E-mail: jkumar@hawaii.edu
2016-06-21
We consider the prospects for the indirect detection of low mass dark matter which couples dominantly to quarks. If the center of mass energy is below about 280 MeV, the kinematically allowed final states will be dominated by photons and neutral pions, producing striking signatures at gamma ray telescopes. In fact, an array of new instruments have been proposed, which would greatly improve sensitivity to photons in this energy range. We find that planned instruments can improve on current sensitivity to dark matter models of this type by up to a few orders of magnitude.
Ploidy Manipulation of Zebrafish Embryos with Heat Shock 2 Treatment
Baars, Destiny L.; Pelegri, Francisco
2016-01-01
Manipulation of ploidy allows for useful transformations, such as diploids to tetraploids, or haploids to diploids. In the zebrafish Danio rerio, specifically the generation of homozygous gynogenetic diploids is useful in genetic analysis because it allows the direct production of homozygotes from a single heterozygous mother. This article describes a modified protocol for ploidy duplication based on a heat pulse during the first cell cycle, Heat Shock 2 (HS2). Through inhibition of centriole duplication, this method results in a precise cell division stall during the second cell cycle. The precise one-cycle division stall, coupled to unaffected DNA duplication, results in whole genome duplication. Protocols associated with this method include egg and sperm collection, UV treatment of sperm, in vitro fertilization and heat pulse to cause a one-cell cycle division delay and ploidy duplication. A modified version of this protocol could be applied to induce ploidy changes in other animal species. PMID:28060351
Angulo, Jesús; Enríquez-Navas, Pedro M; Nieto, Pedro M
2010-07-12
The direct evaluation of dissociation constants (K(D)) from the variation of saturation transfer difference (STD) NMR spectroscopy values with the receptor-ligand ratio is not feasible due to the complex dependence of STD intensities on the spectral properties of the observed signals. Indirect evaluation, by competition experiments, allows the determination of K(D), as long as a ligand of known affinity is available for the protein under study. Herein, we present a novel protocol based on STD NMR spectroscopy for the direct measurements of receptor-ligand dissociation constants (K(D)) from single-ligand titration experiments. The influence of several experimental factors on STD values has been studied in detail, confirming the marked impact on standard determinations of protein-ligand affinities by STD NMR spectroscopy. These factors, namely, STD saturation time, ligand residence time in the complex, and the intensity of the signal, affect the accumulation of saturation in the free ligand by processes closely related to fast protein-ligand rebinding and longitudinal relaxation of the ligand signals. The proposed method avoids the dependence of the magnitudes of ligand STD signals at a given saturation time on spurious factors by constructing the binding isotherms using the initial growth rates of the STD amplification factors, in a similar way to the use of NOE growing rates to estimate cross relaxation rates for distance evaluations. Herein, it is demonstrated that the effects of these factors are cancelled out by analyzing the protein-ligand association curve using STD values at the limit of zero saturation time, when virtually no ligand rebinding or relaxation takes place. The approach is validated for two well-studied protein-ligand systems: the binding of the saccharides GlcNAc and GlcNAcbeta1,4GlcNAc (chitobiose) to the wheat germ agglutinin (WGA) lectin, and the interaction of the amino acid L-tryptophan to bovine serum albumin (BSA). In all cases, the experimental K(D) measured under different experimental conditions converged to the thermodynamic values. The proposed protocol allows accurate determinations of protein-ligand dissociation constants, extending the applicability of the STD NMR spectroscopy for affinity measurements, which is of particular relevance for those proteins for which a ligand of known affinity is not available.
Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.
Számadó, Szabolcs; Szalai, Ferenc; Scheuring, István
2016-01-01
Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.
Hatch, Burt; Healey, Dione M.; Halperin, Jeffrey M.
2013-01-01
Background ADHD has a range of aetiological origins which are associated with a number of disruptions in neuropsychological functioning. This study aims to examine how low birth weight, a proxy measure for a range of environmental complications during gestation, predicts ADHD symptom severity in preschool-aged children indirectly via neuropsychological functioning. Methods 197 preschool-aged children were recruited as part of a larger longitudinal study. Two neuropsychological factors were derived from NEPSY domain scores. One, referred to as ‘Primary Neuropsychological Function,’ loaded highly with Sensorimotor and Visuospatial scores. The other, termed ‘Higher-Order Function’ loaded highly with Language and Memory domain scores. Executive functioning split evenly across the two. Analyses examined whether these neuropsychological factors allowed for an indirect association between birth weight and ADHD symptom severity. Results While both factors were associated with symptom severity, only the Primary Neuropsychological Factor was associated with birth weight. Furthermore, birth weight was indirectly associated to symptom severity via this factor. Conclusions These data indicate that birth weight is indirectly associated with ADHD severity via disruption of neuropsychological functions that are more primary in function as opposed to functions that play a higher-order role in utilising and integrating the primary functions. PMID:24795955
Quantitative image feature variability amongst CT scanners with a controlled scan protocol
NASA Astrophysics Data System (ADS)
Ger, Rachel B.; Zhou, Shouhao; Chi, Pai-Chun Melinda; Goff, David L.; Zhang, Lifei; Lee, Hannah J.; Fuller, Clifton D.; Howell, Rebecca M.; Li, Heng; Stafford, R. Jason; Court, Laurence E.; Mackin, Dennis S.
2018-02-01
Radiomics studies often analyze patient computed tomography (CT) images acquired from different CT scanners. This may result in differences in imaging parameters, e.g. different manufacturers, different acquisition protocols, etc. However, quantifiable differences in radiomics features can occur based on acquisition parameters. A controlled protocol may allow for minimization of these effects, thus allowing for larger patient cohorts from many different CT scanners. In order to test radiomics feature variability across different CT scanners a radiomics phantom was developed with six different cartridges encased in high density polystyrene. A harmonized protocol was developed to control for tube voltage, tube current, scan type, pitch, CTDIvol, convolution kernel, display field of view, and slice thickness across different manufacturers. The radiomics phantom was imaged on 18 scanners using the control protocol. A linear mixed effects model was created to assess the impact of inter-scanner variability with decomposition of feature variation between scanners and cartridge materials. The inter-scanner variability was compared to the residual variability (the unexplained variability) and to the inter-patient variability using two different patient cohorts. The patient cohorts consisted of 20 non-small cell lung cancer (NSCLC) and 30 head and neck squamous cell carcinoma (HNSCC) patients. The inter-scanner standard deviation was at least half of the residual standard deviation for 36 of 49 quantitative image features. The ratio of inter-scanner to patient coefficient of variation was above 0.2 for 22 and 28 of the 49 features for NSCLC and HNSCC patients, respectively. Inter-scanner variability was a significant factor compared to patient variation in this small study for many of the features. Further analysis with a larger cohort will allow more thorough analysis with additional variables in the model to truly isolate the interscanner difference.
Unconditionally verifiable blind quantum computation
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.; Kashefi, Elham
2017-07-01
Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.
Indirect Fabrication of Lattice Metals with Thin Sections Using Centrifugal Casting
Mun, Jiwon; Ju, Jaehyung; Thurman, James
2016-01-01
One of the typical methods to manufacture 3D lattice metals is the direct-metal additive manufacturing (AM) process such as Selective Laser Melting (SLM) and Electron Beam Melting (EBM). In spite of its potential processing capability, the direct AM method has several disadvantages such as high cost, poor surface finish of final products, limitation in material selection, high thermal stress, and anisotropic properties of parts. We propose a cost-effective method to manufacture 3D lattice metals. The objective of this study is to provide a detailed protocol on fabrication of 3D lattice metals having a complex shape and a thin wall thickness; e.g., octet truss made of Al and Cu alloys having a unit cell length of 5 mm and a cell wall thickness of 0.5 mm. An overall experimental procedure is divided into eight sections: (a) 3D printing of sacrificial patterns (b) melt-out of support materials (c) removal of residue of support materials (d) pattern assembly (e) investment (f) burn-out of sacrificial patterns (g) centrifugal casting (h) post-processing for final products. The suggested indirect AM technique provides the potential to manufacture ultra-lightweight lattice metals; e.g., lattice structures with Al alloys. It appears that the process parameters should be properly controlled depending on materials and lattice geometry, observing the final products of octet truss metals by the indirect AM technique. PMID:27214495
Indirect Fabrication of Lattice Metals with Thin Sections Using Centrifugal Casting.
Mun, Jiwon; Ju, Jaehyung; Thurman, James
2016-05-14
One of the typical methods to manufacture 3D lattice metals is the direct-metal additive manufacturing (AM) process such as Selective Laser Melting (SLM) and Electron Beam Melting (EBM). In spite of its potential processing capability, the direct AM method has several disadvantages such as high cost, poor surface finish of final products, limitation in material selection, high thermal stress, and anisotropic properties of parts. We propose a cost-effective method to manufacture 3D lattice metals. The objective of this study is to provide a detailed protocol on fabrication of 3D lattice metals having a complex shape and a thin wall thickness; e.g., octet truss made of Al and Cu alloys having a unit cell length of 5 mm and a cell wall thickness of 0.5 mm. An overall experimental procedure is divided into eight sections: (a) 3D printing of sacrificial patterns (b) melt-out of support materials (c) removal of residue of support materials (d) pattern assembly (e) investment (f) burn-out of sacrificial patterns (g) centrifugal casting (h) post-processing for final products. The suggested indirect AM technique provides the potential to manufacture ultra-lightweight lattice metals; e.g., lattice structures with Al alloys. It appears that the process parameters should be properly controlled depending on materials and lattice geometry, observing the final products of octet truss metals by the indirect AM technique.
Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.
Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C
Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.
New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note.
Gerard, Ian J; Hall, Jeffery A; Mok, Kelvin; Collins, D Louis
2015-09-01
Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.
Production of Monoclonal Antibodies Directed against the Microsporidium Enterocytozoon bieneusi
Accoceberry, Isabelle; Thellier, Marc; Desportes-Livage, Isabelle; Achbarou, Abderrahim; Biligui, Sylvestre; Danis, Martin; Datry, Annick
1999-01-01
Several hybridomas producing antibodies detected by indirect immunofluorescence antibody test (IFAT) were established by fusion of mouse myeloma SP2/O with spleen cells from BALB/c mice immunized against whole spores (protocol 1) or chitinase-treated spores (protocol 2) of Enterocytozoon bieneusi and were cloned twice by limiting dilutions. Two monoclonal antibodies (MAbs), 3B82H2 from protocol 1, isotyped as immunoglobulin M (IgM), and 6E52D9 from protocol 2, isotyped as IgG, were expanded in both ascites and culture. IFAT with the MAbs showed that both MAbs reacted exclusively with the walls of the spores of E. bieneusi, strongly staining the surface of mature spores, and produced titers of greater than 4,096. Immunogold electron microscopy confirmed the specific reactivities of both antibodies. No cross-reaction, either with the spores of the other intestinal microsporidium species Encephalitozoon intestinalis or with yeast cells, bacteria, or any other intestinal parasites, was observed. The MAbs were used to identify E. bieneusi spores in fecal specimens from patients suspected of having intestinal microsporidiosis. The IFAT was validated against standard staining methods (Chromotrope 2R and Uvitex 2B) and PCR. We report here the first description and characterization of two MAbs specific for the spore wall of E. bieneusi. These MAbs have great potential for the demonstration and species determination of E. bieneusi, and their application in immunofluorescence identification of E. bieneusi in stool samples could offer a new diagnostic tool for clinical laboratories. PMID:10565939
Production of monoclonal antibodies directed against the microsporidium Enterocytozoon bieneusi.
Accoceberry, I; Thellier, M; Desportes-Livage, I; Achbarou, A; Biligui, S; Danis, M; Datry, A
1999-12-01
Several hybridomas producing antibodies detected by indirect immunofluorescence antibody test (IFAT) were established by fusion of mouse myeloma SP2/O with spleen cells from BALB/c mice immunized against whole spores (protocol 1) or chitinase-treated spores (protocol 2) of Enterocytozoon bieneusi and were cloned twice by limiting dilutions. Two monoclonal antibodies (MAbs), 3B82H2 from protocol 1, isotyped as immunoglobulin M (IgM), and 6E52D9 from protocol 2, isotyped as IgG, were expanded in both ascites and culture. IFAT with the MAbs showed that both MAbs reacted exclusively with the walls of the spores of E. bieneusi, strongly staining the surface of mature spores, and produced titers of greater than 4,096. Immunogold electron microscopy confirmed the specific reactivities of both antibodies. No cross-reaction, either with the spores of the other intestinal microsporidium species Encephalitozoon intestinalis or with yeast cells, bacteria, or any other intestinal parasites, was observed. The MAbs were used to identify E. bieneusi spores in fecal specimens from patients suspected of having intestinal microsporidiosis. The IFAT was validated against standard staining methods (Chromotrope 2R and Uvitex 2B) and PCR. We report here the first description and characterization of two MAbs specific for the spore wall of E. bieneusi. These MAbs have great potential for the demonstration and species determination of E. bieneusi, and their application in immunofluorescence identification of E. bieneusi in stool samples could offer a new diagnostic tool for clinical laboratories.
Coelho, F; Aguiar, L F; Cunha, G S P; Cardinot, N; Lucena, E
2014-01-01
The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.
Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.
A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.
Efstathion, Caroline A; Kern, William H
2016-09-04
Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.
Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289
Electroencephalography for children with autistic spectrum disorder: a sedation protocol.
Keidan, Ilan; Ben-Menachem, Erez; Tzadok, Michal; Ben-Zeev, Bruria; Berkenstadt, Haim
2015-02-01
To report the effectiveness and efficiency of a predetermined sedation protocol for providing sedation for electroencephalograph (EEG) studies in children with autism. Sleep EEG has been advocated for the majority of children with autism spectrum disorder. In most cases, sedation is required to allow adequate studies. Most sedation drugs have negative effects on the EEG pattern. The sedation protocol we adopted included chloral hydrate, dexmedetomidine, and ketamine and was evaluated prospectively for 2 years. One hundred and eighty-three children with autistic spectrum disorder were sedated with the described drug protocol that was efficient, provided adequate EEG readings, and was not associated with serious adverse events. Our protocol kept costs to a minimum but provided appropriate escalation in care when required. © 2014 John Wiley & Sons Ltd.
Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta
2007-01-01
Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d'Évaluation de la Communication (Montreal Communication Evaluation Battery) - Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process.
New phytochemicals as potential human anti-aging compounds: Reality, promise, and challenges.
Corrêa, Rúbia C G; Peralta, Rosane M; Haminiuk, Charles W I; Maciel, Giselle Maria; Bracht, Adelar; Ferreira, Isabel C F R
2018-04-13
Aging is an inevitable process influenced by genetic, lifestyle, and environmental factors. Indirect evidence shows that several phytochemicals can have anti-aging capabilities, although direct evidence in this field is still limited. This report aims to provide a critical review on aspects related to the use of novel phytochemicals as anti-aging agents, to discuss the obstacles found when performing most anti-aging study protocols in humans, and to analyze future perspectives. In addition to the extensively studied resveratrol, epicatechin, quercetin, and curcumin, new phytochemicals have been reported to act as anti-aging agents, such as the amino acid L-theanine isolated from green tea, and the lignans arctigenin and matairesinol isolated from Arctium lappa seeds. Furthermore, this review discusses the application of several new extracts rich in phytochemicals with potential use in anti-aging therapies. Finally, this review also discusses the most important biomarkers to test anti-aging interventions, the necessity of conducting epidemiological studies and the need of clinical trials with adequate study protocols for humans.
Tsirigotis, Konstantinos; Łuczak, Joanna
2016-09-01
The aim of this study has been to explore the gender differentiation of relationships between individual manifestations of indirect self-destructiveness and particular dimensions of emotional intelligence. A population of 260 individuals (130 women and 130 men) aged 20-30 (mean age of 24.5) was studied by using the Polish version of the Chronic Self-Destructiveness Scale (CS-DS) and INTE, i.e. the Polish version of the Assessing Emotions Scale (AES). Manifestations of indirect self-destructiveness showed significant correlations with INTE variables, and those correlations were mainly negative. Relationships between specific dimensions of emotional intelligence and specific manifestations of self-destructiveness differed between women and men. One of the most important differences was the relationship between transgression and ability to recognize emotions. The knowledge of the differentiation of the above relationships may allow to orient prophylactic and therapeutic actions, and adjust them to the specific gender.
Skordis-Worrall, Jolene; Sinha, Rajesh; Kumar Ojha, Amit; Sarangi, Soumendra; Nair, Nirmala; Tripathy, Prasanta; Sachdev, H S; Bhattacharyya, Sanghita; Gope, Rajkumar; Rath, Shibanand; Rath, Suchitra; Srivastava, Aradhana; Batura, Neha; Pulkki-Brännström, Anni-Maria; Costello, Anthony; Copas, Andrew; Saville, Naomi; Prost, Audrey; Haghparast-Bidgoli, Hassan
2016-11-02
Undernutrition affects ∼165 million children globally and contributes up to 45% of all child deaths. India has the highest proportion of global undernutrition-related morbidity and mortality. This protocol describes the planned economic evaluation of a community-based intervention to improve growth in children under 2 years of age in two rural districts of eastern India. The intervention is being evaluated through a cluster-randomised controlled trial (cRCT, the CARING trial). A cost-effectiveness and cost-utility analysis nested within a cRCT will be conducted from a societal perspective, measuring programme, provider, household and societal costs. Programme costs will be collected prospectively from project accounts using a standardised tool. These will be supplemented with time sheets and key informant interviews to inform the allocation of joint costs. Direct and indirect costs incurred by providers will be collected using key informant interviews and time use surveys. Direct and indirect household costs will be collected prospectively, using time use and consumption surveys. Incremental cost-effectiveness ratios (ICERs) will be calculated for the primary outcome measure, that is, cases of stunting prevented, and other outcomes such as cases of wasting prevented, cases of infant mortality averted, life years saved and disability-adjusted life years (DALYs) averted. Sensitivity analyses will be conducted to assess the robustness of results. There is a shortage of robust evidence regarding the cost-effectiveness of strategies to improve early child growth. As this economic evaluation is nested within a large scale, cRCT, it will contribute to understanding the fiscal space for investment in early child growth, and the relative (in)efficiency of prioritising resources to this intervention over others to prevent stunting in this and other comparable contexts. The protocol has all necessary ethical approvals and the findings will be disseminated within academia and the wider policy sphere. ISRCTN51505201; pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Plasma and catalyst for the oxidation of NOx
NASA Astrophysics Data System (ADS)
Jõgi, Indrek; Erme, Kalev; Levoll, Erik; Raud, Jüri; Stamate, Eugen
2018-03-01
Efficient exhaust gas cleaning from NO x (NO and NO2) by absorption and adsorption based methods requires the oxidation of NO. The application of non-thermal plasma is considered as a promising oxidation method but the oxidation of NO by direct plasma remains limited due to the back-reaction of NO2 to NO mediated by O radicals in plasma. Indirect NO oxidation by plasma produced ozone allows to circumvent the back-reaction and further oxidize NO2 to N2O5 but the slow reaction rate for the latter process limits the efficiency of this process. Present paper gives an overview of the role of metal-oxide catalysts in the improvement of oxidation efficiency for both direct and indirect plasma oxidation of NO x . The plasma produced active oxygen species (O, O3) were shown to play an important role in the reactions taking place on the catalyst surfaces while the exact mechanism and extent of the effect were different for direct and indirect oxidation. In the case of direct plasma oxidation, both short and long lifetime oxygen species could reach the catalyst and participate in the oxidation of NO to NO2. The back-reaction in the plasma phase remained still important factor and limited the effect of catalyst. In the case of indirect oxidation, only ozone could reach the catalyst surface and improve the oxidation of NO2 to N2O5. The effect of catalyst at different experimental conditions was quantitatively described with the aid of simple global chemical kinetic models derived for the NO x oxidation either by plasma or ozone. The models allowed to compare the effect of different catalysts and to analyze the limitations for the efficiency improvement by catalyst.
Evaluation of a continuous-rotation, high-speed scanning protocol for micro-computed tomography.
Kerl, Hans Ulrich; Isaza, Cristina T; Boll, Hanne; Schambach, Sebastian J; Nolte, Ingo S; Groden, Christoph; Brockmann, Marc A
2011-01-01
Micro-computed tomography is used frequently in preclinical in vivo research. Limiting factors are radiation dose and long scan times. The purpose of the study was to compare a standard step-and-shoot to a continuous-rotation, high-speed scanning protocol. Micro-computed tomography of a lead grid phantom and a rat femur was performed using a step-and-shoot and a continuous-rotation protocol. Detail discriminability and image quality were assessed by 3 radiologists. The signal-to-noise ratio and the modulation transfer function were calculated, and volumetric analyses of the femur were performed. The radiation dose of the scan protocols was measured using thermoluminescence dosimeters. The 40-second continuous-rotation protocol allowed a detail discriminability comparable to the step-and-shoot protocol at significantly lower radiation doses. No marked differences in volumetric or qualitative analyses were observed. Continuous-rotation micro-computed tomography significantly reduces scanning time and radiation dose without relevantly reducing image quality compared with a normal step-and-shoot protocol.
Design and Verification of a Distributed Communication Protocol
NASA Technical Reports Server (NTRS)
Munoz, Cesar A.; Goodloe, Alwyn E.
2009-01-01
The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.
The Influence of a Dietary Protocol on Cone Beam CT-Guided Radiotherapy for Prostate Cancer Patients
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smitsmans, Monique H.P.; Pos, Floris J.; Bois, Josien de
2008-07-15
Purpose: To evaluate the influence of a dietary protocol on cone beam computed tomography (CBCT) image quality, which is an indirect indicator for short-term (intrafraction) prostate motion, and on interfraction motion. Image quality is affected by motion (e.g., moving gas) during imaging and influences the performance of automatic prostate localization on CBCT scans. Methods and Materials: Twenty-six patients (336 CBCT scans) followed the dietary protocol and 23 patients (240 CBCT scans) did not. Prostates were automatically localized by using three dimensional (3D) gray-value registration (GR). Feces and (moving) gas occurrence in the CBCT scans, the success rate of 3D-GR, andmore » the statistics of prostate motion data were assessed. Results: Feces, gas, and moving gas significantly decreased from 55%, 61%, and 43% of scans in the nondiet group to 31%, 47%, and 28% in the diet group (all p < 0.001). Since there is a known relation between gas and short-term prostate motion, intrafraction prostate motion probably also decreased. The success rate of 3D-GR improved from 83% to 94% (p < 0.001). A decrease in random interfraction prostate motion also was found, which was not significant after Bonferroni's correction. Significant deviations from planning CT position for rotations around the left-right axis were found in both groups. Conclusions: The dietary protocol significantly decreased the incidence of feces and (moving) gas. As a result, CBCT image quality and the success rate of 3D-GR significantly increased. A trend exists that random interfraction prostate motion decreases. Using a dietary protocol therefore is advisable, also without CBCT-based image guidance.« less
Evans, T A
2001-12-01
Although mark-recapture protocols produce inaccurate population estimates of termite colonies, they might be employed to estimate a relative change in colony size. This possibility was tested using two Australian, mound-building, wood-eating, subterranean Coptotermes species. Three different toxicants delivered in baits were used to decrease (but not eliminate) colony size, and a single mark-recapture protocol was used to estimate pre- and postbaiting population sizes. For both species, the numbers of termites retrieved from bait stations varied widely, resulting in no significant differences in the numbers of termites sampled between treatments in either the pre- or postbaiting protocols. There were significantly fewer termites sampled in all treatments, controls included, in the postbaiting protocol compared with the pre-, suggesting a seasonal change in forager numbers. The comparison of population estimates shows a large decrease in toxicant treated colonies compared with little change in control colonies, which suggests that estimating the relative decline in population size using mark-recapture protocols might to be possible. However, the change in population estimate was due entirely to the significantly lower recapture rate in the control colonies relative to the toxicant treated colonies, as numbers of unmarked termites did not change between treatments. The population estimates should be treated with caution because low recapture rates produce dubious population estimates and, in some cases, postbaiting mark-recapture population estimates could be much greater than those at prebaiting, despite consumption of bait in sufficient quantities to cause population decline. A possible interaction between fat-stain markers and toxicants should be investigated if mark-recapture population estimates are used. Alternative methods of population change are advised, along with other indirect measures.
Usage of the hybrid encryption in a cloud instant messages exchange system
NASA Astrophysics Data System (ADS)
Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek
2016-09-01
A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.
Ex-vivo imaging of excised tissue using vital dyes and confocal microscopy
Johnson, Simon; Rabinovitch, Peter
2012-01-01
Vital dyes routinely used for staining cultured cells can also be used to stain and image live tissue slices ex-vivo. Staining tissue with vital dyes allows researchers to collect structural and functional data simultaneously and can be used for qualitative or quantitative fluorescent image collection. The protocols presented here are useful for structural and functional analysis of viable properties of cells in intact tissue slices, allowing for the collection of data in a structurally relevant environment. With these protocols, vital dyes can be applied as a research tool to disease processes and properties of tissue not amenable to cell culture based studies. PMID:22752953
Monitoring and Research of the Colorado River Ecosystem: When Is Enough Enough?
NASA Astrophysics Data System (ADS)
Schmidt, J. C.
2014-12-01
The Glen Canyon Dam Adaptive Management Program (GCDAMP) is a well-funded ( $10 million/yr.) river rehabilitation program with long-term monitoring and research focused on 400 km of the Colorado River in Glen, Marble, and Grand Canyons downstream from Lake Powell. More than 15 years of substantive science concerning hydrology, hydraulics, sediment transport, geomorphology, aquatic and fish ecology, riparian ecology, and socio-economics has yielded significant insights that guide experimental river management initiatives, such as a new protocol to annually release sediment-triggered controlled floods; administratively called the High Flow Experimental Protocol (HFEP). Implementation of the HFEP requires nearly real-time monitoring of sediment delivery from key sand producing tributaries, transport in and calculation of sand mass balance in segments of the Colorado River, and defined uncertainty of those processes and conditions (see: http://www.gcmrc.gov/). The HFEP aims to rebuild sandbars within the active channel, but many stakeholders remain focused on other aquatic ecosystem, riparian ecosystem, archaeological resources, or cultural values that are linked in complex ways to active channel conditions. Tension exists within the GCDAMP about how funding is allocated for innovative data collection, analysis, and publication strategies that allow implementation of the HFEP, and to also measure derivative resource conditions about which some stakeholders have concern. Monitoring and research initiatives that attempt to incorporate traditional cultural values also have high uncertainty when resource condition is linked with the simple implementation paradigm of the HFEP. Thus, the GCDAMP is faced with the complex challenge of allocating sufficient resources to monitor active channel processes and characteristics, resolve remaining scientific uncertainties, and develop new strategies for incorporating science insights into engineering and policy decisions, while also monitoring terrestrial resources supported by stakeholders but only indirectly linked with dam operations. The challenge of balancing these scientific and adaptive management objectives is substantial.
Quantification of Global DNA Methylation Levels by Mass Spectrometry.
Fernandez, Agustin F; Valledor, Luis; Vallejo, Fernando; Cañal, Maria Jesús; Fraga, Mario F
2018-01-01
Global DNA methylation was classically considered the relative percentage of 5-methylcysine (5mC) with respect to total cytosine (C). Early approaches were based on the use of high-performance separation technologies and UV detection. However, the recent development of protocols using mass spectrometry for the detection has increased sensibility and permitted the precise identification of peak compounds based on their molecular masses. This allows work to be conducted with much less genomic DNA starting material and also to quantify 5-hydroxymethyl-cytosine (5hmC), a recently identified form of methylated cytosine that could play an important role in active DNA demethylation. Here, we describe the protocol that we currently use in our laboratory to analyze 5mC and 5hmC by mass spectrometry. The protocol, which is based on the method originally developed by Le and colleagues using Ultra Performance Liquid Chromatography (UPLC) and mass spectrometry (triple Quadrupole (QqQ)) detection, allows for the rapid and accurate quantification of relative global 5mC and 5hmC levels starting from just 1 μg of genomic DNA, which allows for the rapid and accurate quantification of relative global 5mC and 5hmC levels.
Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.
Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E
2017-03-01
Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.
40 CFR 433.12 - Monitoring requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... indirect dischargers, the control authority) may allow dischargers to make the following certification... the permit limitation [or pretreatment standard] for total toxic organics (TTO), I certify that, to the best of my knowledge and belief, no dumping of concentrated toxic organics into the wastewaters...
Kampik, A; Rapp, J
1979-02-01
A method of Cinematography of the ocular fundus is introduced which--by connecting a camera with an indirect ophthalmoscop--allows to record the monocular picture of the fundus as produced by the ophthalmic lens.
Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Saeed Tanoli, Tariq; Khalid Khan, Muhammad
2013-12-01
Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.
Biolistic Transformation of Wheat.
Tassy, Caroline; Barret, Pierre
2017-01-01
The wheat genome encodes some 100,000 genes. To understand how the expression of these genes is regulated it will be necessary to carry out many genetic transformation experiments. Robust protocols that allow scientists to transform a wide range of wheat genotypes are therefore required. In this chapter, we describe a protocol for biolistic transformation of wheat that uses immature embryos and small quantities of DNA cassettes. An original method for DNA cassette purification is also described. This protocol can be used to transform a wide range of wheat genotypes and other related species.
Thomin, Jean; Aubin, Guillaume Ghislain; Foubert, Fabrice; Corvec, Stéphane
2015-08-01
In this study, we developed and compared four protocols to prepare a bacterial pellet from 944 positive blood cultures for direct MALDI-TOF mass spectrometry Vitek® MS analysis. Protocol 4, tested on 200 monomicrobial samples, allowed 83% of bacterial identification. This easy, fast, cheap and accurate method is promising in daily practice, especially to limit broad range antibiotic treatment. Copyright © 2015 Elsevier B.V. All rights reserved.
Türk, Ayşe Gözde; Sabuncu, Metin; Ünal, Sena; Önal, Banu; Ulusoy, Mübin
2016-01-01
The purpose of the study was to use the photonic imaging modality of optical coherence tomography (OCT) to compare the marginal adaptation of composite inlays fabricated by direct and indirect techniques. Class II cavities were prepared on 34 extracted human molar teeth. The cavities were randomly divided into two groups according to the inlay fabrication technique. The first group was directly restored on cavities with a composite (Esthet X HD, Dentsply, Germany) after isolating. The second group was indirectly restored with the same composite material. Marginal adaptations were scanned before cementation with an invisible infrared light beam of OCT (Thorlabs), allowing measurement in 200 µm intervals. Restorations were cemented with a self-adhesive cement resin (SmartCem2, Dentsply), and then marginal adaptations were again measured with OCT. Mean values were statistically compared by using independent-samples t-test and paired samples t-test (p<0.05), before and after cementation. Direct inlays presented statistically smaller marginal discrepancy values than indirect inlays, before (p=0.00001442) and after (p=0.00001466) cementation. Marginal discrepancy values were increased for all restorations after cementation (p=0.00008839, p=0.000000952 for direct and indirect inlays, respectively). The mean marginal discrepancy value of the direct group increased from 56.88±20.04 µm to 91.88±31.7 µm, whereas the indirect group increased from 107.54±35.63 µm to 170.29±54.83 µm. Different techniques are available to detect marginal adaptation of restorations, but the OCT system can give quantitative information about resin cement thickness and its interaction between tooth and restoration in a nondestructive manner. Direct inlays presented smaller marginal discrepancy than indirect inlays. The marginal discrepancy values were increased for all restorations that refer to cement thickness after cementation.
New viable region of an inert Higgs doublet dark matter model with scotogenic extension
NASA Astrophysics Data System (ADS)
Borah, Debasish; Gupta, Aritra
2017-12-01
We explore the intermediate dark matter mass regime of the inert Higgs doublet model, approximately between 400 and 550 GeV, which is allowed by latest constraints from direct and indirect detection experiments, but the thermal relic abundance remains suppressed. We extend the model by three copies of right-handed neutrinos, odd under the built-in Z2 symmetry of the model. This discrete Z2 symmetry of the model allows these right-handed neutrinos to couple to the usual lepton doublets through the inert Higgs doublet allowing the possibility of radiative neutrino mass in the scotogenic fashion. Apart from generating nonzero neutrino mass, such an extension can also revive the intermediate dark matter mass regime. The late decay of the lightest right-handed neutrino to dark matter makes it possible for the usual thermally underabundant dark matter in this intermediate mass regime to satisfy the correct relic abundance limit. The revival of this wide intermediate mass range can have relevance not only for direct and indirect search experiments but also for neutrino experiments as the long lifetime of the lightest right-handed neutrino also results in almost vanishing lightest neutrino mass.
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
An approach to natalizumab hypersensitivity: a case series of induction of tolerance.
Camacho-Halili, Marie; George, Roxanne; Gottesman, Malcolm; Davis-Lorton, Mark
2011-02-01
Induction of tolerance protocols have been applied successfully to manage allergic reactions to many medications. Hypersensitivity reactions to natalizumab (TYSABRI®) have been recognized as a growing problem. In circumstances where a hypersensitivity reaction to a medication has occurred, but no suitable alternative exists, drug induction of tolerance protocols may be considered. Drug induction of tolerance protocols were performed in three patients with prior hypersensitivity reactions to natalizumab. All three patients tolerated the protocol without adverse reactions, allowing for the safe reintroduction of natalizumab. To conclude, this case series demonstrates success with an induction of tolerance procedure to a highly effective biological agent for multiple sclerosis, in patients with allergic reactions to natalizumab.
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
Toward the modelling of safety violations in healthcare systems.
Catchpole, Ken
2013-09-01
When frontline staff do not adhere to policies, protocols, or checklists, managers often regard these violations as indicating poor practice or even negligence. More often than not, however, these policy and protocol violations reflect the efforts of well intentioned professionals to carry out their work efficiently in the face of systems poorly designed to meet the diverse demands of patient care. Thus, non-compliance with institutional policies and protocols often signals a systems problem, rather than a people problem, and can be influenced among other things by training, competing goals, context, process, location, case complexity, individual beliefs, the direct or indirect influence of others, job pressure, flexibility, rule definition, and clinician-centred design. Three candidates are considered for developing a model of safety behaviour and decision making. The dynamic safety model helps to understand the relationship between systems designs and human performance. The theory of planned behaviour suggests that intention is a function of attitudes, social norms and perceived behavioural control. The naturalistic decision making paradigm posits that decisions are based on a wider view of multiple patients, expertise, systems complexity, behavioural intention, individual beliefs and current understanding of the system. Understanding and predicting behavioural safety decisions could help us to encourage compliance to current processes and to design better interventions.
Rahman, Shafiq; Griffin, Michelle; Naik, Anish; Szarko, Matthew; Butler, Peter E M
2018-02-15
Decellularized scaffolds can induce chondrogenic differentiation of stem cells. This study compares different methods to optimise the decellularization of auricular cartilage. The process consisted of an initial 12 hour dry freeze thaw which froze the cartilage specimens in an empty tube at -20 °C. Samples were allowed to thaw at room temperature followed by submersion in phosphate buffer solution in which they were frozen at -20 °C for a 12 hour period. They were then allowed to thaw at room temperature as before. Protocol A subsequently involved subjecting specimens to both deoxyribonuclease and sodium deoxycholate. Protocol B and C were adaptations of this using 0.25% trypsin (7 cycles) and a 0.5 molar solution of ethylenediaminetetraacetic acid (3 hours for each cycle) respectively as additional steps. Trypsin accelerated the decellularization process with a reduction in DNA content from 55.4 ng/μL (native) to 17.3 ng/μL (P-value < 0.05) after 14 days. Protocol B showed a faster reduction in DNA content when compared with protocol A. In comparison to protocol C after 14 days, trypsin also showed greater decellularization with a mean difference of 11.7 ng/μL (P-value < 0.05). Histological analysis with H&E and DAPI confirmed depletion of cells at 14 days with trypsin.
Distillation of Bell states in open systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Isasi, E.; Mundarain, D.
2010-04-15
In this work we show that the distillation protocol proposed by P. Chen et al. [Phys. Rev. A 54, 3824 (1996)] allows one to distill Bell states at any time for a system evolving in vacuum and prepared in an initial singlet. It is also shown that the same protocol, applied in nonzero temperature thermal baths, yields a considerable recovering of entanglement.
ERIC Educational Resources Information Center
Nakagawa, Hiroshi
2017-01-01
Since 1995, to allow teachers to organize and instruct in more effective ways, many English as a Second Language (ESL) specialists and researchers have studied the Sheltered Instruction Observation Protocol (SIOP) Model and its instructional framework by Echevarria, Vogt, and Short in 2004. By combining strategies and techniques that recognize the…
Privacy-Preserving Classifier Learning
NASA Astrophysics Data System (ADS)
Brickell, Justin; Shmatikov, Vitaly
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database held by a remote server without learning any additional information about the records held in the database. The server does not learn anything about the constructed classifier, not even the user’s choice of feature and class attributes.
Bandwidth Management in Resource Constrained Networks
2012-03-01
Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching
Virtual laboratories: new opportunities for collaborative water science
NASA Astrophysics Data System (ADS)
Ceola, Serena; Arheimer, Berit; Bloeschl, Guenter; Baratti, Emanuele; Capell, Rene; Castellarin, Attilio; Freer, Jim; Han, Dawei; Hrachowitz, Markus; Hundecha, Yeshewatesfa; Hutton, Christopher; Lindström, Goran; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Toth, Elena; Viglione, Alberto; Wagener, Thorsten
2015-04-01
Reproducibility and repeatability of experiments are the fundamental prerequisites that allow researchers to validate results and share hydrological knowledge, experience and expertise in the light of global water management problems. Virtual laboratories offer new opportunities to enable these prerequisites since they allow experimenters to share data, tools and pre-defined experimental procedures (i.e. protocols). Here we present the outcomes of a first collaborative numerical experiment undertaken by five different international research groups in a virtual laboratory to address the key issues of reproducibility and repeatability. Moving from the definition of accurate and detailed experimental protocols, a rainfall-runoff model was independently applied to 15 European catchments by the research groups and model results were collectively examined through a web-based discussion. We found that a detailed modelling protocol was crucial to ensure the comparability and reproducibility of the proposed experiment across groups. Our results suggest that sharing comprehensive and precise protocols and running the experiments within a controlled environment (e.g. virtual laboratory) is as fundamental as sharing data and tools for ensuring experiment repeatability and reproducibility across the broad scientific community and thus advancing hydrology in a more coherent way.
Ong, Hui San; Rahim, Mohd Syafiq; Firdaus-Raih, Mohd; Ramlan, Effirul Ikhwan
2015-01-01
The unique programmability of nucleic acids offers alternative in constructing excitable and functional nanostructures. This work introduces an autonomous protocol to construct DNA Tetris shapes (L-Shape, B-Shape, T-Shape and I-Shape) using modular DNA blocks. The protocol exploits the rich number of sequence combinations available from the nucleic acid alphabets, thus allowing for diversity to be applied in designing various DNA nanostructures. Instead of a deterministic set of sequences corresponding to a particular design, the protocol promotes a large pool of DNA shapes that can assemble to conform to any desired structures. By utilising evolutionary programming in the design stage, DNA blocks are subjected to processes such as sequence insertion, deletion and base shifting in order to enrich the diversity of the resulting shapes based on a set of cascading filters. The optimisation algorithm allows mutation to be exerted indefinitely on the candidate sequences until these sequences complied with all the four fitness criteria. Generated candidates from the protocol are in agreement with the filter cascades and thermodynamic simulation. Further validation using gel electrophoresis indicated the formation of the designed shapes. Thus, supporting the plausibility of constructing DNA nanostructures in a more hierarchical, modular, and interchangeable manner.
Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation
NASA Astrophysics Data System (ADS)
Mantri, Atul; Demarie, Tommaso F.; Menicucci, Nicolas C.; Fitzsimons, Joseph F.
2017-07-01
Blind quantum computation protocols allow a user to delegate a computation to a remote quantum computer in such a way that the privacy of their computation is preserved, even from the device implementing the computation. To date, such protocols are only known for settings involving at least two quantum devices: either a user with some quantum capabilities and a remote quantum server or two or more entangled but noncommunicating servers. In this work, we take the first step towards the construction of a blind quantum computing protocol with a completely classical client and single quantum server. Specifically, we show how a classical client can exploit the ambiguity in the flow of information in measurement-based quantum computing to construct a protocol for hiding critical aspects of a computation delegated to a remote quantum computer. This ambiguity arises due to the fact that, for a fixed graph, there exist multiple choices of the input and output vertex sets that result in deterministic measurement patterns consistent with the same fixed total ordering of vertices. This allows a classical user, computing only measurement angles, to drive a measurement-based computation performed on a remote device while hiding critical aspects of the computation.
Rozenberg, Andrey; Leese, Florian; Weiss, Linda C; Tollrian, Ralph
2016-01-01
Tag-Seq is a high-throughput approach used for discovering SNPs and characterizing gene expression. In comparison to RNA-Seq, Tag-Seq eases data processing and allows detection of rare mRNA species using only one tag per transcript molecule. However, reduced library complexity raises the issue of PCR duplicates, which distort gene expression levels. Here we present a novel Tag-Seq protocol that uses the least biased methods for RNA library preparation combined with a novel approach for joint PCR template and sample labeling. In our protocol, input RNA is fragmented by hydrolysis, and poly(A)-bearing RNAs are selected and directly ligated to mixed DNA-RNA P5 adapters. The P5 adapters contain i5 barcodes composed of sample-specific (moderately) degenerate base regions (mDBRs), which later allow detection of PCR duplicates. The P7 adapter is attached via reverse transcription with individual i7 barcodes added during the amplification step. The resulting libraries can be sequenced on an Illumina sequencer. After sample demultiplexing and PCR duplicate removal with a free software tool we designed, the data are ready for downstream analysis. Our protocol was tested on RNA samples from predator-induced and control Daphnia microcrustaceans.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ader, M.; Bergman, R.N.
Insulin may suppress hepatic glucose production directly, or indirectly via suppression of release of gluconeogenic substrates from extrasplanchnic tissues. To compare these mechanisms, we performed insulin dose-response experiments in conscious dogs at euglycemia, during somatostatin infusion, and intraportal glucagon replacement. Insulin was sequentially infused either intraportally (0.05, 0.20, 0.40, 1.0, 1.4, and/or 3.0; protocol I) or systemically at half the intraportal rate (0.025, 0.10, 0.20, 0.50, 0.70, and/or 1.5 mU.min-1.kg-1; protocol II). Exogenous glucose infused during clamps was labeled with 3-(3H)glucose (2 microCi/g) to prevent a fall in plasma specific activity (P greater than 0.2) that may have contributed tomore » previous underestimations of hepatic glucose output (HGO). Portal insulins were up to threefold higher during intraportal infusion, but peripheral insulin levels were not different between the intraportal and systemic protocols (7 +/- 5 vs. 9 +/- 1, 12 +/- 4 vs. 13 +/- 6, 16 +/- 3 vs. 27 +/- 5, 70 +/- 23 vs. 48 +/- 8, 83 +/- 3 vs. 86 +/- 21, and 128 vs. 120 +/- 14 microU/ml for paired insulin doses; P greater than 0.06 by analysis of variance (ANOVA)). Despite higher portal insulin levels in protocol I, HGO suppression was equivalent in the two protocols when systemic insulin was matched, from 3.3 +/- 0.1 to near-total suppression at 0.3 mg.min-1.kg-1 at the highest insulin infusion rate (3.0 mU.min-1.kg-1; P less than 0.0001) with intraportal insulin, from 2.9 +/- 0.8 to -0.8 +/- 0.2 mg.min-1.kg-1 in protocol II (P less than 0.001). Suppression of HGO was similar at matched systemic insulin, regardless of portal insulin, suggesting the primacy of insulin's action on the periphery in its restraint of hepatic glucose production.« less
Radiative capture reactions via indirect methods
NASA Astrophysics Data System (ADS)
Mukhamedzhanov, A. M.; Rogachev, G. V.
2017-10-01
Many radiative capture reactions of astrophysical interest occur at such low energies that their direct measurement is hardly possible. Until now the only indirect method, which was used to determine the astrophysical factor of the astrophysical radiative capture process, was the Coulomb dissociation. In this paper we address another indirect method, which can provide information about resonant radiative capture reactions at astrophysically relevant energies. This method can be considered an extension of the Trojan horse method for resonant radiative capture reactions. The idea of the suggested indirect method is to use the indirect reaction A (a ,s γ )F to obtain information about the radiative capture reaction A (x ,γ )F , where a =(s x ) and F =(x A ) . The main advantage of using the indirect reactions is the absence of the penetrability factor in the channel x +A , which suppresses the low-energy cross sections of the A (x ,γ )F reactions and does not allow one to measure these reactions at astrophysical energies. A general formalism to treat indirect resonant radiative capture reactions is developed when only a few intermediate states contribute and a statistical approach cannot be applied. The indirect method requires coincidence measurements of the triple differential cross section, which is a function of the photon scattering angle, energy, and the scattering angle of the outgoing spectator particle s . Angular dependence of the triple differential cross section at fixed scattering angle of the spectator s is the angular γ -s correlation function. Using indirect resonant radiative capture reactions, one can obtain information about important astrophysical resonant radiative capture reactions such as (p ,γ ) , (α ,γ ) , and (n ,γ ) on stable and unstable isotopes. The indirect technique makes accessible low-lying resonances, which are close to the threshold, and even subthreshold bound states located at negative energies. In this paper, after developing the general formalism, we demonstrate the application of the indirect reaction 12C(6Li,d γ )16O proceeding through 1- and 2+ subthreshold bound states and resonances to obtain the information about the 12C(α ,γ )16O radiative capture at the astrophysically most effective energy 0.3 MeV, which is impossible using standard direct measurements. Feasibility of the suggested approach is discussed.
Mazzoni, Simona; Marchetti, Claudio; Sgarzani, Rossella; Cipriani, Riccardo; Scotti, Roberto; Ciocca, Leonardo
2013-06-01
The aim of the present study was to evaluate the accuracy of prosthetically guided maxillofacial surgery in reconstructing the mandible with a free vascularized flap using custom-made bone plates and a surgical guide to cut the mandible and fibula. The surgical protocol was applied in a study group of seven consecutive mandibular-reconstructed patients who were compared with a control group treated using the standard preplating technique on stereolithographic models (indirect computer-aided design/computer-aided manufacturing method). The precision of both surgical techniques (prosthetically guided maxillofacial surgery and indirect computer-aided design/computer-aided manufacturing procedure) was evaluated by comparing preoperative and postoperative computed tomographic data and assessment of specific landmarks. With regard to midline deviation, no significant difference was documented between the test and control groups. With regard to mandibular angle shift, only one left angle shift on the lateral plane showed a statistically significant difference between the groups. With regard to angular deviation of the body axis, the data showed a significant difference in the arch deviation. All patients in the control group registered greater than 8 degrees of deviation, determining a facial contracture of the external profile at the lower margin of the mandible. With regard to condylar position, the postoperative condylar position was better in the test group than in the control group, although no significant difference was detected. The new protocol for mandibular reconstruction using computer-aided design/computer-aided manufacturing prosthetically guided maxillofacial surgery to construct custom-made guides and plates may represent a viable method of reproducing the patient's anatomical contour, giving the surgeon better procedural control and reducing procedure time. Therapeutic, III.
Fedel-Miyasato, L E S; Formagio, A S N; Auharek, S A; Kassuya, C A L; Navarro, S D; Cunha-Laura, A L; Monreal, A C D; Vieira, M C; Oliveira, R J
2014-04-30
It is estimated that 60% of anticancer drugs are derived directly or indirectly from medicinal plants. Schinus terebinthifolius Raddi (Anacardiaceae) is traditionally used in Brazilian medicine to treat inflammation, ulcers, and tumors. Because of the need to identify new antimutagenic agents and to determine their mechanism of action, this study evaluated the chemopreventive activity of the methanolic extract from leaves of S. terebinthifolius (MEST) in Allium cepa cells and in Swiss mice analyzing different protocols of MEST in association with DNA-damaging agents. The antigenotoxic and antimutagenic aspects in peripheral blood were evaluated using the comet and micronucleus assays, respectively. The percentage of damage reduction was used to compare the A. cepa and mice results. Our results showed for the first time that MEST can act as a chemopreventive compound that promotes cellular genome integrity by desmutagenic and bioantimutagenic activities in vegetal and animal models. This finding may therefore have therapeutic applications that can indirectly correlate to the prevention and/or treatment of the degenerative diseases such as cancer.
Prospects for indirect detection of frozen-in dark matter
NASA Astrophysics Data System (ADS)
Heikinheimo, Matti; Tenkanen, Tommi; Tuominen, Kimmo
2018-03-01
We study observational consequences arising from dark matter (DM) of nonthermal origin, produced by dark freeze-out from a hidden sector heat bath. We assume this heat bath was populated by feebly coupled mediator particles, produced via a Higgs portal interaction with the Standard Model (SM). The dark sector then attained internal equilibrium with a characteristic temperature different from the SM photon temperature. We find that even if the coupling between the DM and the SM sectors is very weak, the scenario allows for indirect observational signals. We show how the expected strength of these signals depends on the temperature of the hidden sector at DM freeze-out.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rozanov, V. B., E-mail: rozanov@sci.lebedev.ru; Vergunova, G. A., E-mail: verg@sci.lebedev.ru
The main parameters of compression of a target and tendencies at change in the irradiation conditions are determined by analyzing the published results of experiments at the megajoule National Ignition Facility (NIF) on the compression of capsules in indirect-irradiation targets by means of the one-dimensional RADIAN program in the spherical geometry. A possible version of the “failure of ignition” of an indirect-irradiation target under the NIF conditions is attributed to radiation transfer. The application of onedimensional model to analyze the National Ignition Campaign (NIC) experiments allows identifying conditions corresponding to the future ignition regime and distinguishing them from conditions undermore » which ignition does not occur.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... in accordance with applicable Federal cost principles. (e) The term foreign-owned company means a... allowability of indirect costs in accordance with applicable Federal cost principles. (i) The term industry-led..., marketing, or distribution of any product, process, or service that is not reasonably required to conduct...
Lessons from 25 years of genetic mapping in onion: where next?
USDA-ARS?s Scientific Manuscript database
Genetic maps are useful tools for both basic research and plant improvement. Close association of genetic markers with genes controlling economically important traits allows for indirect selection, avoiding often time-consuming and expensive phenotypic evaluations. As a result, detailed genetic maps...
Improving plant bioaccumulation science through consistent reporting of experimental data.
Fantke, Peter; Arnot, Jon A; Doucette, William J
2016-10-01
Experimental data and models for plant bioaccumulation of organic contaminants play a crucial role for assessing the potential human and ecological risks associated with chemical use. Plants are receptor organisms and direct or indirect vectors for chemical exposures to all other organisms. As new experimental data are generated they are used to improve our understanding of plant-chemical interactions that in turn allows for the development of better scientific knowledge and conceptual and predictive models. The interrelationship between experimental data and model development is an ongoing, never-ending process needed to advance our ability to provide reliable quality information that can be used in various contexts including regulatory risk assessment. However, relatively few standard experimental protocols for generating plant bioaccumulation data are currently available and because of inconsistent data collection and reporting requirements, the information generated is often less useful than it could be for direct applications in chemical assessments and for model development and refinement. We review existing testing guidelines, common data reporting practices, and provide recommendations for revising testing guidelines and reporting requirements to improve bioaccumulation knowledge and models. This analysis provides a list of experimental parameters that will help to develop high quality datasets and support modeling tools for assessing bioaccumulation of organic chemicals in plants and ultimately addressing uncertainty in ecological and human health risk assessments. Copyright © 2016 Elsevier Ltd. All rights reserved.
Measuring the emulsification dynamics and stability of self-emulsifying drug delivery systems.
Vasconcelos, Teófilo; Marques, Sara; Sarmento, Bruno
2018-02-01
Self-emulsifying drug delivery systems (SEDDS) are one of the most promising technologies in the drug delivery field, particularly for addressing solubility and bioavailability issues of drugs. The development of these drug carriers excessively relies in visual observations and indirect determinations. The present manuscript intended to describe a method able to measure the emulsification of SEDDS, both micro and nano-emulsions, able to measure the droplet size and to evaluate the physical stability of these formulations. Additionally, a new process to evaluate the physical stability of SEDDS after emulsification was also proposed, based on a cycle of mechanical stress followed by a resting period. The use of a multiparameter continuous evaluation during the emulsification process and stability was of upmost value to understand SEDDS emulsification process. Based on this method, SEDDS were classified as fast and slow emulsifiers. Moreover, emulsification process and stabilization of emulsion was subject of several considerations regarding the composition of SEDDS as major factor that affects stability to physical stress and the use of multicomponent with different properties to develop a stable and robust SEDDS formulation. Drug loading level is herein suggested to impact droplets size of SEDDS after dispersion and SEDDS stability to stress conditions. The proposed protocol allows an online measurement of SEDDS droplet size during emulsification and a rationale selection of excipients based on its emulsification and stabilization performance. Copyright © 2017. Published by Elsevier B.V.
Exact dimension estimation of interacting qubit systems assisted by a single quantum probe
NASA Astrophysics Data System (ADS)
Sone, Akira; Cappellaro, Paola
2017-12-01
Estimating the dimension of an Hilbert space is an important component of quantum system identification. In quantum technologies, the dimension of a quantum system (or its corresponding accessible Hilbert space) is an important resource, as larger dimensions determine, e.g., the performance of quantum computation protocols or the sensitivity of quantum sensors. Despite being a critical task in quantum system identification, estimating the Hilbert space dimension is experimentally challenging. While there have been proposals for various dimension witnesses capable of putting a lower bound on the dimension from measuring collective observables that encode correlations, in many practical scenarios, especially for multiqubit systems, the experimental control might not be able to engineer the required initialization, dynamics, and observables. Here we propose a more practical strategy that relies not on directly measuring an unknown multiqubit target system, but on the indirect interaction with a local quantum probe under the experimenter's control. Assuming only that the interaction model is given and the evolution correlates all the qubits with the probe, we combine a graph-theoretical approach and realization theory to demonstrate that the system dimension can be exactly estimated from the model order of the system. We further analyze the robustness in the presence of background noise of the proposed estimation method based on realization theory, finding that despite stringent constrains on the allowed noise level, exact dimension estimation can still be achieved.
Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara
2018-02-07
Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.
Decoherence estimation in quantum theory and beyond
NASA Astrophysics Data System (ADS)
Pfister, Corsin
The quantum physics literature provides many different characterizations of decoherence. Most of them have in common that they describe decoherence as a kind of influence on a quantum system upon interacting with an another system. In the spirit of quantum information theory, we adapt a particular viewpoint on decoherence which describes it as the loss of information into a system that is possibly controlled by an adversary. We use a quantitative framework for decoherence that builds on operational characterizations of the min-entropy that have been developed in the quantum information literature. It characterizes decoherence as an influence on quantum channels that reduces their suitability for a variety of quantifiable tasks such as the distribution of secret cryptographic keys of a certain length or the distribution of a certain number of maximally entangled qubit pairs. This allows for a quantitative and operational characterization of decoherence via operational characterizations of the min-entropy. In this thesis, we present a series of results about the estimation of the minentropy, subdivided into three parts. The first part concerns the estimation of a quantum adversary's uncertainty about classical information--expressed by the smooth min-entropy--as it is done in protocols for quantum key distribution (QKD). We analyze this form of min-entropy estimation in detail and find that some of the more recently suggested QKD protocols have previously unnoticed security loopholes. We show that the specifics of the sifting subroutine of a QKD protocol are crucial for security by pointing out mistakes in the security analysis in the literature and by presenting eavesdropping attacks on those problematic protocols. We provide solutions to the identified problems and present a formalized analysis of the min-entropy estimate that incorporates the sifting stage of QKD protocols. In the second part, we extend ideas from QKD to a protocol that allows to estimate an adversary's uncertainty about quantum information, expressed by the fully quantum smooth min-entropy. Roughly speaking, we show that a protocol that resembles the parallel execution of two QKD protocols can be used to lower bound the min-entropy of some unmeasured qubits. We explain how this result may influence the ongoing search for protocols for entanglement distribution. The third part is dedicated to the development of a framework that allows the estimation of decoherence even in experiments that cannot be correctly described by quantum theory. Inspired by an equivalent formulation of the min-entropy that relates it to the fidelity with a maximally entangled state, we define a decoherence quantity for a very general class of probabilistic theories that reduces to the min-entropy in the special case of quantum theory. This entails a definition of maximal entanglement for generalized probabilistic theories. Using techniques from semidefinite and linear programming, we show how bounds on this quantity can be estimated through Bell-type experiments. This allows to test models for decoherence that cannot be described by quantum theory. As an example application, we devise an experimental test of a model for gravitational decoherence that has been suggested in the literature.
Aguiar, L. F.; Cunha, G. S. P.; Cardinot, N.; Lucena, E.
2014-01-01
The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate. PMID:25763398
Assessing degradation of composite resin cements during artificial aging by Martens hardness.
Bürgin, Stefan; Rohr, Nadja; Fischer, Jens
2017-05-19
Aim of the study was to verify the efficiency of Martens hardness measurements in detecting the degradation of composite resin cements during artificial aging. Four cements were used: Variolink II (VL2), RelyX Unicem 2 Automix (RUN), PermaFlo DC (PDC), and DuoCem (DCM). Specimens for Martens hardness measurements were light-cured and stored in water at 37 °C for 1 day to allow complete polymerization (baseline). Subsequently the specimens were artificially aged by water storage at 37 °C or thermal cycling (n = 6). Hardness was measured at baseline as well as after 1, 4, 9 and 16 days of aging. Specimens for indirect tensile strength measurements were produced in a similar manner. Indirect tensile strength was measured at baseline and after 16 days of aging (n = 10). The results were statistically analyzed using one-way ANOVA (α = 0.05). After water storage for 16 days hardness was significantly reduced for VL2, RUN and DCM while hardness of PDC as well as indirect tensile strength of all cements were not significantly affected. Thermal cycling significantly reduced both, hardness and indirect tensile strength for all cements. No general correlation was found between Martens hardness and indirect tensile strength. However, when each material was analyzed separately, relative change of hardness and of indirect tensile strength revealed a strong linear correlation. Martens hardness is a sensible test method to assess aging of resin composite cements during thermal cycling that is easy to perform.
[Pharmacogenomics in neuro-oncology].
Riese-Jorda, H H; Baez, J M
Chemotherapy protocols for treatment of brain tumors use toxic molecules for killing cancer cells in a similar way that protocols for treating other cancers. Therefore, secondary effects and poor response are the major handicaps. Technological developments based on pharmacogenomics and pharmacoproteomics will predict response and toxicity giving rise to a personalized medicine. However, there are only few studies that correlate chemotherapeutical molecules for brain tumor treatment and prediction of response and toxicity. The development of new technologies based on high-density microarrays allows the progressive identification of genes whose presence will predict the efficacy of therapeutic protocols. Once identified, specific equipments based on low-density arrays will detect exclusively in an easy and fast way the presence of genes in order to predict patient's response and avoid toxicity. Other more sophisticated techniques at present still at an experimental step based on proteomics as MALDI (Matrix-Assisted Laser Desorption Ionization) and SELDI (Surface-Enhanced Laser Desorption Ionization) will allow the identification of proteins that could predict response and toxicity.
Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian
2008-04-24
Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.
X-ray-generated heralded macroscopical quantum entanglement of two nuclear ensembles.
Liao, Wen-Te; Keitel, Christoph H; Pálffy, Adriana
2016-09-19
Heralded entanglement between macroscopical samples is an important resource for present quantum technology protocols, allowing quantum communication over large distances. In such protocols, optical photons are typically used as information and entanglement carriers between macroscopic quantum memories placed in remote locations. Here we investigate theoretically a new implementation which employs more robust x-ray quanta to generate heralded entanglement between two crystal-hosted macroscopical nuclear ensembles. Mössbauer nuclei in the two crystals interact collectively with an x-ray spontaneous parametric down conversion photon that generates heralded macroscopical entanglement with coherence times of approximately 100 ns at room temperature. The quantum phase between the entangled crystals can be conveniently manipulated by magnetic field rotations at the samples. The inherent long nuclear coherence times allow also for mechanical manipulations of the samples, for instance to check the stability of entanglement in the x-ray setup. Our results pave the way for first quantum communication protocols that use x-ray qubits.
Generation and confirmation of a (100 x 100)-dimensional entangled quantum system.
Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton
2014-04-29
Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising.
Generation and confirmation of a (100 × 100)-dimensional entangled quantum system
Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton
2014-01-01
Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising. PMID:24706902
50 CFR 300.112 - Harvesting permits.
Code of Federal Regulations, 2013 CFR
2013-10-01
... knowledge of the direct and indirect impact of harvesting, the effect of the introduction of alien species... attempts to receive Dissostichus species from a harvesting vessel at sea, regardless of whether such... is allowed under the Marine Mammal Protection Act and/or the Endangered Species Act pursuant to an...
50 CFR 300.112 - Harvesting permits.
Code of Federal Regulations, 2014 CFR
2014-10-01
... knowledge of the direct and indirect impact of harvesting, the effect of the introduction of alien species... attempts to receive Dissostichus species from a harvesting vessel at sea, regardless of whether such... is allowed under the Marine Mammal Protection Act and/or the Endangered Species Act pursuant to an...
50 CFR 300.112 - Harvesting permits.
Code of Federal Regulations, 2012 CFR
2012-10-01
... knowledge of the direct and indirect impact of harvesting, the effect of the introduction of alien species... attempts to receive Dissostichus species from a harvesting vessel at sea, regardless of whether such... is allowed under the Marine Mammal Protection Act and/or the Endangered Species Act pursuant to an...
48 CFR 52.216-7 - Allowable Cost and Payment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... written understanding setting forth the final indirect cost rates. The understanding shall specify (i) the... special terms and the applicable rates. The understanding shall not change any monetary ceiling, contract... not subject to the interest penalty provisions of the Prompt Payment Act. Interim payments made prior...
ERIC Educational Resources Information Center
Bernstein, Alan; Alan, Michael
2009-01-01
A good high school cultural arts program puts students' creative talents on display, allows them to demonstrate innovative thinking, and gives them direct and indirect exposure to careers in the cultural arts. A truly outstanding program goes even further to emulate real-world authentic artistic experiences and to create multidisciplinary artistic…
ERIC Educational Resources Information Center
Rossi, Sergio; Benaglia, Maurizio; Brenna, Davide; Porta, Riccardo; Orlandi, Manuel
2015-01-01
A simple procedure to convert protein data bank files (.pdb) into a stereolithography file (.stl) using VMD software (Virtual Molecular Dynamic) is reported. This tutorial allows generating, with a very simple protocol, three-dimensional customized structures that can be printed by a low-cost 3D-printer, and used for teaching chemical education…
Gaussian operations and privacy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Navascues, Miguel; Acin, Antonio
2005-07-15
We consider the possibilities offered by Gaussian states and operations for two honest parties, Alice and Bob, to obtain privacy against a third eavesdropping party, Eve. We first extend the security analysis of the protocol proposed in [Navascues et al. Phys. Rev. Lett. 94, 010502 (2005)]. Then, we prove that a generalized version of this protocol does not allow one to distill a secret key out of bound entangled Gaussian states.
Khilnani, Jasmin C; Wing, Helen J
2015-10-01
Paenibacillus larvae is the causal agent of the honey bee disease American Foulbrood. Two enhanced protocols that allow the activity of antimicrobial peptides to be tested against P. larvae are presented. Proof of principle experiments demonstrate that the honey bee antimicrobial peptide defensin 1 is active in both assays. Copyright © 2015 Elsevier B.V. All rights reserved.
OXSA: An open-source magnetic resonance spectroscopy analysis toolbox in MATLAB.
Purvis, Lucian A B; Clarke, William T; Biasiolli, Luca; Valkovič, Ladislav; Robson, Matthew D; Rodgers, Christopher T
2017-01-01
In vivo magnetic resonance spectroscopy provides insight into metabolism in the human body. New acquisition protocols are often proposed to improve the quality or efficiency of data collection. Processing pipelines must also be developed to use these data optimally. Current fitting software is either targeted at general spectroscopy fitting, or for specific protocols. We therefore introduce the MATLAB-based OXford Spectroscopy Analysis (OXSA) toolbox to allow researchers to rapidly develop their own customised processing pipelines. The toolbox aims to simplify development by: being easy to install and use; seamlessly importing Siemens Digital Imaging and Communications in Medicine (DICOM) standard data; allowing visualisation of spectroscopy data; offering a robust fitting routine; flexibly specifying prior knowledge when fitting; and allowing batch processing of spectra. This article demonstrates how each of these criteria have been fulfilled, and gives technical details about the implementation in MATLAB. The code is freely available to download from https://github.com/oxsatoolbox/oxsa.
Cross-Layer Protocol Combining Tree Routing and TDMA Slotting in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Bai, Ronggang; Ji, Yusheng; Lin, Zhiting; Wang, Qinghua; Zhou, Xiaofang; Qu, Yugui; Zhao, Baohua
Being different from other networks, the load and direction of data traffic for wireless sensor networks are rather predictable. The relationships between nodes are cooperative rather than competitive. These features allow the design approach of a protocol stack to be able to use the cross-layer interactive way instead of a hierarchical structure. The proposed cross-layer protocol CLWSN optimizes the channel allocation in the MAC layer using the information from the routing tables, reduces the conflicting set, and improves the throughput. Simulations revealed that it outperforms SMAC and MINA in terms of delay and energy consumption.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Romberger, Jeff
An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs
Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos
2015-01-01
In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950
The early detection of antral malignancy in the postmaxillectomy patient
DOE Office of Scientific and Technical Information (OSTI.GOV)
Som, P.M.; Shugar, J.M.; Biller, H.F.
1982-05-01
A protocol was developed for the radiographic evaluation of the postmaxillectomy patient that called for a six- to eight-week postoperative, baseline computed tomography (CT) scan, followed by CT scans at four- to six-month intervals for at least three years. This protocol allowed for an early, more complete assessment of clinically discovered recurrences and the detection of clinically occult recurrences in three out of 18 patients who followed the protocol. The CT appearance of the normal partial and total maxillectomy is discussed, as well as the focal nodular soft-tissue findings suggestive of recurrent disease.
Deterministic and efficient quantum cryptography based on Bell's theorem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen Zengbing; Pan Jianwei; Physikalisches Institut, Universitaet Heidelberg, Philosophenweg 12, 69120 Heidelberg
2006-05-15
We propose a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic. The proposal uses photon pairs with entanglement both in polarization and in time degrees of freedom; each measurement in which both of the two communicating parties register a photon can establish one and only one perfect correlation, and thus deterministically create a key bit. Eavesdropping can be detected by violation of local realism. A variation of the protocol shows a higher security, similar to the six-state protocol, under individual attacks. Our scheme allows a robust implementation under the current technology.
Ocean fertilization, carbon credits and the Kyoto Protocol
NASA Astrophysics Data System (ADS)
Westley, M. B.; Gnanadesikan, A.
2008-12-01
Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization are unlikely to meet the Kyoto Protocol's verification and accounting standards for trading carbon credits on the regulated market. The marketability of ocean fertilization in the voluntary carbon marketplace will likely depend on companies' efforts to minimize environmental risks and consumers' willingness to accept remaining risks.
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
NASA Astrophysics Data System (ADS)
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
Auto-Configuration Protocols in Mobile Ad Hoc Networks
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
Arrigucci, Riccardo; Bushkin, Yuri; Radford, Felix; Lakehal, Karim; Vir, Pooja; Pine, Richard; Martin, December; Sugarman, Jeffrey; Zhao, Yanlin; Yap, George S; Lardizabal, Alfred A; Tyagi, Sanjay; Gennaro, Maria Laura
2017-01-01
We describe a flow-cytometry-based protocol for intracellular mRNA measurements in nonadherent mammalian cells using fluorescence in situ hybridization (FISH) probes. The method, which we call FISH-Flow, allows for high-throughput multiparametric measurements of gene expression, a task that was not feasible with earlier, microscopy-based approaches. The FISH-Flow protocol involves cell fixation, permeabilization and hybridization with a set of fluorescently labeled oligonucleotide probes. In this protocol, surface and intracellular protein markers can also be stained with fluorescently labeled antibodies for simultaneous protein and mRNA measurement. Moreover, a semiautomated, single-tube version of the protocol can be performed with a commercially available cell-wash device that reduces cell loss, operator time and interoperator variability. It takes ~30 h to perform this protocol. An example of FISH-Flow measurements of cytokine mRNA induction by ex vivo stimulation of primed T cells with specific antigens is described. PMID:28518171
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
A Trio of Human Molecular Genetics PCR Assays
ERIC Educational Resources Information Center
Reinking, Jeffrey L.; Waldo, Jennifer T.; Dinsmore, Jannett
2013-01-01
This laboratory exercise demonstrates three different analytical forms of the polymerase chain reaction (PCR) that allow students to genotype themselves at four different loci. Here, we present protocols to allow students to a) genotype a non-coding polymorphic Variable Number of Tandem Repeat (VNTR) locus on human chromosome 5 using conventional…
Collaborative Joins in a Pervasive Computing Environment
2003-07-28
the available resources of each device. For example, CQP allows a tourist to use her handheld device to ask for the closest cheapest laundromat that is...open, given her current location, time of the day and a price range. The protocol also allows the tourist to ask for the closest laundromat adjacent
Medications and Adverse Voice Effects.
Nemr, Kátia; Di Carlos Silva, Ariana; Rodrigues, Danilo de Albuquerque; Zenari, Marcia Simões
2017-08-16
To identify the medications used by patients with dysphonia, describe the voice symptoms reported on initial speech-language pathology (SLP) examination, evaluate the possible direct and indirect effects of medications on voice production, and determine the association between direct and indirect adverse voice effects and self-reported voice symptoms, hydration and smoking habits, comorbidities, vocal assessment, and type and degree of dysphonia. This is a retrospective cross-sectional study. Fifty-five patients were evaluated and the vocal signs and symptoms indicated in the Dysphonia Risk Protocol were considered, as well as data on hydration, smoking and medication use. We analyzed the associations between type of side effect and self-reported vocal signs/symptoms, hydration, smoking, comorbidities, type of dysphonia, and auditory-perceptual and acoustic parameters. Sixty percent were women, the mean age was 51.8 years, 29 symptoms were reported on the screening, and 73 active ingredients were identified with 8.2% directly and 91.8% indirectly affecting vocal function. There were associations between the use of drugs with direct adverse voice effects, self-reported symptoms, general degree of vocal deviation, and pitch deviation. The symptoms of dry throat and shortness of breath were associated with the direct vocal side effect of the medicine, as well as the general degree of vocal deviation and the greater pitch deviation. Shortness of breath when speaking was also associated with the greatest degree of vocal deviation. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Arneitz, Patrick; Egli, Ramon; Leonhardt, Roman
2017-03-01
Reconstructions of the past geomagnetic field provide fundamental constraints for understanding the dynamics of the Earth's interior, as well as serving as basis for magnetostratigraphic and archeomagnetic dating tools. Such reconstructions, when extending over epochs that precede the advent of instrumental measurements, rely exclusively on magnetic records from archeological artifacts, and, further in the past, from rocks and sediments. The most critical component of such indirect records is field intensity because of possible biases introduced by material properties and by laboratory protocols, which do not reproduce exactly the original field recording conditions. Large biases are usually avoided by the use of appropriate checking procedures; however, smaller ones can remain undetected in individual studies and might significantly affect field reconstructions. We introduce a new general approach for analyzing geomagnetic databases in order to investigate the reliability of indirect records. This approach is based on the comparison of historical records with archeomagnetic and volcanic data, considering temporal and spatial mismatches with adequate weighting functions and error estimation. A good overall agreement is found between indirect records and historical measurements, while for several subsets systematic bias is detected (e.g., inclination shallowing of lava records). We also demonstrate that simple approaches to analyzing highly inhomogeneous and internally correlated paleomagnetic data sets can lead to incorrect conclusions about the efficiency of quality checks and corrections. Consistent criteria for selecting and weighting data are presented in this review and can be used to improve current geomagnetic field modeling techniques.
Investigating microplastic trophic transfer in marine top predators.
Nelms, Sarah E; Galloway, Tamara S; Godley, Brendan J; Jarvis, Dan S; Lindeque, Penelope K
2018-07-01
Microplastics are highly bioavailable to marine organisms, either through direct ingestion, or indirectly by trophic transfer from contaminated prey. The latter has been observed for low-trophic level organisms in laboratory conditions, yet empirical evidence in high trophic-level taxa is lacking. In natura studies face difficulties when dealing with contamination and differentiating between directly and indirectly ingested microplastics. The ethical constraints of subjecting large organisms, such as marine mammals, to laboratory investigations hinder the resolution of these limitations. Here, these issues were resolved by analysing sub-samples of scat from captive grey seals (Halichoerus grypus) and whole digestive tracts of the wild-caught Atlantic mackerel (Scomber scombrus) they are fed upon. An enzymatic digestion protocol was employed to remove excess organic material and facilitate visual detection of synthetic particles without damaging them. Polymer type was confirmed using Fourier-Transform Infrared (FTIR) spectroscopy. Extensive contamination control measures were implemented throughout. Approximately half of scat subsamples (48%; n = 15) and a third of fish (32%; n = 10) contained 1-4 microplastics. Particles were mainly black, clear, red and blue in colour. Mean lengths were 1.5 mm and 2 mm in scats and fish respectively. Ethylene propylene was the most frequently detected polymer type in both. Our findings suggest trophic transfer represents an indirect, yet potentially major, pathway of microplastic ingestion for any species whose feeding ecology involves the consumption of whole prey, including humans. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime
2018-03-27
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.
2018-01-01
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen’s d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach. PMID:29584703
Performance Analysis of TCP Enhancements in Satellite Data Networks
NASA Technical Reports Server (NTRS)
Broyles, Ren H.
1999-01-01
This research examines two proposed enhancements to the well-known Transport Control Protocol (TCP) in the presence of noisy communication links. The Multiple Pipes protocol is an application-level adaptation of the standard TCP protocol, where several TCP links cooperate to transfer data. The Space Communication Protocol Standard - Transport Protocol (SCPS-TP) modifies TCP to optimize performance in a satellite environment. While SCPS-TP has inherent advantages that allow it to deliver data more rapidly than Multiple Pipes, the protocol, when optimized for operation in a high-error environment, is not compatible with legacy TCP systems, and requires changes to the TCP specification. This investigation determines the level of improvement offered by SCPS-TP's Corruption Mode, which will help determine if migration to the protocol is appropriate in different environments. As the percentage of corrupted packets approaches 5 %, Multiple Pipes can take over five times longer than SCPS-TP to deliver data. At high error rates, SCPS-TP's advantage is primarily caused by Multiple Pipes' use of congestion control algorithms. The lack of congestion control, however, limits the systems in which SCPS-TP can be effectively used.
A secure RFID-based WBAN for healthcare applications.
Ullah, Sana; Alamri, Atif
2013-10-01
A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.
NASA Astrophysics Data System (ADS)
McEvoy, Thomas Richard; Wolthusen, Stephen D.
Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br
We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The threemore » techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.« less
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Selection of G1 Phase Yeast Cells for Synchronous Meiosis and Sporulation.
Stuart, David T
2017-01-01
Centrifugal elutriation is a procedure that allows the fractionation of cell populations based upon their size and shape. This allows cells in distinct cell cycle stages can be captured from an asynchronous population. The technique is particularly helpful when performing an experiment to monitor the progression of cells through the cell cycle or meiosis. Yeast sporulation like gametogenesis in other eukaryotes initiates from the G1 phase of the cell cycle. Conveniently, S. cerevisiae arrest in G1 phase when starved for nutrients and so withdrawal of nitrogen and glucose allows cells to abandon vegetative growth in G1 phase before initiating the sporulation program. This simple starvation protocol yields a partial synchronization that has been used extensively in studies of progression through meiosis and sporulation. By using centrifugal elutriation it is possible to isolate a homogeneous population of G1 phase cells and induce them to sporulate synchronously, which is beneficial for investigating progression through meiosis and sporulation. An additionally benefit of this protocol is that cell populations can be isolated based upon size and both large and small cell populations can be tested for progression through meiosis and sporulation. Here we present a protocol for purification of G1 phase diploid cells for examining synchronous progression through meiosis and sporulation.
NASA Astrophysics Data System (ADS)
Graham, Michelle; Gray, David
As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.
de Vries, E
2012-01-01
Members of the European Society for Immunodeficiencies (ESID) and other colleagues have updated the multi-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs). The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage. PMID:22132890
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-05-15
The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less
Generating gene knockout rats by homologous recombination in embryonic stem cells
Tong, Chang; Huang, Guanyi; Ashton, Charles; Li, Ping; Ying, Qi-Long
2013-01-01
We describe here a detailed protocol for generating gene knockout rats by homologous recombination in embryonic stem (ES) cells. This protocol comprises the following procedures: derivation and expansion of rat ES cells, construction of gene-targeting vectors, generation of gene-targeted rat ES cells and, finally, production of gene-targeted rats. The major differences between this protocol and the classical mouse gene-targeting protocol include ES cell culture methods, drug selection scheme, colony picking and screening strategies. This ES cell–based gene-targeting technique allows sophisticated genetic modifications to be performed in the rat, as many laboratories have been doing in the mouse for the past two decades. Recently we used this protocol to generate Tp53 (also known as p53) gene knockout rats. The entire process requires ~1 year to complete, from derivation of ES cells to generation of knockout rats. PMID:21637202
A Protocol for Collecting Human Cardiac Tissue for Research.
Blair, Cheavar A; Haynes, Premi; Campbell, Stuart G; Chung, Charles; Mitov, Mihail I; Dennis, Donna; Bonnell, Mark R; Hoopes, Charles W; Guglin, Maya; Campbell, Kenneth S
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol.
A Protocol for Collecting Human Cardiac Tissue for Research
Blair, Cheavar A.; Haynes, Premi; Campbell, Stuart G.; Chung, Charles; Mitov, Mihail I.; Dennis, Donna; Bonnell, Mark R.; Hoopes, Charles W.; Guglin, Maya; Campbell, Kenneth S.
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol. PMID:28042604
Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.
Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel
2006-02-01
Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.
Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R
2016-08-01
To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.
Koetsveld, J; Kolyasnikova, N M; Wagemakers, A; Toporkova, M G; Sarksyan, D S; Oei, A; Platonov, A E; Hovius, J W
2017-07-01
Borrelia miyamotoi has been shown to infect humans in Eurasia and North America causing hard tick-borne relapsing fever (HTBRF). In vitro cultivation of B. miyamotoi was described recently; but clinical isolation of relapsing fever Borrelia is cumbersome. Our aim was to develop a straightforward protocol enabling B. miyamotoi isolation directly from the blood of patients. Modified Kelly-Pettenkorfer (MKP-F) medium, with or without anticoagulants, or blood from healthy human volunteers, was spiked with B. miyamotoi spirochaetes in vitro. Subsequently, either media or plasma was used for cultivation directly, or after an additional centrifugation step. This isolation protocol was tested in a clinical setting on patients suspected of HTBRF. Dipotassium-EDTA, trisodium citrate and lithium heparin inhibited growth of B. miyamotoi at concentrations ≥250 μg/mL, 2.5 mM and 1 IU/mL, respectively. However, when plasma originating from human blood containing B. miyamotoi spirochaetes was subjected to an additional centrifugation step at 8000 g, suspended and inoculated into fresh MKP-F media, positive cultures were observed within 2 weeks. Of importance, this straightforward protocol allowed for isolation of B. miyamotoi from six out of nine patients with confirmed HTBRF. Direct culture from K 2 -EDTA, trisodium citrate and lithium heparin plasma containing B. miyamotoi is hampered due to anticoagulants. Using a simple centrifugation protocol we were able to circumvent this detrimental effect, allowing for the first clinical isolation of B. miyamotoi. This will be of value for future research on the pathogenesis, genetics, diagnosis, therapy and epidemiology of HTBRF and other tick-borne relapsing fevers. Copyright © 2017 European Society of Clinical Microbiology and Infectious Diseases. Published by Elsevier Ltd. All rights reserved.
Remote Memory Access Protocol Target Node Intellectual Property
NASA Technical Reports Server (NTRS)
Haddad, Omar
2013-01-01
The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.
Financing Academic Research Facilities: A National Need.
ERIC Educational Resources Information Center
Norris, Julie T.
1990-01-01
This article examines possible changes to provide increased federal funding for university-based research facilities. The difficulties of converting between depreciation and use allowances are discussed, as is the possibility of using current market value versus acquisition cost as a basis for costing calculations and splitting the indirect cost…
ERIC Educational Resources Information Center
Dempsey, William M.
1997-01-01
A Rochester Institute of Technology (New York) program costing model designed to reflect costs more accurately allocates indirect costs according to salaries and wages, modified total direct costs, square footage of space used, credit hours, and student and faculty full-time equivalents. It allows administrators to make relative value judgments…
Report #17-P-0184, April 24, 2017. The vast majority of costs claimed by NWIFC for cooperative agreements PA00J32201 and PA00J91201 were reasonable, allocable and allowable. Only $87,963 of indirect costs reimbursed to SSIT was questioned.
22 CFR 1203.735-207 - Use of Government property.
Code of Federal Regulations, 2014 CFR
2014-04-01
... activities. An employee has a positive duty to protect and conserve Government property, including equipment... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Use of Government property. 1203.735-207... Government property. An employee shall not directly or indirectly use, or allow the use of Government...
19 CFR 200.735-108 - Use of Government property.
Code of Federal Regulations, 2014 CFR
2014-04-01
... approved activities. An employee has a positive duty to protect and conserve Government property, including... 19 Customs Duties 3 2014-04-01 2014-04-01 false Use of Government property. 200.735-108 Section... of Government property. An employee shall not directly or indirectly use, or allow the use of...
19 CFR 200.735-108 - Use of Government property.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 3 2010-04-01 2010-04-01 false Use of Government property. 200.735-108 Section... of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any kind, including property leased to the Government, for other than officially...
18 CFR 706.207 - Use of Government property.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Use of Government... EMPLOYEE RESPONSIBILITIES AND CONDUCT Conduct and Responsibilities of Employees § 706.207 Use of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any...
18 CFR 706.207 - Use of Government property.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Use of Government... EMPLOYEE RESPONSIBILITIES AND CONDUCT Conduct and Responsibilities of Employees § 706.207 Use of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any...
18 CFR 706.207 - Use of Government property.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Use of Government... EMPLOYEE RESPONSIBILITIES AND CONDUCT Conduct and Responsibilities of Employees § 706.207 Use of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any...
19 CFR 200.735-108 - Use of Government property.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 3 2012-04-01 2012-04-01 false Use of Government property. 200.735-108 Section... of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any kind, including property leased to the Government, for other than officially...
18 CFR 706.207 - Use of Government property.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Use of Government... EMPLOYEE RESPONSIBILITIES AND CONDUCT Conduct and Responsibilities of Employees § 706.207 Use of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any...
18 CFR 706.207 - Use of Government property.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Use of Government... EMPLOYEE RESPONSIBILITIES AND CONDUCT Conduct and Responsibilities of Employees § 706.207 Use of Government property. An employee shall not directly or indirectly use, or allow the use of, Government property of any...
31 CFR 205.33 - How are funds transfers processed?
Code of Federal Regulations, 2010 CFR
2010-07-01
... needed by the State and must time the disbursement to be in accord with the actual, immediate cash... funds transfers must be as close as is administratively feasible to a State's actual cash outlay for direct program costs and the proportionate share of any allowable indirect costs. States should exercise...
ERIC Educational Resources Information Center
Mindrila, Diana; Moore, Lori; Davis, Pamela
2015-01-01
The current study investigated the relationship between behavior management, traditional bullying, cyber-victimization, and several psychosocial consequences of cyber-victimization. Findings from previous research were used to specify a complex path model, which allowed the simultaneous estimation of multiple direct and indirect effects. Data were…
22 CFR 1203.735-207 - Use of Government property.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Use of Government property. 1203.735-207 Section... Government property. An employee shall not directly or indirectly use, or allow the use of Government property of any kind, including property leased to the Government, for other than officially approved...
A Simple XML Producer-Consumer Protocol
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)
2001-01-01
There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.
Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis.
Ali, Ather; Kahn, Janet; Rosenberger, Lisa; Perlman, Adam I
2012-10-04
Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists' clinical judgment and maintaining consistency with a prior pilot study. The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Clinicaltrials.gov NCT00970008 (18 August 2009).
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
Comparative costs and activity from a sample of UK clinical trials units.
Hind, Daniel; Reeves, Barnaby C; Bathers, Sarah; Bray, Christopher; Corkhill, Andrea; Hayward, Christopher; Harper, Lynda; Napp, Vicky; Norrie, John; Speed, Chris; Tremain, Liz; Keat, Nicola; Bradburn, Mike
2017-05-02
The costs of medical research are a concern. Clinical Trials Units (CTUs) need to better understand variations in the costs of their activities. Representatives of ten CTUs and two grant-awarding bodies pooled their experiences in discussions over 1.5 years. Five of the CTUs provided estimates of, and written justification for, costs associated with CTU activities required to implement an identical protocol. The protocol described a 5.5-year, nonpharmacological randomized controlled trial (RCT) conducted at 20 centres. Direct and indirect costs, the number of full time equivalents (FTEs) and the FTEs attracting overheads were compared and qualitative methods (unstructured interviews and thematic analysis) were used to interpret the results. Four members of the group (funding-body representatives or award panel members) reviewed the justification statements for transparency and information content. Separately, 163 activities common to trials were assigned to roles used by nine CTUs; the consistency of role delineation was assessed by Cohen's κ. Median full economic cost of CTU activities was £769,637 (range: £661,112 to £1,383,323). Indirect costs varied considerably, accounting for between 15% and 59% (median 35%) of the full economic cost of the grant. Excluding one CTU, which used external statisticians, the total number of FTEs ranged from 2.0 to 3.0; total FTEs attracting overheads ranged from 0.3 to 2.0. Variation in directly incurred staff costs depended on whether CTUs: supported particular roles from core funding rather than grants; opted not to cost certain activities into the grant; assigned clerical or data management tasks to research or administrative staff; employed extensive on-site monitoring strategies (also the main source of variation in non-staff costs). Funders preferred written justifications of costs that described both FTEs and indicative tasks for funded roles, with itemised non-staff costs. Consistency in role delineation was fair (κ = 0.21-0.40) for statisticians/data managers and poor for other roles (κ < 0.20). Some variation in costs is due to factors outside the control of CTUs such as access to core funding and levels of indirect costs levied by host institutions. Research is needed on strategies to control costs appropriately, especially the implementation of risk-based monitoring strategies.
Kasschau, Margaret; Sherman, Kathleen; Haider, Lamia; Frontario, Ariana; Shaw, Michael; Datta, Abhishek; Bikson, Marom; Charvet, Leigh
2015-12-26
Transcranial direct current stimulation (tDCS) is a noninvasive brain stimulation technique that uses low amplitude direct currents to alter cortical excitability. With well-established safety and tolerability, tDCS has been found to have the potential to ameliorate symptoms such as depression and pain in a range of conditions as well as to enhance outcomes of cognitive and physical training. However, effects are cumulative, requiring treatments that can span weeks or months and frequent, repeated visits to the clinic. The cost in terms of time and travel is often prohibitive for many participants, and ultimately limits real-world access. Following guidelines for remote tDCS application, we propose a protocol that would allow remote (in-home) participation that uses specially-designed devices for supervised use with materials modified for patient use, and real-time monitoring through a telemedicine video conferencing platform. We have developed structured training procedures and clear, detailed instructional materials to allow for self- or proxy-administration while supervised remotely in real-time. The protocol is designed to have a series of checkpoints, addressing attendance and tolerability of the session, to be met in order to continue to the next step. The feasibility of this protocol was then piloted for clinical use in an open label study of remotely-supervised tDCS in multiple sclerosis (MS). This protocol can be widely used for clinical study of tDCS.
Defining robustness protocols: a method to include and evaluate robustness in clinical plans
NASA Astrophysics Data System (ADS)
McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.
2015-04-01
We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.
Altwerger, Gary; Gressel, Gregory M; English, Diana P; Nelson, Wendelin K; Carusillo, Nina; Silasi, Dan-Arin; Azodi, Masoud; Santin, Alessandro; Schwartz, Peter E; Ratner, Elena S
2017-01-01
The carboplatin desensitization (CD) protocol presented here allows patients with either a positive skin test or a prior hypersensitivity reaction (HSR) to safely, rapidly and effectively continue with carboplatin infusions. Newly described factors can identify patients at risk for developing adverse events during CD. A retrospective review was performed on patients with gynecologic cancer who underwent CD between 2005 and 2014. The CD protocol uses a four-step dilution process over 3.5h. 129 patients underwent CD and completed a total of 788cycles. The desensitization protocol prevented HSRs in 96% (753 out of 788) of these cycles. Patients achieved an average of 6.1cycles (SD±4.55, range 0-23) with CD. The CD protocol allowed 73% (94 of 129) of the patients to undergo carboplatin infusion without reaction. Patients with moderate to life-threatening HSRs (grade 2 through 4) were 10.5years younger at initial CD than patients with grades 0 or 1 HSRs (52.3 vs. 63, P = 0.0307). One patient death occurred during her thirteenth desensitization cycle. The HSR in this case was complicated by pre-exisiting pulmonary hypertension. This is the largest study of its kind showing a safe, effective and rapid (3.5h) CD protocol. The majority of patients with a history of either carboplatin hypersensitivity reaction or a positive skin test completed the CD protocol without HSRs. Age was identified as a risk factor for HSR severity during CD. Age can be employed along with pre-load dependent cardiac conditions as a way to help risk stratify patients undergoing CD. Copyright © 2016 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Semenov, Z. V.; Labusov, V. A.
2017-11-01
Results of studying the errors of indirect monitoring by means of computer simulations are reported. The monitoring method is based on measuring spectra of reflection from additional monitoring substrates in a wide spectral range. Special software (Deposition Control Simulator) is developed, which allows one to estimate the influence of the monitoring system parameters (noise of the photodetector array, operating spectral range of the spectrometer and errors of its calibration in terms of wavelengths, drift of the radiation source intensity, and errors in the refractive index of deposited materials) on the random and systematic errors of deposited layer thickness measurements. The direct and inverse problems of multilayer coatings are solved using the OptiReOpt library. Curves of the random and systematic errors of measurements of the deposited layer thickness as functions of the layer thickness are presented for various values of the system parameters. Recommendations are given on using the indirect monitoring method for the purpose of reducing the layer thickness measurement error.
NASA Astrophysics Data System (ADS)
Rings, Thorsten; Lehnertz, Klaus
2016-09-01
We investigate the relative merit of phase-based methods for inferring directional couplings in complex networks of weakly interacting dynamical systems from multivariate time-series data. We compare the evolution map approach and its partialized extension to each other with respect to their ability to correctly infer the network topology in the presence of indirect directional couplings for various simulated experimental situations using coupled model systems. In addition, we investigate whether the partialized approach allows for additional or complementary indications of directional interactions in evolving epileptic brain networks using intracranial electroencephalographic recordings from an epilepsy patient. For such networks, both direct and indirect directional couplings can be expected, given the brain's connection structure and effects that may arise from limitations inherent to the recording technique. Our findings indicate that particularly in larger networks (number of nodes ≫10 ), the partialized approach does not provide information about directional couplings extending the information gained with the evolution map approach.
Kovačič, Aljaž; Borovinšek, Matej; Vesenjak, Matej; Ren, Zoran
2018-01-26
This paper addresses the problem of reconstructing realistic, irregular pore geometries of lotus-type porous iron for computer models that allow for simple porosity and pore size variation in computational characterization of their mechanical properties. The presented methodology uses image-recognition algorithms for the statistical analysis of pore morphology in real material specimens, from which a unique fingerprint of pore morphology at a certain porosity level is derived. The representative morphology parameter is introduced and used for the indirect reconstruction of realistic and statistically representative pore morphologies, which can be used for the generation of computational models with an arbitrary porosity. Such models were subjected to parametric computer simulations to characterize the dependence of engineering elastic modulus on the porosity of lotus-type porous iron. The computational results are in excellent agreement with experimental observations, which confirms the suitability of the presented methodology of indirect pore geometry reconstruction for computational simulations of similar porous materials.
Effect decomposition in the presence of an exposure-induced mediator-outcome confounder
VanderWeele, Tyler J.; Vansteelandt, Stijn; Robins, James M.
2014-01-01
Methods from causal mediation analysis have generalized the traditional approach to direct and indirect effects in the epidemiologic and social science literature by allowing for interaction and non-linearities. However, the methods from the causal inference literature have themselves been subject to a major limitation in that the so-called natural direct and indirect effects that are employed are not identified from data whenever there is a variable that is affected by the exposure, which also confounds the relationship between the mediator and the outcome. In this paper we describe three alternative approaches to effect decomposition that give quantities that can be interpreted as direct and indirect effects, and that can be identified from data even in the presence of an exposure-induced mediator-outcome confounder. We describe a simple weighting-based estimation method for each of these three approaches, illustrated with data from perinatal epidemiology. The methods described here can shed insight into pathways and questions of mediation even when an exposure-induced mediator-outcome confounder is present. PMID:24487213
Memory and the Korsakoff syndrome: not remembering what is remembered.
d'Ydewalle, Géry; Van Damme, Ilse
2007-03-14
Following the distinction between involuntary unconscious memory, involuntary conscious memory, and intentional retrieval, the focus of the present paper is whether there is an impairment of involuntary conscious memory among Korsakoff patients. At study, participants generated associations versus counted the number of letters with enclosed spaces or the number of vowels in the target words (semantic versus perceptual processing). In the Direct tests, stems were to be used to retrieve the targets with either guessing or no guessing allowed; in the Opposition tests, the stems were to be completed with the first word that came to mind but using another word if that first word was a target word; and in the Indirect tests, no reference was made to the target words from the study phase. In the Direct tests, the performance of Korsakoff patients was not necessarily worse than the one of healthy controls, provided guessing was allowed. More critical for the Korsakoff patients was the deficient involuntary conscious memory. The deficiency explained the suppression failures in the Opposition tests, the absence of performance differences between the Indirect and Opposition tests, the absence of a beneficial effect in providing information about the status of the stem, the performance boost when allowed to guess, and the very low rate of "Know"/"Remember" responses.
Trait divergence and indirect interactions allow facilitation of congeneric species
Beltrán, Elisa; Valiente-Banuet, Alfonso; Verdú, Miguel
2012-01-01
Background Plant facilitation occurs when the presence of a plant (i.e. a nurse plant) modifies the environment, making it more favourable for the establishment and survival of other species (i.e. facilitated plants), which can germinate and grow nearby. Facilitative associations can be maintained or turned into competition as the facilitated seedling grows. According to the competition-relatedness hypothesis that suggests that closely related species tend to compete more, facilitation turns into competition between phylogenetically close species. However, some examples of facilitation between congeneric species, which are supposed to be closely related species, have been found in nature. Scope In this work, some examples of congeneric facilitation and subsequent coexistence are reviewed and an attempt is made to explain those exceptions to the competition-relatedness hypothesis. Conclusions Two mechanisms are proposed that can switch the facilitation–competition balance: trait divergence and indirect interactions. When traits have diverged within the genus, the niche overlap is reduced and competition relaxed, thus allowing the coexistence of congeneric species. The presence of third interplayers (mycorrhizal fungi, seed dispersers, pollinators or pathogens) participating in the interaction between plants can alleviate the competition or enhance the reproduction and allow the coexistence of species that could not coexist in their absence. PMID:22543178
Quantum dialogue by nonselective measurements
NASA Astrophysics Data System (ADS)
Nguyen, Ba An
2018-06-01
Unlike classical measurements, quantum measurements may be useful even without reading the outcome. Such so called nonselective measurements are exploited in this paper to design a quantum dialogue protocol that allows exchanging secret data without prior key distributions. The relevant data to be exchanged are in terms of the high-dimensional mutually unbiased bases of quantum measurements. Appropriate modes of bidirectional controlling are devised to ensure the protocol security which is asymptotic.
Multi-party quantum summation without a trusted third party based on single particles
NASA Astrophysics Data System (ADS)
Zhang, Cai; Situ, Haozhen; Huang, Qiong; Yang, Pingle
We propose multi-party quantum summation protocols based on single particles, in which participants are allowed to compute the summation of their inputs without the help of a trusted third party and preserve the privacy of their inputs. Only one participant who generates the source particles needs to perform unitary operations and only single particles are needed in the beginning of the protocols.
PRISMATIC: Unified Hierarchical Probabilistic Verification Tool
2011-09-01
security protocols such as for anonymity and quantum cryptography ; and biological reaction pathways. PRISM is currently the leading probabilistic...a whole will only deadlock and fail with a probability ≤ p/2. The assumption allows us to partition the overall system verification problem into two ...run on any port using the standard HTTP protocol. In this way multiple instances of the PRISMATIC web service can respond to different requests when
Jones, Christopher J; Wozniak, Daniel J
2017-01-01
Congo red is a diazo textile dye that has been used to visualize the production of amyloid fibers for nearly a century. Microbiological applications were later developed, especially in identifying strains that produce amyloid appendages called curli and overexpressing polysaccharides in the biofilm matrix. The second messenger cyclic diguanylate (c-di-GMP) regulates the production of biofilm matrix polysaccharides, and therefore Congo red staining of samples can be utilized as an indirect measurement of elevated c-di-GMP production in bacteria. Congo red allows the identification of strains producing high c-di-GMP in an inexpensive, quantitative, and high-throughput manner.
Experimental Demonstration of X-Ray Drive Enhancement with Rugby-Shaped Hohlraums
NASA Astrophysics Data System (ADS)
Philippe, F.; Casner, A.; Caillaud, T.; Landoas, O.; Monteil, M. C.; Liberatore, S.; Park, H. S.; Amendt, P.; Robey, H.; Sorce, C.; Li, C. K.; Seguin, F.; Rosenberg, M.; Petrasso, R.; Glebov, V.; Stoeckl, C.
2010-01-01
Rugby-shaped hohlraums have been suggested as a way to enhance x-ray drive in the indirect drive approach to inertial confinement fusion. This Letter presents an experimental comparison of rugby-shaped and cylinder hohlraums used for D2 and DHe3-filled capsules implosions on the Omega laser facility, demonstrating an increase of x-ray flux by 18% in rugby-shaped hohlraums. The highest yields to date for deuterium gas implosions in indirect drive on Omega (1.5×1010 neutrons) were obtained, allowing for the first time the measurement of a DD burn history. Proton spectra measurements provide additional validation of the higher drive in rugby-shaped hohlraums.
Collavini, Silvia; Kosta, Ivet; Völker, Sebastian F; Cabanero, German; Grande, Hans J; Tena-Zaera, Ramón; Delgado, Juan Luis
2016-06-08
[70]Fullerene is presented as an efficient alternative electron-selective contact (ESC) for regular-architecture perovskite solar cells (PSCs). A smart and simple, well-described solution processing protocol for the preparation of [70]- and [60]fullerene-based solar cells, namely the fullerene saturation approach (FSA), allowed us to obtain similar power conversion efficiencies for both fullerene materials (i.e., 10.4 and 11.4 % for [70]- and [60]fullerene-based devices, respectively). Importantly, despite the low electron mobility and significant visible-light absorption of [70]fullerene, the presented protocol allows the employment of [70]fullerene as an efficient ESC. The [70]fullerene film thickness and its solubility in the perovskite processing solutions are crucial parameters, which can be controlled by the use of this simple solution processing protocol. The damage to the [70]fullerene film through dissolution during the perovskite deposition is avoided through the saturation of the perovskite processing solution with [70]fullerene. Additionally, this fullerene-saturation strategy improves the performance of the perovskite film significantly and enhances the power conversion efficiency of solar cells based on different ESCs (i.e., [60]fullerene, [70]fullerene, and TiO2 ). Therefore, this universal solution processing protocol widens the opportunities for the further development of PSCs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
Sachs, Peter B; Hunt, Kelly; Mansoubi, Fabien; Borgstede, James
2017-02-01
Building and maintaining a comprehensive yet simple set of standardized protocols for a cross-sectional image can be a daunting task. A single department may have difficulty preventing "protocol creep," which almost inevitably occurs when an organized "playbook" of protocols does not exist and individual radiologists and technologists alter protocols at will and on a case-by-case basis. When multiple departments or groups function in a large health system, the lack of uniformity of protocols can increase exponentially. In 2012, the University of Colorado Hospital formed a large health system (UCHealth) and became a 5-hospital provider network. CT and MR imaging studies are conducted at multiple locations by different radiology groups. To facilitate consistency in ordering, acquisition, and appearance of a given study, regardless of location, we minimized the number of protocols across all scanners and sites of practice with a clinical indication-driven protocol selection and standardization process. Here we review the steps utilized to perform this process improvement task and insure its stability over time. Actions included creation of a standardized protocol template, which allowed for changes in electronic storage and management of protocols, designing a change request form, and formation of a governance structure. We utilized rapid improvement events (1 day for CT, 2 days for MR) and reduced 248 CT protocols into 97 standardized protocols and 168 MR protocols to 66. Additional steps are underway to further standardize output and reporting of imaging interpretation. This will result in an improved, consistent radiologist, patient, and provider experience across the system.
Hammerslough, C R
1992-01-01
An integrated approach to estimate the total number of pregnancies that begin in a population during one calendar year and the probability of spontaneous abortion is described. This includes an indirect estimate of the number of pregnancies that result in spontaneous abortions. The method simultaneously takes into account the proportion of induced abortions that are censored by spontaneous abortions and vice versa in order to estimate the true annual number of spontaneous and induced abortions for a population. It also estimates the proportion of pregnancies that women intended to allow to continue to a live birth. The proposed indirect approach derives adjustment factors to make indirect estimates by combining vital statistics information on gestational age at induced abortion (from the 12 States that report to the National Center for Health Statistics) with a life table of spontaneous abortion probabilities. The adjustment factors are applied to data on induced abortions from the Alan Guttmacher Institute Abortion Provider Survey and data on births from U.S. vital statistics. For the United States in 1980 the probability of a spontaneous abortion is 19 percent, given the presence of induced abortion. Once the effects of spontaneous abortion are discounted, women in 1980 intended to allow 73 percent of their pregnancies to proceed to a live birth. One medical benefit to a population practicing induced abortion is that induced abortions avert some spontaneous abortions, leading to a lower mean gestational duration at the time of spontaneous abortion. PMID:1594736
Noninvasive measurement of dynamic correlation functions
NASA Astrophysics Data System (ADS)
Uhrich, Philipp; Castrignano, Salvatore; Uys, Hermann; Kastner, Michael
2017-08-01
The measurement of dynamic correlation functions of quantum systems is complicated by measurement backaction. To facilitate such measurements we introduce a protocol, based on weak ancilla-system couplings, that is applicable to arbitrary (pseudo)spin systems and arbitrary equilibrium or nonequilibrium initial states. Different choices of the coupling operator give access to the real and imaginary parts of the dynamic correlation function. This protocol reduces disturbances due to the early-time measurements to a minimum, and we quantify the deviation of the measured correlation functions from the theoretical, unitarily evolved ones. Implementations of the protocol in trapped ions and other experimental platforms are discussed. For spin-1 /2 models and single-site observables we prove that measurement backaction can be avoided altogether, allowing for the use of ancilla-free protocols.
Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO
NASA Technical Reports Server (NTRS)
Griffin, Robert I.; Lopez, Isaac (Technical Monitor)
2002-01-01
The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.
Finite-data-size study on practical universal blind quantum computation
NASA Astrophysics Data System (ADS)
Zhao, Qiang; Li, Qiong
2018-07-01
The universal blind quantum computation with weak coherent pulses protocol is a practical scheme to allow a client to delegate a computation to a remote server while the computation hidden. However, in the practical protocol, a finite data size will influence the preparation efficiency in the remote blind qubit state preparation (RBSP). In this paper, a modified RBSP protocol with two decoy states is studied in the finite data size. The issue of its statistical fluctuations is analyzed thoroughly. The theoretical analysis and simulation results show that two-decoy-state case with statistical fluctuation is closer to the asymptotic case than the one-decoy-state case with statistical fluctuation. Particularly, the two-decoy-state protocol can achieve a longer communication distance than the one-decoy-state case in this statistical fluctuation situation.
Simulating Autonomous Telecommunication Networks for Space Exploration
NASA Technical Reports Server (NTRS)
Segui, John S.; Jennings, Esther H.
2008-01-01
Currently, most interplanetary telecommunication systems require human intervention for command and control. However, considering the range from near Earth to deep space missions, combined with the increase in the number of nodes and advancements in processing capabilities, the benefits from communication autonomy will be immense. Likewise, greater mission science autonomy brings the need for unscheduled, unpredictable communication and network routing. While the terrestrial Internet protocols are highly developed their suitability for space exploration has been questioned. JPL has developed the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE) tool to help characterize network designs and protocols. The results will allow future mission planners to better understand the trade offs of communication protocols. This paper discusses various issues with interplanetary network and simulation results of interplanetary networking protocols.
CT protocol management: simplifying the process by using a master protocol concept.
Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N
2015-07-08
This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be adapted among different clinical indications on a single scanner and among different CT scanners.
Bhullar, Indermeet S; Tepas, Joseph J; Siragusa, Daniel; Loper, Todd; Kerwin, Andrew; Frykberg, Eric R
2017-04-01
Nonoperative management (NOM) of hemodynamically stable high-grade (IV-V) blunt splenic trauma remains controversial given the high failure rates (19%) that persist despite angioembolization (AE) protocols. The NOM protocol was modified in 2011 to include mandatory AE of all grade (IV-V) injuries without contrast blush (CB) along with selective AE of grade (I-V) with CB. The purpose of this study was to determine if this new AE (NAE) protocol significantly lowered the failure rates for grade (IV-V) injuries allowing for safe observation without surgery and if the exclusion of grade III injuries allowed for the prevention of unnecessary angiograms without affecting the overall failure rates. The records of patients with blunt splenic trauma from January 2000 to October 2014 at a Level I trauma center were retrospectively reviewed. Patients were divided into two groups and failure of NOM (FNOM) rates compared: NAE protocol (2011-2014) with mandatory AE for all grade (IV-V) injuries without CB and selective AE for grade (I-V) with CB versus old AE (OAE) protocol (2000-2010) with selective AE for grade (I-V) with CB. Seven hundred twelve patients underwent NOM with 522 (73%) in the OAE group and 190 (27%) in the NAE group. Evolving from the OAE to the NAE strategy resulted in a significantly lower FNOM rate for the overall group (grade I-V) (OAE vs. NAE, 4% to 1%, p = 0.04) and the grade (IV-V) group (OAE vs. NAE, 19% vs. 3%, p = 0.01). Angiograms were avoided in 113 grade (I-III) injuries with no CB; these patients had NOM with observation alone and none failed. A protocol using mandatory AE of all high-grade (IV-V) injuries without CB and selective AE of grade (I-V) with CB may provide for optimum salvage with safe NOM of the high-grade injuries (IV-V) and limited unnecessary angiograms. Therapeutic study, level IV.
Alonso Roldán, Virginia; Bossio, Luisina; Galván, David E
2015-01-01
In species showing distributions attached to particular features of the landscape or conspicuous signs, counts are commonly made by making focal observations where animals concentrate. However, to obtain density estimates for a given area, independent searching for signs and occupancy rates of suitable sites is needed. In both cases, it is important to estimate detection probability and other possible sources of variation to avoid confounding effects on measurements of abundance variation. Our objective was to assess possible bias and sources of variation in a two-step protocol in which random designs were applied to search for signs while continuously recording video cameras were used to perform abundance counts where animals are concentrated, using mara (Dolichotis patagonum) as a case study. The protocol was successfully applied to maras within the Península Valdés protected area, given that the protocol was logistically suitable, allowed warrens to be found, the associated adults to be counted, and the detection probability to be estimated. Variability was documented in both components of the two-step protocol. These sources of variation should be taken into account when applying this protocol. Warren detectability was approximately 80% with little variation. Factors related to false positive detection were more important than imperfect detection. The detectability for individuals was approximately 90% using the entire day of observations. The shortest sampling period with a similar detection capacity than a day was approximately 10 hours, and during this period, the visiting dynamic did not show trends. For individual mara, the detection capacity of the camera was not significantly different from the observer during fieldwork. The presence of the camera did not affect the visiting behavior of adults to the warren. Application of this protocol will allow monitoring of the near-threatened mara providing a minimum local population size and a baseline for measuring long-term trends.
Gorr, Matthew W; Youtz, Dane J; Eichenseer, Clayton M; Smith, Korbin E; Nelin, Timothy D; Cormet-Boyaka, Estelle; Wold, Loren E
2015-07-01
Particulate matter (PM) exposure induces a pathological response from both the lungs and the cardiovascular system. PM is capable of both manifestation into the lung epithelium and entrance into the bloodstream. Therefore, PM has the capacity for both direct and lung-mediated indirect effects on the heart. In the present studies, we exposed isolated rat cardiomyocytes to ultrafine particulate matter (diesel exhaust particles, DEP) and examined their contractile function and calcium handling ability. In another set of experiments, lung epithelial cells (16HBE14o- or Calu-3) were cultured on permeable supports that allowed access to both the basal (serosal) and apical (mucosal) media; the basal media was used to culture cardiomyocytes to model the indirect, lung-mediated effects of PM on the heart. Both the direct and indirect treatments caused a reduction in contractility as evidenced by reduced percent sarcomere shortening and reduced calcium handling ability measured in field-stimulated cardiomyocytes. Treatment of cardiomyocytes with various anti-oxidants before culture with DEP was able to partially prevent the contractile dysfunction. The basal media from lung epithelial cells treated with PM contained several inflammatory cytokines, and we found that monocyte chemotactic protein-1 was a key trigger for cardiomyocyte dysfunction. These results indicate the presence of both direct and indirect effects of PM on cardiomyocyte function in vitro. Future work will focus on elucidating the mechanisms involved in these separate pathways using in vivo models of air pollution exposure. Copyright © 2015 the American Physiological Society.
The price of being seen to be just: an intention signalling strategy for indirect reciprocity.
Tanaka, Hiroki; Ohtsuki, Hisashi; Ohtsubo, Yohsuke
2016-07-27
Cooperation among strangers is a marked characteristic of human sociality. One prominent evolutionary explanation for this form of human cooperation is indirect reciprocity, whereby each individual selectively helps people with a 'good' reputation, but not those with a 'bad' reputation. Some evolutionary analyses have underscored the importance of second-order reputation information (the reputation of a current partner's previous partner) for indirect reciprocity as it allows players to discriminate justified 'good' defectors, who selectively deny giving help to 'bad' partners, from unjustified 'bad' defectors. Nevertheless, it is not clear whether people in fact make use of second-order information in indirect reciprocity settings. As an alternative, we propose the intention signalling strategy, whereby defectors are given the option to abandon a resource as a means of expunging their 'bad' reputation. Our model deviates from traditional modelling approaches in the indirect reciprocity literature in a crucial way-we show that first-order information is sufficient to maintain cooperation if players are given an option to signal their intention. Importantly, our model is robust against invasion by both unconditionally cooperative and uncooperative strategies, a first step towards demonstrating its viability as an evolutionarily stable strategy. Furthermore, in two behavioural experiments, when participants were given the option to abandon a resource so as to mend a tarnished reputation, participants not only spontaneously began to use this option, they also interpreted others' use of this option as a signal of cooperative intent. © 2016 The Author(s).
Orteiza, N; Linder, J E; Rice, W R
2005-09-01
The empirical foundation for sexual conflict theory is the data from many different taxa demonstrating that females are harmed while interacting with males. However, the interpretation of this keystone evidence has been challenged because females may more than counterbalance the direct costs of interacting with males by the indirect benefits of obtaining higher quality genes for their offspring. A quantification of this trade-off is critical to resolve the controversy and is presented here. A multi-generation fitness assay in the Drosophila melanogaster laboratory model system was used to quantify both the direct costs to females due to interactions with males and indirect benefits via sexy sons. We specifically focus on the interactions that occur between males and nonvirgin females. In the laboratory environment of our base population, females mate soon after eclosion and store sufficient sperm for their entire lifetime, yet males persistently court these nonvirgin females and frequently succeed in re-mating them. Females may benefit from these interactions despite direct costs to their lifetime fecundity if re-mating allows them to trade-up to mates of higher genetic quality and thereby secure indirect benefits for their offspring. We found that direct costs of interactions between males and nonvirgin females substantially exceeded indirect benefits through sexy sons. These data, in combination with past studies of the good genes route of indirect benefits, demonstrate that inter-sexual interactions drive sexually antagonistic co-evolution in this model system.
Brazilian spotted fever: real-time PCR for diagnosis of fatal cases.
dos Santos, Fabiana Cristina Pereira; do Nascimento, Elvira Maria Mendes; Katz, Gizelda; Angerami, Rodrigo Nogueira; Colombo, Silvia; de Souza, Eliana Rodrigues; Labruna, Marcelo Bahia; da Silva, Marcos Vinicius
2012-12-01
Suspicion of Brazilian spotted fever (BSF) should occur in endemic regions upon surveillance of the acute febrile icteric hemorrhagic syndrome (AFIHS). However, limitations associated with currently available laboratory tests pose a challenge to early diagnosis, especially in fatal cases. Two real-time PCR (qPCR) protocols were evaluated to diagnose BSF in 110 fatal AFIHS cases, collected in BSF-endemic regions in 2009-2010. Of these, 24 were positive and 86 negative by indirect immunofluorescence (IFA) assay (cut-off IgG and/or IgM ≥ 128). DNA from these samples was used in the qPCR protocols: one to detect Rickettsia spp. (citrate synthase gene) and another to determine spotted fever group (SFG) Rickettsia species (OmpA gene). Of the 24 IFA-positive samples, 5 (21%) were positive for OmpA and 9 (38%) for citrate synthase. In the IFA-negative group (n=86), OmpA and citrate synthase were positive in 23 (27%) and 27 (31%), respectively. These results showed that the 2 qPCR protocols were about twice as sensitive as the IFA test alone (93% concordance). In conclusion, qPCR is a sensitive method for the diagnosis of fatal BSF cases and should be considered for routine surveillance of AFIHS in places like Brazil, where spotted fever-related lethality is high and other endemic diseases like dengue and leptospirosis can mislead diagnosis. Copyright © 2012 Elsevier GmbH. All rights reserved.
McCade, Kirsten J.; Wingo, Robert M.; Haarmann, Timothy K.; Sutherland, Andrew; Gubler, Walter D.
2015-12-15
A specialized conditioning protocol for honeybees that is designed for use within a complex agricultural ecosystem. This method ensures that the conditioned bees will be less likely to exhibit a conditioned response to uninfected plants, a false positive response that would render such a biological sensor unreliable for agricultural decision support. Also described is a superboosting training regime that allows training without the aid of expensive equipment and protocols for training in out in the field. Also described is a memory enhancing cocktail that aids in long term memory retention of a vapor signature. This allows the bees to be used in the field for longer durations and with fewer bees trained overall.
Application of random coherence order selection in gradient-enhanced multidimensional NMR
NASA Astrophysics Data System (ADS)
Bostock, Mark J.; Nietlispach, Daniel
2016-03-01
Development of multidimensional NMR is essential to many applications, for example in high resolution structural studies of biomolecules. Multidimensional techniques enable separation of NMR signals over several dimensions, improving signal resolution, whilst also allowing identification of new connectivities. However, these advantages come at a significant cost. The Fourier transform theorem requires acquisition of a grid of regularly spaced points to satisfy the Nyquist criterion, while frequency discrimination and acquisition of a pure phase spectrum require acquisition of both quadrature components for each time point in every indirect (non-acquisition) dimension, adding a factor of 2 N -1 to the number of free- induction decays which must be acquired, where N is the number of dimensions. Compressed sensing (CS) ℓ 1-norm minimisation in combination with non-uniform sampling (NUS) has been shown to be extremely successful in overcoming the Nyquist criterion. Previously, maximum entropy reconstruction has also been used to overcome the limitation of frequency discrimination, processing data acquired with only one quadrature component at a given time interval, known as random phase detection (RPD), allowing a factor of two reduction in the number of points for each indirect dimension (Maciejewski et al. 2011 PNAS 108 16640). However, whilst this approach can be easily applied in situations where the quadrature components are acquired as amplitude modulated data, the same principle is not easily extended to phase modulated (P-/N-type) experiments where data is acquired in the form exp (iωt) or exp (-iωt), and which make up many of the multidimensional experiments used in modern NMR. Here we demonstrate a modification of the CS ℓ 1-norm approach to allow random coherence order selection (RCS) for phase modulated experiments; we generalise the nomenclature for RCS and RPD as random quadrature detection (RQD). With this method, the power of RQD can be extended to the full suite of experiments available to modern NMR spectroscopy, allowing resolution enhancements for all indirect dimensions; alone or in combination with NUS, RQD can be used to improve experimental resolution, or shorten experiment times, of considerable benefit to the challenging applications undertaken by modern NMR.
TÜRK, Ayşe Gözde; SABUNCU, Metin; ÜNAL, Sena; ÖNAL, Banu; ULUSOY, Mübin
2016-01-01
ABSTRACT Objective The purpose of the study was to use the photonic imaging modality of optical coherence tomography (OCT) to compare the marginal adaptation of composite inlays fabricated by direct and indirect techniques. Material and Methods Class II cavities were prepared on 34 extracted human molar teeth. The cavities were randomly divided into two groups according to the inlay fabrication technique. The first group was directly restored on cavities with a composite (Esthet X HD, Dentsply, Germany) after isolating. The second group was indirectly restored with the same composite material. Marginal adaptations were scanned before cementation with an invisible infrared light beam of OCT (Thorlabs), allowing measurement in 200 µm intervals. Restorations were cemented with a self-adhesive cement resin (SmartCem2, Dentsply), and then marginal adaptations were again measured with OCT. Mean values were statistically compared by using independent-samples t-test and paired samples t-test (p<0.05), before and after cementation. Results Direct inlays presented statistically smaller marginal discrepancy values than indirect inlays, before (p=0.00001442) and after (p=0.00001466) cementation. Marginal discrepancy values were increased for all restorations after cementation (p=0.00008839, p=0.000000952 for direct and indirect inlays, respectively). The mean marginal discrepancy value of the direct group increased from 56.88±20.04 µm to 91.88±31.7 µm, whereas the indirect group increased from 107.54±35.63 µm to 170.29±54.83 µm. Different techniques are available to detect marginal adaptation of restorations, but the OCT system can give quantitative information about resin cement thickness and its interaction between tooth and restoration in a nondestructive manner. Conclusions Direct inlays presented smaller marginal discrepancy than indirect inlays. The marginal discrepancy values were increased for all restorations that refer to cement thickness after cementation. PMID:27556210
On the verification of intransitive noninterference in mulitlevel security.
Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez
2005-10-01
We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.
Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta
2007-01-01
Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. Objective To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d’Évaluation de la Communication (Montreal Communication Evaluation Battery) – Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. Methods A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Results Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. Conclusions A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process. PMID:29213400
Screening protocol for Torulopsis (Candida) glabrata.
Land, G; Burke, J; Shelby, C; Rhodes, J; Collett, J; Bennett, I; Johnson, J
1996-01-01
A screening test has been developed for the presumptive identification of Torulopsis (Candida) glabrata from other common clinical isolates of yeast-like fungi. An interlaboratory comparison of a protocol consisting of morphology on cornmeal Tween 80 agar and trehalose fermentation at 42 degrees C was successful in differentiating T. glabrata from other taxa that are frequent or possible clinical isolates. The screening results for 517 clinical yeast isolates, 241 of which were T. glabrata, were compared with their final identification via commercial systems (API20C Yeast Identification System [bioMERIEUX, Hazelwood, Mo.] and Rapid Yeast Identification Panel [Dade Microscan, Sacramento, Calif.]). The trehalose screening test has a sensitivity and a specificity of 97.8 and 95.8%, respectively, and a positive predictive value of 97.4% and a negative predictive value of 96.5%. Overall, the trehalose screen had an efficiency rating of 93.9% for ruling in or out T. glabrata. Since T. glabrata represents a substantial part of the workload in a clinical laboratory, a significant reduction in direct and indirect costs should be realized. PMID:8862605
Test One to Test Many: A Unified Approach to Quantum Benchmarks
NASA Astrophysics Data System (ADS)
Bai, Ge; Chiribella, Giulio
2018-04-01
Quantum benchmarks are routinely used to validate the experimental demonstration of quantum information protocols. Many relevant protocols, however, involve an infinite set of input states, of which only a finite subset can be used to test the quality of the implementation. This is a problem, because the benchmark for the finitely many states used in the test can be higher than the original benchmark calculated for infinitely many states. This situation arises in the teleportation and storage of coherent states, for which the benchmark of 50% fidelity is commonly used in experiments, although finite sets of coherent states normally lead to higher benchmarks. Here, we show that the average fidelity over all coherent states can be indirectly probed with a single setup, requiring only two-mode squeezing, a 50-50 beam splitter, and homodyne detection. Our setup enables a rigorous experimental validation of quantum teleportation, storage, amplification, attenuation, and purification of noisy coherent states. More generally, we prove that every quantum benchmark can be tested by preparing a single entangled state and measuring a single observable.
Optimization of immunostaining on flat-mounted human corneas.
Forest, Fabien; Thuret, Gilles; Gain, Philippe; Dumollard, Jean-Marc; Peoc'h, Michel; Perrache, Chantal; He, Zhiguo
2015-01-01
In the literature, immunohistochemistry on cross sections is the main technique used to study protein expression in corneal endothelial cells (ECs), even though this method allows visualization of few ECs, without clear subcellular localization, and is subject to the staining artifacts frequently encountered at tissue borders. We previously proposed several protocols, using fixation in 0.5% paraformaldehyde (PFA) or in methanol, allowing immunostaining on flatmounted corneas for proteins of different cell compartments. In the present study, we further refined the technique by systematically assessing the effect of fixative temperature. Last, we used optimized protocols to further demonstrate the considerable advantages of immunostaining on flatmounted intact corneas: detection of rare cells in large fields of thousands of ECs and epithelial cells, and accurate subcellular localization of given proteins. The staining of four ubiquitous proteins, ZO-1, hnRNP L, actin, and histone H3, with clearly different subcellular localizations, was analyzed in ECs of organ-cultured corneas. Whole intact human corneas were fixed for 30 min in 0.5% paraformaldehyde or pure methanol at four temperatures (4 °C for PFA, -20 °C for methanol, and 23, 37, and 50 °C for both). Experiments were performed in duplicate and repeated on three corneas. Standardized pictures were analyzed independently by two experts. Second, optimized immunostaining protocols were applied to fresh corneas for three applications: identification of rare cells that express KI67 in the endothelium of specimens with Fuch's endothelial corneal dystrophy (FECD), the precise localization of neural cell adhesion molecules (NCAMs) in normal ECs and of the cytokeratin pair K3/12 and CD44 in normal epithelial cells, and the identification of cells that express S100b in the normal epithelium. Temperature strongly influenced immunostaining quality. There was no ubiquitous protocol, but nevertheless, room temperature may be recommended as first-line temperature during fixation, instead of the conventional -20 °C for methanol and 4 °C for PFA. Further optimization may be required for certain target proteins. Optimized protocols allowed description of two previously unknown findings: the presence of a few proliferating ECs in FECD specimens, suggesting ineffective compensatory mechanisms against premature EC death, and the localization of NCAMs exclusively in the lateral membranes of ECs, showing hexagonal organization at the apical pole and an irregular shape with increasing complexity toward the basal pole. Optimized protocols were also effective for the epithelium, allowing clear localization of cytokeratin 3/12 and CD44 in superficial and basal epithelial cells, respectively. Finally, S100b allowed identification of clusters of epithelial Langerhans cells near the limbus and more centrally. Fixative temperature is a crucial parameter in optimizing immunostaining on flatmounted intact corneas. Whole-tissue overview and precise subcellular staining are significant advantages over conventional immunohistochemistry (IHC) on cross sections. This technique, initially developed for the corneal endothelium, proved equally suitable for the corneal epithelium and could be used for other superficial mono- and multilayered epithelia.
NASA Astrophysics Data System (ADS)
Shen, Ming; Trébosc, Julien; O'Dell, Luke A.; Lafon, Olivier; Pourpoint, Frédérique; Hu, Bingwen; Chen, Qun; Amoureux, Jean-Paul
2015-09-01
We present an experimental comparison of several through-space Hetero-nuclear Multiple-Quantum Correlation experiments, which allow the indirect observation of homo-nuclear single- (SQ) or double-quantum (DQ) 14N coherences via spy 1H nuclei. These 1H-{14N} D-HMQC sequences differ not only by the order of 14N coherences evolving during the indirect evolution, t1, but also by the radio-frequency (rf) scheme used to excite and reconvert these coherences under Magic-Angle Spinning (MAS). Here, the SQ coherences are created by the application of center-band frequency-selective pulses, i.e. long and low-power rectangular pulses at the 14N Larmor frequency, ν0(14N), whereas the DQ coherences are excited and reconverted using rf irradiation either at ν0(14N) or at the 14N overtone frequency, 2ν0(14N). The overtone excitation is achieved either by constant frequency rectangular pulses or by frequency-swept pulses, specifically Wide-band, Uniform-Rate, and Smooth-Truncation (WURST) pulse shapes. The present article compares the performances of four different 1H-{14N} D-HMQC sequences, including those with 14N rectangular pulses at ν0(14N) for the indirect detection of homo-nuclear (i) 14N SQ or (ii) DQ coherences, as well as their overtone variants using (iii) rectangular or (iv) WURST pulses. The compared properties include: (i) the sensitivity, (ii) the spectral resolution in the 14N dimension, (iii) the rf requirements (power and pulse length), as well as the robustness to (iv) rf offset and (v) MAS frequency instabilities. Such experimental comparisons are carried out for γ-glycine and L-histidine.HCl monohydrate, which contain 14N sites subject to moderate quadrupole interactions. We demonstrate that the optimum choice of the 1H-{14N} D-HMQC method depends on the experimental goal. When the sensitivity and/or the robustness to offset are the major concerns, the D-HMQC sequence allowing the indirect detection of 14N SQ coherences should be employed. Conversely, when the highest resolution and/or adjusted indirect spectral width are needed, overtone experiments are the method of choice. The overtone scheme using WURST pulses results in broader excitation bandwidths than that using rectangular pulses, at the expense of reduced sensitivity. Numerically exact simulations also show that the sensitivity of the overtone 1H-{14N} D-HMQC experiment increases for larger quadrupole interactions.
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.; Barton, Richard J.
2011-01-01
Wireless Sensor Networks (WSNs) can provide a substantial benefit in spacecraft systems, reducing launch weight and providing unprecedented flexibility by allowing instrumentation capabilities to grow and change over time. Achieving data transport reliability on par with that of wired systems, however, can prove extremely challenging in practice. Fortunately, much progress has been made in developing standard WSN radio protocols for applications from non-critical home automation to mission-critical industrial process control. The relative performances of candidate protocols must be compared in representative aerospace environments, however, to determine their suitability for spaceflight applications. In this paper, we will present the results of a rigorous laboratory analysis of the performance of two standards-based, low power, low data rate WSN protocols: ZigBee Pro and ISA100.11a. Both are based on IEEE 802.15.4 and augment that standard's specifications to build complete, multi-hop networking stacks. ZigBee Pro targets primarily the home and office automation markets, providing an ad-hoc protocol that is computationally lightweight and easy to implement in inexpensive system-on-a-chip components. As a result of this simplicity, however, ZigBee Pro can be susceptible to radio frequency (RF) interference. ISA100.11a, on the other hand, targets the industrial process control market, providing a robust, centrally-managed protocol capable of tolerating a significant amount of RF interference. To achieve these gains, a coordinated channel hopping mechanism is employed, which entails a greater computational complexity than ZigBee and requires more sophisticated and costly hardware. To guide future aerospace deployments, we must understand how well these standards relatively perform in analog environments under expected operating conditions. Specifically, we are interested in evaluating goodput -- application level throughput -- in a representative crewed environment in the presence of varying levels of 802.11g Wi-Fi traffic. To do so, we use the NASA Johnson Space Center Wireless Habitat Testbed (WHT), a metallic, habitation-sized module designed for co-existence testing of wireless systems. In its quiescent state, the sealed WHT provides an RF-quiet environment to which we can selectively add interfering systems; it also provides a realistic level of multi-path self-interference for systems under investigation. In our test, we deploy two representative five node networks, configured in a star topology with all nodes reporting directly to a WSN gateway. Each ZigBee network WSN node is built using a Texas Instruments (TI) CC2530 system-on-a-chip radio running TI's ZigBee Pro Z-stack. Each ISA100.11a network node is built using a Nivis VersaNode 210 system-on-a-chip radio. In both cases, radios interface with TI MSP430-F5438 microcontroller implementing a common test application. Interference is provided by a D-link 802.11g Wi-Fi router transporting traffic generated using the Iperf network testing tool. For the single-channel ZigBee network, effects of both direct and indirect Wi-Fi interference are evaluated. For the channel-hopping ISA100.11a network, effects of interference from multiple Wi-Fi routers configured in non-overlapping 802.11g channels are evaluated. Our results show that, in general, the more lightweight ZigBee network performs well at low interference levels, but performance degrades as interference increases. Conversely, the more complex and costly ISA100.11a network continues to perform well as Wi-Fi interference levels increase.
Noisy processing and distillation of private quantum States.
Renes, Joseph M; Smith, Graeme
2007-01-12
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.
Liver plasma membranes: an effective method to analyze membrane proteome.
Cao, Rui; Liang, Songping
2012-01-01
Plasma membrane proteins are critical for the maintenance of biological systems and represent important targets for the treatment of disease. The hydrophobicity and low abundance of plasma membrane proteins make them difficult to analyze. The protocols given here are the efficient isolation/digestion procedures for liver plasma membrane proteomic analysis. Both protocol for the isolation of plasma membranes and protocol for the in-gel digestion of gel-embedded plasma membrane proteins are presented. The later method allows the use of a high detergent concentration to achieve efficient solubilization of hydrophobic plasma membrane proteins while avoiding interference with the subsequent LC-MS/MS analysis.
Outpatient desensitization in selected patients with platinum hypersensitivity reactions.
O'Malley, David M; Vetter, Monica Hagan; Cohn, David E; Khan, Ambar; Hays, John L
2017-06-01
Platinum-based chemotherapies are a standard treatment for both initial and recurrent gynecologic cancers. Given this widespread use, it is important to be aware of the features of platinum hypersensitivity reactions and the subsequent treatment of these reactions. There is also increasing interest in the development of desensitization protocols to allow patients with a history of platinum hypersensitivity to receive further platinum based therapy. In this review, we describe the management of platinum hypersensitivity reactions and the desensitization protocols utilized at our institution. We also describe the clinical categorizations utilized to triage patients to appropriate desensitization protocols. Copyright © 2017 Elsevier Inc. All rights reserved.
Jensen, Stephanie M; Nguyen, Celina T; Jewett, John C
2016-09-01
Dengue virus (DENV) is a mosquito-transmitted flavivirus that infects approximately 100 million people annually. Multi-day protocols for purification of DENV reduce the infective titer due to viral sensitivity to both temperature and pH. Herein we describe a 5-h protocol for the purification of all DENV serotypes, utilizing traditional gradient-free ultracentrifugation followed by selective virion precipitation. This protocol allows for the separation of DENV from contaminating proteins - including intact C6/36 densovirus, for the production of infective virus at high concentration for protein-level analysis. Copyright © 2016 Elsevier B.V. All rights reserved.
A Method to Identify Nucleolus-Associated Chromatin Domains (NADs).
Carpentier, Marie-Christine; Picart-Picolo, Ariadna; Pontvianne, Frédéric
2018-01-01
The nuclear context needs to be taken into consideration to better understand the mechanisms shaping the epigenome and its organization, and therefore its impact on gene expression. For example, in Arabidopsis, heterochromatin is preferentially localized at the nuclear and the nucleolar periphery. Although chromatin domains associating with the nuclear periphery remain to be identified in plant cells, Nucleolus Associated chromatin Domains (NADs) can be identified thanks to a protocol allowing the isolation of pure nucleoli. We describe here the protocol enabling the identification of NADs in Arabidopsis. Providing the transfer of a nucleolus marker as described here in other crop species, this protocol is broadly applicable.
[Immunocytochemical demonstration of astrocytes in brain sections combined with Nissl staining].
Korzhevskiĭ, D E; Otellin, V A
2004-01-01
The aim of the present study was to develop an easy and reliable protocol of combined preparation staining, which would unite the advantages of immunocytochemical demonstration of astrocytes with the availability to evaluate functional state of neurons provided by Nissl technique. The presented protocol of paraffin sections processing allows to retain high quality of tissue structure and provides for selective demonstration of astrocytes using the monoclonal antibodies against glial fibrillary acidic protein and contrast Nissl staining of cells. The protocol can be used without any changes for processing of brain sections obtained from the humans and other mammals with the exception of mice and rabbits.
Contributions of Uncertainty in Droplet Nucleation to the Indirect Effect in Global Models
NASA Astrophysics Data System (ADS)
Rothenberg, D. A.; Wang, C.; Avramov, A.
2016-12-01
Anthropogenic aerosol perturbations to clouds and climate (the indirect effect, or AIE) contribute significant uncertainty towards understanding contemporary climate change. Despite refinements over the past two decades, modern global aerosol-climate models widely disagree on the magnitude of AIE, and wholly disagree with satellite estimates. Part of the spread in estimates of AIE arises from a lack of constraints on what exactly comprised the pre-industrial atmospheric aerosol burden, but another component is attributable to inter-model differences in simulating the chain of aerosol-cloud-precipitation processes which ultimately produce the indirect effect. Thus, one way to help constrain AIE is to thoroughly investigate the differences in aerosol-cloud processes and interactions occurring in these models. We have configured one model, the CESM/MARC, with a suite of parameterizations affecting droplet activation. Each configuration produces similar climatologies with respect to precipitation and cloud macrophysics, but shows different sensitivies to aerosol perturbation - up to 1 W/m^2 differences in AIE. Regional differences in simulated aerosol-cloud interactions, especially in marine regions with little anthropogenic pollution, contribute to the spread in these AIE estimates. The baseline pre-industrial droplet number concentration in marine regions dominated by natural aerosol strongly predicts the magnitude of each model's AIE, suggesting that targeted observations of cloud microphysical properties across different cloud regimes and their sensitivity to aerosol influences could help provide firm constraints and targets for models. Additionally, we have performed supplemental fully-coupled (atmosphere/ocean) simulations with each model configuration, allowing the model to relax to equilibrium following a change in aerosol emissions. These simulations allow us to assess the slower-timescale responses to aerosol perturbations. The spread in fast model responses (which produce the noted changes in indirect effect or forcing) gives rise to large differences in the equilibrium climate state of each configuration. We show that these changes in equilibrium climate state have implications for AIE estimates from model configurations tuned to the present-day climate.
Heritability of female extra-pair paternity rate in song sparrows (Melospiza melodia)
Reid, Jane M.; Arcese, Peter; Sardell, Rebecca J.; Keller, Lukas F.
2011-01-01
The forces driving the evolution of extra-pair reproduction in socially monogamous animals remain widely debated and unresolved. One key hypothesis is that female extra-pair reproduction evolves through indirect genetic benefits, reflecting increased additive genetic value of extra-pair offspring. Such evolution requires that a female's propensity to produce offspring that are sired by an extra-pair male is heritable. However, additive genetic variance and heritability in female extra-pair paternity (EPP) rate have not been quantified, precluding accurate estimation of the force of indirect selection. Sixteen years of comprehensive paternity and pedigree data from socially monogamous but genetically polygynandrous song sparrows (Melospiza melodia) showed significant additive genetic variance and heritability in the proportion of a female's offspring that was sired by an extra-pair male, constituting major components of the genetic architecture required for extra-pair reproduction to evolve through indirect additive genetic benefits. However, estimated heritabilities were moderately small (0.12 and 0.18 on the observed and underlying latent scales, respectively). The force of selection on extra-pair reproduction through indirect additive genetic benefits may consequently be relatively weak. However, the additive genetic variance and non-zero heritability observed in female EPP rate allow for multiple further genetic mechanisms to drive and constrain mating system evolution. PMID:20980302
Effect of Profilin on Actin Critical Concentration: A Theoretical Analysis
Yarmola, Elena G.; Dranishnikov, Dmitri A.; Bubb, Michael R.
2008-01-01
To explain the effect of profilin on actin critical concentration in a manner consistent with thermodynamic constraints and available experimental data, we built a thermodynamically rigorous model of actin steady-state dynamics in the presence of profilin. We analyzed previously published mechanisms theoretically and experimentally and, based on our analysis, suggest a new explanation for the effect of profilin. It is based on a general principle of indirect energy coupling. The fluctuation-based process of exchange diffusion indirectly couples the energy of ATP hydrolysis to actin polymerization. Profilin modulates this coupling, producing two basic effects. The first is based on the acceleration of exchange diffusion by profilin, which indicates, paradoxically, that a faster rate of actin depolymerization promotes net polymerization. The second is an affinity-based mechanism similar to the one suggested in 1993 by Pantaloni and Carlier although based on indirect rather than direct energy coupling. In the model by Pantaloni and Carlier, transformation of chemical energy of ATP hydrolysis into polymerization energy is regulated by direct association of each step in the hydrolysis reaction with a corresponding step in polymerization. Thus, hydrolysis becomes a time-limiting step in actin polymerization. In contrast, indirect coupling allows ATP hydrolysis to lag behind actin polymerization, consistent with experimental results. PMID:18835900
Bushmakin, A G; Cappelleri, J C; Symonds, T; Stecher, V J
2014-01-01
To apportion the direct effect and the indirect effect (through erections) that sildenafil (vs placebo) has on individual satisfaction and couple satisfaction over time, longitudinal mediation modeling was applied to outcomes on the Sexual Experience Questionnaire. The model included data from weeks 4 and 10 (double-blind phase) and week 16 (open-label phase) of a controlled study. Data from 167 patients with erectile dysfunction (ED) were available for analysis. Estimation of statistical significance was based on bootstrap simulations, which allowed inferences at and between time points. Percentages (and corresponding 95% confidence intervals) for direct and indirect effects of treatment were calculated using the model. For the individual satisfaction and couple satisfaction domains, direct treatment effects were negligible (not statistically significant) whereas indirect treatment effects via the erection domain represented >90% of the treatment effects (statistically significant). Week 4 vs week 10 percentages of direct and indirect effects were not statistically different, indicating that the mediation effects are longitudinally invariant. As there was no placebo arm in the open-label phase, mediation effects at week 16 were not estimable. In conclusion, erection has a crucial role as a mediator in restoring individual satisfaction and couple satisfaction in men with ED treated with sildenafil.
Space flight operations communications phraseology and techniques
NASA Technical Reports Server (NTRS)
Noneman, S. R.
1986-01-01
Communications are a critical link in space flight operations. Specific communications phraseology and techniques have been developed to allow rapid and clear transfer of information. Communications will be clear and brief through the use of procedural words and phrases. Communications protocols standardize the required information transferred. The voicing of letters and numbers is discussed. The protocols used in air-to-ground communications are given. A glossary of communications terminology is presented in the appendix.
Entangled state quantum cryptography: eavesdropping on the ekert protocol
Naik; Peterson; White; Berglund; Kwiat
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.
Nursing Care of Patients Undergoing Chemotherapy Desensitization: Part II.
Jakel, Patricia; Carsten, Cynthia; Carino, Arvie; Braskett, Melinda
2016-04-01
Chemotherapy desensitization protocols are safe, but labor-intensive, processes that allow patients with cancer to receive medications even if they initially experienced severe hypersensitivity reactions. Part I of this column discussed the pathophysiology of hypersensitivity reactions and described the development of desensitization protocols in oncology settings. Part II incorporates the experiences of an academic medical center and provides a practical guide for the nursing care of patients undergoing chemotherapy desensitization. .
Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S
2011-11-01
To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.
Recommended features of protocols for long-term ecological monitoring
Oakley, Karen L.; Boudreau, Susan L.; Humphrey, Sioux-Z
2001-01-01
In 1991, the National Park Service (NPS) selected seven parks to serve as prototypes for development of a long-term ecological monitoring program. Denali National Park and Preserve was one of the prototype parks selected. The principal focus of this national program was to detect and document resource changes and to understand the forces driving those changes. One of the major tasks of each prototype park was to develop monitoring protocols. In this paper, we discuss some lessons learned and what we believe to be the most important features of protocols.One of the many lessons we have learned is that monitoring protocols vary greatly in content and format. This variation leads to confusion about what information protocols should contain and how they should be formatted. Problems we have observed in existing protocols include (1) not providing enough detail, (2) omitting critical topics (such as data management), and (3) mixing explanation with instructions. Once written, protocols often sit on the shelf to collect dust, allowing methods changes to occur without being adequately considered, tested, or documented. Because a lengthy and costly research effort is often needed to develop protocols, a vision of what the final product should look like is helpful. Based on our involvement with the prototype monitoring program for Denali (Oakley and Boudreau 2000), we recommend key features of protocols, including a scheme for linking protocols to data in the data management system and for tracking protocol revisions. A protocol system is crucial for producing long-term data sets of known quality that meet program objectives.
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
41 CFR 301-52.2 - What information must I provide in my travel claim?
Code of Federal Regulations, 2010 CFR
2010-07-01
... points visited when you travel by an indirect route other than a stopover to change planes or embark... provide in my travel claim? 301-52.2 Section 301-52.2 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES ARRANGING FOR TRAVEL SERVICES, PAYING...
48 CFR 15.407-1 - Defective certified cost or pricing data.
Code of Federal Regulations, 2011 CFR
2011-10-01
... price adjustment, including profit or fee, of any significant amount by which the price was increased... the defective data increase or decrease the contract price. The contracting officer shall consider any... (e.g., material, direct labor, or indirect costs). (6) An offset shall not be allowed if— (i) The...
The Rural Context and Post-Secondary School Enrollment: An Ecological Systems Approach
ERIC Educational Resources Information Center
Demi, Mary Ann; Coleman-Jensen, Alisha; Snyder, Anastasia R.
2010-01-01
This study uses an ecological systems framework to examine how indicators of individual, family, and school contexts are associated with post-secondary educational enrollment among a sample of rural youth. Structural equation modeling allows us to examine both direct and indirect effects of these contexts on school enrollment. Unique elements of…
The Gender Puzzle: Toddlers' Use of Articles to Access Noun Information
ERIC Educational Resources Information Center
Arias-Trejo, Natalia; Falcon, Alberto; Alva-Canto, Elda A.
2013-01-01
Grammatical gender embedded in determiners, nouns and adjectives allows indirect and more rapid processing of the referents implied in sentences. However in a language such as Spanish, this useful information cannot be reliably retrieved from a single source of information. Instead, noun gender may be extracted either from phono-morphological,…
The Use of Consultation to Improve Academic and Psychosocial Outcomes for Gifted Students
ERIC Educational Resources Information Center
Knotek, Steven E.; Kovac, Megan; Bostwick, Emily
2011-01-01
School psychologists can make use of consultation within a prevention and wellness framework to heighten gifted students' academic, social, mental health, and life competencies. The triadic and indirect nature of consultation allows school-based consultants the opportunity to support a larger population of students than they could with traditional…
ERIC Educational Resources Information Center
Grimm, Kevin; Zhang, Zhiyong; Hamagami, Fumiaki; Mazzocco, Michele
2013-01-01
We propose the use of the latent change and latent acceleration frameworks for modeling nonlinear growth in structural equation models. Moving to these frameworks allows for the direct identification of "rates of change" and "acceleration" in latent growth curves--information available indirectly through traditional growth…
Mexican Indirection: How To Help Mexican ESL Writers Channel Their Energies into Focused Essays.
ERIC Educational Resources Information Center
Ransdell, D. R.
The fact that a writer's culture influences the composing style is undeniable. Spanish speakers writing in English often allow their points to "leap around," perhaps constituting a pattern the instructor does not see. In "Beyond Culture," Edward Hall explains that cultures operate under either "monochronic" or…
34 CFR 222.194 - Are “in-kind” contributions permissible?
Code of Federal Regulations, 2010 CFR
2010-07-01
.... (b) Third party in-kind contributions mean property or services that benefit this grant program and... indirect costs, the provisions of 34 CFR 80.24 govern the allowability and valuation of in-kind contributions, except that it is permissible for a third party to contribute real property to a grantee for a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... best practicable control technology currently available. (a) By-product cokemaking—iron and steel... for by-product coke plants which have wet desulfurization systems but only to the extent such systems... limitations, are allowed for by-product coke plants which include indirect ammonia recovery systems but only...
NASA Astrophysics Data System (ADS)
Perton, Mathieu; Contreras-Zazueta, Marcial A.; Sánchez-Sesma, Francisco J.
2016-06-01
A new implementation of indirect boundary element method allows simulating the elastic wave propagation in complex configurations made of embedded regions that are homogeneous with irregular boundaries or flat layers. In an older implementation, each layer of a flat layered region would have been treated as a separated homogeneous region without taking into account the flat boundary information. For both types of regions, the scattered field results from fictitious sources positioned along their boundaries. For the homogeneous regions, the fictitious sources emit as in a full-space and the wave field is given by analytical Green's functions. For flat layered regions, fictitious sources emit as in an unbounded flat layered region and the wave field is given by Green's functions obtained from the discrete wavenumber (DWN) method. The new implementation allows then reducing the length of the discretized boundaries but DWN Green's functions require much more computation time than the full-space Green's functions. Several optimization steps are then implemented and commented. Validations are presented for 2-D and 3-D problems. Higher efficiency is achieved in 3-D.
Viral Organization of Human Proteins
Wuchty, Stefan; Siwo, Geoffrey; Ferdig, Michael T.
2010-01-01
Although maps of intracellular interactions are increasingly well characterized, little is known about large-scale maps of host-pathogen protein interactions. The investigation of host-pathogen interactions can reveal features of pathogenesis and provide a foundation for the development of drugs and disease prevention strategies. A compilation of experimentally verified interactions between HIV-1 and human proteins and a set of HIV-dependency factors (HDF) allowed insights into the topology and intricate interplay between viral and host proteins on a large scale. We found that targeted and HDF proteins appear predominantly in rich-clubs, groups of human proteins that are strongly intertwined among each other. These assemblies of proteins may serve as an infection gateway, allowing the virus to take control of the human host by reaching protein pathways and diversified cellular functions in a pronounced and focused way. Particular transcription factors and protein kinases facilitate indirect interactions between HDFs and viral proteins. Discerning the entanglement of directly targeted and indirectly interacting proteins may uncover molecular and functional sites that can provide novel perspectives on the progression of HIV infection and highlight new avenues to fight this virus. PMID:20827298
Lung Ultrasound in the Critically Ill Neonate
Lichtenstein, Daniel A; Mauriat, Philippe
2012-01-01
Critical ultrasound is a new tool for first-line physicians, including neonate intensivists. The consideration of the lung as one major target allows to redefine the priorities. Simple machines work better than up-to-date ones. We use a microconvex probe. Ten standardized signs allow a majority of uses: the bat sign (pleural line), lung sliding and the A-line (normal lung surface), the quad sign and sinusoid sign indicating pleural effusion regardless its echogenicity, the tissue-like sign and fractal sign indicating lung consolidation, the B-line artifact and lung rockets (indicating interstitial syndrome), abolished lung sliding with the stratosphere sign, suggesting pneumothorax, and the lung point, indicating pneumothorax. Other signs are used for more sophisticated applications (distinguishing atelectasis from pneumonia for instance...). All these disorders were assessed in the adult using CT as gold standard with sensitivity and specificity ranging from 90 to 100%, allowing to consider ultrasound as a reasonable bedside gold standard in the critically ill. The same signs are found, with no difference in the critically ill neonate. Fast protocols such as the BLUE-protocol are available, allowing immediate diagnosis of acute respiratory failure using seven standardized profiles. Pulmonary edema e.g. yields anterior lung rockets associated with lung sliding, making the B-profile. The FALLS-protocol, inserted in a Limited Investigation including a simple model of heart and vessels, assesses acute circulatory failure using lung artifacts. Interventional ultrasound (mainly, thoracocenthesis) provides maximal safety. Referrals to CT can be postponed. CEURF proposes personnalized bedside trainings since 1990. Lung ultrasound opens physicians to a visual medicine. PMID:23255876
Lung Ultrasound in the Critically Ill Neonate.
Lichtenstein, Daniel A; Mauriat, Philippe
2012-08-01
Critical ultrasound is a new tool for first-line physicians, including neonate intensivists. The consideration of the lung as one major target allows to redefine the priorities. Simple machines work better than up-to-date ones. We use a microconvex probe. Ten standardized signs allow a majority of uses: the bat sign (pleural line), lung sliding and the A-line (normal lung surface), the quad sign and sinusoid sign indicating pleural effusion regardless its echogenicity, the tissue-like sign and fractal sign indicating lung consolidation, the B-line artifact and lung rockets (indicating interstitial syndrome), abolished lung sliding with the stratosphere sign, suggesting pneumothorax, and the lung point, indicating pneumothorax. Other signs are used for more sophisticated applications (distinguishing atelectasis from pneumonia for instance...). All these disorders were assessed in the adult using CT as gold standard with sensitivity and specificity ranging from 90 to 100%, allowing to consider ultrasound as a reasonable bedside gold standard in the critically ill. The same signs are found, with no difference in the critically ill neonate. Fast protocols such as the BLUE-protocol are available, allowing immediate diagnosis of acute respiratory failure using seven standardized profiles. Pulmonary edema e.g. yields anterior lung rockets associated with lung sliding, making the B-profile. The FALLS-protocol, inserted in a Limited Investigation including a simple model of heart and vessels, assesses acute circulatory failure using lung artifacts. Interventional ultrasound (mainly, thoracocenthesis) provides maximal safety. Referrals to CT can be postponed. CEURF proposes personnalized bedside trainings since 1990. Lung ultrasound opens physicians to a visual medicine.
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Wen-Bo; Zhang, Shi-Bin; Wang, Hai-Chun; Yan, Li-Li; Han, Gui-Hua; Sheng, Zhi-Wei; Huang, Yuan-Yuan; Suo, Wang; Xiong, Jin-Xin
2016-12-01
A protocol for quantum private comparison of equality (QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party (TP). In our protocol, TP is allowed to misbehave on its own but can not conspire with either of two parties. Compared with most two-user QPCE protocols, our protocol not only can compare two groups of private information (each group has two users) in one execution, but also compare just two private information. Compared with the multi-user QPCE protocol proposed, our protocol is safer with more reasonable assumptions of TP. The qubit efficiency is computed and analyzed. Our protocol can also be generalized to the case of 2N participants with one TP. The 2N-participant protocol can compare two groups (each group has N private information) in one execution or just N private information. Supported by NSFC under Grant Nos. 61402058, 61572086, the Fund for Middle and Young Academic Leaders of CUIT under Grant No. J201511, the Science and Technology Support Project of Sichuan Province of China under Grant No. 2013GZX0137, the Fund for Young Persons Project of Sichuan Province of China under Grant No. 12ZB017, and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No. szjj2014-074
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon
2017-05-22
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.
The Direct Insertion of the ACL Carries More Load than the Indirect Insertion
Nawabi, Danyal H.; Tucker, Scott; Jones, Kristofer J.; Nguyen, Joseph; Wickiewicz, Thomas L.; Imhauser, Carl; Pearle, Andrew
2014-01-01
Objectives: Recent histological studies have shown that the ACL consists of two different structures: the direct and indirect insertions. The direct insertion is located along the lateral intercondylar ridge and the indirect insertion is ‘lower’ in the notch, adjacent to the posterior articular cartilage. The ‘lower’ position has become more popular for locating the femoral tunnel, as surgeons switch to the anteromedial (AM) portal drilling technique in order to place the graft in the region of the native footprint. However, a recent registry-based outcomes study has reported a 1.5 times higher graft failure rate for AM portal versus traditional transtibial techniques. The objective of this study was to investigate the load characteristics of the native ACL in the regions of the direct and indirect insertions. We hypothesized that the direct insertion would carry more load than the indirect insertion. Methods: Twelve cadaveric knees were mounted to a six degree of freedom robot equipped with a universal force-moment sensor. We simulated the Lachman and anterior drawer tests at 30oand 90o of flexion by applying a 134N anterior load, and the pivot shift test at 15o flexion by applying combined valgus (8Nm) and internal (4Nm) rotational moments. The kinematic pathway required to achieve these loading conditions was recorded for each intact knee. Using position control to repeat the loading paths, the robot recorded the loads for the ACL intact, ACL partially sectioned, and ACL completely sectioned states. Sectioning Protocol: The lateral intercondylar ridge and posterior articular margin was identified in each case. The 50% mark between this two areas was used to delineate the regions of the direct and indirect insertions (Fig. 1). Sectioning order was alternated between each cadaver. Footprint Digitization: The borders of the sectioned areas were digitized post-sectioning and mapped onto a computed tomography (CT) scan of each knee. The sectioning method was assessed under a blinded validation by experienced observers (TW, AP) who excluded two specimens that did not conform to the objective definitions of the sectioning method. Statistics: Loads were compared between direct and indirect locations at different flexion angles by conducting two-way repeated measures ANOVA models. Results: Under an anterior tibial load at 30o flexion, the direct insertion carried 83.9% (±7.2%) of the total ACL load compared to 16.1% (±7.2%) in the indirect insertion (p<0.001). The direct insertion also carried more load at 90o flexion (95.2% vs 4.8%; p<0.001). Under a combined rotatory load at 15o flexion, the direct insertion carried 84.2% (±4.2%)of the total ACL load compared to 15.8% (±4.2%) in the indirect insertion (p<0.001). Conclusion: The fibres in the direct insertion of the ACL carry more load than fibres in the indirect insertion. Previous studies have suggested that the direct insertion plays a major role in the mechanical link between the ACL and bone. With the current shift in emphasis towards anatomic ACL reconstruction, it may be beneficial to create the femoral tunnel within the direct insertion rather than ‘lower’ in the notch. Although further work is required in determining graft behaviour at the new insertions sites described in this study, our findings suggest that placing a graft in the region of the direct insertion may be an important consideration when adhering to the principles of anatomic ACL reconstruction.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Extra-Vehicular Activity (EVA) glove evaluation test protocol
NASA Technical Reports Server (NTRS)
Hinman-Sweeney, E. M.
1994-01-01
One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.
NASA Technical Reports Server (NTRS)
Nickle, F. R.; Freeman, Arthur B.
1939-01-01
The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.
Extraction of High Quality DNA from Seized Moroccan Cannabis Resin (Hashish)
El Alaoui, Moulay Abdelaziz; Melloul, Marouane; Alaoui Amine, Sanaâ; Stambouli, Hamid; El Bouri, Aziz; Soulaymani, Abdelmajid; El Fahime, Elmostafa
2013-01-01
The extraction and purification of nucleic acids is the first step in most molecular biology analysis techniques. The objective of this work is to obtain highly purified nucleic acids derived from Cannabis sativa resin seizure in order to conduct a DNA typing method for the individualization of cannabis resin samples. To obtain highly purified nucleic acids from cannabis resin (Hashish) free from contaminants that cause inhibition of PCR reaction, we have tested two protocols: the CTAB protocol of Wagner and a CTAB protocol described by Somma (2004) adapted for difficult matrix. We obtained high quality genomic DNA from 8 cannabis resin seizures using the adapted protocol. DNA extracted by the Wagner CTAB protocol failed to give polymerase chain reaction (PCR) amplification of tetrahydrocannabinolic acid (THCA) synthase coding gene. However, the extracted DNA by the second protocol permits amplification of THCA synthase coding gene using different sets of primers as assessed by PCR. We describe here for the first time the possibility of DNA extraction from (Hashish) resin derived from Cannabis sativa. This allows the use of DNA molecular tests under special forensic circumstances. PMID:24124454
Álvarez, José M; Cortizo, Millán; Ordás, Ricardo J
2012-01-01
Pinus pinaster is one of the most economically important conifers in the world. Somatic embryogenesis is a powerful tool in breeding programmes because it allows the generation of a great number of different clonal lines from seeds of superior genotypes. Unfortunately, embryogenic competence decreases with the age of cultures. Therefore, it is necessary to have a cryopreservation protocol that ensures a continuous supply of juvenile mass while allowing good maturation and conversion rates into vigorously growing plants. In this work we studied the influence of several cryopreservation parameters, such as cryoprotectant solution and pre-cooling temperature, on embryogenic culture regrowth and embryo maturation. Recovery of rewarmed samples after cryopreservation in a -150 degree C freezer depended on the cooling temperature reached prior to plunging the tubes into liquid nitrogen. As a result, we present an optimised cryopreservation protocol that ensures high recovery and embryo maturation rates. The protocol presented is a simple and fast alternative and enabled successful cryopreservation and recovery of 100 percent of the lines tested. Cryopreserved lines presented the same maturation rates as non-cryopreserved controls.
Lago, Laura; Rilo, Benito; Fernández-Formoso, Noelia; DaSilva, Luis
2017-08-01
Rehabilitation with implants is a challenge. Having previous evaluation criteria is key to establishing the best treatment for the patient. In addition to clinical and radiological aspects, the prosthetic parameters must be taken into account in the initial workup, since they allow discrimination between fixed and removable rehabilitation. We present a study protocol that analyzes three basic prosthetic aspects. First, denture space defines the need to replace teeth, tissue, or both. Second, lip support focuses on whether or not to include a flange. Third, the smile line warns of potential risks in esthetic rehabilitation. Combining these parameters allows us to make a decision as to the most suitable type of prosthesis. The proposed protocol is useful for assessing the prosthetic parameters that influence decision making as to the best-suited type of restoration. From this point of view, we think it is appropriate for the initial approach to the patient. In any case, other considerations of study may amend the proposal. © 2016 by the American College of Prosthodontists.
Global Connections for Lasting Impressions: Experiential Learning about TCP
NASA Astrophysics Data System (ADS)
Allison, Colin; Miller, Alan; Oliver, Iain; Sturgeon, Thomas
“Tell me and I forget, Show me and I remember, Involve me and I understand”. This paper discusses the motivation for, and design of, a learning resource which allows students to explore the Transmission Control Protocol (TCP). TCP is responsible for transporting over 80% of the traffic on the Internet - all web and e-mail for example - and in addition is the primary means of achieving Internet congestion control. TCP is therefore core to modern life. It is a protocol under constant study with a view to evolution, and it is incumbent on all ICT curricula to provide education at appropriate levels about its dynamics, strengths and weaknesses. There are no shortages of good textbooks which provide information on TCP, but these are no substitute for experiential learning in order to provide a lasting understanding. The TCP Live learning resource allows students to explore the behavior of TCP on the global Internet, and see the wide variety of conditions that the protocol has to cope with, thereby extending their viewpoint outwith the limited scope of their own institutional firewalls.
The SHIP: A SIP to HTTP Interaction Protocol
NASA Astrophysics Data System (ADS)
Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco
IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.
Control of size and aspect ratio in hydroquinone-based synthesis of gold nanorods
NASA Astrophysics Data System (ADS)
Morasso, Carlo; Picciolini, Silvia; Schiumarini, Domitilla; Mehn, Dora; Ojea-Jiménez, Isaac; Zanchetta, Giuliano; Vanna, Renzo; Bedoni, Marzia; Prosperi, Davide; Gramatica, Furio
2015-08-01
In this article, we describe how it is possible to tune the size and the aspect ratio of gold nanorods obtained using a highly efficient protocol based on the use of hydroquinone as a reducing agent by varying the amounts of CTAB and silver ions present in the "seed-growth" solution. Our approach not only allows us to prepare nanorods with a four times increased Au3+ reduction yield, when compared with the commonly used protocol based on ascorbic acid, but also allows a remarkable reduction of 50-60 % of the amount of CTAB needed. In fact, according to our findings, the concentration of CTAB present in the seed-growth solution do not linearly influence the final aspect ratio of the obtained nanorods, and an optimal concentration range between 30 and 50 mM has been identified as the one that is able to generate particles with more elongated shapes. On the optimized protocol, the effect of the concentration of Ag+ ions in the seed-growth solution and the stability of the obtained particles has also been investigated.
NASA Astrophysics Data System (ADS)
Bellac, Michel Le
2014-11-01
The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.
Carbon Management In the Post-Cap-and-Trade Carbon Economy
NASA Astrophysics Data System (ADS)
DeGroff, F. A.
2013-12-01
This abstract outlines an economic model that integrates carbon externalities seamlessly into the national and international economies. The model incorporates a broad carbon metric used to value all carbon in the biosphere, as well as all transnational commerce. The model minimizes the cost associated with carbon management, and allows for the variation in carbon avidity between jurisdictions. When implemented over time, the model reduces the deadweight loss while minimizing social cost, thus maximizing the marginal social benefit commonly associated with Pigouvian taxes. Once implemented, the model provides a comprehensive economic construct for governments, industry and consumers to efficiently weigh the cost of carbon, and effectively participate in helping to reduce their direct and indirect use of carbon, while allowing individual jurisdictions to decide their own carbon value, without the need for explicit, express agreement of all countries. The model uses no credits, requires no caps, and matches climate changing behavior to costs. The steps to implement the model for a particular jurisdiction are: 1) Define the Carbon Metric to value changes in Carbon Quality. 2) Apply the Carbon Metric to assess the Carbon Toll a) for all changes in Carbon Quality and b) for imports and exports. This economic model has 3 clear advantages. 1) The carbon pricing and cost scheme use existing and generally accepted accounting methodologies to ensure the veracity and verifiability of carbon management efforts with minimal effort and expense using standard auditing protocols. Implementing this economic model will not require any special training, tools, or systems for any entity to achieve their minimum carbon target goals within their jurisdictional framework. 2) Given the spectrum of carbon affinities worldwide, the model recognizes and provides for flexible carbon pricing regimes, but does not penalize domestic carbon-consuming producers subject to imports from exporters in lower carbon-pricing jurisdictions. Thus, the economic model avoids a key shortcoming of cap-and-trade carbon pricing, and eliminates any incentive to inefficiently shift carbon consumption to jurisdictions with lower carbon tolls. 3) The economic model is a comprehensive, efficient and effective strategy that allows for the implementation of a carbon-pricing structure without the complete, explicit agreement of carbon consumers worldwide.
Compact and portable X-ray imager system using Medipix3RX
NASA Astrophysics Data System (ADS)
Garcia-Nathan, T. B.; Kachatkou, A.; Jiang, C.; Omar, D.; Marchal, J.; Changani, H.; Tartoni, N.; van Silfhout, R. G.
2017-10-01
In this paper the design and implementation of a novel portable X-ray imager system is presented. The design features a direct X-ray detection scheme by making use of a hybrid detector (Medipix3RX). Taking advantages of the capabilities of the Medipix3RX, like a high resolution, zero dead-time, single photon detection and charge-sharing mode, the imager has a better resolution and higher sensitivity compared to using traditional indirect detection schemes. A detailed description of the system is presented, which consists of a vacuum chamber containing the sensor, an electronic board for temperature management, conditioning and readout of the sensor and a data processing unit which also handles network connection and allow communication with clients by acting as a server. A field programmable gate array (FPGA) device is used to implement the readout protocol for the Medipix3RX, apart from the readout the FPGA can perform complex image processing functions such as feature extraction, histogram, profiling and image compression at high speeds. The temperature of the sensor is monitored and controlled through a PID algorithm making use of a Peltier cooler, improving the energy resolution and response stability of the sensor. Without implementing data compression techniques, the system is capable of transferring 680 profiles/s or 240 images/s in a continuous mode. Implementation of equalization procedures and tests on colour mode are presented in this paper. For the experimental measurements the Medipix3RX sensor was used with a Silicon layer. One of the tested applications of the system is as an X-ray beam position monitor (XBPM) device for synchrotron applications. The XBPM allows a non-destructive real time measurement of the beam position, size and intensity. A Kapton foil is placed in the beam path scattering radiation towards a pinhole camera setup that allows the sensor to obtain an image of the beam. By using profiles of the synchrotron X-ray beam, high frequency movement of the beam position can be studied, up to 340 Hz. The system is capable of realizing an independent energy measure of the beam by using the Medipix3RX variable energy threshold feature.
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
NASA Astrophysics Data System (ADS)
Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.
Methodological aspects of crossover and maximum fat-oxidation rate point determination.
Michallet, A-S; Tonini, J; Regnier, J; Guinot, M; Favre-Juvin, A; Bricout, V; Halimi, S; Wuyam, B; Flore, P
2008-11-01
Indirect calorimetry during exercise provides two metabolic indices of substrate oxidation balance: the crossover point (COP) and maximum fat oxidation rate (LIPOXmax). We aimed to study the effects of the analytical device, protocol type and ventilatory response on variability of these indices, and the relationship with lactate and ventilation thresholds. After maximum exercise testing, 14 relatively fit subjects (aged 32+/-10 years; nine men, five women) performed three submaximum graded tests: one was based on a theoretical maximum power (tMAP) reference; and two were based on the true maximum aerobic power (MAP). Gas exchange was measured concomitantly using a Douglas bag (D) and an ergospirometer (E). All metabolic indices were interpretable only when obtained by the D reference method and MAP protocol. Bland and Altman analysis showed overestimation of both indices with E versus D. Despite no mean differences between COP and LIPOXmax whether tMAP or MAP was used, the individual data clearly showed disagreement between the two protocols. Ventilation explained 10-16% of the metabolic index variations. COP was correlated with ventilation (r=0.96, P<0.01) and the rate of increase in blood lactate (r=0.79, P<0.01), and LIPOXmax correlated with the ventilation threshold (r=0.95, P<0.01). This study shows that, in fit healthy subjects, the analytical device, reference used to build the protocol and ventilation responses affect metabolic indices. In this population, and particularly to obtain interpretable metabolic indices, we recommend a protocol based on the true MAP or one adapted to include the transition from fat to carbohydrate. The correlation between metabolic indices and lactate/ventilation thresholds suggests that shorter, classical maximum progressive exercise testing may be an alternative means of estimating these indices in relatively fit subjects. However, this needs to be confirmed in patients who have metabolic defects.
Study Protocol: The influence of Running Therapy on executive functions and sleep of prisoners
Meijers, Jesse; Harte, Joke; Meynen, Gerben; Cuijpers, Pim
2015-01-01
Background: Executive dysfunction appears to be related to increased recidivism. Of note is that sleep disturbances, which are highly prevalent in prisons, may attenuate executive functions. Thus, improving executive functions, either directly or indirectly through the improvement of sleep, may reduce recidivism. It is hypothesised that physical exercise, in the form of Running Therapy, has a direct positive effect on executive functions as well as an indirect effect through the improvement of sleep. Methods/Design: Seventy two (N = 72) detainees in various penitentiary institutions in the Netherlands will be recruited in this study. A baseline measurement, including six neuropsychological tests of the Cambridge Neuropsychological Test Automated Battery (CANTAB), an assessment of sleep quality and duration using the Actiwatch (Actiwatch 2, Philips Respironics, Murrysville, PA, USA) and various other measurements will be administered before the start of the treatment. After 3 months of Running Therapy, participants will be assessed again with the same tests for neuropsychological and physical functioning. Primary outcomes are executive functioning and various sleep variables. Discussion: This study will be the first to investigate the possible influence of Running Therapy on the cognitive functioning, sleep and aggression in prisoners. PMID:26664703
Study Protocol: The influence of Running Therapy on executive functions and sleep of prisoners.
Meijers, Jesse; Harte, Joke; Meynen, Gerben; Cuijpers, Pim
2015-01-01
Executive dysfunction appears to be related to increased recidivism. Of note is that sleep disturbances, which are highly prevalent in prisons, may attenuate executive functions. Thus, improving executive functions, either directly or indirectly through the improvement of sleep, may reduce recidivism. It is hypothesised that physical exercise, in the form of Running Therapy, has a direct positive effect on executive functions as well as an indirect effect through the improvement of sleep. Seventy two (N = 72) detainees in various penitentiary institutions in the Netherlands will be recruited in this study. A baseline measurement, including six neuropsychological tests of the Cambridge Neuropsychological Test Automated Battery (CANTAB), an assessment of sleep quality and duration using the Actiwatch (Actiwatch 2, Philips Respironics, Murrysville, PA, USA) and various other measurements will be administered before the start of the treatment. After 3 months of Running Therapy, participants will be assessed again with the same tests for neuropsychological and physical functioning. Primary outcomes are executive functioning and various sleep variables. This study will be the first to investigate the possible influence of Running Therapy on the cognitive functioning, sleep and aggression in prisoners.
Cost analysis of microtia treatment in the Netherlands.
Kolodzynski, M N; van Hövell Tot Westerflier, C V A; Kon, M; Breugem, C C
2017-09-01
Ear reconstruction for microtia is a challenging procedure. Although analyzing esthetic outcome is crucial, there is a paucity of information with regard to financial aspects of microtia reconstruction. This study was conducted to analyze the costs associated with ear reconstruction with costal cartilage in patients with microtia. Ten consecutive children with autologous ear reconstruction of a unilateral microtia were included in this analysis. All patients had completed their treatment protocol for ear reconstruction. Direct costs (admission to hospital, diagnostics, and surgery) and indirect cost (travel expenses and absence from work) were obtained retrospectively. The overall mean cumulative cost per patient was €14,753. Direct and indirect costs were €13,907 and €846, respectively. Hospital admission and surgery cover 55% and 32% of all the costs, respectively. This study analyzes the costs for autologous ear reconstruction. Hospital admission and surgery are the most important factors of the total costs. Total costs could be decreased by possibly decreasing admission days and surgical time. These data can be used for choosing and developing future treatment strategies. Copyright © 2017 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.
ARINC 818 express for high-speed avionics video and power over coax
NASA Astrophysics Data System (ADS)
Keller, Tim; Alexander, Jon
2012-06-01
CoaXPress is a new standard for high-speed video over coax cabling developed for the machine vision industry. CoaXPress includes both a physical layer and a video protocol. The physical layer has desirable features for aerospace and defense applications: it allows 3Gbps (up to 6Gbps) communication, includes 21Mbps return path allowing for bidirectional communication, and provides up to 13W of power, all over a single coax connection. ARINC 818, titled "Avionics Digital Video Bus" is a protocol standard developed specifically for high speed, mission critical aerospace video systems. ARINC 818 is being widely adopted for new military and commercial display and sensor applications. The ARINC 818 protocol combined with the CoaXPress physical layer provide desirable characteristics for many aerospace systems. This paper presents the results of a technology demonstration program to marry the physical layer from CoaXPress with the ARINC 818 protocol. ARINC 818 is a protocol, not a physical layer. Typically, ARINC 818 is implemented over fiber or copper for speeds of 1 to 2Gbps, but beyond 2Gbps, it has been implemented exclusively over fiber optic links. In many rugged applications, a copper interface is still desired, by implementing ARINC 818 over the CoaXPress physical layer, it provides a path to 3 and 6 Gbps copper interfaces for ARINC 818. Results of the successful technology demonstration dubbed ARINC 818 Express are presented showing 3Gbps communication while powering a remote module over a single coax cable. The paper concludes with suggested next steps for bring this technology to production readiness.
Protocols development for security and privacy of radio frequency identification systems
NASA Astrophysics Data System (ADS)
Sabbagha, Fatin
There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.