Sample records for protocol display sharing

  1. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    NASA Technical Reports Server (NTRS)

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole process, while maintaining the integrity of the latest technological displayed image devices. This study will provide insights to the many possibilities that can be filtered down to a harmoniously responsive product that can be used in today's MCC environment.

  2. A VM-shared desktop virtualization system based on OpenStack

    NASA Astrophysics Data System (ADS)

    Liu, Xi; Zhu, Mingfa; Xiao, Limin; Jiang, Yuanjie

    2018-04-01

    With the increasing popularity of cloud computing, desktop virtualization is rising in recent years as a branch of virtualization technology. However, existing desktop virtualization systems are mostly designed as a one-to-one mode, which one VM can only be accessed by one user. Meanwhile, previous desktop virtualization systems perform weakly in terms of response time and cost saving. This paper proposes a novel VM-Shared desktop virtualization system based on OpenStack platform. The paper modified the connecting process and the display data transmission process of the remote display protocol SPICE to support VM-Shared function. On the other hand, we propose a server-push display mode to improve user interactive experience. The experimental results show that our system performs well in response time and achieves a low CPU consumption.

  3. Display Sharing: An Alternative Paradigm

    NASA Technical Reports Server (NTRS)

    Brown, Michael A.

    2010-01-01

    The current Johnson Space Center (JSC) Mission Control Center (MCC) Video Transport System (VTS) provides flight controllers and management the ability to meld raw video from various sources with telemetry to improve situational awareness. However, maintaining a separate infrastructure for video delivery and integration of video content with data adds significant complexity and cost to the system. When considering alternative architectures for a VTS, the current system's ability to share specific computer displays in their entirety to other locations, such as large projector systems, flight control rooms, and back supporting rooms throughout the facilities and centers must be incorporated into any new architecture. Internet Protocol (IP)-based systems also support video delivery and integration. IP-based systems generally have an advantage in terms of cost and maintainability. Although IP-based systems are versatile, the task of sharing a computer display from one workstation to another can be time consuming for an end-user and inconvenient to administer at a system level. The objective of this paper is to present a prototype display sharing enterprise solution. Display sharing is a system which delivers image sharing across the LAN while simultaneously managing bandwidth, supporting encryption, enabling recovery and resynchronization following a loss of signal, and, minimizing latency. Additional critical elements will include image scaling support, multi -sharing, ease of initial integration and configuration, integration with desktop window managers, collaboration tools, host and recipient controls. This goal of this paper is to summarize the various elements of an IP-based display sharing system that can be used in today's control center environment.

  4. Research into display sharing techniques for distributed computing environments

    NASA Technical Reports Server (NTRS)

    Hugg, Steven B.; Fitzgerald, Paul F., Jr.; Rosson, Nina Y.; Johns, Stephen R.

    1990-01-01

    The X-based Display Sharing solution for distributed computing environments is described. The Display Sharing prototype includes the base functionality for telecast and display copy requirements. Since the prototype implementation is modular and the system design provided flexibility for the Mission Control Center Upgrade (MCCU) operational consideration, the prototype implementation can be the baseline for a production Display Sharing implementation. To facilitate the process the following discussions are presented: Theory of operation; System of architecture; Using the prototype; Software description; Research tools; Prototype evaluation; and Outstanding issues. The prototype is based on the concept of a dedicated central host performing the majority of the Display Sharing processing, allowing minimal impact on each individual workstation. Each workstation participating in Display Sharing hosts programs to facilitate the user's access to Display Sharing as host machine.

  5. Design and implementation of a medium speed communications interface and protocol for a low cost, refreshed display computer

    NASA Technical Reports Server (NTRS)

    Phyne, J. R.; Nelson, M. D.

    1975-01-01

    The design and implementation of hardware and software systems involved in using a 40,000 bit/second communication line as the connecting link between an IMLAC PDS 1-D display computer and a Univac 1108 computer system were described. The IMLAC consists of two independent processors sharing a common memory. The display processor generates the deflection and beam control currents as it interprets a program contained in the memory; the minicomputer has a general instruction set and is responsible for starting and stopping the display processor and for communicating with the outside world through the keyboard, teletype, light pen, and communication line. The processing time associated with each data byte was minimized by designing the input and output processes as finite state machines which automatically sequence from each state to the next. Several tests of the communication link and the IMLAC software were made using a special low capacity computer grade cable between the IMLAC and the Univac.

  6. Eavesdropping on the improved three-party quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2011-02-01

    Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.

  7. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  8. Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shibin; Chang, Yan

    2017-08-01

    Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.

  9. Entanglement-secured single-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scherpelz, P.; Resch, R.; Berryrieser, D.

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less

  10. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  11. Relativistic (2,3)-threshold quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mehdi; Wu, Ya-Dong; Sanders, Barry C.

    2017-09-01

    In quantum secret sharing protocols, the usual presumption is that the distribution of quantum shares and players' collaboration are both performed inertially. Here we develop a quantum secret sharing protocol that relaxes these assumptions wherein we consider the effects due to the accelerating motion of the shares. Specifically, we solve the (2,3)-threshold continuous-variable quantum secret sharing in noninertial frames. To this aim, we formulate the effect of relativistic motion on the quantum field inside a cavity as a bosonic quantum Gaussian channel. We investigate how the fidelity of quantum secret sharing is affected by nonuniform motion of the quantum shares. Furthermore, we fully characterize the canonical form of the Gaussian channel, which can be utilized in quantum-information-processing protocols to include relativistic effects.

  12. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  13. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  14. 76 FR 28252 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-16

    ... liquidity provider rebate is $0.0020 per share executed for displayed quotes/orders and $0.0010 per share... determining whether a member qualifies for its highest rebate tier of $0.0015 per share executed for non-displayed quotes/orders and $0.00295 per share executed for displayed quotes/orders. Currently, a member's...

  15. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  16. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  17. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  18. Sequential quantum secret sharing in a noisy environment aided with weak measurements

    NASA Astrophysics Data System (ADS)

    Ray, Maharshi; Chatterjee, Sourav; Chakrabarty, Indranil

    2016-05-01

    In this work we give a (n,n)-threshold protocol for sequential secret sharing of quantum information for the first time. By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. First of all we present our protocol for three parties and later we generalize it for the situation where we have more (n> 3) parties. Interestingly, we show that our protocol of sequential secret sharing requires less amount of quantum as well as classical resource as compared to the situation wherein existing protocols are repeatedly used. Further in a much more realistic situation, we consider the sharing of qubits through two kinds of noisy channels, namely the phase damping channel (PDC) and the amplitude damping channel (ADC). When we carry out the sequential secret sharing in the presence of noise we observe that the fidelity of secret sharing at the kth iteration is independent of the effect of noise at the (k - 1)th iteration. In case of ADC we have seen that the average fidelity of secret sharing drops down to ½ which is equivalent to a random guess of the quantum secret. Interestingly, we find that by applying weak measurements one can enhance the average fidelity. This increase of the average fidelity can be achieved with certain trade off with the success probability of the weak measurements.

  19. HYDRA Hyperspectral Data Research Application Tom Rink and Tom Whittaker

    NASA Astrophysics Data System (ADS)

    Rink, T.; Whittaker, T.

    2005-12-01

    HYDRA is a freely available, easy to install tool for visualization and analysis of large local or remote hyper/multi-spectral datasets. HYDRA is implemented on top of the open source VisAD Java library via Jython - the Java implementation of the user friendly Python programming language. VisAD provides data integration, through its generalized data model, user-display interaction and display rendering. Jython has an easy to read, concise, scripting-like, syntax which eases software development. HYDRA allows data sharing of large datasets through its support of the OpenDAP and OpenADDE server-client protocols. The users can explore and interrogate data, and subset in physical and/or spectral space to isolate key areas of interest for further analysis without having to download an entire dataset. It also has an extensible data input architecture to recognize new instruments and understand different local file formats, currently NetCDF and HDF4 are supported.

  20. The Native Plant Propagation Protocol Database: 16 years of sharing information

    Treesearch

    R. Kasten Dumroese; Thomas D. Landis

    2016-01-01

    The Native Plant Propagation Protocol Database was launched in 2001 to provide an online mechanism for sharing information about growing native plants. It relies on plant propagators to upload their protocols (detailed directions for growing particular native plants) so that others may benefit from their experience. Currently the database has nearly 3000 protocols and...

  1. User Expectations for Media Sharing Practices in Open Display Networks

    PubMed Central

    Jose, Rui; Cardoso, Jorge C. S.; Hong, Jason

    2015-01-01

    Open Display Networks have the potential to allow many content creators to publish their media to an open-ended set of screen displays. However, this raises the issue of how to match that content to the right displays. In this study, we aim to understand how the perceived utility of particular media sharing scenarios is affected by three independent variables, more specifically: (a) the locativeness of the content being shared; (b) how personal that content is and (c) the scope in which it is being shared. To assess these effects, we composed a set of 24 media sharing scenarios embedded with different treatments of our three independent variables. We then asked 100 participants to express their perception of the relevance of those scenarios. The results suggest a clear preference for scenarios where content is both local and directly related to the person that is publishing it. This is in stark contrast to the types of content that are commonly found in public displays, and confirms the opportunity that open displays networks may represent a new media for self-expression. This novel understanding may inform the design of new publication paradigms that will enable people to share media across the display networks. PMID:26153770

  2. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  3. ShareSync: A Solution for Deterministic Data Sharing over Ethernet

    NASA Technical Reports Server (NTRS)

    Dunn, Daniel J., II; Koons, William A.; Kennedy, Richard D.; Davis, Philip A.

    2007-01-01

    As part of upgrading the Contact Dynamics Simulation Laboratory (CDSL) at the NASA Marshall Space Flight Center (MSFC), a simple, cost effective method was needed to communicate data among the networked simulation machines and I/O controllers used to run the facility. To fill this need and similar applicable situations, a generic protocol was developed, called ShareSync. ShareSync is a lightweight, real-time, publish-subscribe Ethernet protocol for simple and deterministic data sharing across diverse machines and operating systems. ShareSync provides a simple Application Programming Interface (API) for simulation programmers to incorporate into their code. The protocol is compatible with virtually all Ethernet-capable machines, is flexible enough to support a variety of applications, is fast enough to provide soft real-time determinism, and is a low-cost resource for distributed simulation development, deployment, and maintenance. The first design cycle iteration of ShareSync has been completed, and the protocol has undergone several testing procedures including endurance and benchmarking tests and approaches the 2001ts data synchronization design goal for the CDSL.

  4. Comment on "Dynamic quantum secret sharing"

    NASA Astrophysics Data System (ADS)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  5. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  6. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  7. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    USDA-ARS?s Scientific Manuscript database

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  8. High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan

    2016-11-01

    Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.

  9. A shared computer-based problem-oriented patient record for the primary care team.

    PubMed

    Linnarsson, R; Nordgren, K

    1995-01-01

    1. INTRODUCTION. A computer-based patient record (CPR) system, Swedestar, has been developed for use in primary health care. The principal aim of the system is to support continuous quality improvement through improved information handling, improved decision-making, and improved procedures for quality assurance. The Swedestar system has evolved during a ten-year period beginning in 1984. 2. SYSTEM DESIGN. The design philosophy is based on the following key factors: a shared, problem-oriented patient record; structured data entry based on an extensive controlled vocabulary; advanced search and query functions, where the query language has the most important role; integrated decision support for drug prescribing and care protocols and guidelines; integrated procedures for quality assurance. 3. A SHARED PROBLEM-ORIENTED PATIENT RECORD. The core of the CPR system is the problem-oriented patient record. All problems of one patient, recorded by different members of the care team, are displayed on the problem list. Starting from this list, a problem follow-up can be made, one problem at a time or for several problems simultaneously. Thus, it is possible to get an integrated view, across provider categories, of those problems of one patient that belong together. This shared problem-oriented patient record provides an important basis for the primary care team work. 4. INTEGRATED DECISION SUPPORT. The decision support of the system includes a drug prescribing module and a care protocol module. The drug prescribing module is integrated with the patient records and includes an on-line check of the patient's medication list for potential interactions and data-driven reminders concerning major drug problems. Care protocols have been developed for the most common chronic diseases, such as asthma, diabetes, and hypertension. The patient records can be automatically checked according to the care protocols. 5. PRACTICAL EXPERIENCE. The Swedestar system has been implemented in a primary care area with 30,000 inhabitants. It is being used by all the primary care team members: 15 general practitioners, 25 district nurses, and 10 physiotherapists. Several years of practical experience of the CPR system shows that it has a positive impact on quality of care on four levels: 1) improved clinical follow-up of individual patients; 2) facilitated follow-up of aggregated data such as practice activity analysis, annual reports, and clinical indicators; 3) automated medical audit; and 4) concurrent audit. Within that primary care area, quality of care has improved substantially in several aspects due to the use of the CPR system [1].

  10. Using NetMeeting for remote configuration of the Otto Bock C-Leg: technical considerations.

    PubMed

    Lemaire, E D; Fawcett, J A

    2002-08-01

    Telehealth has the potential to be a valuable tool for technical and clinical support of computer controlled prosthetic devices. This pilot study examined the use of Internet-based, desktop video conferencing for remote configuration of the Otto Bock C-Leg. Laboratory tests involved connecting two computers running Microsoft NetMeeting over a local area network (IP protocol). Over 56 Kbs(-1), DSL/Cable, and 10 Mbs(-1) LAN speeds, a prosthetist remotely configured a user's C-Leg by using Application Sharing, Live Video, and Live Audio. A similar test between sites in Ottawa and Toronto, Canada was limited by the notebook computer's 28 Kbs(-1) modem. At the 28 Kbs(-1) Internet-connection speed, NetMeeting's application sharing feature was not able to update the remote Sliders window fast enough to display peak toe loads and peak knee angles. These results support the use of NetMeeting as an accessible and cost-effective tool for remote C-Leg configuration, provided that sufficient Internet data transfer speed is available.

  11. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  12. Operator Influence of Unexploded Ordnance Sensor Technologies

    DTIC Science & Technology

    2007-03-01

    chart display ActiveX control Mscomct2.dll – date/time display ActiveX control Pnpscr.dll – Systran SCRAMNet replicated shared memory device...response value database rgm_p2.dll – Phase 2 shared memory API and implementation Commercial components StripM.ocx – strip chart display ActiveX

  13. Are One-to-One Computers Necessary? An Analysis of Collaborative Web Exploration Activities Supported by Shared Displays

    ERIC Educational Resources Information Center

    Chang, Chia-Jung; Liu, Chen-Chung; Shen, Yan-Jhih

    2012-01-01

    Collaborative web exploration, in which learners work together to explore the World Wide Web, has become a key learning activity in education contexts. Learners can use a shared computer with a shared display to explore the web together. However, such a shared-computer approach may limit active participation among learners. To address this issue,…

  14. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Treesearch

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  15. The [Un]Spoken Challenges of Administrator Collaboration: An Exploration of One District Leadership Team's Use of Protocols to Promote Reflection and Shared Theories of Action

    ERIC Educational Resources Information Center

    Szczesiul, Stacy Agee

    2014-01-01

    This article explores the use of protocol-structured dialogue in promoting reflective practices and shared theories of action within a district leadership team. Protocols have been used to make individuals' theories of action visible and subject to evaluation. This is important for leaders trying to establish coherence across a system; in…

  16. Subconscious Visual Cues during Movement Execution Allow Correct Online Choice Reactions

    PubMed Central

    Leukel, Christian; Lundbye-Jensen, Jesper; Christensen, Mark Schram; Gollhofer, Albert; Nielsen, Jens Bo; Taube, Wolfgang

    2012-01-01

    Part of the sensory information is processed by our central nervous system without conscious perception. Subconscious processing has been shown to be capable of triggering motor reactions. In the present study, we asked the question whether visual information, which is not consciously perceived, could influence decision-making in a choice reaction task. Ten healthy subjects (28±5 years) executed two different experimental protocols. In the Motor reaction protocol, a visual target cue was shown on a computer screen. Depending on the displayed cue, subjects had to either complete a reaching movement (go-condition) or had to abort the movement (stop-condition). The cue was presented with different display durations (20–160 ms). In the second Verbalization protocol, subjects verbalized what they experienced on the screen. Again, the cue was presented with different display durations. This second protocol tested for conscious perception of the visual cue. The results of this study show that subjects achieved significantly more correct responses in the Motor reaction protocol than in the Verbalization protocol. This difference was only observed at the very short display durations of the visual cue. Since correct responses in the Verbalization protocol required conscious perception of the visual information, our findings imply that the subjects performed correct motor responses to visual cues, which they were not conscious about. It is therefore concluded that humans may reach decisions based on subconscious visual information in a choice reaction task. PMID:23049749

  17. Multiprocessor shared-memory information exchange

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.

    1989-02-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, ismore » designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange.« less

  18. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  19. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  20. An Energy-Efficient MAC Protocol for Medical Emergency Monitoring Body Sensor Networks

    PubMed Central

    Zhang, Chongqing; Wang, Yinglong; Liang, Yongquan; Shu, Minglei; Chen, Changfang

    2016-01-01

    Medical emergency monitoring body sensor networks (BSNs) monitor the occurrence of medical emergencies and are helpful for the daily care of the elderly and chronically ill people. Such BSNs are characterized by rare traffic when there is no emergency occurring, high real-time and reliable requirements of emergency data and demand for a fast wake-up mechanism for waking up all nodes when an emergency happens. A beacon-enabled MAC protocol is specially designed to meet the demands of medical emergency monitoring BSNs. The rarity of traffic is exploited to improve energy efficiency. By adopting a long superframe structure to avoid unnecessary beacons and allocating most of the superframe to be inactive periods, the duty cycle is reduced to an extremely low level to save energy. Short active time slots are interposed into the superframe and shared by all of the nodes to deliver the emergency data in a low-delay and reliable way to meet the real-time and reliable requirements. The interposition slots can also be used by the coordinator to broadcast network demands to wake-up all nodes in a low-delay and energy-efficient way. Experiments display that the proposed MAC protocol works well in BSNs with low emergency data traffic. PMID:26999145

  1. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less

  2. Semiquantum secret sharing using entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li Qin; Department of Computer Science, Sun Yat-sen University, Guangzhou 510006; Department of Mathematics, Hong Kong Baptist University, Kowloon

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but onemore » of them cannot. The presented protocols are also shown to be secure against eavesdropping.« less

  3. DWTP: a basis for networked VR on the Internet

    NASA Astrophysics Data System (ADS)

    Broll, Wolfgang; Schick, Daniel

    1998-04-01

    Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.

  4. Interlibrary Loan, the Key to Resource Sharing: A Manual of Procedures and Protocols.

    ERIC Educational Resources Information Center

    Alaska State Dept. of Education, Juneau. Div. of State Libraries.

    Intended for use by librarians in Alaska, this manual provides general guidelines for the maximum utilization of library resources through interlibrary loan service. The first of four major sections describes the Alaska Library Network (ALN), which provides protocols and procedures to libraries for resource sharing; points out that new protocols…

  5. Method-centered digital communities on protocols.io for fast-paced scientific innovation.

    PubMed

    Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L

    2016-01-01

    The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs.  This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field.  The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.

  6. What is shared, what is different? Core relational themes and expressive displays of eight positive emotions.

    PubMed

    Campos, Belinda; Shiota, Michelle N; Keltner, Dacher; Gonzaga, Gian C; Goetz, Jennifer L

    2013-01-01

    Understanding positive emotions' shared and differentiating features can yield valuable insight into the structure of positive emotion space and identify emotion states, or aspects of emotion states, that are most relevant for particular psychological processes and outcomes. We report two studies that examined core relational themes (Study 1) and expressive displays (Study 2) for eight positive emotion constructs--amusement, awe, contentment, gratitude, interest, joy, love, and pride. Across studies, all eight emotions shared one quality: high positive valence. Distinctive core relational theme and expressive display patterns were found for four emotions--amusement, awe, interest, and pride. Gratitude was associated with a distinct core relational theme but not an expressive display. Joy and love were each associated with a distinct expressive display but their core relational themes also characterised pride and gratitude, respectively. Contentment was associated with a distinct expressive display but not a core relational theme. The implications of this work for the study of positive emotion are discussed.

  7. Quantum secret sharing with identity authentication based on Bell states

    NASA Astrophysics Data System (ADS)

    Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid

    Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.

  8. Visual supports for shared reading with young children: the effect of static overlay design.

    PubMed

    Wood Jackson, Carla; Wahlquist, Jordan; Marquis, Cassandra

    2011-06-01

    This study examined the effects of two types of static overlay design (visual scene display and grid display) on 39 children's use of a speech-generating device during shared storybook reading with an adult. This pilot project included two groups: preschool children with typical communication skills (n = 26) and with complex communication needs (n = 13). All participants engaged in shared reading with two books using each visual layout on a speech-generating device (SGD). The children averaged a greater number of activations when presented with a grid display during introductory exploration and free play. There was a large effect of the static overlay design on the number of silent hits, evidencing more silent hits with visual scene displays. On average, the children demonstrated relatively few spontaneous activations of the speech-generating device while the adult was reading, regardless of overlay design. When responding to questions, children with communication needs appeared to perform better when using visual scene displays, but the effect of display condition on the accuracy of responses to wh-questions was not statistically significant. In response to an open ended question, children with communication disorders demonstrated more frequent activations of the SGD using a grid display than a visual scene. Suggestions for future research as well as potential implications for designing AAC systems for shared reading with young children are discussed.

  9. Laser scanning confocal microscopy: history, applications, and related optical sectioning techniques.

    PubMed

    Paddock, Stephen W; Eliceiri, Kevin W

    2014-01-01

    Confocal microscopy is an established light microscopical technique for imaging fluorescently labeled specimens with significant three-dimensional structure. Applications of confocal microscopy in the biomedical sciences include the imaging of the spatial distribution of macromolecules in either fixed or living cells, the automated collection of 3D data, the imaging of multiple labeled specimens and the measurement of physiological events in living cells. The laser scanning confocal microscope continues to be chosen for most routine work although a number of instruments have been developed for more specific applications. Significant improvements have been made to all areas of the confocal approach, not only to the instruments themselves, but also to the protocols of specimen preparation, to the analysis, the display, the reproduction, sharing and management of confocal images using bioinformatics techniques.

  10. Maximizing Interhospital Transfer Resources for Neurosurgical Patients.

    PubMed

    Schnurman, Zane; Chin, Robert; Fishkin, Edward R; Huang, Paul P

    2017-08-01

    Delays in patient transfers are associated with worse outcomes for some neurosurgical conditions. One of the primary causes of transfer delay is lack of neurosurgery intensive care unit bed availability. In the present study, we characterize the results of implementing an interhospital transfer protocol to reduce unnecessary transfers and improve bed availability. A transfer protocol was implemented in July 2012 at the Bellevue Hospital Department of Neurosurgery that screened for and prevented transfer of low-risk patients who were unlikely to require specialized inpatient neurosurgical care. The impact of this protocol was assessed with prospectively recorded data on all potential interhospital transfers from May 2011 through June 2016. Of the 1978 calls (regarding 1886 individual patients), 402 occurred before the implementation of the transfer protocol and 1576 occurred after. Before the protocol, 84.1% of transfer requests were accepted, but 15.2% were subsequently denied for bed unavailability. After the protocol, a smaller share of transfer requests were accepted after protocol screening (71.8%, P < 0.001), but only 1.9% (P < 0.001) were subsequently denied because of bed unavailability. The diagnosis demographics changed significantly (P < 0.001), with a larger share of arriving transfers suffering from aneurysms or tumors after the protocol and a smaller share suffering from stenosis/disc disease without neurological symptoms. The transfer protocol implemented in the present study allowed transfer determination based on the need for specialized neurosurgical care rather than chance unavailability of beds. Developing interhospital transfer protocols may be an effective strategy to efficiently allocate limited hospital resources and improve transfer systems. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Quantum secret sharing with qudit graph states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keet, Adrian; Fortescue, Ben; Sanders, Barry C.

    We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.

  12. Enhancement of the Shared Graphics Workspace.

    DTIC Science & Technology

    1987-12-31

    participants to share videodisc images and computer graphics displayed in color and text and facsimile information displayed in black on amber. They...could annotate the information in up to five * colors and print the annotated version at both sites, using a standard fax machine. The SGWS also used a fax...system to display a document, whether text or photo, the camera scans the document, digitizes the data, and sends it via direct memory access (DMA) to

  13. Emotional display rules as work unit norms: a multilevel analysis of emotional labor among nurses.

    PubMed

    Diefendorff, James M; Erickson, Rebecca J; Grandey, Alicia A; Dahling, Jason J

    2011-04-01

    Emotional labor theory has conceptualized emotional display rules as shared norms governing the expression of emotions at work. Using a sample of registered nurses working in different units of a hospital system, we provided the first empirical evidence that display rules can be represented as shared, unit-level beliefs. Additionally, controlling for the influence of dispositional affectivity, individual-level display rule perceptions, and emotion regulation, we found that unit-level display rules are associated with individual-level job satisfaction. We also showed that unit-level display rules relate to burnout indirectly through individual-level display rule perceptions and emotion regulation strategies. Finally, unit-level display rules also interacted with individual-level dispositional affectivity to predict employee use of emotion regulation strategies. We discuss how future research on emotional labor and display rules, particularly in the health care setting, can build on these findings.

  14. Virtual laboratories: new opportunities for collaborative water science

    NASA Astrophysics Data System (ADS)

    Ceola, Serena; Arheimer, Berit; Bloeschl, Guenter; Baratti, Emanuele; Capell, Rene; Castellarin, Attilio; Freer, Jim; Han, Dawei; Hrachowitz, Markus; Hundecha, Yeshewatesfa; Hutton, Christopher; Lindström, Goran; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Toth, Elena; Viglione, Alberto; Wagener, Thorsten

    2015-04-01

    Reproducibility and repeatability of experiments are the fundamental prerequisites that allow researchers to validate results and share hydrological knowledge, experience and expertise in the light of global water management problems. Virtual laboratories offer new opportunities to enable these prerequisites since they allow experimenters to share data, tools and pre-defined experimental procedures (i.e. protocols). Here we present the outcomes of a first collaborative numerical experiment undertaken by five different international research groups in a virtual laboratory to address the key issues of reproducibility and repeatability. Moving from the definition of accurate and detailed experimental protocols, a rainfall-runoff model was independently applied to 15 European catchments by the research groups and model results were collectively examined through a web-based discussion. We found that a detailed modelling protocol was crucial to ensure the comparability and reproducibility of the proposed experiment across groups. Our results suggest that sharing comprehensive and precise protocols and running the experiments within a controlled environment (e.g. virtual laboratory) is as fundamental as sharing data and tools for ensuring experiment repeatability and reproducibility across the broad scientific community and thus advancing hydrology in a more coherent way.

  15. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  16. Data Sharing to Improve Close Approach Monitoring and Safety of Flight

    NASA Astrophysics Data System (ADS)

    Chan, Joseph; DalBello, Richard; Hope, Dean; Wauthier, Pascal; Douglas, Tim; Inghram, Travis

    2009-03-01

    Individual satellite operators have done a good job of developing the internal protocols and procedures to ensure the safe operation of their fleets. However, data sharing among operators for close approach monitoring is conducted in an ad-hoc manner during relocations, and there is currently no standardized agreement among operators on the content, format, and distribution protocol for data sharing. Crowding in geostationary orbit, participation by new commercial actors, government interest in satellite constellations, and highly maneuverable spacecraft all suggest that satellite operators will need to begin a dialogue on standard communication protocols and procedure to improve situation awareness. We will give an overview of the current best practices among different operators for close approach monitoring and discuss the concept of an active data center to improve data sharing, conjunction monitoring, and avoidance among satellite operators. We will also report on the progress and lessons learned from a Data Center prototype conducted by several operators over a one year period.

  17. One-pot preparation of mRNA/cDNA display by a novel and versatile puromycin-linker DNA.

    PubMed

    Mochizuki, Yuki; Biyani, Manish; Tsuji-Ueno, Sachika; Suzuki, Miho; Nishigaki, Koichi; Husimi, Yuzuru; Nemoto, Naoto

    2011-09-12

    A rapid, easy, and robust preparation method for mRNA/cDNA display using a newly designed puromycin-linker DNA is presented. The new linker is structurally simple, easy to synthesize, and cost-effective for use in "in vitro peptide and protein selection". An introduction of RNase T1 nuclease site to the new linker facilitates the easy recovery of mRNA/cDNA displayed protein by an improvement of the efficiency of ligating the linker to mRNAs and efficient release of mRNA/cDNA displayed protein from the solid-phase (magnetic bead). For application demonstration, affinity selections were successfully performed. Furthermore, we introduced a "one-pot" preparation protocol to perform mRNA display easy. Unlike conventional approaches that require tedious and downstream multistep process including purification, this protocol will make the mRNA/cDNA display methods more practical and convenient and also facilitate the development of next-generation, high-throughput mRNA/cDNA display systems amenable to automation.

  18. ACL double-bundle reconstruction with one tibial tunnel provides equal stability compared to two tibial tunnels.

    PubMed

    Drews, Björn Holger; Seitz, Andreas Martin; Huth, Jochen; Bauer, Gerhard; Ignatius, Anita; Dürselen, Lutz

    2017-05-01

    The purpose of this study was to investigate whether an anterior cruciate ligament (ACL) double-bundle reconstruction with one tibial tunnel displays the same in vitro stability as a conventional double-bundle reconstruction with two tibial tunnels when using the same tensioning protocol. In 11 fresh-frozen cadaveric knees, ACL double-bundle reconstruction with one and two tibial tunnels was performed. The two grafts were tightened using 80 N in different flexion angles (anteromedial-bundle at 60° and posterolateral-bundle at 15°). Anterior tibial translation (134 N) and translation with combined rotatory and valgus loads (10 Nm valgus stress and 4 Nm internal tibial torque) were determined at 0°, 30°, 60° and 90° flexion. Measurements were taken in intact ACL, resected ACL, three-tunnel reconstruction and four-tunnel reconstruction. Additionally, the tension on the grafts was determined. Student's t test was performed for statistical analysis of the related samples. Significance was set at p < 0.017 according to Bonferroni correction. The two reconstructive techniques displayed no significant differences in comparison with the intact ACL in anterior tibial translation at 0°, 60° and 90° of flexion. The same results were obtained for the anterior tibial translation with a combined rotatory load at 60° and 90°. When directly comparing both reconstructive techniques, there were no significant differences for the anterior tibial translation and combined rotatory load at all flexion angles. The measured tension on grafts displayed similar load sharing between both bundles. Except at full extension, both grafts displayed a significantly different tension increase under anterior tibial translation for both techniques (p = 0.0086). Tightening both bundles in ACL double-bundle reconstruction with one or two tibial tunnels in different flexion angles achieved comparable restoration of stability, although there was different load sharing on the bundles. With regard to individualized ACL reconstruction, the double-bundle technique with one tibial tunnel offers a possibility to address small tibial insertion sites without compromising the advantages of a double-bundle procedure.

  19. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  20. Supporting Common Ground Development in the Operation Room through Information Display Systems

    PubMed Central

    Feng, Yuanyuan; Mentis, Helena M.

    2016-01-01

    Effective information sharing is crucial for clinical team coordination. Most information display systems have been designed to replace verbal communication. However, information may not be available for capture before a communication event and information needs often become clear and evident through an evolving discourse. Thus, to build tools to support clinical team in situ information sharing, we need a better understanding of how evolving information needs are identified and satisfied. In this study, we used sequential analysis techniques to explore the ways communication and information sharing events between an attending surgeon and a resident change throughout a laparoscopic surgery. We demonstrate how common ground is developed and maintained, and how information needs change through the efforts of grounding. From our findings, we suggest that the design for information display systems could encourage communication and support the articulation work that is necessary to accomplish the information sharing. PMID:28269936

  1. Supporting Common Ground Development in the Operation Room through Information Display Systems.

    PubMed

    Feng, Yuanyuan; Mentis, Helena M

    2016-01-01

    Effective information sharing is crucial for clinical team coordination. Most information display systems have been designed to replace verbal communication. However, information may not be available for capture before a communication event and information needs often become clear and evident through an evolving discourse. Thus, to build tools to support clinical team in situ information sharing, we need a better understanding of how evolving information needs are identified and satisfied. In this study, we used sequential analysis techniques to explore the ways communication and information sharing events between an attending surgeon and a resident change throughout a laparoscopic surgery. We demonstrate how common ground is developed and maintained, and how information needs change through the efforts of grounding. From our findings, we suggest that the design for information display systems could encourage communication and support the articulation work that is necessary to accomplish the information sharing.

  2. Analogy motor learning by young children: a study of rope skipping.

    PubMed

    Tse, Andy C Y; Fong, Shirley S M; Wong, Thomson W L; Masters, Rich

    2017-03-01

    Research in psychology suggests that provision of an instruction by analogy can enhance acquisition and understanding of knowledge. Limited research has been conducted to test this proposition in motor learning by children. The purpose of the present study was to examine the feasibility of analogy instructions in motor skill acquisition by children. Thirty-two children were randomly assigned to one of the two instruction protocols: analogy and explicit instruction protocols for a two-week rope skipping training. Each participant completed a pretest (Lesson 1), three practice sessions (Lesson 2-4), a posttest and a secondary task test (Lesson 5). Children in the analogy protocol displayed better rope skip performance than those in the explicit instruction protocol (p < .001). Moreover, a cognitive secondary task test indicated that children in the analogy protocol performed more effectively, whereas children in the explicit protocol displayed decrements in performance. Analogy learning may aid children to acquire complex motor skills, and have potential benefits related to reduced cognitive processing requirements.

  3. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  4. Verifiable Secret Redistribution

    DTIC Science & Technology

    2001-10-01

    but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the

  5. 77 FR 68873 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ... calculation for Auto-Ex Mode, (ii) provide a fixed per share rebate for Midpoint Peg Zero Display Reserve... NMS stocks with quoted prices less than one dollar, (ii) create a fixed per share rebate for Midpoint Peg Zero Display Reserve Orders,\\3\\ and (iii) correct typographical inconsistencies within the Fee...

  6. KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  7. KENNEDY SPACE CENTER, FLA. - Children enjoy displays of fire equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy displays of fire equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  8. Use of nontraditional flight displays for the reduction of central visual overload in the cockpit

    NASA Technical Reports Server (NTRS)

    Weinstein, Lisa F.; Wickens, Christopher D.

    1992-01-01

    The use of nontraditional flight displays to reduce visual overload in the cockpit was investigated in a dual-task paradigm. Three flight displays (central, peripheral, and ecological) were used between subjects for the primary tasks, and the type of secondary task (object identification or motion judgment) and the presentation of the location of the task in the visual field (central or peripheral) were manipulated with groups. The two visual-spatial tasks were time-shared to study the possibility of a compatibility mapping between task type and task location. The ecological display was found to allow for the most efficient time-sharing.

  9. Role of messenger RNA-ribosome complex in complementary DNA display.

    PubMed

    Naimuddin, Mohammed; Ohtsuka, Isao; Kitamura, Koichiro; Kudou, Motonori; Kimura, Shinnosuke

    2013-07-15

    In vitro display technologies such as ribosome display and messenger RNA (mRNA)/complementary DNA (cDNA) display are powerful methods that can generate library diversities on the order of 10(10-14). However, in mRNA and cDNA display methods, the end use diversity is two orders of magnitude lower than initial diversity and is dependent on the downstream processes that act as limiting factors. We found that in our previous cDNA display protocol, the purification of protein fusions by the use of streptavidin matrices from cell-free translation mixtures had poor efficiency (∼10-15%) that seriously affected the diversity of the purified library. Here, we have investigated and optimized the protocols that provided remarkable purification efficiencies. The stalled ribosome in the mRNA-ribosome complex was found to impede this purification efficiency. Among the various conditions tested, destabilization of ribosomes by appropriate concentration of metal chelating agents in combination with an optimal temperature of 30°C were found to be crucial and effective for nearly complete isolation of protein fusions from the cell-free translation system. Thus, this protocol provided 8- to 10-fold increased efficiency of purification over the previous method and results in retaining the diversity of the library by approximately an order of magnitude-important for directed evolution. We also discuss the possible effects in the fabrication of protein chips. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Influence of LCD color reproduction accuracy on observer performance using virtual pathology slides

    NASA Astrophysics Data System (ADS)

    Krupinski, Elizabeth A.; Silverstein, Louis D.; Hashmi, Syed F.; Graham, Anna R.; Weinstein, Ronald S.; Roehrig, Hans

    2012-02-01

    The use of color LCDs in medical imaging is growing as more clinical specialties use digital images as a resource in diagnosis and treatment decisions. Telemedicine applications such as telepathology, teledermatology and teleophthalmology rely heavily on color images. However, standard methods for calibrating, characterizing and profiling color displays do not exist, resulting in inconsistent presentation. To address this, we developed a calibration, characterization and profiling protocol for color-critical medical imaging applications. Physical characterization of displays calibrated with and without the protocol revealed high color reproduction accuracy with the protocol. The present study assessed the impact of this protocol on observer performance. A set of 250 breast biopsy virtual slide regions of interest (half malignant, half benign) were shown to 6 pathologists, once using the calibration protocol and once using the same display in its "native" off-the-shelf uncalibrated state. Diagnostic accuracy and time to render a decision were measured. In terms of ROC performance, Az (area under the curve) calibrated = 0.8640; uncalibrated = 0.8558. No statistically significant difference (p = 0.2719) was observed. In terms of interpretation speed, mean calibrated = 4.895 sec, mean uncalibrated = 6.304 sec which is statistically significant (p = 0.0460). Early results suggest a slight advantage diagnostically for a properly calibrated and color-managed display and a significant potential advantage in terms of improved workflow. Future work should be conducted using different types of color images that may be more dependent on accurate color rendering and a wider range of LCDs with varying characteristics.

  11. X-Windows Information Sharing Protocol Widget Class

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Information Sharing Protocol (ISP) Widget Class ("Class") is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing ISP graphical-user-interface (GUI) computer programs. ISP programming tasks require many method calls to identify, query, and interpret the connections and messages exchanged between a client and an ISP server. Most X-Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Information Sharing Protocol (ISP) Widget Class encapsulates the client side of the ISP programming libraries within the framework of an X-Windows widget. Using the widget framework, X-Windows GUI programs can interact with ISP services in an abstract way and in the same manner as that of other graphical widgets, making it easier to write ISP GUI client programs. Wrapping ISP client services inside a widget framework enables a programmer to treat an ISP server interface as though it were a GUI. Moreover, an alternate subclass could implement another communication protocol in the same sort of widget.

  12. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  13. Shared Activity Coordination

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of real-time, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities in a dynamic environment, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  14. Continual coordination through shared activities

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of realtime, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of separate missions, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  15. Argumentation for coordinating shared activities

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.; Schaffer, Steven R.

    2004-01-01

    an increasing need for space missions to be able to collaboratively (and competitively) develop plans both within and across missions. In addition, interacting spacecraft that interleave onboard planning and execution must reach consensus on their commitments to each other prior to execution. In domains where missions have varying degrees of interaction and different constraints on communication and computation, the missions will require different coordination protocols in order to efficiently reach consensus with in their imposed deadlines. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of multiple agents and a foundation for customizing protocols for negotiating planner interactions. We investigate variations of a few simple protocols based on argumentation and distributed constraints satisfaction techniques and evaluate their abilities to reach consistent solutions according to computation, time, and communication costs in an abstract domain where spacecraft propose joint measurements.

  16. KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  17. KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of fire equipment behind KSC NASA Headquarters. Employees were invited to share their work experience with their children for Take Our Children to Work Day.

    NASA Image and Video Library

    2003-07-24

    KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of fire equipment behind KSC NASA Headquarters. Employees were invited to share their work experience with their children for Take Our Children to Work Day.

  18. Dual genetically encoded phage-displayed ligands.

    PubMed

    Mohan, Kritika; Weiss, Gregory A

    2014-05-15

    M13 bacteriophage display presents polypeptides as fusions to phage coat proteins. Such phage-displayed ligands offer useful reagents for biosensors. Here, we report a modified phage propagation protocol for the consistent and robust display of two different genetically encoded ligands on the major coat protein, P8. The results demonstrate that the phage surface reaches a saturation point for maximum peptide display. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. A remote control console for the HHIRF 25-MV Tandem Accelerator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hasanul Basher, A.M.

    The CAMAC-based control system for the 25-MV Tandem Accelerator at HHIRF uses two Perkin-Elmer, 32-bit minicomputers: a message-switching computer and a supervisory computer. Two operator consoles are located on one of the six serial highways. Operator control is provided by means of a console CRT, trackball, assignable shaft encoders, and meters. The message-switching computer transmits and receives control information on the serial highways. At present, the CRT pages with updated parameters can be displayed and parameters can be controlled only from the two existing consoles, one in the Tandem control room and the other in the ORIC control room. Itmore » has become necessary to expand the control capability to several other locations in the building. With the expansion of control and monitoring capability of accelerator parameters to other locations, the operators will be able to control and observe the result of the control action at the same time. This capability will be useful in the new Radioactive Ion Beam project of the division. Since the new control console will be PC-based, the existing page format will be changed. The PC will be communicating with the Perkin-Elmer through RS-232 with the aid of a communication protocol. Hardware configuration has been established, a software program that reads the pages from the shared memory, and a communication protocol have been developed. The following sections present the implementation strategy, work completed, future action plans, and the functional details of the communication protocol.« less

  20. Controlling Distributed Planning

    NASA Technical Reports Server (NTRS)

    Clement, Bradley; Barrett, Anthony

    2004-01-01

    A system of software implements an extended version of an approach, denoted shared activity coordination (SHAC), to the interleaving of planning and the exchange of plan information among organizations devoted to different missions that normally communicate infrequently except that they need to collaborate on joint activities and/or the use of shared resources. SHAC enables the planning and scheduling systems of the organizations to coordinate by resolving conflicts while optimizing local planning solutions. The present software provides a framework for modeling and executing communication protocols for SHAC. Shared activities are represented in each interacting planning system to establish consensus on joint activities or to inform the other systems of consumption of a common resource or a change in a shared state. The representations of shared activities are extended to include information on (1) the role(s) of each participant, (2) permissions (defined as specifications of which participant controls what aspects of shared activities and scheduling thereof), and (3) constraints on the parameters of shared activities. Also defined in the software are protocols for changing roles, permissions, and constraints during the course of coordination and execution.

  1. The CHAT System: An OS/360 MVT Time-Sharing Subsystem for Displays and Teletype. Technical Progress Report.

    ERIC Educational Resources Information Center

    Schultz, Gary D.

    The design and operation of a time-sharing monitor are described. It runs under OS/360 MVT that supports multiple application program interaction with operators of CRT (cathode ray tube) display stations and of a teletype. Key design features discussed include: 1) an interface allowing application programs to be coded in either PL/I or assembler…

  2. On-line data display

    NASA Astrophysics Data System (ADS)

    Lang, Sherman Y. T.; Brooks, Martin; Gauthier, Marc; Wein, Marceli

    1993-05-01

    A data display system for embedded realtime systems has been developed for use as an operator's user interface and debugging tool. The motivation for development of the On-Line Data Display (ODD) have come from several sources. In particular the design reflects the needs of researchers developing an experimental mobile robot within our laboratory. A proliferation of specialized user interfaces revealed a need for a flexible communications and graphical data display system. At the same time the system had to be readily extensible for arbitrary graphical display formats which would be required for data visualization needs of the researchers. The system defines a communication protocol transmitting 'datagrams' between tasks executing on the realtime system and virtual devices displaying the data in a meaningful way on a graphical workstation. The communication protocol multiplexes logical channels on a single data stream. The current implementation consists of a server for the Harmony realtime operating system and an application written for the Macintosh computer. Flexibility requirements resulted in a highly modular server design, and a layered modular object- oriented design for the Macintosh part of the system. Users assign data types to specific channels at run time. Then devices are instantiated by the user and connected to channels to receive datagrams. The current suite of device types do not provide enough functionality for most users' specialized needs. Instead the system design allows the creation of new device types with modest programming effort. The protocol, design and use of the system are discussed.

  3. Two-party secret key distribution via a modified quantum secret sharing protocol.

    PubMed

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  4. Offering to Share: How to Put Heads Together in Autism Neuroimaging

    ERIC Educational Resources Information Center

    Belmonte, Matthew K.; Mazziotta, John C.; Minshew, Nancy J.; Evans, Alan C.; Courchesne, Eric; Dager, Stephen R.; Bookheimer, Susan Y.; Aylward, Elizabeth H.; Amaral, David G.; Cantor, Rita M.; Chugani, Diane C.; Dale, Anders M.; Davatzikos, Christos; Gerig, Guido; Herbert, Martha R.; Lainhart, Janet E.; Murphy, Declan G.; Piven, Joseph; Reiss, Allan L.; Schultz, Robert T.; Zeffiro, Thomas A.; Levi-Pearl, Susan; Lajonchere, Clara; Colamarino, Sophia A.

    2008-01-01

    Data sharing in autism neuroimaging presents scientific, technical, and social obstacles. We outline the desiderata for a data-sharing scheme that combines imaging with other measures of phenotype and with genetics, defines requirements for comparability of derived data and recommendations for raw data, outlines a core protocol including…

  5. Asynchronous reference frame agreement in a quantum network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Wehner, Stephanie

    2016-03-01

    An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.

  6. Shared Displays: An Overview of Perceptual and Cognitive Issues

    DTIC Science & Technology

    2007-06-01

    workload (Emery, L ., Catchpole, K., Macklin, C., Dudfield, H., & Myers, E., 2001) during a simulated C2 exercise at the Joint Force Air Component...individual workstations, shared displays, and C2 personnel. REFERENCES Aleva, D. L ., & Meyer, F. M. (2004). AFRL battlespace visualization branch...education. Emery, L ., Catchpole, K., Macklin, C., Dudfield, H., & Myers, E. (2001). Big is better? Empirical results of an assessment of command teams

  7. An implementation of the SNR high speed network communication protocol (Receiver part)

    NASA Astrophysics Data System (ADS)

    Wan, Wen-Jyh

    1995-03-01

    This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.

  8. Lapin Data Interchange Among Database, Analysis and Display Programs Using XML-Based Text Files

    NASA Technical Reports Server (NTRS)

    2004-01-01

    The purpose was to investigate and evaluate the interchange of application- specific data among multiple programs each carrying out part of the analysis and design task. This has been carried out previously by creating a custom program to read data produced by one application and then write that data to a file whose format is specific to the second application that needs all or part of that data. In this investigation, data of interest is described using the XML markup language that allows the data to be stored in a text-string. Software to transform output data of a task into an XML-string and software to read an XML string and extract all or a portion of the data needed for another application is used to link two independent applications together as part of an overall design effort. This approach was initially used with a standard analysis program, Lapin, along with standard applications a standard spreadsheet program, a relational database program, and a conventional dialog and display program to demonstrate the successful sharing of data among independent programs. See Engineering Analysis Using a Web-Based Protocol by J.D. Schoeffler and R.W. Claus, NASA TM-2002-211981, October 2002. Most of the effort beyond that demonstration has been concentrated on the inclusion of more complex display programs. Specifically, a custom-written windowing program organized around dialogs to control the interactions have been combined with an independent CAD program (Open Cascade) that supports sophisticated display of CAD elements such as lines, spline curves, and surfaces and turbine-blade data produced by an independent blade design program (UD0300).

  9. Are child-centric aspects in newborn and child health systematic review and meta-analysis protocols and reports adequately reported?-two systematic reviews.

    PubMed

    Farid-Kapadia, Mufiza; Joachim, Kariym C; Balasingham, Chrinna; Clyburne-Sherin, April; Offringa, Martin

    2017-03-06

    Evidence suggests that newborn and child health systematic reviews and meta-analyses exhibit poor quality in reporting. The "Preferred Reporting Items in Systematic Review and Meta-Analysis" (PRISMA) and PRISMA-Protocols (PRISMA-P) checklists have been developed to improve the reporting of systematic review results and protocols, respectively. We aimed to evaluate the clarity and transparency in reporting of child-centric items in child health systematic reviews (SRs) and SR protocols and to identify areas where reporting could be strengthened. Two preliminary lists of potential child-centric reporting items were used to examine current reporting. The Cochrane, DARE, MEDLINE, and EMBASE libraries were searched from 2010 to 2014 for systematic reviews that included children. Each report and protocol that met the inclusion criteria had their quality of reporting assessed by their reporting of child-centric items. Quality of reporting was assessed per whether one third, one to two thirds, or more than two thirds of papers complied with potential child-centric potential modifications/extensions to PRISMA and were analyzed by the following: (i) paper type (i.e., report vs. protocol), (ii) publication type (i.e., Cochrane vs. non-Cochrane), and (iii) population type (i.e., child-only vs. mixed populations vs. family/maternal). Of the 414 eligible articles, 248 reports and 76 protocols were included. In 21 of 24 potential SR reporting items and 13 of 14 potential SR protocol reporting items, less than two thirds of papers met the child-centric reporting item requirements. Mixed population studies displayed significantly poorer reporting in comparison to child-only and family/maternal intervention studies for 11 potential SR reporting items (p < 0.05) and five potential SR protocol items (p < 0.05). When comparing non-Cochrane to Cochrane reports and protocols, five items in both lists were found to perform significantly poorer in non-Cochrane reports (p < 0.05). Significant differences in reporting quality were found in three of 14 items shared between the potential SR reporting items and potential SR protocol reporting items (p < 0.05). Newborn and child health systematic reviews and meta-analyses exhibit incomplete reporting, thereby hindering prudent decision-making by healthcare providers and policy makers. These results provide a rationale for the implementation of child-centric extensions and modifications to current PRISMA and PRISMA-P, such as to improve reporting in this population.

  10. Unconditional security of entanglement-based continuous-variable quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo

    2017-01-01

    The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.

  11. An Experimental Study of the Effect of Shared Information on Pilot/Controller Re-Route Negotiation

    NASA Technical Reports Server (NTRS)

    Farley, Todd C.; Hansman, R. John

    1999-01-01

    Air-ground data link systems are being developed to enable pilots and air traffic controllers to share information more fully. The sharing of information is generally expected to enhance their shared situation awareness and foster more collaborative decision making. An exploratory, part-task simulator experiment is described which evaluates the extent to which shared information may lead pilots and controllers to cooperate or compete when negotiating route amendments. The results indicate an improvement in situation awareness for pilots and controllers and a willingness to work cooperatively. Independent of data link considerations, the experiment also demonstrates the value of providing controllers with a good-quality weather representation on their plan view displays. Observed improvements in situation awareness and separation assurance are discussed. It is argued that deployment of this relatively simple, low-risk addition to the plan view displays be accelerated.

  12. Semi-quantum Dialogue Based on Single Photons

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  13. Rosetta:MSF: a modular framework for multi-state computational protein design.

    PubMed

    Löffler, Patrick; Schmitz, Samuel; Hupfeld, Enrico; Sterner, Reinhard; Merkl, Rainer

    2017-06-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta's protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta's single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design.

  14. Rosetta:MSF: a modular framework for multi-state computational protein design

    PubMed Central

    Hupfeld, Enrico; Sterner, Reinhard

    2017-01-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta’s protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta’s single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design. PMID:28604768

  15. Cell synchrony and chromosomal protocols for somatic cells of cotton gossypium hirsutum

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van`t Hof, J.; Lamm, S.S.

    1994-10-10

    The intent of this pamphlet is to share information with others who are interested in useful protocols for cotton cytogenetics and cytology. The protocols described are a beginning effort and they are expected to be improved. All methods, results and data given pertain to cultivar MD 51ne. We are not satisfied with our results of in situ hybridization.

  16. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  17. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  18. System Collects And Displays Demultiplexed Data

    NASA Technical Reports Server (NTRS)

    Reschke, Millard F.; Fariss, Julie L.; Kulecz, Walter B.; Paloski, William H.

    1992-01-01

    Electronic system collects, manipulates, and displays in real time results of manipulation of streams of data transmitted from remote scientific instrumentation. Interface circuit shifts data-and-clock signal from differential logic levels of multiplexer to single-ended logic levels of computer. System accommodates nonstandard data-transmission protocol. Software useful in applications where Macintosh computers used in real-time display and recording of data.

  19. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  20. Network Analysis with SiLK

    DTIC Science & Technology

    2015-01-06

    Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol

  1. Medical color displays and their calibration

    NASA Astrophysics Data System (ADS)

    Fan, Jiahua; Roehrig, Hans; Dallas, W.; Krupinski, Elizabeth

    2009-08-01

    Color displays are increasingly used for medical imaging, replacing the traditional monochrome displays in radiology for multi-modality applications, 3D representation applications, etc. Color displays are also used increasingly because of wide spread application of Tele-Medicine, Tele-Dermatology and Digital Pathology. At this time, there is no concerted effort for calibration procedures for this diverse range of color displays in Telemedicine and in other areas of the medical field. Using a colorimeter to measure the display luminance and chrominance properties as well as some processing software we developed a first attempt to a color calibration protocol for the medical imaging field.

  2. Detector-device-independent quantum secret sharing with source flaws.

    PubMed

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  3. Meeting Submission Deadlines--A Shared Responsibility.

    ERIC Educational Resources Information Center

    Nachby, Andrew L.

    1979-01-01

    A research administrator is seen as one who provides an environment conducive to the performance of research by allowing the principal investigator to spend as little time as possible with administrative paperwork. A protocol routing sheet and a checklist for protocol submissions are provided. (MLW)

  4. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  5. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  6. A heptadecanuclear Mn(III)9Dy(III)8 cluster derived from triethanolamine with two edge sharing supertetrahedra as the core and displaying SMM behaviour.

    PubMed

    Langley, Stuart K; Moubarakia, Boujemaa; Murray, Keith S

    2010-06-07

    A heterometallic, heptadecanuclear cluster of formula [Mn(III)9Dy(III)8O8(OH)8(tea)2(teaH)2(teaH2)4(Ac)4(NO3)2(H2O)4](NO3)7·8H2O (1) is reported. The core of 1 displays two edge sharing Mn(III)5Dy(III)5 supertetrahedra and represents one of the largest Mn/4f cluster compound so far reported. Magnetic studies show that 1 displays probable SMM behaviour as observed via non-zero values in the χM''vs T plot.

  7. SU-E-I-19: CTDI Values for All Protocols: Using the Ratio of the DLP Measured in CTDI Phantoms to the Measured Air Exposure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Raterman, G; Gauntt, D

    2014-06-01

    Purpose: To propose a method other than CTDI phantom measurements for routine CT dosimetry QA. This consists of taking a series of air exposure measurements and calculating a factor for converting from this exposure measurement to the protocol's associated head or body CTDI value using DLP. The data presented are the ratios of phantom DLP to air exposure ratios for different scanners, as well as error in the displayed CTDI. Methods: For each scanner, the CTDI is measured at all available tube voltages using both the head and body phantoms. Then, the exposure is measured using a pencil chamber inmore » air at isocenter. A ratio of phantom DLP to exposure in air for a given protocol may be calculated and used for converting a simple air dose measurement to a head or body CTDI value. For our routine QA, the exposure in air for different collimations, mAs, and kVp is measured, and displayed CTDI is recorded. Therefore, the ratio calculated may convert these exposures to CTDI values that may then be compared to the displayed CTDI for a large range of acquisition parameter combinations. Results: It was found that all scanners tend to have a ratio factor that slightly increases with kVp. Also, Philips scanners appear to have less of a dependence on kVp; whereas, GE scanners have a lower ratio at lower kVp. The use of air exposure times the DLP conversion yielded CTDI values that were less than 10% different from the displayed CTDI on several scanners. Conclusion: This method may be used as a primary method for CT dosimetry QA. As a result of the ease of measurement, a dosimetry metric specific to that scanner may be calculated for a wide variety of CT protocols, which could also be used to monitor display CTDI value accuracy.« less

  8. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  9. Quantum error correction assisted by two-way noisy communication

    PubMed Central

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C. H.

    2014-01-01

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  10. Quantum error correction assisted by two-way noisy communication.

    PubMed

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C H

    2014-11-26

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  11. XDS-I Gateway Development for HIE Connectivity with Legacy PACS at Gil Hospital.

    PubMed

    Simalango, Mikael Fernandus; Kim, Youngchul; Seo, Young Tae; Choi, Young Hwan; Cho, Yong Kyun

    2013-12-01

    The ability to support healthcare document sharing is imperative in a health information exchange (HIE). Sharing imaging documents or images, however, can be challenging, especially when they are stored in a picture archiving and communication system (PACS) archive that does not support document sharing via standard HIE protocols. This research proposes a standard-compliant imaging gateway that enables connectivity between a legacy PACS and the entire HIE. Investigation of the PACS solutions used at Gil Hospital was conducted. An imaging gateway application was then developed using a Java technology stack. Imaging document sharing capability enabled by the gateway was tested by integrating it into Gil Hospital's order communication system and its HIE infrastructure. The gateway can acquire radiology images from a PACS storage system, provide and register the images to Gil Hospital's HIE for document sharing purposes, and make the images retrievable by a cross-enterprise document sharing document viewer. Development of an imaging gateway that mediates communication between a PACS and an HIE can be considered a viable option when the PACS does not support the standard protocol for cross-enterprise document sharing for imaging. Furthermore, the availability of common HIE standards expedites the development and integration of the imaging gateway with an HIE.

  12. XDS-I Gateway Development for HIE Connectivity with Legacy PACS at Gil Hospital

    PubMed Central

    Simalango, Mikael Fernandus; Kim, Youngchul; Seo, Young Tae; Cho, Yong Kyun

    2013-01-01

    Objectives The ability to support healthcare document sharing is imperative in a health information exchange (HIE). Sharing imaging documents or images, however, can be challenging, especially when they are stored in a picture archiving and communication system (PACS) archive that does not support document sharing via standard HIE protocols. This research proposes a standard-compliant imaging gateway that enables connectivity between a legacy PACS and the entire HIE. Methods Investigation of the PACS solutions used at Gil Hospital was conducted. An imaging gateway application was then developed using a Java technology stack. Imaging document sharing capability enabled by the gateway was tested by integrating it into Gil Hospital's order communication system and its HIE infrastructure. Results The gateway can acquire radiology images from a PACS storage system, provide and register the images to Gil Hospital's HIE for document sharing purposes, and make the images retrievable by a cross-enterprise document sharing document viewer. Conclusions Development of an imaging gateway that mediates communication between a PACS and an HIE can be considered a viable option when the PACS does not support the standard protocol for cross-enterprise document sharing for imaging. Furthermore, the availability of common HIE standards expedites the development and integration of the imaging gateway with an HIE. PMID:24523994

  13. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  14. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  15. Threshold Things That Think: Authorisation for Resharing

    NASA Astrophysics Data System (ADS)

    Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart

    As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.

  16. Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.

    PubMed

    Niimi, Yukari; Ota, Katsumasa

    2017-02-01

    Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.

  17. The Wicked Problem of Information Sharing in Homeland Security - A Leadership Perspective

    DTIC Science & Technology

    2014-06-01

    filled environment. One such coping strategy termed emotion work, describes how analysts manage their feelings to display a public face or bodily ...in many aspects of Western culture but 56 Jeff Conklin, Dialogue Mapping : Building Shared...effective, whether modifications should be 60 Conklin, Dialogue Mapping : Building Shared Understanding

  18. Large-Scale Interaction Profiling of Protein Domains Through Proteomic Peptide-Phage Display Using Custom Peptidomes.

    PubMed

    Seo, Moon-Hyeong; Nim, Satra; Jeon, Jouhyun; Kim, Philip M

    2017-01-01

    Protein-protein interactions are essential to cellular functions and signaling pathways. We recently combined bioinformatics and custom oligonucleotide arrays to construct custom-made peptide-phage libraries for screening peptide-protein interactions, an approach we call proteomic peptide-phage display (ProP-PD). In this chapter, we describe protocols for phage display for the identification of natural peptide binders for a given protein. We finally describe deep sequencing for the analysis of the proteomic peptide-phage display.

  19. 12 CFR 740.4 - Requirements for the official sign.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... participates in a shared branch network with other credit unions and accepts share deposits for members of.... No teller in a nonfederally insured credit union may display the official NCUA sign. (d) The Board...

  20. 12 CFR 740.4 - Requirements for the official sign.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... participates in a shared branch network with other credit unions and accepts share deposits for members of.... No teller in a nonfederally insured credit union may display the official NCUA sign. (d) The Board...

  1. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  2. Providing Epistemic Support For Assessments Through Mobile-Supported Sharing Activities1

    PubMed Central

    Raclaw, Joshua; Robles, Jessica S.; DiDomenico, Stephen M.

    2017-01-01

    This paper examines how participants in face-to-face conversation employ mobile phones as a resource for social action. We focus on what we call mobile-supported sharing activities, in which participants use a mobile phone to share text or images with others by voicing text aloud from their mobile or providing others with visual access to the device’s display screen. Drawing from naturalistic video recordings, we focus on how mobile-supported sharing activities invite assessments by providing access to an object that is not locally accessible to the participants. Such practices make relevant co-participants’ assessment of these objects and allow for different forms of co-participation across sequence types. We additionally examine how the organization of assessments during these sharing activities displays sensitivity to preference structure. The analysis illustrates the relevance of embodiment, local objects, and new communicative technologies to the production of action in co-present interaction. Data are in American English. PMID:28936031

  3. Reply to ``Comment II on `Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers' ''

    NASA Astrophysics Data System (ADS)

    Karimipour, V.

    2006-07-01

    In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating.

  4. 21 CFR 1311.140 - Requirements for signing a controlled substance prescription.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... following statement or its substantial equivalent is displayed: “By completing the two-factor authentication... above information to the pharmacy for dispensing. The two-factor authentication protocol may only be... section remain displayed, the practitioner must be prompted to complete the two-factor authentication...

  5. Plug into a Network.

    ERIC Educational Resources Information Center

    Vander Linden, Doug; Clark, Larry

    1994-01-01

    Stand-alone, single-user software programs for classroom use can be prohibitively expensive, compared to information-sharing network systems. Based on a Kansas district's experience, this article explains three types of networks (device-sharing, operating-system-based, and client-server-based) and discusses network protocols, software choices,…

  6. Armenian Virtual Observatory: Services and Data Sharing

    NASA Astrophysics Data System (ADS)

    Knyazyan, A. V.; Astsatryan, H. V.; Mickaelian, A. M.

    2016-06-01

    The main aim of this article is to introduce the data management and services of the Armenian Virtual Observatory (ArVO), which consists of user friendly data management mechanisms, a new and productive cross-correlation service, and data sharing API based on international standards and protocols.

  7. Sharing data for public health research by members of an international online diabetes social network.

    PubMed

    Weitzman, Elissa R; Adida, Ben; Kelemen, Skyler; Mandl, Kenneth D

    2011-04-27

    Surveillance and response to diabetes may be accelerated through engaging online diabetes social networks (SNs) in consented research. We tested the willingness of an online diabetes community to share data for public health research by providing members with a privacy-preserving social networking software application for rapid temporal-geographic surveillance of glycemic control. SN-mediated collection of cross-sectional, member-reported data from an international online diabetes SN entered into a software application we made available in a "Facebook-like" environment to enable reporting, charting and optional sharing of recent hemoglobin A1c values through a geographic display. Self-enrollment by 17% (n = 1,136) of n = 6,500 active members representing 32 countries and 50 US states. Data were current with 83.1% of most recent A1c values reported obtained within the past 90 days. Sharing was high with 81.4% of users permitting data donation to the community display. 34.1% of users also displayed their A1cs on their SN profile page. Users selecting the most permissive sharing options had a lower average A1c (6.8%) than users not sharing with the community (7.1%, p = .038). 95% of users permitted re-contact. Unadjusted aggregate A1c reported by US users closely resembled aggregate 2007-2008 NHANES estimates (respectively, 6.9% and 6.9%, p = 0.85). Success within an early adopter community demonstrates that online SNs may comprise efficient platforms for bidirectional communication with and data acquisition from disease populations. Advancing this model for cohort and translational science and for use as a complementary surveillance approach will require understanding of inherent selection and publication (sharing) biases in the data and a technology model that supports autonomy, anonymity and privacy.

  8. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  9. The effectiveness and cost-effectiveness of shared care: protocol for a realist review.

    PubMed

    Hardwick, Rebecca; Pearson, Mark; Byng, Richard; Anderson, Rob

    2013-02-12

    Shared care (an enhanced information exchange over and above routine outpatient letters) is commonly used to improve care coordination and communication between a specialist and primary care services for people with long-term conditions. Evidence of the effectiveness and cost-effectiveness of shared care is mixed. Informed decision-making for targeting shared care requires a greater understanding of how it works, for whom it works, in what contexts and why. This protocol outlines how realist review methods can be used to synthesise evidence on shared care for long-term conditions.A further aim of the review is to explore economic evaluations of shared care. Economic evaluations are difficult to synthesise due to problems in accounting for contextual differences that impact on resource use and opportunity costs. Realist review methods have been suggested as a way to overcome some of these issues, so this review will also assess whether realist review methods are amenable to synthesising economic evidence. Database and web searching will be carried out in order to find relevant evidence to develop and test programme theories about how shared care works. The review will have two phases. Phase 1 will concentrate on the contextual conditions and mechanisms that influence how shared care works, in order to develop programme theories, which partially explain how it works. Phase 2 will focus on testing these programme theories. A Project Reference Group made up of health service professionals and people with actual experience of long-term conditions will be used to ground the study in real-life experience. Review findings will be disseminated through local and sub-national networks for integrated care and long-term conditions. This realist review will explore why and for whom shared care works, in order to support decision-makers working to improve the effectiveness of care for people outside hospital. The development of realist review methods to take into account cost and cost-effectiveness evidence is particularly innovative and challenging, and if successful will offer a new approach to synthesising economic evidence. This systematic review protocol is registered on the PROSPERO database (registration number: CRD42012002842).

  10. Remote Video Auditing in the Surgical Setting.

    PubMed

    Pedersen, Anne; Getty Ritter, Elizabeth; Beaton, Megan; Gibbons, David

    2017-02-01

    Remote video auditing, a method first adopted by the food preparation industry, was later introduced to the health care industry as a novel approach to improving hand hygiene practices. This strategy yielded tremendous and sustained improvement, causing leaders to consider the potential effects of such technology on the complex surgical environment. This article outlines the implementation of remote video auditing and the first year of activity, outcomes, and measurable successes in a busy surgery department in the eastern United States. A team of anesthesia care providers, surgeons, and OR personnel used low-resolution cameras, large-screen displays, and cell phone alerts to make significant progress in three domains: application of the Universal Protocol for preventing wrong site, wrong procedure, wrong person surgery; efficiency metrics; and cleaning compliance. The use of cameras with real-time auditing and results-sharing created an environment of continuous learning, compliance, and synergy, which has resulted in a safer, cleaner, and more efficient OR. Copyright © 2017 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  11. Optimization of knowledge sharing through multi-forum using cloud computing architecture

    NASA Astrophysics Data System (ADS)

    Madapusi Vasudevan, Sriram; Sankaran, Srivatsan; Muthuswamy, Shanmugasundaram; Ram, N. Sankar

    2011-12-01

    Knowledge sharing is done through various knowledge sharing forums which requires multiple logins through multiple browser instances. Here a single Multi-Forum knowledge sharing concept is introduced which requires only one login session which makes user to connect multiple forums and display the data in a single browser window. Also few optimization techniques are introduced here to speed up the access time using cloud computing architecture.

  12. Achieving consistent color and grayscale presentation on medial color displays

    NASA Astrophysics Data System (ADS)

    Fan, Jiahua; Roehrig, Hans; Dallas, William; Krupinski, Elizabeth A.

    2008-03-01

    Color displays are increasingly used for medical imaging, replacing the traditional monochrome displays in radiology for multi-modality applications, 3D representation applications, etc. Color displays are also used increasingly because of wide spread application of Tele-Medicine, Tele-Dermatology and Digital Pathology. At this time, there is no concerted effort for calibration procedures for this diverse range of color displays in Telemedicine and in other areas of the medical field. Using a colorimeter to measure the display luminance and chrominance properties as well as some processing software we developed a first attempt to a color calibration protocol for the medical imaging field.

  13. Direct Fabrication of a-Si:H Thin Film Transistor Arrays on Plastic and Metal Foils for Flexible Displays

    DTIC Science & Technology

    2008-12-01

    TFTs ) arrays for high information content active matrix flexible displays for Army applications. For all flexible substrates a manufacturable...impermeable flexible substrate systems “display-ready” materials and handling protocols, (ii) high performance TFT devices and circuits fabricated...processes for integration with the flexible TFT arrays. Approaches and solution to address each of these major challenges are described in the

  14. Secure Display of Space-Exploration Images

    NASA Technical Reports Server (NTRS)

    Cheng, Cecilia; Thornhill, Gillian; McAuley, Michael

    2006-01-01

    Java EDR Display Interface (JEDI) is software for either local display or secure Internet distribution, to authorized clients, of image data acquired from cameras aboard spacecraft engaged in exploration of remote planets. ( EDR signifies experimental data record, which, in effect, signifies image data.) Processed at NASA s Multimission Image Processing Laboratory (MIPL), the data can be from either near-realtime processing streams or stored files. JEDI uses the Java Advanced Imaging application program interface, plus input/output packages that are parts of the Video Image Communication and Retrieval software of the MIPL, to display images. JEDI can be run as either a standalone application program or within a Web browser as a servlet with an applet front end. In either operating mode, JEDI communicates using the HTTP(s) protocol(s). In the Web-browser case, the user must provide a password to gain access. For each user and/or image data type, there is a configuration file, called a "personality file," containing parameters that control the layout of the displays and the information to be included in them. Once JEDI has accepted the user s password, it processes the requested EDR (provided that user is authorized to receive the specific EDR) to create a display according to the user s personality file.

  15. 50 CFR 15.23 - Permits for zoological breeding or display programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... education protocol that provides information on educational materials on the ecology and/or conservation... self-sustaining population of the exotic bird species in captivity; (iii) A statement on efforts to... the population from which the exotic bird was or would be removed; (4) Whether the breeding or display...

  16. 50 CFR 15.23 - Permits for zoological breeding or display programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... education protocol that provides information on educational materials on the ecology and/or conservation... self-sustaining population of the exotic bird species in captivity; (iii) A statement on efforts to... the population from which the exotic bird was or would be removed; (4) Whether the breeding or display...

  17. 50 CFR 15.23 - Permits for zoological breeding or display programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... education protocol that provides information on educational materials on the ecology and/or conservation... self-sustaining population of the exotic bird species in captivity; (iii) A statement on efforts to... the population from which the exotic bird was or would be removed; (4) Whether the breeding or display...

  18. Competing Distractors Facilitate Visual Search in Heterogeneous Displays.

    PubMed

    Kong, Garry; Alais, David; Van der Burg, Erik

    2016-01-01

    In the present study, we examine how observers search among complex displays. Participants were asked to search for a big red horizontal line among 119 distractor lines of various sizes, orientations and colours, leading to 36 different feature combinations. To understand how people search in such a heterogeneous display, we evolved the search display by using a genetic algorithm (Experiment 1). The best displays (i.e., displays corresponding to the fastest reaction times) were selected and combined to create new, evolved displays. Search times declined over generations. Results show that items sharing the same colour and orientation as the target disappeared over generations, implying they interfered with search, but items sharing the same colour and were 12.5° different in orientation only interfered if they were also the same size. Furthermore, and inconsistent with most dominant visual search theories, we found that non-red horizontal distractors increased over generations, indicating that these distractors facilitated visual search while participants were searching for a big red horizontally oriented target. In Experiments 2 and 3, we replicated these results using conventional, factorial experiments. Interestingly, in Experiment 4, we found that this facilitation effect was only present when the displays were very heterogeneous. While current models of visual search are able to successfully describe search in homogeneous displays, our results challenge the ability of these models to describe visual search in heterogeneous environments.

  19. Development and Evaluation of an Interactive Mobile Learning Environment with Shared Display Groupware

    ERIC Educational Resources Information Center

    Yang, Jie Chi; Lin, Yi Lung

    2010-01-01

    When using mobile devices in support of learning activities, students gain mobility, but problems arise when group members share information. The small size of the mobile device screen becomes problematic when it is being used by two or more students to share and exchange information. This problem affects interactions among group members. To…

  20. Display, Identity and the Everyday: Self-Presentation through Online Image Sharing

    ERIC Educational Resources Information Center

    Davies, Julia

    2007-01-01

    Drawing on a study of a photo-sharing website (Flickr.com), this paper explores ways in which everyday life is reconfigured through an online photo-sharing space, where traditional boundaries between the public and private spheres are being extended, challenged or eroded. The paper reflects on the presentation and subjects of the images; the…

  1. Melanins and melanogenesis: methods, standards, protocols.

    PubMed

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  3. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  4. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  5. Histologic findings in protocol biopsies performed in stable renal allografts under different immunosuppressive schedules.

    PubMed

    Moreso, F; Alperovich, G; Fulladosa, X; Gil-Vernet, S; Ibernon, M; Carrera, M; Castelao, A M; Hueso, M; Grinyo, J M; Serón, D

    2003-08-01

    Protocol biopsies performed in stable renal allografts show different degrees of acute and chronic lesions. Histologic findings in protocol biopsies have been related to graft outcome. We evaluated histologic lesions observed in protocol biopsies performed in patients under different immunosuppression therapies. From June 1988 a protocol biopsy was performed at approximately 4 months in patients who fulfilled the following criteria: serum creatinine <300 micromol/L; stable renal function; and proteinuria <1 g/d. Histologic lesions were graded according to 1997 Banff criteria. For the present study we considered the following groups according to immunosuppressive schedule: (i) induction therapy with polyclonal or monoclonal antilymphocytic antibodies associated with cyclosporine and prednisone (n=201); (ii) cyclosporine, mycophenolate mofetil, and prednisone (n=127); and (iii) tacrolimus, mycophenolate mofetil, and prednisone (n=51). On protocol biopsy patients treated with tacrolimus displayed a lower acute score (0.61+/-1.01 vs 1.24+/-1.23 in group I, 1.28+/-1.41 in group II; P<.0001) and a higher proportion of normal biopsies (57.1% vs 41.9% in group I, 45.1% in group II; P=.016). A similar proportion of chronic lesions (chronic score of group I: 1.30+/-1.56; group II: 1.34+/-1.80; group III: 1.51+/-0.95; P=NS) was observed in the three groups. Protocol biopsies displayed fewer acute lesions in patients treated with tacrolimus. This result suggests that the efficacy of new immunosuppression schedules can be evaluated using the protocol biopsy as a surrogate marker of graft outcome.

  6. Production and Purification of Recombinant Filamentous Bacteriophages Displaying Immunogenic Heterologous Epitopes.

    PubMed

    Deng, Lei; Linero, Florencia; Saelens, Xavier

    2016-01-01

    Viruslike particles often combine high physical stability with robust immunogenicity. Furthermore, when such particles are based on bacteriophages, they can be produced in high amounts at minimal cost and typically will require only standard biologically contained facilities. We provide protocols for the characterization and purification of recombinant viruslike particles derived from filamentous bacteriophages. As an example, we focus on filamentous Escherichia coli fd phage displaying a conserved influenza A virus epitope that is fused genetically to the N-terminus of the major coat protein of this phage. A step-by-step procedure to obtain a high-titer, pure recombinant phage preparation is provided. We also describe a quality control experiment based on a biological readout of the purified fd phage preparation. These protocols together with the highlighted critical steps may facilitate generic implementation of the provided procedures for the display of other epitopes by recombinant fd phages.

  7. A new display stream compression standard under development in VESA

    NASA Astrophysics Data System (ADS)

    Jacobson, Natan; Thirumalai, Vijayaraghavan; Joshi, Rajan; Goel, James

    2017-09-01

    The Advanced Display Stream Compression (ADSC) codec project is in development in response to a call for technologies from the Video Electronics Standards Association (VESA). This codec targets visually lossless compression of display streams at a high compression rate (typically 6 bits/pixel) for mobile/VR/HDR applications. Functionality of the ADSC codec is described in this paper, and subjective trials results are provided using the ISO 29170-2 testing protocol.

  8. Sagnac secret sharing over telecom fiber networks.

    PubMed

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  9. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  10. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  11. The effect of a new lifetime-cardiovascular-risk display on patients' motivation to participate in shared decision-making.

    PubMed

    Jegan, Nikita Roman A; Kürwitz, Sarah Anna; Kramer, Lena Kathrin; Heinzel-Gutenbrunner, Monika; Adarkwah, Charles Christian; Popert, Uwe; Donner-Banzhoff, Norbert

    2018-06-09

    This study investigated the effects of three different risk displays used in a cardiovascular risk calculator on patients' motivation for shared decision-making (SDM). We compared a newly developed time-to-event (TTE) display with two established absolute risk displays (i.e. emoticons and bar charts). The accessibility, that is, how understandable, helpful, and trustworthy patients found each display, was also investigated. We analysed a sample of 353 patients recruited in general practices. After giving consent, patients were introduced to one of three fictional vignettes with low, medium or high cardiovascular risk. All three risk displays were shown in a randomized order. Patients were asked to rate each display with regard to motivation for SDM and accessibility. Two-factorial repeated measures analyses of variance were conducted to compare the displays and investigate possible interactions with age. Regarding motivation for SDM, the TTE elicited the highest motivation, followed by the emoticons and bar chart (p < .001). The displays had no differential influence on the age groups (p = .445). While the TTE was generally rated more accessible than the emoticons and bar chart (p < .001), the emoticons were only superior to the bar chart in the younger subsample. However, this was only to a small effect (interaction between display and age, p < .01, η 2  = 0.018). Using fictional case vignettes, the novel TTE display was superior regarding motivation for SDM and accessibility when compared to established displays using emoticons and a bar chart. If future research can replicate these results in real-life consultations, the TTE display will be a valuable addition to current risk calculators and decision aids by improving patients' participation.

  12. Immunephenotype of glomerular and interstitial infiltrating cells in protocol renal allograft biopsies and histological diagnosis.

    PubMed

    Moreso, F; Seron, D; O'Valle, F; Ibernon, M; Gomà, M; Hueso, M; Cruzado, J M; Bestard, O; Duarte, V; del Moral, R García; Grinyó, J M

    2007-12-01

    Patients with a protocol renal allograft biopsy simultaneously displaying interstitial fibrosis/tubular atrophy (IF/TA) and subclinical rejection (SCR) have a shortened graft survival than patients with a normal biopsy, or with a biopsy only displaying IF/TA or SCR. The poor outcome of these patients could be related with a more severe inflammation. We evaluate the immunophenotype of infiltrating cells in these diagnostic categories. Nonexhausted paraffin blocks from protocol biopsies done during the first year were stained with anti-CD45, CD3, CD20, CD68 and CD15 monoclonal antibodies. Glomerular and interstitial positive cells were counted. C4d deposition in peritubular capillaries was evaluated. Histological diagnoses were: normal (n = 80), SCR (n = 17), IF/TA (n = 42) and IF/TA + SCR (n = 17). Only interstitial CD20 positive cells were significantly increased in patients displaying IF/TA + SCR; normal (137 +/- 117), SCR (202 +/- 145), IF/TA (208 +/- 151) and IF/TA + SCR (307 +/- 180 cells/mm(2)), p < 0.01. The proportion of biopsies displaying C4d deposition was not different among groups. The upper tertile of CD20 positive interstitial cells was associated with a decreased death-censored graft survival (relative risk: 3.01, 95% confidence interval: 1.23-7.35; p = 0.015). These data suggest that B-cell interstitial infiltrates are associated with histological damage and outcome, but do not distinguish whether these infiltrates were the cause or the consequence of chronic tubulo-interstitial damage.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marrinan, Thomas; Leigh, Jason; Renambot, Luc

    Mixed presence collaboration involves remote collaboration between multiple collocated groups. This paper presents the design and results of a user study that focused on mixed presence collaboration using large-scale tiled display walls. The research was conducted in order to compare data synchronization schemes for multi-user visualization applications. Our study compared three techniques for sharing data between display spaces with varying constraints and affordances. The results provide empirical evidence that using data sharing techniques with continuous synchronization between the sites lead to improved collaboration for a search and analysis task between remotely located groups. We have also identified aspects of synchronizedmore » sessions that result in increased remote collaborator awareness and parallel task coordination. It is believed that this research will lead to better utilization of large-scale tiled display walls for distributed group work.« less

  14. Distributed Visualization Project

    NASA Technical Reports Server (NTRS)

    Craig, Douglas; Conroy, Michael; Kickbusch, Tracey; Mazone, Rebecca

    2016-01-01

    Distributed Visualization allows anyone, anywhere to see any simulation at any time. Development focuses on algorithms, software, data formats, data systems and processes to enable sharing simulation-based information across temporal and spatial boundaries without requiring stakeholders to possess highly-specialized and very expensive display systems. It also introduces abstraction between the native and shared data, which allows teams to share results without giving away proprietary or sensitive data. The initial implementation of this capability is the Distributed Observer Network (DON) version 3.1. DON 3.1 is available for public release in the NASA Software Store (https://software.nasa.gov/software/KSC-13775) and works with version 3.0 of the Model Process Control specification (an XML Simulation Data Representation and Communication Language) to display complex graphical information and associated Meta-Data.

  15. Location-Unbound Color-Shape Binding Representations in Visual Working Memory.

    PubMed

    Saiki, Jun

    2016-02-01

    The mechanism by which nonspatial features, such as color and shape, are bound in visual working memory, and the role of those features' location in their binding, remains unknown. In the current study, I modified a redundancy-gain paradigm to investigate these issues. A set of features was presented in a two-object memory display, followed by a single object probe. Participants judged whether the probe contained any features of the memory display, regardless of its location. Response time distributions revealed feature coactivation only when both features of a single object in the memory display appeared together in the probe, regardless of the response time benefit from the probe and memory objects sharing the same location. This finding suggests that a shared location is necessary in the formation of bound representations but unnecessary in their maintenance. Electroencephalography data showed that amplitude modulations reflecting location-unbound feature coactivation were different from those reflecting the location-sharing benefit, consistent with the behavioral finding that feature-location binding is unnecessary in the maintenance of color-shape binding. © The Author(s) 2015.

  16. GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application

    NASA Technical Reports Server (NTRS)

    McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.

    2010-01-01

    The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.

  17. An adaptive transmission protocol for managing dynamic shared states in collaborative surgical simulation.

    PubMed

    Qin, J; Choi, K S; Ho, Simon S M; Heng, P A

    2008-01-01

    A force prediction algorithm is proposed to facilitate virtual-reality (VR) based collaborative surgical simulation by reducing the effect of network latencies. State regeneration is used to correct the estimated prediction. This algorithm is incorporated into an adaptive transmission protocol in which auxiliary features such as view synchronization and coupling control are equipped to ensure the system consistency. We implemented this protocol using multi-threaded technique on a cluster-based network architecture.

  18. Dutch Protocols for Deliberately Ending the Life of Newborns: A Defence.

    PubMed

    Tedesco, Matthew

    2017-06-01

    The Groningen Protocol, introduced in the Netherlands in 2005 and accompanied by revised guidelines published in a report commissioned by the Royal Dutch Medical Association in 2014, specifies conditions under which the lives of severely ill newborns may be deliberately ended. Its publication came four years after the Netherlands became the first nation to legalize the voluntary active euthanasia of adults, and the Netherlands remains the only country to offer a pathway to protecting physicians who might engage in deliberately ending the life of a newborn (DELN). In this paper, I offer two lines of argument. The first is a positive argument for the Protocol, grounded in the good of the newborn as unanimously determined by those in a position to determine it. The second addresses the widely shared belief that the killing of newborns is morally prohibited, where I offer two arguments-one grounded in the fact that the kinds of cases the Protocol is meant to govern are very rare and highly unusual, and the other focused more broadly on the role of pre-theoretical beliefs in moral reasoning-meant to undermine the strong role that the critic of the Protocol affords this belief. I argue that, given this second line of argument, the beliefs underlying my positive argument for the Protocol are in fact more secure than the widely shared belief underlying the critic's position.

  19. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  20. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  1. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  2. Access and benefit sharing: Best practices for the use and exchange of invertebrate biological control agents

    USDA-ARS?s Scientific Manuscript database

    The Convention on Biological Diversity (CBD) acknowledges the sovereign rights that countries have over their ‘genetic resources’. The Nagoya Protocol that came into force in 2014 provides a framework for implementation of and equitable process by which access to, and sharing of benefits between don...

  3. Share your sweets: Chimpanzee (Pan troglodytes) and bonobo (Pan paniscus) willingness to share highly attractive, monopolizable food sources.

    PubMed

    Byrnit, Jill T; Høgh-Olesen, Henrik; Makransky, Guido

    2015-08-01

    All over the world, humans (Homo sapiens) display resource-sharing behavior, and common patterns of sharing seem to exist across cultures. Humans are not the only primates to share, and observations from the wild have long documented food sharing behavior in our closest phylogenetic relatives, chimpanzees (Pan troglodytes) and bonobos (Pan paniscus). However, few controlled studies have been made in which groups of Pan are introduced to food items that may be shared or monopolized by a first food possessor, and very few studies have examined what happens to these sharing patterns if the food in question is a highly attractive, monopolizable food source. The one study to date to include food quality as the independent variable used different types of food as high- and low-value items, making differences in food divisibility and size potentially confounding factors. It was the aim of the present study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of 2 different degrees of desirability (with or without syrup). Results showed that the large majority of food transfers in both species came about as sharing in which group members were allowed to cofeed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than bonobos. Bonobos, instead, engaged in sexual invitations, which the chimpanzees never did. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  4. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    PubMed

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass. This optimized protocol can accurately identify low lean tissue mass, while still being easily applied at the bedside. © 2017 The Authors. Journal of Cachexia, Sarcopenia and Muscle published by John Wiley & Sons Ltd on behalf of the Society on Sarcopenia, Cachexia and Wasting Disorders.

  5. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass

    PubMed Central

    Paris, Michael T.; Lafleur, Benoit; Dubin, Joel A.

    2017-01-01

    Abstract Background Ultrasound is a non‐invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four‐site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole‐body reference methods. Our primary objectives were to (i) compare the four‐site protocol's ability to predict appendicular lean tissue mass from dual‐energy X‐ray absorptiometry; (ii) optimize the predictability of the four‐site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. Methods This observational cross‐sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole‐body dual‐energy X‐ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine‐site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four‐site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. Results The four‐site protocol was strongly associated (R 2 = 0.72) with appendicular lean tissue mass, but Bland–Altman analysis displayed wide limits of agreement (−5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four‐site protocol, improved the association (R 2 = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (−3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). Conclusions The four‐site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass. This optimized protocol can accurately identify low lean tissue mass, while still being easily applied at the bedside. PMID:28722298

  6. The general theory of three-party quantum secret sharing protocols over phase-damping channels

    NASA Astrophysics Data System (ADS)

    Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying

    2013-10-01

    The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.

  7. Combining Phage and Yeast Cell Surface Antibody Display to Identify Novel Cell Type-Selective Internalizing Human Monoclonal Antibodies.

    PubMed

    Bidlingmaier, Scott; Su, Yang; Liu, Bin

    2015-01-01

    Using phage antibody display, large libraries can be generated and screened to identify monoclonal antibodies with affinity for target antigens. However, while library size and diversity is an advantage of the phage display method, there is limited ability to quantitatively enrich for specific binding properties such as affinity. One way of overcoming this limitation is to combine the scale of phage display selections with the flexibility and quantitativeness of FACS-based yeast surface display selections. In this chapter we describe protocols for generating yeast surface antibody display libraries using phage antibody display selection outputs as starting material and FACS-based enrichment of target antigen-binding clones from these libraries. These methods should be widely applicable for the identification of monoclonal antibodies with specific binding properties.

  8. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  9. Low-cost Cognitive Electronics Technology for Enhanced Communications and Situational Awareness for Networks of Small Unmanned Aerial Vehicles (UAV)

    DTIC Science & Technology

    2013-03-01

    series of checkpoints in a complex route network,” while observing standard traffic etiquette and regulations [17]. The rules for the 2012 RoboCup...structure or protocols above the PHY. To support AVEP operation, we developed a packet structure based on the transmission control protocol (TCP...Control Protocol .” 1981. [37] F. Ge, Q. Chen, Y. Wang, C. W. Bostian, T. W. Rondeau, and B. Le, “Cognitive radio: from spectrum sharing to adaptive

  10. Retrieving and routing quantum information in a quantum network

    NASA Astrophysics Data System (ADS)

    Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.

    2015-12-01

    In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.

  11. Efficient File Sharing by Multicast - P2P Protocol Using Network Coding and Rank Based Peer Selection

    NASA Technical Reports Server (NTRS)

    Stoenescu, Tudor M.; Woo, Simon S.

    2009-01-01

    In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.

  12. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  13. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols†

    PubMed Central

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  14. Stereotypic and complex phrase types provide structural evidence for a multi-message display in humpback whales (Megaptera novaeangliae).

    PubMed

    Murray, Anita; Dunlop, Rebecca A; Noad, Michael J; Goldizen, Anne W

    2018-02-01

    Male humpback whales produce a mating display called "song." Behavioral studies indicate song has inter- and/or intra-sexual functionality, suggesting song may be a multi-message display. Multi-message displays often include stereotypic components that convey group membership for mate attraction and/or male-male interactions, and complex components that convey individual quality for courtship. Humpback whale song contains sounds ("units") arranged into sequences ("phrases"). Repetitions of a specific phrase create a "theme." Within a theme, imperfect phrase repetitions ("phrase variants") create variability among phrases of the same type ("phrase type"). The hypothesis that song contains stereotypic and complex phrase types, structural characteristics consistent with a multi-message display, is investigated using recordings of 17 east Australian males (8:2004, 9:2011). Phrase types are categorized as stereotypic or complex using number of unit types, number of phrase variants, and the proportion of phrases that is unique to an individual versus shared amongst males. Unit types are determined using self-organizing maps. Phrase variants are determined by Levenshtein distances between phrases. Stereotypic phrase types have smaller numbers of unit types and shared phrase variants. Complex phrase types have larger numbers of unit types and unique phrase variants. This study supports the hypothesis that song could be a multi-message display.

  15. Network Time Protocol - Naval Oceanography Portal

    Science.gov Websites

    section Advanced Search... Sections Home Time Earth Orientation Astronomy Meteorology Oceanography Ice You are here: Home › USNO › Precise Time › NTP USNO Logo USNO Navigation Master Clock GPS Display Clocks TWSTT Telephone Time NTP Eastern TZ Mountain TZ DoD Customers Info Network Time Protocol Network

  16. Transitions of care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): a study of protocols in Greater London.

    PubMed

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-06-23

    Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0-70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0-50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services.

  17. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): A study of protocols in Greater London

    PubMed Central

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-01-01

    Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services. PMID:18573214

  18. The expanding cognitive-behavioural therapy treatment umbrella for the anxiety disorders: disorder-specific and transdiagnostic approaches.

    PubMed

    Rector, Neil A; Man, Vincent; Lerman, Bethany

    2014-06-01

    Cognitive-behavioural therapy (CBT) is an empirically supported treatment for anxiety disorders. CBT treatments are based on disorder-specific protocols that have been developed to target individual anxiety disorders, despite that anxiety disorders frequently co-occur and are comorbid with depression. Given the high rates of diagnostic comorbidity, substantial overlap in dimensional symptom ratings, and extensive evidence that the mood and anxiety disorders share a common set of psychological and biological vulnerabilities, transdiagnostic CBT protocols have recently been developed to treat the commonalities among the mood and anxiety disorders. We conducted a selective review of empirical developments in the transdiagnostic CBT treatment of anxiety and depression (2008-2013). Preliminary evidence suggests that theoretically based transdiagnostic CBT approaches lead to large treatment effects on the primary anxiety disorder, considerable reduction of diagnostic comorbidity, and some preliminary effects regarding the impact on the putative, shared psychological mechanisms. However, the empirical literature remains tentative owing to relatively small samples, limited direct comparisons with disorder-specific CBT protocols, and the relative absence of the study of disorder-specific compared with shared mechanisms of action in treatment. We conclude with a treatment conceptualization of the new transdiagnostic interventions as complementary, rather than contradictory, to disorder-specific CBT.

  19. Sharing Leadership Responsibilities Results in Achievement Gains

    ERIC Educational Resources Information Center

    Armistead, Lew

    2010-01-01

    Collective, not individual, leadership in schools has a greater impact on student achievement; when principals and teachers share leadership responsibilities, student achievement is higher; and schools having high student achievement also display a vision for student achievement and teacher growth. Those are just a few of the insights into school…

  20. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  1. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    PubMed

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  2. Scalable Adaptive Graphics Environment (SAGE) Software for the Visualization of Large Data Sets on a Video Wall

    NASA Technical Reports Server (NTRS)

    Jedlovec, Gary; Srikishen, Jayanthi; Edwards, Rita; Cross, David; Welch, Jon; Smith, Matt

    2013-01-01

    The use of collaborative scientific visualization systems for the analysis, visualization, and sharing of "big data" available from new high resolution remote sensing satellite sensors or four-dimensional numerical model simulations is propelling the wider adoption of ultra-resolution tiled display walls interconnected by high speed networks. These systems require a globally connected and well-integrated operating environment that provides persistent visualization and collaboration services. This abstract and subsequent presentation describes a new collaborative visualization system installed for NASA's Shortterm Prediction Research and Transition (SPoRT) program at Marshall Space Flight Center and its use for Earth science applications. The system consists of a 3 x 4 array of 1920 x 1080 pixel thin bezel video monitors mounted on a wall in a scientific collaboration lab. The monitors are physically and virtually integrated into a 14' x 7' for video display. The display of scientific data on the video wall is controlled by a single Alienware Aurora PC with a 2nd Generation Intel Core 4.1 GHz processor, 32 GB memory, and an AMD Fire Pro W600 video card with 6 mini display port connections. Six mini display-to-dual DVI cables are used to connect the 12 individual video monitors. The open source Scalable Adaptive Graphics Environment (SAGE) windowing and media control framework, running on top of the Ubuntu 12 Linux operating system, allows several users to simultaneously control the display and storage of high resolution still and moving graphics in a variety of formats, on tiled display walls of any size. The Ubuntu operating system supports the open source Scalable Adaptive Graphics Environment (SAGE) software which provides a common environment, or framework, enabling its users to access, display and share a variety of data-intensive information. This information can be digital-cinema animations, high-resolution images, high-definition video-teleconferences, presentation slides, documents, spreadsheets or laptop screens. SAGE is cross-platform, community-driven, open-source visualization and collaboration middleware that utilizes shared national and international cyberinfrastructure for the advancement of scientific research and education.

  3. Scalable Adaptive Graphics Environment (SAGE) Software for the Visualization of Large Data Sets on a Video Wall

    NASA Astrophysics Data System (ADS)

    Jedlovec, G.; Srikishen, J.; Edwards, R.; Cross, D.; Welch, J. D.; Smith, M. R.

    2013-12-01

    The use of collaborative scientific visualization systems for the analysis, visualization, and sharing of 'big data' available from new high resolution remote sensing satellite sensors or four-dimensional numerical model simulations is propelling the wider adoption of ultra-resolution tiled display walls interconnected by high speed networks. These systems require a globally connected and well-integrated operating environment that provides persistent visualization and collaboration services. This abstract and subsequent presentation describes a new collaborative visualization system installed for NASA's Short-term Prediction Research and Transition (SPoRT) program at Marshall Space Flight Center and its use for Earth science applications. The system consists of a 3 x 4 array of 1920 x 1080 pixel thin bezel video monitors mounted on a wall in a scientific collaboration lab. The monitors are physically and virtually integrated into a 14' x 7' for video display. The display of scientific data on the video wall is controlled by a single Alienware Aurora PC with a 2nd Generation Intel Core 4.1 GHz processor, 32 GB memory, and an AMD Fire Pro W600 video card with 6 mini display port connections. Six mini display-to-dual DVI cables are used to connect the 12 individual video monitors. The open source Scalable Adaptive Graphics Environment (SAGE) windowing and media control framework, running on top of the Ubuntu 12 Linux operating system, allows several users to simultaneously control the display and storage of high resolution still and moving graphics in a variety of formats, on tiled display walls of any size. The Ubuntu operating system supports the open source Scalable Adaptive Graphics Environment (SAGE) software which provides a common environment, or framework, enabling its users to access, display and share a variety of data-intensive information. This information can be digital-cinema animations, high-resolution images, high-definition video-teleconferences, presentation slides, documents, spreadsheets or laptop screens. SAGE is cross-platform, community-driven, open-source visualization and collaboration middleware that utilizes shared national and international cyberinfrastructure for the advancement of scientific research and education.

  4. 77 FR 31055 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ... order is no longer converted to a Non-Displayed Order, but rather is displayed at the most aggressive... cases, a member will submit a Price to Comply Order at an aggressive price that it anticipates will be... typically submit additional aggressive orders, which likewise are not executed. Because the OUCH protocol is...

  5. Threshold quantum cryptography

    NASA Astrophysics Data System (ADS)

    Tokunaga, Yuuki; Okamoto, Tatsuaki; Imoto, Nobuyuki

    2005-01-01

    We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to compute a quantum cryptographic function, while keeping each share secretly inside each party. The shared secrets are reusable if no cheating is detected. As a concrete example of this concept, we show a distributed protocol (with threshold) of conjugate coding.

  6. Virtual memory support for distributed computing environments using a shared data object model

    NASA Astrophysics Data System (ADS)

    Huang, F.; Bacon, J.; Mapp, G.

    1995-12-01

    Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.

  7. Using GBrowse 2.0 to visualize and share next-generation sequence data

    PubMed Central

    2013-01-01

    GBrowse is a mature web-based genome browser that is suitable for deployment on both public and private web sites. It supports most of genome browser features, including qualitative and quantitative (wiggle) tracks, track uploading, track sharing, interactive track configuration, semantic zooming and limited smooth track panning. As of version 2.0, GBrowse supports next-generation sequencing (NGS) data by providing for the direct display of SAM and BAM sequence alignment files. SAM/BAM tracks provide semantic zooming and support both local and remote data sources. This article provides step-by-step instructions for configuring GBrowse to display NGS data. PMID:23376193

  8. Do anorectic men share personality traits with opiate dependent men? A case-control study.

    PubMed

    Abbate-Daga, Giovanni; Amianto, Federico; Rogna, Lorenzo; Fassino, Secondo

    2007-01-01

    Eating disorders (ED) and substance use disorders (SUD) display clinical and psychodynamic analogies. The co-diagnosis of a substance use disorder in male ED patients is frequent. Nevertheless, knowledge about the mutual predisposing factors or personality analogies is currently scarce and hypotheses are controversial. The Temperament and Character Inventory (TCI) was used to assess 21 anorectic men, 79 heroin-dependent men, and 75 control men matched for age and education. Anorectic and opiate-addicted patients displayed higher Harm Avoidance and lower Self-directedness and Cooperativeness. Anorectic men displayed lower Reward Dependence and higher Persistence. Opiate addicts had higher Novelty Seeking and Self-transcendence. Anorectic and heroine-dependent subjects share personality traits related to anxiety, fearfulness and antisocial features. Nevertheless, the personality profile does not completely overlap and this could influence the choice of the "substance" of abuse and the related clinical differences between anorexia and heroin dependence.

  9. The Stranger effect: the rejection of affective deviants.

    PubMed

    Szczurek, Lauren; Monin, Benoît; Gross, James J

    2012-10-01

    What happens when affective displays deviate from normative expectations? In this study, participants evaluated target individuals displaying flat, incongruent, or congruent expressions seemingly in response to pictures eliciting positive, neutral, or negative affect. Relative to targets who displayed normative reactions, those who violated affective norms (affective deviants) were rated more negatively on various dimensions of social judgment. Participants also preferred greater social distance from affective deviants, reported more moral outrage in response to them, and inferred that these targets did not share their moral values. Incongruent affect resulted in more negative social judgment than did flat affect, and this relationship was moderated by stimulus valence. Finally, the relationship between targets' affective expressions and participants' avoidant intentions was mediated by the extent to which participants thought the targets shared their moral values. These findings demonstrate the interpersonal costs of affective deviance, revealing the pervasiveness and force of affective norms.

  10. Communicating shared knowledge in infancy.

    PubMed

    Egyed, Katalin; Király, Ildikó; Gergely, György

    2013-07-01

    Object-directed emotion expressions provide two types of information: They can convey the expressers' person-specific subjective disposition toward objects, or they can be used communicatively as referential symbolic devices to convey culturally shared valence-related knowledge about referents that can be generalized to other individuals. By presenting object-directed emotion expressions in communicative versus noncommunicative contexts, we demonstrated that 18-month-olds can flexibly assign either a person-centered interpretation or an object-centered interpretation to referential emotion displays. When addressed by ostensive signals of communication, infants generalized their object-centered interpretation of the emotion display to other individuals as well, whereas in the noncommunicative emotion-expression context, they attributed to the emoting agent a person-specific subjective dispositional attitude without generalizing this attribution as relevant to other individuals. The findings indicate that, as proposed by natural pedagogy theory, infants are prepared to learn shared cultural knowledge from nonverbal communicative demonstrations addressed to them at a remarkably early age.

  11. Selection dynamic of Escherichia coli host in M13 combinatorial peptide phage display libraries.

    PubMed

    Zanconato, Stefano; Minervini, Giovanni; Poli, Irene; De Lucrezia, Davide

    2011-01-01

    Phage display relies on an iterative cycle of selection and amplification of random combinatorial libraries to enrich the initial population of those peptides that satisfy a priori chosen criteria. The effectiveness of any phage display protocol depends directly on library amino acid sequence diversity and the strength of the selection procedure. In this study we monitored the dynamics of the selective pressure exerted by the host organism on a random peptide library in the absence of any additional selection pressure. The results indicate that sequence censorship exerted by Escherichia coli dramatically reduces library diversity and can significantly impair phage display effectiveness.

  12. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    PubMed Central

    2009-01-01

    Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS) for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development), a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH) protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community. PMID:19941647

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon

    Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.

  14. Quantitative assessment of interactions between hospitalized patients and portable medical equipment and other fomites.

    PubMed

    Suwantarat, Nuntra; Supple, Laura A; Cadnum, Jennifer L; Sankar, Thriveen; Donskey, Curtis J

    2017-11-01

    In an observational study, we demonstrated that hospitalized patients frequently had direct or indirect interactions with medical equipment and other fomites that are shared among patients, and these items were often contaminated with health care-associated pathogens. There is a need for protocols to ensure routine cleaning of shared portable equipment. Published by Elsevier Inc.

  15. Adapted Shared Storybook Reading: A Study of Its Application for Children with Autism Spectrum Disorders in Home Settings

    ERIC Educational Resources Information Center

    Golloher, Andrea N.

    2018-01-01

    This study investigated the use of an adapted shared reading protocol with three children with autism spectrum disorders (ASD) in home settings. Using a multiple baseline across participants design, this investigation replicated and extended a previous investigation by Browder et al. to children with ASD and home settings. In addition, this study…

  16. Exploratory visualization of astronomical data on ultra-high-resolution wall displays

    NASA Astrophysics Data System (ADS)

    Pietriga, Emmanuel; del Campo, Fernando; Ibsen, Amanda; Primet, Romain; Appert, Caroline; Chapuis, Olivier; Hempel, Maren; Muñoz, Roberto; Eyheramendy, Susana; Jordan, Andres; Dole, Hervé

    2016-07-01

    Ultra-high-resolution wall displays feature a very high pixel density over a large physical surface, which makes them well-suited to the collaborative, exploratory visualization of large datasets. We introduce FITS-OW, an application designed for such wall displays, that enables astronomers to navigate in large collections of FITS images, query astronomical databases, and display detailed, complementary data and documents about multiple sources simultaneously. We describe how astronomers interact with their data using both the wall's touchsensitive surface and handheld devices. We also report on the technical challenges we addressed in terms of distributed graphics rendering and data sharing over the computer clusters that drive wall displays.

  17. California Institute for Water Resources - California Institute for Water

    Science.gov Websites

    Information Nitrogen Management Rosenberg Forum Follow us on Twitter Join Email List 174446display Resources Publications Keep in Touch QUICK LINKS Our Blog: The Confluence Drought & Water Information Nitrogen Management Rosenberg Forum Follow us on Twitter Join Email List 174446display Share Print Site Map

  18. Relations between emotions, display rules, social motives, and facial behaviour.

    PubMed

    Zaalberg, Ruud; Manstead, Antony; Fischer, Agneta

    2004-02-01

    We report research on the relations between emotions, display rules, social motives, and facial behaviour. In Study 1 we used a questionnaire methodology to examine how respondents would react to a funny or a not funny joke told to them by a close friend or a stranger. We assessed display rules and motivations for smiling and/or laughing. Display rules and social motives (partly) mediated the relationship between the experimental manipulations and self-reported facial behaviour. Study 2 was a laboratory experiment in which funny or not funny jokes were told to participants by a male or female stranger. Consistent with hypotheses, hearing a funny joke evoked a stronger motivation to share positive affect by showing longer Duchenne smiling. Contrary to hypotheses, a not funny joke did not elicit greater prosocial motivation by showing longer "polite" smiling, although such a smiling pattern did occur. Rated funniness of the joke and the motivation to share positive affect mediated the relationship between the joke manipulation and facial behaviour. Path analysis was used to explore this mediating process in greater detail.

  19. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  20. Antibody VH and VL recombination using phage and ribosome display technologies reveals distinct structural routes to affinity improvements with VH-VL interface residues providing important structural diversity

    PubMed Central

    Groves, Maria AT; Amanuel, Lily; Campbell, Jamie I; Rees, D Gareth; Sridharan, Sudharsan; Finch, Donna K; Lowe, David C; Vaughan, Tristan J

    2014-01-01

    In vitro selection technologies are an important means of affinity maturing antibodies to generate the optimal therapeutic profile for a particular disease target. Here, we describe the isolation of a parent antibody, KENB061 using phage display and solution phase selections with soluble biotinylated human IL-1R1. KENB061 was affinity matured using phage display and targeted mutagenesis of VH and VL CDR3 using NNS randomization. Affinity matured VHCDR3 and VLCDR3 library blocks were recombined and selected using phage and ribosome display protocol. A direct comparison of the phage and ribosome display antibodies generated was made to determine their functional characteristics. PMID:24256948

  1. A Graphical User Interface for the Low Cost Combat Direction System

    DTIC Science & Technology

    1991-09-16

    the same tasks. These shipboard tasks, which include contact management , moving geometry calculations, intelligence compila- tion, area plotting and...Display Defaults Analysis This category covers a wide range of required data input and system configuration issues. To keep the screen display manageable ...parts or dialog boxes. The implementation of an Ada application using STARS is quite straightforward, although knowlede of X Protocol primitives is

  2. Rethinking Traffic Management: Design of Optimizable Networks

    DTIC Science & Technology

    2008-06-01

    Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated

  3. ORFeome Phage Display.

    PubMed

    Zantow, Jonas; Moreira, Gustavo Marçal Schmidt Garcia; Dübel, Stefan; Hust, Michael

    2018-01-01

    ORFeome phage display allows the efficient functional screening of entire proteomes or even metaproteomes to identify immunogenic proteins. For this purpose, randomly fragmented, whole genomes or metagenomes are cloned into a phage-display vector allowing positive selection for open reading frames (ORF) to improve the library quality. These libraries display all possible proteins encoded by a pathogen or a microbiome on the phage surface. Consequently, immunogenic proteins can be selected from these libraries using disease-related immunoglobulins from patient serum. ORFeome phage display in particular allows the identification of immunogenic proteins that are only expressed in the host-pathogen interaction but not in cultivation, as well as the detection of very low expressed and very small immunogens and immunogenic proteins of non-cultivable organisms. The identified immunogenic proteins are potential biomarkers for the development of diagnostic assays or vaccines. These articles will give an introduction to ORFeome phage-display technology and give detailed protocols to identify immunogenic proteins by phage display.

  4. Clinical Preceptors' Perceptions of Empathy: The Empathy in Osteopathic Training and Education (EMOTE) Study.

    PubMed

    Davis, Glenn Elbert; Hartwig, Walter Carl; McTighe, Adam J

    2017-08-01

    Physician empathy influences rapport with patients and improves outcomes, but it is not well understood as an outcome of osteopathic medical education. To determine how clerkship preceptors at Touro University College of Osteopathic Medicine-CA (TUCOM) in Vallejo define empathy and how they compare observed empathetic behavior of TUCOM students with that of other medical students. Cross-sectional data were obtained from a survey of TUCOM clinical preceptors comparing TUCOM students with other medical students on 10 behaviors. Results were analyzed with a 2-tailed z test of proportional difference at the 95% confidence level. Of 650 preceptors contacted, 177 responded and were included in the final analysis (27%). Survey item reliability was high (Cronbach α=0.96). A majority of preceptors (59% to 71%) considered TUCOM students "similar" to other medical students for each behavior. A majority of preceptors (107 [60%]) shared a definition of empathy with one another and with the National Board of Osteopathic Medical Examiners and the American Association of Colleges of Osteopathic Medicine. Approximately 39% of preceptors rated TUCOM students "better" or "advanced" for "displays of empathy" compared with approximately 30% of preceptors who rated students as better or advanced across all 10 behaviors. Preceptors who shared a definition of empathy rated TUCOM students as better or advanced at a significantly higher rate for "displays of empathy" (z=1.982, P<.05) compared with preceptors who did not share a definition (n=70). Osteopathic preceptors (n=67) rated TUCOM students significantly higher on "displays of empathy" (z=2.82, P<.05) and "clear and effective communication to patients, families and co-workers" (z=2.83, P<.01) than did allopathic preceptors. No significant differences were found based on number of years as a preceptor or on the combination of types of students the preceptor taught. Most clinical preceptors shared a definition of empathy, and they were able to observe and rate displays of it in clerkship students. Preceptors rated TUCOM students more favorably than other students they taught for displays of empathy.

  5. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  6. Broken symmetry in a two-qubit quantum control landscape

    NASA Astrophysics Data System (ADS)

    Bukov, Marin; Day, Alexandre G. R.; Weinberg, Phillip; Polkovnikov, Anatoli; Mehta, Pankaj; Sels, Dries

    2018-05-01

    We analyze the physics of optimal protocols to prepare a target state with high fidelity in a symmetrically coupled two-qubit system. By varying the protocol duration, we find a discontinuous phase transition, which is characterized by a spontaneous breaking of a Z2 symmetry in the functional form of the optimal protocol, and occurs below the quantum speed limit. We study in detail this phase and demonstrate that even though high-fidelity protocols come degenerate with respect to their fidelity, they lead to final states of different entanglement entropy shared between the qubits. Consequently, while globally both optimal protocols are equally far away from the target state, one is locally closer than the other. An approximate variational mean-field theory which captures the physics of the different phases is developed.

  7. Virtual observatory tools and amateur radio observations supporting scientific analysis of Jupiter radio emissions

    NASA Astrophysics Data System (ADS)

    Cecconi, Baptiste; Hess, Sebastien; Le Sidaner, Pierre; Savalle, Renaud; Stéphane, Erard; Coffre, Andrée; Thétas, Emmanuel; André, Nicolas; Génot, Vincent; Thieman, Jim; Typinski, Dave; Sky, Jim; Higgins, Chuck; Imai, Masafumi

    2016-04-01

    In the frame of the preparation of the NASA/JUNO and ESA/JUICE (Jupiter Icy Moon Explorer) missions, and the development of a planetary sciences virtual observatory (VO), we are proposing a new set of tools directed to data providers as well as users, in order to ease data sharing and discovery. We will focus on ground based planetary radio observations (thus mainly Jupiter radio emissions), trying for instance to enhance the temporal coverage of jovian decametric emission. The data service we will be using is EPN-TAP, a planetary science data access protocol developed by Europlanet-VESPA (Virtual European Solar and Planetary Access). This protocol is derived from IVOA (International Virtual Observatory Alliance) standards. The Jupiter Routine Observations from the Nancay Decameter Array are already shared on the planetary science VO using this protocol, as well as data from the Iitate Low Frquency Radio Antenna, in Japan. Amateur radio data from the RadioJOVE project is also available. The attached figure shows data from those three providers. We will first introduce the VO tools and concepts of interest for the planetary radioastronomy community. We will then present the various data formats now used for such data services, as well as their associated metadata. We will finally show various prototypical tools that make use of this shared datasets.

  8. Catching fire and spreading it: A glimpse into displayed entrepreneurial passion in crowdfunding campaigns.

    PubMed

    Li, Junchao Jason; Chen, Xiao-Ping; Kotha, Suresh; Fisher, Greg

    2017-07-01

    Crowdfunding is an emerging phenomenon that enables entrepreneurs to solicit financial contributions for new projects from mass audiences. Drawing on the elaboration likelihood model of persuasion and emotional contagion theory, the authors examined the importance of displayed entrepreneurial passion when seeking resources in a crowdfunding context. They proposed that entrepreneurs' displayed passion in the introductory video for a crowdfunding project increases viewers' experienced enthusiasm about the project (i.e., passion contagion), which then prompts them to contribute financially and to share campaign information via social-media channels. Such sharing further facilitates campaign success. In addition, the authors proposed that perceived project innovativeness strengthens the positive effect of displayed passion on social-media exposure and the funding amount a project garners. They first tested their hypotheses in 2 studies using a combination of survey and archival data from the world's 2 most popular crowdfunding platforms: Indiegogo (Study 1) and Kickstarter (Study 2). They then conducted an experiment (Study 3) to validate the proposed passion contagion process, and the effect of displayed entrepreneurial passion at the individual level. Findings from these 3 studies significantly supported their hypotheses. The authors discuss the theoretical and practical implications of their findings. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Approaching a Sacred Song: Toward a Respectful Presentation of the Discourse we Study

    ERIC Educational Resources Information Center

    Palmer, Andie Diane

    2007-01-01

    Educators who focus on American Indian or First Nations languages often have the privilege of bringing tape recordings of songs and stories to their students in the classroom. Learning the protocols for such sharing of the treasured gifts of ancestors is made easier by the good examples of teachers in and out of the classroom, who share such gifts…

  10. Rating Parent-Child Interactions: Joint Engagement, Communication Dynamics, and Shared Topics in Autism, Down Syndrome, and Typical Development

    ERIC Educational Resources Information Center

    Adamson, Lauren B.; Bakeman, Roger; Deckner, Deborah F.; Nelson, P. Brooke

    2012-01-01

    A battery of 17 rating items were applied to video records of typically-developing toddlers and young children with autism and Down syndrome interacting with their parents during the Communication Play Protocol. This battery provided a reliable and broad view of the joint engagement triad of child, partner, and shared topic. Ratings of the child's…

  11. Enhancing FBI Terrorism and Homeland Security Information Sharing With State, Local and Tribal Agencies

    DTIC Science & Technology

    2010-09-01

    the proposed NSI implementation (PM-ISE, 2008). The ISE reported, in October 2009, that the Los Angeles Police Department ( LAPD ) ISE...position of the Department of Defense or the U.S. Government. IRB Protocol number ________________. 12a. DISTRIBUTION / AVAILABILITY STATEMENT...critical, priority issue for all levels of government. The consensus of all three categories of literature was that government information sharing

  12. High-performing trauma teams: frequency of behavioral markers of a shared mental model displayed by team leaders and quality of medical performance.

    PubMed

    Johnsen, Bjørn Helge; Westli, Heidi Kristina; Espevik, Roar; Wisborg, Torben; Brattebø, Guttorm

    2017-11-10

    High quality team leadership is important for the outcome of medical emergencies. However, the behavioral marker of leadership are not well defined. The present study investigated frequency of behavioral markers of shared mental models (SMM) on quality of medical management. Training video recordings of 27 trauma teams simulating emergencies were analyzed according to team -leader's frequency of shared mental model behavioral markers. The results showed a positive correlation of quality of medical management with leaders sharing information without an explicit demand for the information ("push" of information) and with leaders communicating their situational awareness (SA) and demonstrating implicit supporting behavior. When separating the sample into higher versus lower performing teams, the higher performing teams had leaders who displayed a greater frequency of "push" of information and communication of SA and supportive behavior. No difference was found for the behavioral marker of team initiative, measured as bringing up suggestions to other teammembers. The results of this study emphasize the team leader's role in initiating and updating a team's shared mental model. Team leaders should also set expectations for acceptable interaction patterns (e.g., promoting information exchange) and create a team climate that encourages behaviors, such as mutual performance monitoring, backup behavior, and adaptability to enhance SMM.

  13. Cryptanalysis on a scheme to share information via employing a discrete algorithm to quantum states

    NASA Astrophysics Data System (ADS)

    Amellal, H.; Meslouhi, A.; El Baz, M.; Hassouni, Y.; El Allati, A.

    2017-03-01

    Recently, Yang and Hwang [Int. J. Theor. Phys. 53, 224 (2014)] demonstrated that the scheme to share information via employing discrete algorithm to quantum states presented by Kang and Fang [Commun. Theor. Phys. 55, 239 (2011)] suffers from a major vulnerability allowing an eavesdropper to perform a measurement and resend attack. By introducing an additional checking state framework, the authors have proposed an improved protocol to overcome this weakness. This work calls into question the invoked vulnerability in order to clarify a misinterpretation in the same protocol stages also introduce a possible leakage information strategy, known as a faked state attack, despite the proposed improvement, which means that the same security problem may persist. Finally, an upgrading technic was introduced in order to enhance the security transmission.

  14. Semi-counterfactual cryptography

    NASA Astrophysics Data System (ADS)

    Akshata Shenoy, H.; Srikanth, R.; Srinivas, T.

    2013-09-01

    In counterfactual quantum key distribution (QKD), two remote parties can securely share random polarization-encoded bits through the blocking rather than the transmission of particles. We propose a semi-counterfactual QKD, i.e., one where the secret bit is shared, and also encoded, based on the blocking or non-blocking of a particle. The scheme is thus semi-counterfactual and not based on polarization encoding. As with other counterfactual schemes and the Goldenberg-Vaidman protocol, but unlike BB84, the encoding states are orthogonal and security arises ultimately from single-particle non-locality. Unlike any of them, however, the secret bit generated is maximally indeterminate until the joint action of Alice and Bob. We prove the general security of the protocol, and study the most general photon-number-preserving incoherent attack in detail.

  15. Integrating biodiversity management and indigenous biopiracy protection to promote environmental justice and global health.

    PubMed

    Mackey, Tim K; Liang, Bryan A

    2012-06-01

    Many potentially useful medicines arise from developing countries' biodiverse environments and indigenous knowledge. However, global intellectual property rules have resulted in biopiracy, raising serious ethical concerns of environmental justice, exploitation, and health disparities in these populations. Furthermore, state-based approaches have not led to adequate biodiversity protection, management, or resource sharing, which affect access to lifesaving drugs. In response, country delegates adopted the Nagoya Protocol, which aims at promoting biodiversity management, combating biopiracy, and encouraging equitable benefits sharing with indigenous communities. However, the effectiveness of this framework in meeting these objectives remains in question. To address these challenges, we propose a policy building on the Nagoya Protocol that employs a World Health Organization-World Trade Organization Joint Committee on Bioprospecting and Biopiracy.

  16. A Mobile Phone App to Support Young People in Making Shared Decisions in Therapy (Power Up): Study Protocol.

    PubMed

    Chapman, Louise; Edbrooke-Childs, Julian; Martin, Kate; Webber, Helen; Craven, Michael P; Hollis, Chris; Deighton, Jessica; Law, Roslyn; Fonagy, Peter; Wolpert, Miranda

    2017-10-30

    Evidence suggests that young people want to be active participants in their care and involved in decisions about their treatment. However, there is a lack of digital shared decision-making tools available to support young people in child and adolescent mental health services (CAMHS). The primary aim of this paper is to present the protocol of a feasibility trial for Power Up, a mobile phone app to empower young people in CAMHS to make their voices heard and participate in decisions around their care. In the development phase, 30 young people, parents, and clinicians will take part in interviews and focus groups to elicit opinions on an early version of the app. In the feasibility testing phase, 60 young people from across 7 to 10 London CAMHS sites will take part in a trial looking at the feasibility and acceptability of measuring the impact of Power Up on shared decision making. Data collection for the development phase ended in December 2016. Data collection for the feasibility testing phase will end in December 2017. Findings will inform the planning of a cluster controlled trial and contribute to the development and implementation of a shared decision-making app to be integrated into CAMHS. ISRCTN77194423; http://www.isrctn.com/ISRCTN77194423 (Archived by WebCite at http://www.webcitation.org/6td6MINP0). ClinicalTrials.gov NCT02987608; https://clinicaltrials.gov/ct2/show/NCT02987608 (Archived by WebCite at http://www.webcitation.org/6td6PNBZM). ©Louise Chapman, Julian Edbrooke-Childs, Kate Martin, Helen Webber, Michael P Craven, Chris Hollis, Jessica Deighton, Roslyn Law, Peter Fonagy, Miranda Wolpert. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 30.10.2017.

  17. Systematic Assessment of the Impact of User Roles on Network Flow Patterns

    DTIC Science & Technology

    2017-09-01

    Protocol SNMP Simple Network Management Protocol SQL Structured Query Language SSH Secure Shell SYN TCP Sync Flag SVDD Support Vector Data Description SVM...and evaluating users based on roles provide the best approach for defining normal digital behaviors? People are individuals, with different interests...activities on the network. We evaluate the assumption that users sharing similar roles exhibit similar network behaviors, and contrast the level of similarity

  18. Consistency and Change in Participatory Action Research: Reflections on a Focus Group Study about How Farmers Learn

    ERIC Educational Resources Information Center

    Piercy, Fred P.; Franz, Nancy; Donaldson, Joseph L.; Richard, Robert F.

    2011-01-01

    The purpose of this paper is to reflect on our efforts to balance consistency in our multi-year participatory action research study with the need to adapt our research protocol to what we are learning along the way. While both are important, we share several examples of how our flexibility and openness to adapt our protocol to our research…

  19. Multimedia-Based Integration of Cross-Layer Techniques

    DTIC Science & Technology

    2014-06-01

    wireless networks play a critical role in net-centric warfare, including the sharing of the time-sensitive battlefield information among military nodes for...layer protocols are key enablers in effectively deploying the military wireless network. This report discusses the design of cross-layer protocols...2 1.0 INTRODUCTION 1.1 Motivation The Air Force (AF) Wireless Networks (also denoted as military networks in this report) must be capable of

  20. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  1. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    PubMed Central

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT, administrative staff, and hospital management. Some of the IT solutions presented in this paper are novel and currently unique to our institution. PACS number: 87.57.Q PMID:26103176

  2. Plants, Pollution and Public Engagement with Atmospheric Chemistry: Sharing the TEMPO Story Through Ozone Garden Activities

    NASA Astrophysics Data System (ADS)

    Reilly, L. G.; Pippin, M. R.; Malick, E.; Summers, D.; Dussault, M. E.; Wright, E. A.; Skelly, J.

    2016-12-01

    What do a snap-bean plant and a future NASA satellite instrument named TEMPO have in common? They are both indicators of the quality of the air we breathe. Scientists, educators, and museum and student collaborators of the Tropospheric Emissions: Monitoring Pollution (TEMPO) instrument team are developing a program model to engage learners of all ages via public ozone garden exhibits and associated activities. TEMPO, an ultraviolet and visible spectroscopy instrument due for launch on a geostationary host satellite between 2019 and 2021, will scan North America hourly to measure the major elements in the tropospheric ozone chemistry cycle, providing near real-time data with high temporal and spatial resolution. The TEMPO mission provides a unique opportunity to share the story of the effects of air quality on living organisms. A public ozone garden exhibit affords an accessible way to understand atmospheric science through a connection with nature, while providing a visual representation of the impact of ozone pollution on living organisms. A prototype ozone garden exhibit was established at the Virginia Living Museum in partnership with NASA Langley, and has served as a site to formatively evaluate garden planting and exhibit display protocols, hands-on interpretive activities, and citizen science data collection protocols for learners as young as 3 to 10 as well as older adults. The fun and engaging activities, optimized for adult-child interaction in informal or free-choice learning environments, are aimed at developing foundational science skills such as observing, comparing, classifying, and collecting and making sense of data in the context of thinking about air quality - all NGSS-emphasized scientific practices, as well as key capabilities for future contributing members of the citizen science community. As the launch of TEMPO approaches, a major public engagement effort will include disseminating this ozone garden exhibit and program model to a network of museums and public gardens across the country, so that learners nationwide participate in a hands-on way and develop the citizen science skills to be able to contribute quantitative and qualitative data on local air-quality impact back to the overall science community.

  3. High End Computer Network Testbedding at NASA Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Gary, James Patrick

    1998-01-01

    The Earth & Space Data Computing (ESDC) Division, at the Goddard Space Flight Center, is involved in development and demonstrating various high end computer networking capabilities. The ESDC has several high end super computers. These are used to run: (1) computer simulation of the climate systems; (2) to support the Earth and Space Sciences (ESS) project; (3) to support the Grand Challenge (GC) Science, which is aimed at understanding the turbulent convection and dynamos in stars. GC research occurs in many sites throughout the country, and this research is enabled by, in part, the multiple high performance network interconnections. The application drivers for High End Computer Networking use distributed supercomputing to support virtual reality applications, such as TerraVision, (i.e., three dimensional browser of remotely accessed data), and Cave Automatic Virtual Environments (CAVE). Workstations can access and display data from multiple CAVE's with video servers, which allows for group/project collaborations using a combination of video, data, voice and shared white boarding. The ESDC is also developing and demonstrating the high degree of interoperability between satellite and terrestrial-based networks. To this end, the ESDC is conducting research and evaluations of new computer networking protocols and related technologies which improve the interoperability of satellite and terrestrial networks. The ESDC is also involved in the Security Proof of Concept Keystone (SPOCK) program sponsored by National Security Agency (NSA). The SPOCK activity provides a forum for government users and security technology providers to share information on security requirements, emerging technologies and new product developments. Also, the ESDC is involved in the Trans-Pacific Digital Library Experiment, which aims to demonstrate and evaluate the use of high performance satellite communications and advanced data communications protocols to enable interactive digital library data access between the U. S. Library of Congress, the National Library of Japan and other digital library sites at 155 MegaBytes Per Second. The ESDC participation in this program is the Trans-Pacific access to GLOBE visualizations in real time. ESDC is participating in the Department of Defense's ATDNet with Multiwavelength Optical Network (MONET) a fully switched Wavelength Division Networking testbed. This presentation is in viewgraph format.

  4. Bidirectional teleportation of a pure EPR state by using GHZ states

    NASA Astrophysics Data System (ADS)

    Hassanpour, Shima; Houshmand, Monireh

    2016-02-01

    In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.

  5. Assessing older adults' perceptions of sensor data and designing visual displays for ambient environments. An exploratory study.

    PubMed

    Reeder, B; Chung, J; Le, T; Thompson, H; Demiris, G

    2014-01-01

    This article is part of the Focus Theme of Methods of Information in Medicine on "Using Data from Ambient Assisted Living and Smart Homes in Electronic Health Records". Our objectives were to: 1) characterize older adult participants' perceived usefulness of in-home sensor data and 2) develop novel visual displays for sensor data from Ambient Assisted Living environments that can become part of electronic health records. Semi-structured interviews were conducted with community-dwelling older adult participants during three and six-month visits. We engaged participants in two design iterations by soliciting feedback about display types and visual displays of simulated data related to a fall scenario. Interview transcripts were analyzed to identify themes related to perceived usefulness of sensor data. Thematic analysis identified three themes: perceived usefulness of sensor data for managing health; factors that affect perceived usefulness of sensor data and; perceived usefulness of visual displays. Visual displays were cited as potentially useful for family members and health care providers. Three novel visual displays were created based on interview results, design guidelines derived from prior AAL research, and principles of graphic design theory. Participants identified potential uses of personal activity data for monitoring health status and capturing early signs of illness. One area for future research is to determine how visual displays of AAL data might be utilized to connect family members and health care providers through shared understanding of activity levels versus a more simplified view of self-management. Connecting informal and formal caregiving networks may facilitate better communication between older adults, family members and health care providers for shared decision-making.

  6. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  7. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  8. Tolerance in Nonhuman Primates by Delayed Mixed Chimerism

    DTIC Science & Technology

    2017-12-01

    person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...induction of mixed chimerism in a non -human primate (NHP) model. This approach, in contrast to protocols which have already reached clinical trials...principle of delayed induction of mixed chimerism in a non -human primate (NHP) model. This approach, in contrast to protocols which have already reached

  9. Optimization of Delayed Tolerance Induction in Swine: A Clinically-Relevant Protocol for Immunosuppression-Free Vascularized Composite Allotransplantation

    DTIC Science & Technology

    2017-10-01

    information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE October...been achieved in nonhuman primates (NHPs) using a the delayed period protocol, i.e combination of post- transplant non -myeloablative conditioning and...seminars, study groups , and individual study. Include participation in conferences, workshops, and seminars not listed under major activities

  10. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  11. Digital Motion Imagery, Interoperability Challenges for Space Operations

    NASA Technical Reports Server (NTRS)

    Grubbs, Rodney

    2012-01-01

    With advances in available bandwidth from spacecraft and between terrestrial control centers, digital motion imagery and video is becoming more practical as a data gathering tool for science and engineering, as well as for sharing missions with the public. The digital motion imagery and video industry has done a good job of creating standards for compression, distribution, and physical interfaces. Compressed data streams can easily be transmitted or distributed over radio frequency, internet protocol, and other data networks. All of these standards, however, can make sharing video between spacecraft and terrestrial control centers a frustrating and complicated task when different standards and protocols are used by different agencies. This paper will explore the challenges presented by the abundance of motion imagery and video standards, interfaces and protocols with suggestions for common formats that could simplify interoperability between spacecraft and ground support systems. Real-world examples from the International Space Station will be examined. The paper will also discuss recent trends in the development of new video compression algorithms, as well likely expanded use of Delay (or Disruption) Tolerant Networking nodes.

  12. Generating Animated Displays of Spacecraft Orbits

    NASA Technical Reports Server (NTRS)

    Candey, Robert M.; Chimiak, Reine A.; Harris, Bernard T.

    2005-01-01

    Tool for Interactive Plotting, Sonification, and 3D Orbit Display (TIPSOD) is a computer program for generating interactive, animated, four-dimensional (space and time) displays of spacecraft orbits. TIPSOD utilizes the programming interface of the Satellite Situation Center Web (SSCWeb) services to communicate with the SSC logic and database by use of the open protocols of the Internet. TIPSOD is implemented in Java 3D and effects an extension of the preexisting SSCWeb two-dimensional static graphical displays of orbits. Orbits can be displayed in any or all of the following seven reference systems: true-of-date (an inertial system), J2000 (another inertial system), geographic, geomagnetic, geocentric solar ecliptic, geocentric solar magnetospheric, and solar magnetic. In addition to orbits, TIPSOD computes and displays Sibeck's magnetopause and Fairfield's bow-shock surfaces. TIPSOD can be used by the scientific community as a means of projection or interpretation. It also has potential as an educational tool.

  13. A cache-aided multiprocessor rollback recovery scheme

    NASA Technical Reports Server (NTRS)

    Wu, Kun-Lung; Fuchs, W. Kent

    1989-01-01

    This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.

  14. 78 FR 14867 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... how the NSX System may execute certain types of Zero Display Reserve Orders \\4\\ that are pegged to the midpoint between the Protected BBO in subpennies. NSX Rule 11.3(c) provides that a Zero Display Reserve... the System rounds executions in securities priced less than $1.00 per share resulting from a Zero...

  15. Stennis Space Center celebrates Native American culture

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Famie Willis (left), 2009-2010 Choctaw Indian Princess, displays artifacts during Native American Heritage Month activities at Stennis Space Center on Nov. 24. The celebration featured various Native American cultural displays for Stennis employees to view. Shown above are (l to r): Willis, Elaine Couchman of NASA Shared Services Center, John Cecconi of NSSC and Lakeisha Robertson of the Environmental Protection Agency.

  16. Stennis Space Center celebrates Native American culture

    NASA Image and Video Library

    2009-11-24

    Famie Willis (left), 2009-2010 Choctaw Indian Princess, displays artifacts during Native American Heritage Month activities at Stennis Space Center on Nov. 24. The celebration featured various Native American cultural displays for Stennis employees to view. Shown above are (l to r): Willis, Elaine Couchman of NASA Shared Services Center, John Cecconi of NSSC and Lakeisha Robertson of the Environmental Protection Agency.

  17. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  18. GUIdock-VNC: using a graphical desktop sharing system to provide a browser-based interface for containerized software

    PubMed Central

    Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong

    2017-01-01

    Abstract Background: Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line–based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. Results: We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. Conclusions: As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. PMID:28327936

  19. GUIdock-VNC: using a graphical desktop sharing system to provide a browser-based interface for containerized software.

    PubMed

    Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong; Yeung, Ka Yee

    2017-04-01

    Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line-based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. © The Authors 2017. Published by Oxford University Press.

  20. Using Aromatherapy Massage to Increase Shared Attention Behaviours in Children with Autistic Spectrum Disorders and Severe Learning Difficulties

    ERIC Educational Resources Information Center

    Solomons, Steve

    2005-01-01

    Children with autistic spectrum disorders (ASD) characteristically display a lack of shared attention behaviours and the lack of these behaviours impacts on their ability to develop social interactions and relationships with others. Steve Solomons, assistant headteacher at Rectory Paddock School and Research Unit in the London Borough of Bromley,…

  1. Biotemplated Synthesis of PZT Nanowires

    DTIC Science & Technology

    2013-11-25

    this same experimental protocol would be successful with other biotemplates. M13 bacteriophage was chosen as a second template because (1) it possesses...and (3) it can be customized to bind compounds of interest with tailorable specificities based on the phage display process.14 M13 is a virus that is...coefficients (d33 < 8 pm/V). 50 As negatively charged carboxyl groups can bind cations,51 M13 phages were genetically engineered to display glutamate

  2. Entangled state quantum cryptography: eavesdropping on the ekert protocol

    PubMed

    Naik; Peterson; White; Berglund; Kwiat

    2000-05-15

    Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.

  3. Using ARINC 818 Avionics Digital Video Bus (ADVB) for military displays

    NASA Astrophysics Data System (ADS)

    Alexander, Jon; Keller, Tim

    2007-04-01

    ARINC 818 Avionics Digital Video Bus (ADVB) is a new digital video interface and protocol standard developed especially for high bandwidth uncompressed digital video. The first draft of this standard, released in January of 2007, has been advanced by ARINC and the aerospace community to meet the acute needs of commercial aviation for higher performance digital video. This paper analyzes ARINC 818 for use in military display systems found in avionics, helicopters, and ground vehicles. The flexibility of ARINC 818 for the diverse resolutions, grayscales, pixel formats, and frame rates of military displays is analyzed as well as the suitability of ARINC 818 to support requirements for military video systems including bandwidth, latency, and reliability. Implementation issues relevant to military displays are presented.

  4. Phage display selection of peptides that target calcium-binding proteins.

    PubMed

    Vetter, Stefan W

    2013-01-01

    Phage display allows to rapidly identify peptide sequences with binding affinity towards target proteins, for example, calcium-binding proteins (CBPs). Phage technology allows screening of 10(9) or more independent peptide sequences and can identify CBP binding peptides within 2 weeks. Adjusting of screening conditions allows selecting CBPs binding peptides that are either calcium-dependent or independent. Obtained peptide sequences can be used to identify CBP target proteins based on sequence homology or to quickly obtain peptide-based CBP inhibitors to modulate CBP-target interactions. The protocol described here uses a commercially available phage display library, in which random 12-mer peptides are displayed on filamentous M13 phages. The library was screened against the calcium-binding protein S100B.

  5. Design and evaluation of web-based image transmission and display with different protocols

    NASA Astrophysics Data System (ADS)

    Tan, Bin; Chen, Kuangyi; Zheng, Xichuan; Zhang, Jianguo

    2011-03-01

    There are many Web-based image accessing technologies used in medical imaging area, such as component-based (ActiveX Control) thick client Web display, Zerofootprint thin client Web viewer (or called server side processing Web viewer), Flash Rich Internet Application(RIA) ,or HTML5 based Web display. Different Web display methods have different peformance in different network environment. In this presenation, we give an evaluation on two developed Web based image display systems. The first one is used for thin client Web display. It works between a PACS Web server with WADO interface and thin client. The PACS Web server provides JPEG format images to HTML pages. The second one is for thick client Web display. It works between a PACS Web server with WADO interface and thick client running in browsers containing ActiveX control, Flash RIA program or HTML5 scripts. The PACS Web server provides native DICOM format images or JPIP stream for theses clients.

  6. Experimentally feasible security check for n-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.

    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less

  7. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  8. Secure management of biomedical data with cryptographic hardware.

    PubMed

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  9. Application of visual cryptography for learning in optics and photonics

    NASA Astrophysics Data System (ADS)

    Mandal, Avikarsha; Wozniak, Peter; Vauderwange, Oliver; Curticapean, Dan

    2016-09-01

    In the age data digitalization, important applications of optics and photonics based sensors and technology lie in the field of biometrics and image processing. Protecting user data in a safe and secure way is an essential task in this area. However, traditional cryptographic protocols rely heavily on computer aided computation. Secure protocols which rely only on human interactions are usually simpler to understand. In many scenarios development of such protocols are also important for ease of implementation and deployment. Visual cryptography (VC) is an encryption technique on images (or text) in which decryption is done by human visual system. In this technique, an image is encrypted into number of pieces (known as shares). When the printed shares are physically superimposed together, the image can be decrypted with human vision. Modern digital watermarking technologies can be combined with VC for image copyright protection where the shares can be watermarks (small identification) embedded in the image. Similarly, VC can be used for improving security of biometric authentication. This paper presents about design and implementation of a practical laboratory experiment based on the concept of VC for a course in media engineering. Specifically, our contribution deals with integration of VC in different schemes for applications like digital watermarking and biometric authentication in the field of optics and photonics. We describe theoretical concepts and propose our infrastructure for the experiment. Finally, we will evaluate the learning outcome of the experiment, performed by the students.

  10. Secure Management of Biomedical Data With Cryptographic Hardware

    PubMed Central

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2014-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations. PMID:22010157

  11. NCWin — A Component Object Model (COM) for processing and visualizing NetCDF data

    USGS Publications Warehouse

    Liu, Jinxun; Chen, J.M.; Price, D.T.; Liu, S.

    2005-01-01

    NetCDF (Network Common Data Form) is a data sharing protocol and library that is commonly used in large-scale atmospheric and environmental data archiving and modeling. The NetCDF tool described here, named NCWin and coded with Borland C + + Builder, was built as a standard executable as well as a COM (component object model) for the Microsoft Windows environment. COM is a powerful technology that enhances the reuse of applications (as components). Environmental model developers from different modeling environments, such as Python, JAVA, VISUAL FORTRAN, VISUAL BASIC, VISUAL C + +, and DELPHI, can reuse NCWin in their models to read, write and visualize NetCDF data. Some Windows applications, such as ArcGIS and Microsoft PowerPoint, can also call NCWin within the application. NCWin has three major components: 1) The data conversion part is designed to convert binary raw data to and from NetCDF data. It can process six data types (unsigned char, signed char, short, int, float, double) and three spatial data formats (BIP, BIL, BSQ); 2) The visualization part is designed for displaying grid map series (playing forward or backward) with simple map legend, and displaying temporal trend curves for data on individual map pixels; and 3) The modeling interface is designed for environmental model development by which a set of integrated NetCDF functions is provided for processing NetCDF data. To demonstrate that the NCWin can easily extend the functions of some current GIS software and the Office applications, examples of calling NCWin within ArcGIS and MS PowerPoint for showing NetCDF map animations are given.

  12. Development of a Modular Research Platform to Create Medical Observational Studies for Mobile Devices.

    PubMed

    Zens, Martin; Grotejohann, Birgit; Tassoni, Adrian; Duttenhoefer, Fabian; Südkamp, Norbert P; Niemeyer, Philipp

    2017-05-23

    Observational studies have proven to be a valuable resource in medical research, especially when performed on a large scale. Recently, mobile device-based observational studies have been discovered by an increasing number of researchers as a promising new source of information. However, the development and deployment of app-based studies is not trivial and requires profound programming skills. The aim of this project was to develop a modular online research platform that allows researchers to create medical studies for mobile devices without extensive programming skills. The platform approach for a modular research platform consists of three major components. A Web-based platform forms the researchers' main workplace. This platform communicates via a shared database with a platform independent mobile app. Furthermore, a separate Web-based login platform for physicians and other health care professionals is outlined and completes the concept. A prototype of the research platform has been developed and is currently in beta testing. Simple questionnaire studies can be created within minutes and published for testing purposes. Screenshots of an example study are provided, and the general working principle is displayed. In this project, we have created a basis for a novel research platform. The necessity and implications of a modular approach were displayed and an outline for future development given. International researchers are invited and encouraged to participate in this ongoing project. ©Martin Zens, Birgit Grotejohann, Adrian Tassoni, Fabian Duttenhoefer, Norbert P Südkamp, Philipp Niemeyer. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 23.05.2017.

  13. Experience with PACS in an ATM/Ethernet switched network environment.

    PubMed

    Pelikan, E; Ganser, A; Kotter, E; Schrader, U; Timmermann, U

    1998-03-01

    Legacy local area network (LAN) technologies based on shared media concepts are not adequate for the growth of a large-scale picture archiving and communication system (PACS) in a client-server architecture. First, an asymmetric network load, due to the requests of a large number of PACS clients for only a few main servers, should be compensated by communication links to the servers with a higher bandwidth compared to the clients. Secondly, as the number of PACS nodes increases, the network throughout should not measurably cut production. These requirements can easily be fulfilled using switching technologies. Here asynchronous transfer mode (ATM) is clearly one of the hottest topics in networking because the ATM architecture provides integrated support for a variety of communication services, and it supports virtual networking. On the other hand, most of the imaging modalities are not yet ready for integration into a native ATM network. For a lot of nodes already joining an Ethernet, a cost-effective and pragmatic way to benefit from the switching concept would be a combined ATM/Ethernet switching environment. This incorporates an incremental migration strategy with the immediate benefits of high-speed, high-capacity ATM (for servers and high-sophisticated display workstations), while preserving elements of the existing network technologies. In addition, Ethernet switching instead of shared media Ethernet improves the performance considerably. The LAN emulation (LANE) specification by the ATM forum defines mechanisms that allow ATM networks to coexist with legacy systems using any data networking protocol. This paper points out the suitability of this network architecture in accordance with an appropriate system design.

  14. Verifiable Secret Redistribution for Threshold Sharing Schemes

    DTIC Science & Technology

    2002-02-01

    complete verification in our protocol, old shareholders broadcast a commitment to the secret to the new shareholders. We prove that the new...of an m − 1 degree polynomial from m of n points yields a constant term in 1 the polynomial that corresponds to the secret . In Blakley’s scheme [Bla79...the intersection of m of n vector spaces yields a one-dimensional vector that corresponds to the secret . Desmedt surveys other sharing schemes

  15. Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-Jun; Man, Zhong-Xiao

    2005-07-01

    Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.

  16. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  17. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  18. A Simulation System Based on the Actor Paradigm

    DTIC Science & Technology

    1988-02-01

    of the protocol. Shared memory communication requires the programmer to wait and signal semaphores explicitly to synchronize the communicating parties...wide range of possibilities within the same basic protocol. - The simplicity of the primitive operation set affords those creating new operations...more flexibility (Ada has a large and complicated primitive set). -3- II I I I B A I -I I I I I . 0 1 2 3 4 5 Time 0: Both processes A and B are

  19. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  20. Matroids and quantum-secret-sharing schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarvepalli, Pradeep; Raussendorf, Robert

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less

  1. Consensus definitions of 14 severe acute toxic effects for childhood lymphoblastic leukaemia treatment: a Delphi consensus.

    PubMed

    Schmiegelow, Kjeld; Attarbaschi, Andishe; Barzilai, Shlomit; Escherich, Gabriele; Frandsen, Thomas Leth; Halsey, Christina; Hough, Rachael; Jeha, Sima; Kato, Motohiro; Liang, Der-Cherng; Mikkelsen, Torben Stamm; Möricke, Anja; Niinimäki, Riitta; Piette, Caroline; Putti, Maria Caterina; Raetz, Elizabeth; Silverman, Lewis B; Skinner, Roderick; Tuckuviene, Ruta; van der Sluis, Inge; Zapotocka, Ester

    2016-06-01

    Although there are high survival rates for children with acute lymphoblastic leukaemia, their outcome is often counterbalanced by the burden of toxic effects. This is because reported frequencies vary widely across studies, partly because of diverse definitions of toxic effects. Using the Delphi method, 15 international childhood acute lymphoblastic leukaemia study groups assessed acute lymphoblastic leukaemia protocols to address toxic effects that were to be considered by the Ponte di Legno working group. 14 acute toxic effects (hypersensitivity to asparaginase, hyperlipidaemia, osteonecrosis, asparaginase-associated pancreatitis, arterial hypertension, posterior reversible encephalopathy syndrome, seizures, depressed level of consciousness, methotrexate-related stroke-like syndrome, peripheral neuropathy, high-dose methotrexate-related nephrotoxicity, sinusoidal obstructive syndrome, thromboembolism, and Pneumocystis jirovecii pneumonia) that are serious but too rare to be addressed comprehensively within any single group, or are deemed to need consensus definitions for reliable incidence comparisons, were selected for assessment. Our results showed that none of the protocols addressed all 14 toxic effects, that no two protocols shared identical definitions of all toxic effects, and that no toxic effect definition was shared by all protocols. Using the Delphi method over three face-to-face plenary meetings, consensus definitions were obtained for all 14 toxic effects. In the overall assessment of outcome of acute lymphoblastic leukaemia treatment, these expert opinion-based definitions will allow reliable comparisons of frequencies and severities of acute toxic effects across treatment protocols, and facilitate international research on cause, guidelines for treatment adaptation, preventive strategies, and development of consensus algorithms for reporting on acute lymphoblastic leukaemia treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Facilitating Secure Sharing of Personal Health Data in the Cloud.

    PubMed

    Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick

    2016-05-27

    Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.

  3. A short protocol using dexamethasone and monophosphoryl lipid A generates tolerogenic dendritic cells that display a potent migratory capacity to lymphoid chemokines

    PubMed Central

    2013-01-01

    Background Generation of tolerogenic dendritic cells (TolDCs) for therapy is challenging due to its implications for the design of protocols suitable for clinical applications, which means not only using safe products, but also working at defining specific biomarkers for TolDCs identification, developing shorter DCs differentiation methods and obtaining TolDCs with a stable phenotype. We describe here, a short-term protocol for TolDCs generation, which are characterized in terms of phenotypic markers, cytokines secretion profile, CD4+ T cell-stimulatory ability and migratory capacity. Methods TolDCs from healthy donors were generated by modulation with dexamethasone plus monophosphoryl lipid A (MPLA-tDCs). We performed an analysis of MPLA-tDCs in terms of yield, viability, morphology, phenotypic markers, cytokines secretion profile, stability, allogeneic and antigen-specific CD4+ T-cell stimulatory ability and migration capacity. Results After a 5-day culture, MPLA-tDCs displayed reduced expression of costimulatory and maturation molecules together to an anti-inflammatory cytokines secretion profile, being able to maintain these tolerogenic features even after the engagement of CD40 by its cognate ligand. In addition, MPLA-tDCs exhibited reduced capabilities to stimulate allogeneic and antigen-specific CD4+ T cell proliferation, and induced an anti-inflammatory cytokine secretion pattern. Among potential tolerogenic markers studied, only TLR-2 was highly expressed in MPLA-tDCs when compared to mature and immature DCs. Remarkable, like mature DCs, MPLA-tDCs displayed a high CCR7 and CXCR4 expression, both chemokine receptors involved in migration to secondary lymphoid organs, and even more, in an in vitro assay they exhibited a high migration response towards CCL19 and CXCL12. Conclusion We describe a short-term protocol for TolDC generation, which confers them a stable phenotype and migratory capacity to lymphoid chemokines, essential features for TolDCs to be used as therapeutics for autoimmunity and prevention of graft rejection. PMID:23706017

  4. Distributing Data to Hand-Held Devices in a Wireless Network

    NASA Technical Reports Server (NTRS)

    Hodges, Mark; Simmons, Layne

    2008-01-01

    ADROIT is a developmental computer program for real-time distribution of complex data streams for display on Web-enabled, portable terminals held by members of an operational team of a spacecraft-command-and-control center who may be located away from the center. Examples of such terminals include personal data assistants, laptop computers, and cellular telephones. ADROIT would make it unnecessary to equip each terminal with platform- specific software for access to the data streams or with software that implements the information-sharing protocol used to deliver telemetry data to clients in the center. ADROIT is a combination of middleware plus software specific to the center. (Middleware enables one application program to communicate with another by performing such functions as conversion, translation, consolidation, and/or integration.) ADROIT translates a data stream (voice, video, or alphanumerical data) from the center into Extensible Markup Language, effectuates a subscription process to determine who gets what data when, and presents the data to each user in real time. Thus, ADROIT is expected to enable distribution of operations and to reduce the cost of operations by reducing the number of persons required to be in the center.

  5. Induced pluripotent stem cell-derived limbal epithelial cells (LiPSC) as a cellular alternative for in vitro ocular toxicity testing.

    PubMed

    Aberdam, Edith; Petit, Isabelle; Sangari, Linda; Aberdam, Daniel

    2017-01-01

    Induced pluripotent stem cells hold great potential to produce unlimited amount of differentiated cells as cellular source for regenerative medicine but also for in vitro drug screening and cytotoxicity tests. Ocular toxicity testing is mandatory to evaluate the risks of drugs and cosmetic products before their application to human patients by preventing eye irritation or insult. Since the global ban to use animals, many human-derived alternatives have been proposed, from ex-vivo enucleated postmortem cornea, primary corneal cell culture and immortalized corneal epithelial cell lines. All of them share limitations for their routine use. Using an improved protocol, we derived limbal epithelial cells from human induced pluripotent stem cells, named LiPSC, that are able to be passaged and differentiate further into corneal epithelial cells. Comparative RT-qPCR, immunofluorescence staining, flow cytometry analysis and zymography assays demonstrate that LiPSC are morphologically and molecularly similar to the adult stem cells. Moreover, contrary to HCE, LiPSC and primary limbal cells display similarly sensitive to cytotoxicity treatment among passages. Our data strongly suggest that LiPSC could become a powerful alternative cellular model for cosmetic and drug tests.

  6. Induced pluripotent stem cell-derived limbal epithelial cells (LiPSC) as a cellular alternative for in vitro ocular toxicity testing

    PubMed Central

    Aberdam, Edith; Petit, Isabelle; Sangari, Linda

    2017-01-01

    Induced pluripotent stem cells hold great potential to produce unlimited amount of differentiated cells as cellular source for regenerative medicine but also for in vitro drug screening and cytotoxicity tests. Ocular toxicity testing is mandatory to evaluate the risks of drugs and cosmetic products before their application to human patients by preventing eye irritation or insult. Since the global ban to use animals, many human-derived alternatives have been proposed, from ex-vivo enucleated postmortem cornea, primary corneal cell culture and immortalized corneal epithelial cell lines. All of them share limitations for their routine use. Using an improved protocol, we derived limbal epithelial cells from human induced pluripotent stem cells, named LiPSC, that are able to be passaged and differentiate further into corneal epithelial cells. Comparative RT-qPCR, immunofluorescence staining, flow cytometry analysis and zymography assays demonstrate that LiPSC are morphologically and molecularly similar to the adult stem cells. Moreover, contrary to HCE, LiPSC and primary limbal cells display similarly sensitive to cytotoxicity treatment among passages. Our data strongly suggest that LiPSC could become a powerful alternative cellular model for cosmetic and drug tests. PMID:28640863

  7. ISPATOM: A Generic Real-Time Data Processing Tool Without Programming

    NASA Technical Reports Server (NTRS)

    Dershowitz, Adam

    2007-01-01

    Information Sharing Protocol Advanced Tool of Math (ISPATOM) is an application program allowing for the streamlined generation of comps, which subscribe to streams of incoming telemetry data, perform any necessary computations on the data, then send the data to other programs for display and/or further processing in NASA mission control centers. Heretofore, the development of comps was difficult, expensive, and time-consuming: Each comp was custom written manually, in a low-level computing language, by a programmer attempting to follow requirements of flight controllers. ISPATOM enables a flight controller who is not a programmer to write a comp by simply typing in one or more equation( s) at a command line or retrieving the equation(s) from a text file. ISPATOM then subscribes to the necessary input data, performs all of necessary computations, and sends out the results. It sends out new results whenever the input data change. The use of equations in ISPATOM is no more difficult than is entering equations in a spreadsheet. The time involved in developing a comp is thus limited to the time taken to decide on the necessary equations. Thus, ISPATOM is a real-time dynamic calculator.

  8. Optimizing tubal ligation service delivery: a prospective cohort study to measure the task-sharing experience of Marie Stopes International Ethiopia.

    PubMed

    Nuccio, Olivia; Sendek, Birhanu; Park, Min Hae; Mesele, Tesfaye; Okello, Francis Ogojo; Gordon-Maclean, Cristin

    2017-03-01

    The Ethiopian government implements a progressive task-sharing policy for health services as a strategy to address shortages of highly skilled providers and increase access to critical services, such as family planning. Since 2009, Marie Stopes International Ethiopia has trained health officers to provide tubal ligations, a permanent method of family planning, as part of its task-sharing strategy. The objectives of this research were to evaluate task-sharing tubal ligations to health officers at Marie Stopes International Ethiopia, specifically: (a) to investigate safety, as measured by the proportion of major adverse events; (b) to evaluate the feasibility, as measured by adherence to the standard tubal ligation procedure protocol and (c) to investigate acceptability to clients of the tubal ligation procedure provided by health officers. We established a prospective cohort of women aged  ≥18 years presenting for tubal ligation at Marie Stopes International Ethiopia sites in three regions in Ethiopia (March–May 2014). Data on adverse events (incomplete procedure, pain, bleeding, infection, perforation) were collected intra-operatively; peri-operatively (1-h post-procedure); and post-operatively (7 days post-procedure). To measure feasibility, 65% of procedures were selected for ‘audit’, where a nurse observed and scored health officers adherence to standard protocol using an 18-item checklist. To assess acceptability, women were asked about their satisfaction with the procedure. In total, 276 women were enrolled in the study. 97.5% of procedures took place in rural settings. All participants were followed up 7 days post-procedure (100% response rate). The overall proportion of major adverse events was 3% (95% CI 1–6%). The most frequent adverse event was ‘failure to complete the TL’ (2.2%, n = 6). The average score on protocol adherence was 96.9%. Overall, 98.2% (n = 271) of clients would recommend the procedure to a friend. Findings from this study, indicating safety, feasibility and acceptability, are consistent with the existing literature, which indicate safety and acceptability for task-sharing tubal ligations, and other methods of contraception with non-physician health providers. This study adds to scant literature on task-sharing tubal ligations in rural and low-resource settings.

  9. Optimization of design and production strategies for novel adeno-associated viral display peptide libraries.

    PubMed

    Körbelin, J; Hunger, A; Alawi, M; Sieber, T; Binder, M; Trepel, M

    2017-08-01

    Libraries displaying random peptides on the surface of adeno-associated virus (AAV) are powerful tools for the generation of target-specific gene therapy vectors. However, for unknown reasons the success rate of AAV library screenings is variable and the influence of the production procedure has not been thoroughly evaluated. During library screenings, the capsid variants with the most favorable tropism are enriched over several selection rounds on a target of choice and identified by subsequent sequencing of the encapsidated viral genomes encoding the library capsids with targeting peptide insertions. Thus, a high capsid-genome correlation is crucial to obtain the correct information about the selected capsid variants. Producing AAV libraries by a two-step protocol with pseudotyped library transfer shuttles has been proposed as one way to ensure such a correlation. Here we show that AAV2 libraries produced by such a protocol via transfer shuttles display an unexpected additional bias in the amino-acid composition which confers increased heparin affinity and thus similarity to wildtype AAV2 tropism. This bias may fundamentally impair the intended use of AAV libraries, discouraging the use of transfer shuttles for the production of AAV libraries in the future.

  10. KSC-03PD-2181

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  11. KSC-03PD-2179

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  12. KSC-03PD-2182

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. Children enjoy displays of fire equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  13. Tweeting badges: user motivations for displaying achievement in publicly networked environments.

    PubMed

    Kwon, K Hazel; Halavais, Alexander; Havener, Shannon

    2015-02-01

    Badge systems, a common mechanism for gamification on social media platforms, provide a way for users to present their knowledge or experience to others. This study aims to contribute to the understanding of why social media users publicize their achievements in the form of online badges. Five motivational factors for badge display in public networked environments are distinguished-self-efficacy, social incentives, networked support, passing time, and inattentive sharing-and it is suggested that different badge types are associated with different motivations. System developers are advised to consider these components in their designs, applying the elements most appropriate to the communities they serve. Comparing user motivations associated with badges shared across boundaries provides a better understanding of how online badges relate to the larger social media ecosystem.

  14. Kinematic changes during running-induced fatigue and relations with core endurance in novice runners.

    PubMed

    Koblbauer, Ian F; van Schooten, Kimberley S; Verhagen, Evert A; van Dieën, Jaap H

    2014-07-01

    This study aimed to investigate kinematic changes experienced during running-induced fatigue. Further, the study examined relations between kinematic changes and core endurance. Repeated measures and correlation. Seventeen novice runners participated in a running-induced fatigue protocol and underwent core endurance assessment. Participants ran at a steady state corresponding to an intensity of 13 on the Borg scale and continued until 2min after a Borg score of 17 or 90% of maximum heart rate was reached. Kinematic data were analyzed for the lower extremities and trunk throughout a running protocol and, on separate days, core endurance measures were recorded. Changes in pre- and post-fatigue running kinematics and their relations with core endurance measures were analyzed. Analysis of peak joint angles revealed significant increases in trunk flexion (4°), decreases in trunk extension (3°), and increases in non-dominant ankle eversion (1.6°) as a result of running-induced fatigue. Post-fatigue increased trunk flexion changes displayed a strong to moderate positive relation with trunk extensor core endurance measures, in contrast to expected negative relations. Novice runners displayed an overall increase in trunk inclination and increased ankle eversion peak angles when fatigued utilizing a running-induced fatigue protocol. As most pronounced changes were found for the trunk, trunk kinematics appear to be significantly affected during fatigued running and should not be overlooked. Core endurance measures displayed unexpected relations with running kinematics and require further investigation to determine the significance of these relations. Copyright © 2013 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  15. Fast transfer of crossmodal time interval training.

    PubMed

    Chen, Lihan; Zhou, Xiaolin

    2014-06-01

    Sub-second time perception is essential for many important sensory and perceptual tasks including speech perception, motion perception, motor coordination, and crossmodal interaction. This study investigates to what extent the ability to discriminate sub-second time intervals acquired in one sensory modality can be transferred to another modality. To this end, we used perceptual classification of visual Ternus display (Ternus in Psychol Forsch 7:81-136, 1926) to implicitly measure participants' interval perception in pre- and posttests and implemented an intra- or crossmodal sub-second interval discrimination training protocol in between the tests. The Ternus display elicited either an "element motion" or a "group motion" percept, depending on the inter-stimulus interval between the two visual frames. The training protocol required participants to explicitly compare the interval length between a pair of visual, auditory, or tactile stimuli with a standard interval or to implicitly perceive the length of visual, auditory, or tactile intervals by completing a non-temporal task (discrimination of auditory pitch or tactile intensity). Results showed that after fast explicit training of interval discrimination (about 15 min), participants improved their ability to categorize the visual apparent motion in Ternus displays, although the training benefits were mild for visual timing training. However, the benefits were absent for implicit interval training protocols. This finding suggests that the timing ability in one modality can be rapidly acquired and used to improve timing-related performance in another modality and that there may exist a central clock for sub-second temporal processing, although modality-specific perceptual properties may constrain the functioning of this clock.

  16. Call sign intelligibility improvement using a spatial auditory display

    NASA Technical Reports Server (NTRS)

    Begault, Durand R.

    1994-01-01

    A spatial auditory display was designed for separating the multiple communication channels usually heard over one ear to different virtual auditory positions. The single 19 foot rack mount device utilizes digital filtering algorithms to separate up to four communication channels. The filters use four different binaural transfer functions, synthesized from actual outer ear measurements, to impose localization cues on the incoming sound. Hardware design features include 'fail-safe' operation in the case of power loss, and microphone/headset interfaces to the mobile launch communication system in use at KSC. An experiment designed to verify the intelligibility advantage of the display used 130 different call signs taken from the communications protocol used at NASA KSC. A 6 to 7 dB intelligibility advantage was found when multiple channels were spatially displayed, compared to monaural listening. The findings suggest that the use of a spatial auditory display could enhance both occupational and operational safety and efficiency of NASA operations.

  17. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...

  18. Random bipartite entanglement from W and W-like states.

    PubMed

    Fortescue, Ben; Lo, Hoi-Kwong

    2007-06-29

    We describe a protocol for distilling maximally entangled bipartite states between random pairs of parties from those sharing a tripartite W state |W=(1/sqrt[3])(|100+|010+|001)(ABC), and show that the total distillation rate E(t)(infinity) [the total number of Einstein-Podolsky-Rosen (EPR) pairs distilled per W, irrespective of who shares them] may be done at a higher rate than EPR distillation between specified pairs of parties. Specifically, the optimal rate for distillation to specified parties has been previously shown to be 0.92 EPR pairs per W, while our protocol can asymptotically distill 1 EPR pair per W between random pairs of parties, which we conjecture to be optimal. We thus demonstrate a tradeoff between overall distillation rate and final distribution of EPR pairs. We further show that there exist states with fixed lower-bounded E(t)(infinity), but arbitrarily small distillable entanglement for specified parties.

  19. Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corndorf, Eric; Liang Chuang; Kanter, Gregory S.

    2005-06-15

    We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less

  20. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Li, Celia; Wang, Zhuang; Yang, Cungang

    In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

  1. Integrating sequence and structural biology with DAS

    PubMed Central

    Prlić, Andreas; Down, Thomas A; Kulesha, Eugene; Finn, Robert D; Kähäri, Andreas; Hubbard, Tim JP

    2007-01-01

    Background The Distributed Annotation System (DAS) is a network protocol for exchanging biological data. It is frequently used to share annotations of genomes and protein sequence. Results Here we present several extensions to the current DAS 1.5 protocol. These provide new commands to share alignments, three dimensional molecular structure data, add the possibility for registration and discovery of DAS servers, and provide a convention how to provide different types of data plots. We present examples of web sites and applications that use the new extensions. We operate a public registry of DAS sources, which now includes entries for more than 250 distinct sources. Conclusion Our DAS extensions are essential for the management of the growing number of services and exchange of diverse biological data sets. In addition the extensions allow new types of applications to be developed and scientific questions to be addressed. The registry of DAS sources is available at PMID:17850653

  2. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  3. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  4. Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-06-01

    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.

  5. Development and Application of a Virtual Screening Protocol for the Identification of Multitarget Fragments.

    PubMed

    Bottegoni, Giovanni; Veronesi, Marina; Bisignano, Paola; Kacker, Puneet; Favia, Angelo D; Cavalli, Andrea

    2016-06-20

    In this study, we report on a virtual ligand screening protocol optimized to identify fragments endowed with activity at multiple targets. Thanks to this protocol, we were able to identify a fragment that displays activity in the low-micromolar range at both β-secretase 1 (BACE-1) and glycogen synthase kinase 3β (GSK-3β). These two structurally and physiologically unrelated enzymes likely contribute, through different pathways, to the onset of Alzheimer's disease (AD). Therefore, their simultaneous inhibition holds great potential in exerting a profound effect on AD. In perspective, the strategy outlined herein can be adapted to other target combinations. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. The Effects of Shared Information on Pilot-Controller Situation Awareness And Re-Route Negotiation

    NASA Technical Reports Server (NTRS)

    Farley, Todd C.; Hansman, R. John; Endsley, Mica R.; Amonlirdviman, Keith

    1999-01-01

    The effect of shared information is assessed in terms of pilot-controller negotiating behavior and shared situation awareness. Pilot goals and situation awareness requirements are developed and compared against those of air traffic controllers to identify areas of common and competing interest. An exploratory, part-task simulator experiment is described which evaluates the extent to which shared information may lead pilots and controllers to cooperate or compete when negotiating route amendments. Results are presented which indicate that shared information enhances situation awareness and can engender more collaborative interaction between pilots and air traffic controllers. Furthermore, the value of providing controllers with a good-quality weather overlay on their plan view displays is demonstrated. Observed improvements in situation awareness and separation assurance are discussed.

  7. Assumptions, Trust, and Names in Computer Security Protocols

    DTIC Science & Technology

    2011-06-01

    sharing her banking credentials with a criminal, which is clearly bad . But PKI proto- cols like this one can be used in other, less risky ways. Suppose...Figure 4.5. This is similar to a failure of PKI-based protocols in which the authority signs a bad certificate. But the interesting thing is how the... Zoo Figure 4.6: Using AdultVerify. The run is as follows: 1. As the first step in Diffie-Hellman Key Exchange, Alice picks and sends the

  8. Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naik, D. S.; Peterson, C. G.; White, A. G.

    2000-05-15

    Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability. (c) 2000 The American Physical Society.

  9. Large High Resolution Displays for Co-Located Collaborative Sensemaking: Display Usage and Territoriality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bradel, Lauren; Endert, Alexander; Koch, Kristen

    2013-08-01

    Large, high-resolution vertical displays carry the potential to increase the accuracy of collaborative sensemaking, given correctly designed visual analytics tools. From an exploratory user study using a fictional textual intelligence analysis task, we investigated how users interact with the display to construct spatial schemas and externalize information, as well as how they establish shared and private territories. We investigated the space management strategies of users partitioned by type of tool philosophy followed (visualization- or text-centric). We classified the types of territorial behavior exhibited in terms of how the users interacted with information on the display (integrated or independent workspaces). Next,more » we examined how territorial behavior impacted the common ground between the pairs of users. Finally, we offer design suggestions for building future co-located collaborative visual analytics tools specifically for use on large, high-resolution vertical displays.« less

  10. Effects of an ontology display with history representation on organizational memory information systems.

    PubMed

    Hwang, Wonil; Salvendy, Gavriel

    2005-06-10

    Ontologies, as a possible element of organizational memory information systems, appear to support organizational learning. Ontology tools can be used to share knowledge among the members of an organization. However, current ontology-viewing user interfaces of ontology tools do not fully support organizational learning, because most of them lack proper history representation in their display. In this study, a conceptual model was developed that emphasized the role of ontology in the organizational learning cycle and explored the integration of history representation in the ontology display. Based on the experimental results from a split-plot design with 30 participants, two conclusions were derived: first, appropriately selected history representations in the ontology display help users to identify changes in the ontologies; and second, compatibility between types of ontology display and history representation is more important than ontology display and history representation in themselves.

  11. Why is data sharing in collaborative natural resource efforts so hard and what can we do to improve it?

    PubMed

    Volk, Carol J; Lucero, Yasmin; Barnas, Katie

    2014-05-01

    Increasingly, research and management in natural resource science rely on very large datasets compiled from multiple sources. While it is generally good to have more data, utilizing large, complex datasets has introduced challenges in data sharing, especially for collaborating researchers in disparate locations ("distributed research teams"). We surveyed natural resource scientists about common data-sharing problems. The major issues identified by our survey respondents (n = 118) when providing data were lack of clarity in the data request (including format of data requested). When receiving data, survey respondents reported various insufficiencies in documentation describing the data (e.g., no data collection description/no protocol, data aggregated, or summarized without explanation). Since metadata, or "information about the data," is a central obstacle in efficient data handling, we suggest documenting metadata through data dictionaries, protocols, read-me files, explicit null value documentation, and process metadata as essential to any large-scale research program. We advocate for all researchers, but especially those involved in distributed teams to alleviate these problems with the use of several readily available communication strategies including the use of organizational charts to define roles, data flow diagrams to outline procedures and timelines, and data update cycles to guide data-handling expectations. In particular, we argue that distributed research teams magnify data-sharing challenges making data management training even more crucial for natural resource scientists. If natural resource scientists fail to overcome communication and metadata documentation issues, then negative data-sharing experiences will likely continue to undermine the success of many large-scale collaborative projects.

  12. Why is Data Sharing in Collaborative Natural Resource Efforts so Hard and What can We Do to Improve it?

    NASA Astrophysics Data System (ADS)

    Volk, Carol J.; Lucero, Yasmin; Barnas, Katie

    2014-05-01

    Increasingly, research and management in natural resource science rely on very large datasets compiled from multiple sources. While it is generally good to have more data, utilizing large, complex datasets has introduced challenges in data sharing, especially for collaborating researchers in disparate locations ("distributed research teams"). We surveyed natural resource scientists about common data-sharing problems. The major issues identified by our survey respondents ( n = 118) when providing data were lack of clarity in the data request (including format of data requested). When receiving data, survey respondents reported various insufficiencies in documentation describing the data (e.g., no data collection description/no protocol, data aggregated, or summarized without explanation). Since metadata, or "information about the data," is a central obstacle in efficient data handling, we suggest documenting metadata through data dictionaries, protocols, read-me files, explicit null value documentation, and process metadata as essential to any large-scale research program. We advocate for all researchers, but especially those involved in distributed teams to alleviate these problems with the use of several readily available communication strategies including the use of organizational charts to define roles, data flow diagrams to outline procedures and timelines, and data update cycles to guide data-handling expectations. In particular, we argue that distributed research teams magnify data-sharing challenges making data management training even more crucial for natural resource scientists. If natural resource scientists fail to overcome communication and metadata documentation issues, then negative data-sharing experiences will likely continue to undermine the success of many large-scale collaborative projects.

  13. Display methods of electronic patient record screens: patient privacy concerns.

    PubMed

    Niimi, Yukari; Ota, Katsumasa

    2013-01-01

    To provide adequate care, medical professionals have to collect not only medical information but also information that may be related to private aspects of the patient's life. With patients' increasing awareness of information privacy, healthcare providers have to pay attention to the patients' right of privacy. This study aimed to clarify the requirements of the display method of electronic patient record (EPR) screens in consideration of both patients' information privacy concerns and health professionals' information needs. For this purpose, semi-structured group interviews were conducted of 78 medical professionals. They pointed out that partial concealment of information to meet patients' requests for privacy could result in challenges in (1) safety in healthcare, (2) information sharing, (3) collaboration, (4) hospital management, and (5) communication. They believed that EPRs should (1) meet the requirements of the therapeutic process, (2) have restricted access, (3) provide convenient access to necessary information, and (4) facilitate interprofessional collaboration. This study provides direction for the development of display methods that balance the sharing of vital information and protection of patient privacy.

  14. Print, Broadcast Students Share VDTs at West Fla.

    ERIC Educational Resources Information Center

    Roberts, Churchill L.; Dickson, Sandra H.

    1985-01-01

    Describes the use of video display terminals in the journalism lab of a Florida university. Discusses the different purposes for which broadcast and print journalism students use such equipment. (HTH)

  15. Revisiting control establishments for emerging energy hubs

    NASA Astrophysics Data System (ADS)

    Nasirian, Vahidreza

    Emerging small-scale energy systems, i.e., microgrids and smartgrids, rely on centralized controllers for voltage regulation, load sharing, and economic dispatch. However, the central controller is a single-point-of-failure in such a design as either the controller or attached communication links failure can render the entire system inoperable. This work seeks for alternative distributed control structures to improve system reliability and help to the scalability of the system. A cooperative distributed controller is proposed that uses a noise-resilient voltage estimator and handles global voltage regulation and load sharing across a DC microgrid. Distributed adaptive droop control is also investigated as an alternative solution. A droop-free distributed control is offered to handle voltage/frequency regulation and load sharing in AC systems. This solution does not require frequency measurement and, thus, features a fast frequency regulation. Distributed economic dispatch is also studied, where a distributed protocol is designed that controls generation units to merge their incremental costs into a consensus and, thus, push the entire system to generate with the minimum cost. Experimental verifications and Hardware-in-the-Loop (HIL) simulations are used to study efficacy of the proposed control protocols.

  16. Unification of quantum information theory

    NASA Astrophysics Data System (ADS)

    Abeyesinghe, Anura

    We present the unification of many previously disparate results in noisy quantum Shannon theory and the unification of all of noiseless quantum Shannon theory. More specifically we deal here with bipartite, unidirectional, and memoryless quantum Shannon theory. We find all the optimal protocols and quantify the relationship between the resources used, both for the one-shot and for the ensemble case, for what is arguably the most fundamental task in quantum information theory: sharing entangled states between a sender and a receiver. We find that all of these protocols are derived from our one-shot superdense coding protocol and relate nicely to each other. We then move on to noisy quantum information theory and give a simple, direct proof of the "mother" protocol, or rather her generalization to the Fully Quantum Slepian-Wolf protocol (FQSW). FQSW simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim, and Winter as well as a new class of distributed compression protocols for correlated quantum sources, which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecessary: all protocols in the family are children of the mother.

  17. Pilot evaluation of a method to assess prescribers' information processing of medication alerts.

    PubMed

    Russ, Alissa L; Melton, Brittany L; Daggy, Joanne K; Saleem, Jason J

    2017-02-01

    Prescribers commonly receive alerts during medication ordering. Prescribers work in a complex, time-pressured environment; to enhance the effectiveness of safety alerts, the effort needed to cognitively process these alerts should be minimized. Methods to evaluate the extent to which computerized alerts support prescribers' information processing are lacking. To develop a methodological protocol to assess the extent to which alerts support prescribers' information processing at-a-glance; specifically, the incorporation of information into their working memory. We hypothesized that the method would be feasible and that we would be able to detect a significant difference in prescribers' information processing with a revised alert display that incorporates warning design guidelines compared to the original alert display. A counterbalanced, within-subject study was conducted with 20 prescribers in a human-computer interaction laboratory. We tested a single alert that was displayed in two different ways. Prescribers were informed that an alert would appear for 10s. After the alert was shown, a white screen was displayed, and prescribers were asked to verbally describe what they saw; indicate how many total warnings; and describe anything else they remembered about the alert. We measured information processing via the accuracy of prescribers' free recall and their ability to identify that three warning messages were present. Two analysts independently evaluated participants' responses against a comprehensive catalog of alert elements and then discussed discrepancies until reaching consensus. This feasibility study demonstrated that the method seemed to be effective for evaluating prescribers' information processing of medication alert displays. With this method, we were able to detect significant differences in prescribers' recall of alert information. The proportion of total data elements that prescribers were able to accurately recall was significantly greater for the revised versus original alert display (p=0.006). With the revised display, more prescribers accurately reported that three warnings were shown (p=0.002). The methodological protocol was feasible for evaluating the alert display and yielded important findings on prescribers' information processing. Study methods supplement traditional usability evaluation methods and may be useful for evaluating information processing of other healthcare technologies. Published by Elsevier Inc.

  18. Advancing Proteomics Research through Collaboration | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    The National Cancer Institute (NCI), through the Office of Cancer Clinical Proteomics Research (OCCPR), has signed two Memorandums of Understanding (MOUs) in the areas of sharing proteomics reagents and protocols and also in regulatory science.

  19. Multisites Coordination in Shared Multicast Trees

    DTIC Science & Technology

    1999-01-01

    conferencing, distributed interactive simulations, and collaborative systems. We de- scribe a novel protocol to coordinate multipoint groupwork in the IP...multicast framework. The pro- tocol supports Internet-wide coordination for large and highly-interactive groupwork , relying on trans- mission of

  20. E-Learning

    ERIC Educational Resources Information Center

    Buzzi, Marina, Ed.

    2010-01-01

    E-Learning is a vast and complex research topic that poses many challenges in every aspect: educational and pedagogical strategies and techniques and the tools for achieving them; usability, accessibility and user interface design; knowledge sharing and collaborative environments; technologies, architectures, and protocols; user activity…

  1. KSC-03PD-2177

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. Children enjoy a hands-on display of fire equipment behind KSC NASA Headquarters. Employees were invited to share their work experience with their children for Take Our Children to Work Day.

  2. KSC-03PD-2178

    NASA Technical Reports Server (NTRS)

    2003-01-01

    KENNEDY SPACE CENTER, FLA. Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.

  3. Advanced teleprocessing systems

    NASA Astrophysics Data System (ADS)

    Kleinrock, L.; Gerla, M.

    1982-09-01

    This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.

  4. Demonstrating Patterns in the Views Of Stakeholders Regarding Ethically-Salient Issues in Clinical Research: A Novel Use of Graphical Models in Empirical Ethics Inquiry.

    PubMed

    Kim, Jane Paik; Roberts, Laura Weiss

    Empirical ethics inquiry works from the notion that stakeholder perspectives are necessary for gauging the ethical acceptability of human studies and assuring that research aligns with societal expectations. Although common, studies involving different populations often entail comparisons of trends that problematize the interpretation of results. Using graphical model selection - a technique aimed at transcending limitations of conventional methods - this report presents data on the ethics of clinical research with two objectives: (1) to display the patterns of views held by ill and healthy individuals in clinical research as a test of the study's original hypothesis and (2) to introduce graphical model selection as a key analytic tool for ethics research. In this IRB-approved, NIH-funded project, data were collected from 60 mentally ill and 43 physically ill clinical research protocol volunteers, 47 healthy protocol-consented participants, and 29 healthy individuals without research protocol experience. Respondents were queried on the ethical acceptability of research involving people with mental and physical illness (i.e., cancer, HIV, depression, schizophrenia, and post-traumatic stress disorder) and non-illness related sources of vulnerability (e.g., age, class, gender, ethnicity). Using a statistical algorithm, we selected graphical models to display interrelationships among responses to questions. Both mentally and physically ill protocol volunteers revealed a high degree of connectivity among ethically-salient perspectives. Healthy participants, irrespective of research protocol experience, revealed patterns of views that were not highly connected. Between ill and healthy protocol participants, the pattern of views is vastly different. Experience with illness was tied to dense connectivity, whereas healthy individuals expressed views with sparse connections. In offering a nuanced perspective on the interrelation of ethically relevant responses, graphical model selection has the potential to bring new insights to the field of ethics.

  5. A special attack on the multiparty quantum secret sharing of secure direct communication using single photons

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Gao, Fei; Wen, Qiao-Yan; Zhu, Fu-Chen

    2008-11-01

    The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled- (-iσy) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.

  6. Experimental circular quantum secret sharing over telecom fiber network.

    PubMed

    Wei, Ke-Jin; Ma, Hai-Qiang; Yang, Jian-Hui

    2013-07-15

    We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.

  7. Automatic image hanging protocol for chest radiographs in PACS.

    PubMed

    Luo, Hui; Hao, Wei; Foos, David H; Cornelius, Craig W

    2006-04-01

    Chest radiography is one of the most widely used techniques in diagnostic imaging. It comprises at least one-third of all diagnostic radiographic procedures in hospitals. However, in the picture archive and communication system, images are often stored with the projection and orientation unknown or mislabeled, which causes inefficiency for radiologists' interpretation. To address this problem, an automatic hanging protocol for chest radiographs is presented. The method targets the most effective region in a chest radiograph, and extracts a set of size-, rotation-, and translation-invariant features from it. Then, a well-trained classifier is used to recognize the projection. The orientation of the radiograph is later identified by locating the neck, heart, and abdomen positions in the radiographs. Initial experiments are performed on the radiographs collected from daily routine chest exams in hospitals and show promising results. Using the presented protocol, 98.2% of all cases could be hung correctly on projection view (without protocol, 62%), and 96.1% had correct orientation (without protocol, 75%). A workflow study on the protocol also demonstrates a significant improvement in efficiency for image display.

  8. NPS Collaborative Technology Testbed for ONR CKM Program

    DTIC Science & Technology

    2005-01-11

    or have access to the MIT E-Wall hosted by the TOC. The combination of E-Wall and agents lend themselves to the dynamic gathering and display of...display, intuitive icons or menus that is easy to activate and customize , and automatically seeks and connects to other like services/networks/agents...integration creates network- centric memory mechanism for developing shared understanding of SA events Data Base Integration of Sensor-DM Agents and

  9. Advances in infrastructure support for flat panel display manufacturing

    NASA Astrophysics Data System (ADS)

    Bardsley, James N.; Ciesinski, Michael F.; Pinnel, M. Robert

    1997-07-01

    The success of the US display industry, both in providing high-performance displays for the US Department of Defense at reasonable cost and in capturing a significant share of the global civilian market, depends on maintaining technological leadership and on building efficient manufacturing capabilities. The US Display Consortium (USDC) was set up in 1993 by the US Government and private industry to guide the development of the infrastructure needed to support the manufacturing of flat panel displays. This mainly involves the supply of equipment and materials, but also includes the formation of partnerships and the training of a skilled labor force. Examples are given of successful development projects, some involving USDC participation, others through independent efforts of its member companies. These examples show that US-based companies can achieve leadership positions in this young and rapidly growing global market.

  10. Shared virtual environments for aerospace training

    NASA Technical Reports Server (NTRS)

    Loftin, R. Bowen; Voss, Mark

    1994-01-01

    Virtual environments have the potential to significantly enhance the training of NASA astronauts and ground-based personnel for a variety of activities. A critical requirement is the need to share virtual environments, in real or near real time, between remote sites. It has been hypothesized that the training of international astronaut crews could be done more cheaply and effectively by utilizing such shared virtual environments in the early stages of mission preparation. The Software Technology Branch at NASA's Johnson Space Center has developed the capability for multiple users to simultaneously share the same virtual environment. Each user generates the graphics needed to create the virtual environment. All changes of object position and state are communicated to all users so that each virtual environment maintains its 'currency.' Examples of these shared environments will be discussed and plans for the utilization of the Department of Defense's Distributed Interactive Simulation (DIS) protocols for shared virtual environments will be presented. Finally, the impact of this technology on training and education in general will be explored.

  11. Ocean Optical Database

    DTIC Science & Technology

    1992-05-01

    ocean color for retrieving ocean k(490) values are examined. The validation of the optical database from the satellite is accessed through comparison...for sharing results of this validation study. We wish to thank J. Mueller for helpful discussions in optics and satellite processing and for sharing his...of these data products are displayable as 512 x 512 8-bit image maps compatible with the PC-SeaPak image format. Valid data ranges are from 1 to 255

  12. Password-only authenticated three-party key exchange with provable security in the standard model.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  13. The Simulation of Read-time Scalable Coherent Interface

    NASA Technical Reports Server (NTRS)

    Li, Qiang; Grant, Terry; Grover, Radhika S.

    1997-01-01

    Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.

  14. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  15. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  16. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  17. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    NASA Astrophysics Data System (ADS)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  18. Co-creating and Evaluating a Web-app Mapping Real-World Health Care Services for Students: The servi-Share Protocol.

    PubMed

    Montagni, Ilaria; Langlois, Emmanuel; Wittwer, Jérôme; Tzourio, Christophe

    2017-02-16

    University students aged 18-30 years are a population group reporting low access to health care services, with high rates of avoidance and delay of medical care. This group also reports not having appropriate information about available health care services. However, university students are at risk for several health problems, and regular medical consultations are recommended in this period of life. New digital devices are popular among the young, and Web-apps can be used to facilitate easy access to information regarding health care services. A small number of electronic health (eHealth) tools have been developed with the purpose of displaying real-world health care services, and little is known about how such eHealth tools can improve access to care. This paper describes the processes of co-creating and evaluating the beta version of a Web-app aimed at mapping and describing free or low-cost real-world health care services available in the Bordeaux area of France, which is specifically targeted to university students. The co-creation process involves: (1) exploring the needs of students to know and access real-world health care services; (2) identifying the real-world health care services of interest for students; and (3) deciding on a user interface, and developing the beta version of the Web-app. Finally, the evaluation process involves: (1) testing the beta version of the Web-app with the target audience (university students aged 18-30 years); (2) collecting their feedback via a satisfaction survey; and (3) planning a long-term evaluation. The co-creation process of the beta version of the Web-app was completed in August 2016 and is described in this paper. The evaluation process started on September 7, 2016. The project was completed in December 2016 and implementation of the Web-app is ongoing. Web-apps are an innovative way to increase the health literacy of young people in terms of delivery of and access to health care. The creation of Web-apps benefits from the involvement of stakeholders (eg, students and health care providers) to correctly identify the real-world health care services to be displayed. ©Ilaria Montagni, Emmanuel Langlois, Jérôme Wittwer, Christophe Tzourio. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 16.02.2017.

  19. Rating parent-child interactions: joint engagement, communication dynamics, and shared topics in autism, Down syndrome, and typical development.

    PubMed

    Adamson, Lauren B; Bakeman, Roger; Deckner, Deborah F; Nelson, P Brooke

    2012-12-01

    A battery of 17 rating items were applied to video records of typically-developing toddlers and young children with autism and Down syndrome interacting with their parents during the Communication Play Protocol. This battery provided a reliable and broad view of the joint engagement triad of child, partner, and shared topic. Ratings of the child's joint engagement correlated very strongly with state coding of joint engagement and replicated the finding that coordinated joint engagement was less likely in children with autism. Ratings of other child actions, of parent contributions, and of shared topics and communicative dynamics also documented pervasive variations related to diagnosis, language facility, and communicative context.

  20. A systematic review of the relationship between internet use, self-harm and suicidal behaviour in young people: The good, the bad and the unknown.

    PubMed

    Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate; John, Ann

    2017-01-01

    Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums' (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518).

  1. Next-Generation Search Engines for Information Retrieval

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Devarakonda, Ranjeet; Hook, Leslie A; Palanisamy, Giri

    In the recent years, there have been significant advancements in the areas of scientific data management and retrieval techniques, particularly in terms of standards and protocols for archiving data and metadata. Scientific data is rich, and spread across different places. In order to integrate these pieces together, a data archive and associated metadata should be generated. Data should be stored in a format that can be retrievable and more importantly it should be in a format that will continue to be accessible as technology changes, such as XML. While general-purpose search engines (such as Google or Bing) are useful formore » finding many things on the Internet, they are often of limited usefulness for locating Earth Science data relevant (for example) to a specific spatiotemporal extent. By contrast, tools that search repositories of structured metadata can locate relevant datasets with fairly high precision, but the search is limited to that particular repository. Federated searches (such as Z39.50) have been used, but can be slow and the comprehensiveness can be limited by downtime in any search partner. An alternative approach to improve comprehensiveness is for a repository to harvest metadata from other repositories, possibly with limits based on subject matter or access permissions. Searches through harvested metadata can be extremely responsive, and the search tool can be customized with semantic augmentation appropriate to the community of practice being served. One such system, Mercury, a metadata harvesting, data discovery, and access system, built for researchers to search to, share and obtain spatiotemporal data used across a range of climate and ecological sciences. Mercury is open-source toolset, backend built on Java and search capability is supported by the some popular open source search libraries such as SOLR and LUCENE. Mercury harvests the structured metadata and key data from several data providing servers around the world and builds a centralized index. The harvested files are indexed against SOLR search API consistently, so that it can render search capabilities such as simple, fielded, spatial and temporal searches across a span of projects ranging from land, atmosphere, and ocean ecology. Mercury also provides data sharing capabilities using Open Archive Initiatives Protocol for Metadata Handling (OAI-PMH). In this paper we will discuss about the best practices for archiving data and metadata, new searching techniques, efficient ways of data retrieval and information display.« less

  2. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    PubMed

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  3. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  4. Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    NASA Technical Reports Server (NTRS)

    Shaw, Harry; Hussein, Sayed; Helgert, Hermann

    2011-01-01

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.

  5. PR-PR: Cross-Platform Laboratory Automation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Linshiz, G; Stawski, N; Goyal, G

    To enable protocol standardization, sharing, and efficient implementation across laboratory automation platforms, we have further developed the PR-PR open-source high-level biology-friendly robot programming language as a cross-platform laboratory automation system. Beyond liquid-handling robotics, PR-PR now supports microfluidic and microscopy platforms, as well as protocol translation into human languages, such as English. While the same set of basic PR-PR commands and features are available for each supported platform, the underlying optimization and translation modules vary from platform to platform. Here, we describe these further developments to PR-PR, and demonstrate the experimental implementation and validation of PR-PR protocols for combinatorial modified Goldenmore » Gate DNA assembly across liquid-handling robotic, microfluidic, and manual platforms. To further test PR-PR cross-platform performance, we then implement and assess PR-PR protocols for Kunkel DNA mutagenesis and hierarchical Gibson DNA assembly for microfluidic and manual platforms.« less

  6. Design of the frame structure for a multiservice interactive system using ATM-PON

    NASA Astrophysics Data System (ADS)

    Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae

    1998-10-01

    The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.

  7. BioBlocks: Programming Protocols in Biology Made Easier.

    PubMed

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  8. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  9. PR-PR: cross-platform laboratory automation system.

    PubMed

    Linshiz, Gregory; Stawski, Nina; Goyal, Garima; Bi, Changhao; Poust, Sean; Sharma, Monica; Mutalik, Vivek; Keasling, Jay D; Hillson, Nathan J

    2014-08-15

    To enable protocol standardization, sharing, and efficient implementation across laboratory automation platforms, we have further developed the PR-PR open-source high-level biology-friendly robot programming language as a cross-platform laboratory automation system. Beyond liquid-handling robotics, PR-PR now supports microfluidic and microscopy platforms, as well as protocol translation into human languages, such as English. While the same set of basic PR-PR commands and features are available for each supported platform, the underlying optimization and translation modules vary from platform to platform. Here, we describe these further developments to PR-PR, and demonstrate the experimental implementation and validation of PR-PR protocols for combinatorial modified Golden Gate DNA assembly across liquid-handling robotic, microfluidic, and manual platforms. To further test PR-PR cross-platform performance, we then implement and assess PR-PR protocols for Kunkel DNA mutagenesis and hierarchical Gibson DNA assembly for microfluidic and manual platforms.

  10. Transport Protocols for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Eddie Law, K. L.

    Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.

  11. An upper bound on the second order asymptotic expansion for the quantum communication cost of state redistribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Datta, Nilanjana, E-mail: n.datta@statslab.cam.ac.uk; Hsieh, Min-Hsiu, E-mail: Min-Hsiu.Hsieh@uts.edu.au; Oppenheim, Jonathan, E-mail: j.oppenheim@ucl.ac.uk

    State redistribution is the protocol in which given an arbitrary tripartite quantum state, with two of the subsystems initially being with Alice and one being with Bob, the goal is for Alice to send one of her subsystems to Bob, possibly with the help of prior shared entanglement. We derive an upper bound on the second order asymptotic expansion for the quantum communication cost of achieving state redistribution with a given finite accuracy. In proving our result, we also obtain an upper bound on the quantum communication cost of this protocol in the one-shot setting, by using the protocol ofmore » coherent state merging as a primitive.« less

  12. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  13. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  14. Confidentiality and spatially explicit data: Concerns and challenges

    PubMed Central

    VanWey, Leah K.; Rindfuss, Ronald R.; Gutmann, Myron P.; Entwisle, Barbara; Balk, Deborah L.

    2005-01-01

    Recent theoretical, methodological, and technological advances in the spatial sciences create an opportunity for social scientists to address questions about the reciprocal relationship between context (spatial organization, environment, etc.) and individual behavior. This emerging research community has yet to adequately address the new threats to the confidentiality of respondent data in spatially explicit social survey or census data files, however. This paper presents four sometimes conflicting principles for the conduct of ethical and high-quality science using such data: protection of confidentiality, the social–spatial linkage, data sharing, and data preservation. The conflict among these four principles is particularly evident in the display of spatially explicit data through maps combined with the sharing of tabular data files. This paper reviews these two research activities and shows how current practices favor one of the principles over the others and do not satisfactorily resolve the conflict among them. Maps are indispensable for the display of results but also reveal information on the location of respondents and sampling clusters that can then be used in combination with shared data files to identify respondents. The current practice of sharing modified or incomplete data sets or using data enclaves is not ideal for either the advancement of science or the protection of confidentiality. Further basic research and open debate are needed to advance both understanding of and solutions to this dilemma. PMID:16230608

  15. Biodiversity gains from efficient use of private sponsorship for flagship species conservation.

    PubMed

    Bennett, Joseph R; Maloney, Richard; Possingham, Hugh P

    2015-04-22

    To address the global extinction crisis, both efficient use of existing conservation funding and new sources of funding are vital. Private sponsorship of charismatic 'flagship' species conservation represents an important source of new funding, but has been criticized as being inefficient. However, the ancillary benefits of privately sponsored flagship species conservation via actions benefiting other species have not been quantified, nor have the benefits of incorporating such sponsorship into objective prioritization protocols. Here, we use a comprehensive dataset of conservation actions for the 700 most threatened species in New Zealand to examine the potential biodiversity gains from national private flagship species sponsorship programmes. We find that private funding for flagship species can clearly result in additional species and phylogenetic diversity conserved, via conservation actions shared with other species. When private flagship species funding is incorporated into a prioritization protocol to preferentially sponsor shared actions, expected gains can be more than doubled. However, these gains are consistently smaller than expected gains in a hypothetical scenario where private funding could be optimally allocated among all threatened species. We recommend integrating private sponsorship of flagship species into objective prioritization protocols to sponsor efficient actions that maximize biodiversity gains, or wherever possible, encouraging private donations for broader biodiversity goals. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  16. Biodiversity gains from efficient use of private sponsorship for flagship species conservation

    PubMed Central

    Bennett, Joseph R.; Maloney, Richard; Possingham, Hugh P.

    2015-01-01

    To address the global extinction crisis, both efficient use of existing conservation funding and new sources of funding are vital. Private sponsorship of charismatic ‘flagship’ species conservation represents an important source of new funding, but has been criticized as being inefficient. However, the ancillary benefits of privately sponsored flagship species conservation via actions benefiting other species have not been quantified, nor have the benefits of incorporating such sponsorship into objective prioritization protocols. Here, we use a comprehensive dataset of conservation actions for the 700 most threatened species in New Zealand to examine the potential biodiversity gains from national private flagship species sponsorship programmes. We find that private funding for flagship species can clearly result in additional species and phylogenetic diversity conserved, via conservation actions shared with other species. When private flagship species funding is incorporated into a prioritization protocol to preferentially sponsor shared actions, expected gains can be more than doubled. However, these gains are consistently smaller than expected gains in a hypothetical scenario where private funding could be optimally allocated among all threatened species. We recommend integrating private sponsorship of flagship species into objective prioritization protocols to sponsor efficient actions that maximize biodiversity gains, or wherever possible, encouraging private donations for broader biodiversity goals. PMID:25808885

  17. Water, Water, Everywhere: Defining and Assessing Data Sharing in Academia.

    PubMed

    Van Tuyl, Steven; Whitmire, Amanda L

    2016-01-01

    Sharing of research data has begun to gain traction in many areas of the sciences in the past few years because of changing expectations from the scientific community, funding agencies, and academic journals. National Science Foundation (NSF) requirements for a data management plan (DMP) went into effect in 2011, with the intent of facilitating the dissemination and sharing of research results. Many projects that were funded during 2011 and 2012 should now have implemented the elements of the data management plans required for their grant proposals. In this paper we define 'data sharing' and present a protocol for assessing whether data have been shared and how effective the sharing was. We then evaluate the data sharing practices of researchers funded by the NSF at Oregon State University in two ways: by attempting to discover project-level research data using the associated DMP as a starting point, and by examining data sharing associated with journal articles that acknowledge NSF support. Sharing at both the project level and the journal article level was not carried out in the majority of cases, and when sharing was accomplished, the shared data were often of questionable usability due to access, documentation, and formatting issues. We close the article by offering recommendations for how data producers, journal publishers, data repositories, and funding agencies can facilitate the process of sharing data in a meaningful way.

  18. Rigidity of quantum steering and one-sided device-independent verifiable quantum computation

    NASA Astrophysics Data System (ADS)

    Gheorghiu, Alexandru; Wallden, Petros; Kashefi, Elham

    2017-02-01

    The relationship between correlations and entanglement has played a major role in understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. 47 777-80). Tsirelson proved that Bell states, shared among two parties, when measured suitably, achieve the maximum non-local correlations allowed by quantum mechanics (Cirel’son 1980 Lett. Math. Phys. 4 93-100). Conversely, Reichardt et al showed that observing the maximal correlation value over a sequence of repeated measurements, implies that the underlying quantum state is close to a tensor product of maximally entangled states and, moreover, that it is measured according to an ideal strategy (Reichardt et al 2013 Nature 496 456-60). However, this strong rigidity result comes at a high price, requiring a large number of entangled pairs to be tested. In this paper, we present a significant improvement in terms of the overhead by instead considering quantum steering where the device of the one side is trusted. We first demonstrate a robust one-sided device-independent version of self-testing, which characterises the shared state and measurement operators of two parties up to a certain bound. We show that this bound is optimal up to constant factors and we generalise the results for the most general attacks. This leads us to a rigidity theorem for maximal steering correlations. As a key application we give a one-sided device-independent protocol for verifiable delegated quantum computation, and compare it to other existing protocols, to highlight the cost of trust assumptions. Finally, we show that under reasonable assumptions, the states shared in order to run a certain type of verification protocol must be unitarily equivalent to perfect Bell states.

  19. Systems, methods, and products for graphically illustrating and controlling a droplet actuator

    NASA Technical Reports Server (NTRS)

    Brafford, Keith R. (Inventor); Pamula, Vamsee K. (Inventor); Paik, Philip Y. (Inventor); Pollack, Michael G. (Inventor); Sturmer, Ryan A. (Inventor); Smith, Gregory F. (Inventor)

    2010-01-01

    Systems for controlling a droplet microactuator are provided. According to one embodiment, a system is provided and includes a controller, a droplet microactuator electronically coupled to the controller, and a display device displaying a user interface electronically coupled to the controller, wherein the system is programmed and configured to permit a user to effect a droplet manipulation by interacting with the user interface. According to another embodiment, a system is provided and includes a processor, a display device electronically coupled to the processor, and software loaded and/or stored in a storage device electronically coupled to the controller, a memory device electronically coupled to the controller, and/or the controller and programmed to display an interactive map of a droplet microactuator. According to yet another embodiment, a system is provided and includes a controller, a droplet microactuator electronically coupled to the controller, a display device displaying a user interface electronically coupled to the controller, and software for executing a protocol loaded and/or stored in a storage device electronically coupled to the controller, a memory device electronically coupled to the controller, and/or the controller.

  20. Military display market: third comprehensive edition

    NASA Astrophysics Data System (ADS)

    Desjardins, Daniel D.; Hopper, Darrel G.

    2002-08-01

    Defense displays comprise a niche market whose continually high performance requirements drive technology. The military displays market is being characterized to ascertain opportunities for synergy across platforms, and needs for new technology. All weapons systems are included. Some 382,585 displays are either now in use or planned in DoD weapon systems over the next 15 years, comprising displays designed into direct-view, projection-view, and virtual- image-view applications. This defense niche market is further fractured into 1163 micro-niche markets by the some 403 program offices who make decisions independently of one another. By comparison, a consumer electronics product has volumes of tens-of-millions of units for a single fixed design. Some 81% of defense displays are ruggedized versions of consumer-market driven designs. Some 19% of defense displays, especially in avionics cockpits and combat crewstations, are custom designs to gain the additional performance available in the technology base but not available in consumer-market-driven designs. Defense display sizes range from 13.6 to 4543 mm. More than half of defense displays are now based on some form of flat panel display technology, especially thin-film-transistor active matrix liquid crystal display (TFT AMLCD); the cathode ray tube (CRT) is still widely used but continuing to drop rapidly in defense market share.

  1. Drought Stress Predominantly Endures Arabidopsis thaliana to Pseudomonas syringae Infection

    PubMed Central

    Gupta, Aarti; Dixit, Sandeep K.; Senthil-Kumar, Muthappa

    2016-01-01

    Plant responses to a combination of drought and bacterial pathogen infection, an agronomically important and altogether a new stress, are not well-studied. While occurring concurrently, these two stresses can lead to synergistic or antagonistic effects on plants due to stress-interaction. It is reported that plant responses to the stress combinations consist of both strategies, unique to combined stress and those shared between combined and individual stresses. However, the combined stress response mechanisms governing stress interaction and net impact are largely unknown. In order to study these adaptive strategies, an accurate and convenient methodology is lacking even in model plants like Arabidopsis thaliana. The gradual nature of drought stress imposition protocol poses a hindrance in simultaneously applying pathogen infection under laboratory conditions to achieve combined stress. In present study we aimed to establish systematic combined stress protocol and to study physiological responses of the plants to various degrees of combined stress. Here, we have comprehensively studied the impact of combined drought and Pseudomonas syringae pv. tomato DC3000 infection on A. thaliana. Further, by employing different permutations of drought and pathogen stress intensities, an attempt was made to dissect the contribution of each individual stress effects during their concurrence. We hereby present two main aspects of combined stress viz., stress interaction and net impact of the stress on plants. Mainly, this study established a systematic protocol to assess the impact of combined drought and bacterial pathogen stress. It was observed that as a result of net impact, some physiological responses under combined stress are tailored when compared to the plants exposed to individual stresses. We also infer that plant responses under combined stress in this study are predominantly influenced by the drought stress. Our results show that pathogen multiplication was reduced by drought stress in combined stressed plants. Combined stressed plants also displayed reduced ROS generation and declined cell death which could be attributed to activation of effective basal defense responses. We hypothesize a model on ABA mediated gene regulation to partly explain the possible mechanistic basis for reduced in planta bacterial numbers under combined stress over individual pathogen stress. PMID:27375661

  2. The VLBA correlator: Real-time in the distributed era

    NASA Technical Reports Server (NTRS)

    Wells, D. C.

    1992-01-01

    The correlator is the signal processing engine of the Very Long Baseline Array (VLBA). Radio signals are recorded on special wideband (128 Mb/s) digital recorders at the 10 telescopes, with sampling times controlled by hydrogen maser clocks. The magnetic tapes are shipped to the Array Operations Center in Socorro, New Mexico, where they are played back simultaneously into the correlator. Real-time software and firmware controls the playback drives to achieve synchronization, compute models of the wavefront delay, control the numerous modules of the correlator, and record FITS files of the fringe visibilities at the back-end of the correlator. In addition to the more than 3000 custom VLSI chips which handle the massive data flow of the signal processing, the correlator contains a total of more than 100 programmable computers, 8-, 16- and 32-bit CPUs. Code is downloaded into front-end CPU's dependent on operating mode. Low-level code is assembly language, high-level code is C running under a RT OS. We use VxWorks on Motorola MVME147 CPU's. Code development is on a complex of SPARC workstations connected to the RT CPU's by Ethernet. The overall management of the correlation process is dependent on a database management system. We use Ingres running on a Sparcstation-2. We transfer logging information from the database of the VLBA Monitor and Control System to our database using Ingres/NET. Job scripts are computed and are transferred to the real-time computers using NFS, and correlation job execution logs and status flow back by the route. Operator status and control displays use windows on workstations, interfaced to the real-time processes by network protocols. The extensive network protocol support provided by VxWorks is invaluable. The VLBA Correlator's dependence on network protocols is an example of the radical transformation of the real-time world over the past five years. Real-time is becoming more like conventional computing. Paradoxically, 'conventional' computing is also adopting practices from the real-time world: semaphores, shared memory, light-weight threads, and concurrency. This appears to be a convergence of thinking.

  3. Large-screen display technology assessment for military applications

    NASA Astrophysics Data System (ADS)

    Blaha, Richard J.

    1990-08-01

    Full-color, large screen display systems can enhance military applications that require group presentation, coordinated decisions, or interaction between decision makers. The technology already plays an important role in operations centers, simulation facilities, conference rooms, and training centers. Some applications display situational, status, or briefing information, while others portray instructional material for procedural training or depict realistic panoramic scenes that are used in simulators. While each specific application requires unique values of luminance, resolution, response time, reliability, and the video interface, suitable performance can be achieved with available commercial large screen displays. Advances in the technology of large screen displays are driven by the commercial applications because the military applications do not provide the significant market share enjoyed by high definition television (HDTV), entertainment, advertisement, training, and industrial applications. This paper reviews the status of full-color, large screen display technologies and includes the performance and cost metrics of available systems. For this discussion, performance data is based upon either measurements made by our personnel or extractions from vendors' data sheets.

  4. Practical social assessments for national forest planning.

    Treesearch

    Pamela Jakes; Thomas Fish; Deborah Carr; Dale Blahna

    1998-01-01

    Residents of northern Wisconsin identified functional communities--geographic areas in which people share perceptions of and relationships to forests and natural resources. Functional communities are a useful concept for displaying social information for forest management and planning.

  5. Maternal support for autonomy: relationships with persistence for children with Down syndrome and typically developing children.

    PubMed

    Gilmore, Linda; Cuskelly, Monica; Jobling, Anne; Hayes, Alan

    2009-01-01

    Maternal behaviors and child mastery behaviors were examined in 25 children with Down syndrome and 43 typically developing children matched for mental age (24-36 months). During a shared problem-solving task, there were no group differences in maternal directiveness or support for autonomy, and mothers in the two groups used similar verbal strategies when helping their child. There were also no group differences in child mastery behaviors, measured as persistence with two optimally challenging tasks. However, the two groups differed in the relationships of maternal style with child persistence. Children with Down syndrome whose mothers were more supportive of their autonomy in the shared task displayed greater persistence when working independently on a challenging puzzle, while children of highly directive mothers displayed lower levels of persistence. For typically developing children, persistence was unrelated to maternal style, suggesting that mother behaviors may have different causes or consequences in the two groups.

  6. Cloud-based image sharing network for collaborative imaging diagnosis and consultation

    NASA Astrophysics Data System (ADS)

    Yang, Yuanyuan; Gu, Yiping; Wang, Mingqing; Sun, Jianyong; Li, Ming; Zhang, Weiqiang; Zhang, Jianguo

    2018-03-01

    In this presentation, we presented a new approach to design cloud-based image sharing network for collaborative imaging diagnosis and consultation through Internet, which can enable radiologists, specialists and physicians locating in different sites collaboratively and interactively to do imaging diagnosis or consultation for difficult or emergency cases. The designed network combined a regional RIS, grid-based image distribution management, an integrated video conferencing system and multi-platform interactive image display devices together with secured messaging and data communication. There are three kinds of components in the network: edge server, grid-based imaging documents registry and repository, and multi-platform display devices. This network has been deployed in a public cloud platform of Alibaba through Internet since March 2017 and used for small lung nodule or early staging lung cancer diagnosis services between Radiology departments of Huadong hospital in Shanghai and the First Hospital of Jiaxing in Zhejiang Province.

  7. Research on tactical information display technology for interactive virtual cockpit

    NASA Astrophysics Data System (ADS)

    Sun, Zhongyun; Tian, Tao; Su, Feng

    2018-04-01

    Based on a fact that traditional tactical information display technology suffers from disadvantages of a large number of data to be transferred and low plotting efficiency in an interactive virtual cockpit, a GID protocol-based simulation has been designed. This method dissolves complex tactical information screens into basic plotting units. The indication of plotting units is controlled via the plotting commands, which solves the incompatibility between the tactical information display in traditional simulation and the desktop-based virtual simulation training system. Having been used in desktop systems for helicopters, fighters, and transporters, this method proves to be scientific and reasonable in design and simple and efficient in usage, which exerts a significant value in establishing aviation equipment technology support training products.

  8. Facilitating Secure Sharing of Personal Health Data in the Cloud

    PubMed Central

    Nepal, Surya; Glozier, Nick

    2016-01-01

    Background Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. Objective This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. Methods We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). Results We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. Conclusions We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors. PMID:27234691

  9. Differential Sarcomere and Electrophysiological Maturation of Human iPSC-Derived Cardiac Myocytes in Monolayer vs. Aggregation-Based Differentiation Protocols

    PubMed Central

    Jeziorowska, Dorota; Fontaine, Vincent; Jouve, Charlène; Villard, Eric; Dussaud, Sébastien; Akbar, David; Letang, Valérie; Cervello, Pauline; Itier, Jean-Michiel; Pruniaux, Marie-Pierre; Hulot, Jean-Sébastien

    2017-01-01

    Human induced pluripotent stem cells (iPSCs) represent a powerful human model to study cardiac disease in vitro, notably channelopathies and sarcomeric cardiomyopathies. Different protocols for cardiac differentiation of iPSCs have been proposed either based on embroid body formation (3D) or, more recently, on monolayer culture (2D). We performed a direct comparison of the characteristics of the derived cardiomyocytes (iPSC-CMs) on day 27 ± 2 of differentiation between 3D and 2D differentiation protocols with two different Wnt-inhibitors were compared: IWR1 (inhibitor of Wnt response) or IWP2 (inhibitor of Wnt production). We firstly found that the level of Troponin T (TNNT2) expression measured by FACS was significantly higher for both 2D protocols as compared to the 3D protocol. In the three methods, iPSC-CM show sarcomeric structures. However, iPSC-CM generated in 2D protocols constantly displayed larger sarcomere lengths as compared to the 3D protocol. In addition, mRNA and protein analyses reveal higher cTNi to ssTNi ratios in the 2D protocol using IWP2 as compared to both other protocols, indicating a higher sarcomeric maturation. Differentiation of cardiac myocytes with 2D monolayer-based protocols and the use of IWP2 allows the production of higher yield of cardiac myocytes that have more suitable characteristics to study sarcomeric cardiomyopathies. PMID:28587156

  10. Frontal-parietal synchrony in elderly EEG for visual search.

    PubMed

    Phillips, Steven; Takeda, Yuji

    2010-01-01

    Aging involves selective changes in attentional control. However, its precise effect on visual attention is difficult to discern from behavioural studies alone. In this paper, we employ a recently developed phase-locking measure of synchrony as an indicator of top-down/bottom-up control of attention to assess attentional control in the elderly. Fourteen participants (63-74 years) searched for a target item (coloured, oriented rectangular bar) among a display set of distractors. For the feature search condition, where none of the distractors shared a feature with the target, search time did not increase with display set size (two, or four items). For the conjunctive search condition, where each distractor shared either a colour or orientation feature with the target, search time increased with display size. Phase-locking analysis revealed a significant increase in high gamma-band (36-56 Hz) synchrony indicating greater bottom-up control for feature than conjunctive search. In view of our earlier study on younger (21-32 years) adults (Phillips and Takeda, 2009), these results suggest that older participants are more likely to use bottom-up control of attention, possibly triggered by their greater susceptibility to attentional capture, than younger participants. Copyright (c) 2009 Elsevier B.V. All rights reserved.

  11. Aggression and withdrawal related behavior within conflict management progression in preschool boys with language impairment.

    PubMed

    Horowitz, Laura; Westlund, Karolina; Ljungberg, Tomas

    2007-10-01

    This study examined conflict behavior in naturalistic preschool settings to better understand the role of non-affiliative behavior and language in conflict management. Free-play at preschool was filmed among 20 boys with typically developing language (TL) and among 11 boys with Language Impairment (LI); the boys 4-7 years old. Conflict behavior was coded and analyzed with a validated system. Post-conflict non-affiliative behavior (aggression and withdrawal) displays, and the links between the displays and reconciliation (i.e., former opponents exchange friendly behavioral shortly after conflict termination) was examined. Group comparisons revealed boys with LI displayed aggression in a smaller share of conflicts, but exhibited [Symbol: see text]active' withdrawal (left the room), in a larger conflict share. Boys with TL overcame aggression (more common TL behavior) and after reconciled, to a greater extent than the boys with LI after active withdrawal (more common LI behavior). Also, after reciprocal or only verbal aggression, boys with LI reconciled to a lesser extent than boys with TL. The boys with LI demonstrated difficulties confronting conflict management, as well as concluding emotionally heightened and aggressive behavioral turns.

  12. Infrastructure-Less Communication Platform for Off-The-Shelf Android Smartphones

    PubMed Central

    2018-01-01

    As smartphones and other small portable devices become more sophisticated and popular, opportunities for communication and information sharing among such device users have increased. In particular, since it is known that infrastructure-less device-to-device (D2D) communication platforms consisting only of such devices are excellent in terms of, for example, bandwidth efficiency, efforts are being made to merge their information sharing capabilities with conventional infrastructure. However, efficient multi-hop communication is difficult with the D2D communication protocol, and many conventional D2D communication platforms require modifications of the protocol and terminal operating systems (OSs). In response to these issues, this paper reports on a proposed tree-structured D2D communication platform for Android devices that combines Wi-Fi Direct and Wi-Fi functions. The proposed platform, which is expected to be used with general Android 4.0 (or higher) OS equipped terminals, makes it possible to construct an ad hoc network instantaneously without sharing prior knowledge among participating devices. We will show the feasibility of our proposed platform through its design and demonstrate the implementation of a prototype using real devices. In addition, we will report on our investigation into communication delays and stability based on the number of hops and on terminal performance through experimental confirmation experiments. PMID:29510536

  13. Infrastructure-Less Communication Platform for Off-The-Shelf Android Smartphones.

    PubMed

    Oide, Takuma; Abe, Toru; Suganuma, Takuo

    2018-03-04

    As smartphones and other small portable devices become more sophisticated and popular, opportunities for communication and information sharing among such device users have increased. In particular, since it is known that infrastructure-less device-to-device (D2D) communication platforms consisting only of such devices are excellent in terms of, for example, bandwidth efficiency, efforts are being made to merge their information sharing capabilities with conventional infrastructure. However, efficient multi-hop communication is difficult with the D2D communication protocol, and many conventional D2D communication platforms require modifications of the protocol and terminal operating systems (OSs). In response to these issues, this paper reports on a proposed tree-structured D2D communication platform for Android devices that combines Wi-Fi Direct and Wi-Fi functions. The proposed platform, which is expected to be used with general Android 4.0 (or higher) OS equipped terminals, makes it possible to construct an ad hoc network instantaneously without sharing prior knowledge among participating devices. We will show the feasibility of our proposed platform through its design and demonstrate the implementation of a prototype using real devices. In addition, we will report on our investigation into communication delays and stability based on the number of hops and on terminal performance through experimental confirmation experiments.

  14. Construction of a filamentous phage display peptide library.

    PubMed

    Fagerlund, Annette; Myrset, Astrid Hilde; Kulseth, Mari Ann

    2014-01-01

    The concept of phage display is based on insertion of random oligonucleotides at an appropriate location within a structural gene of a bacteriophage. The resulting phage will constitute a library of random peptides displayed on the surface of the bacteriophages, with the encoding genotype packaged within each phage particle. Using a phagemid/helper phage system, the random peptides are interspersed between wild-type coat proteins. Libraries of phage-expressed peptides may be used to search for novel peptide ligands to target proteins. The success of finding a peptide with a desired property in a given library is highly dependent on the diversity and quality of the library. The protocols in this chapter describe the construction of a high-diversity library of phagemid vector encoding fusions of the phage coat protein pVIII with random peptides, from which a phage library displaying random peptides can be prepared.

  15. Developing Intranets: Practical Issues for Implementation and Design.

    ERIC Educational Resources Information Center

    Trowbridge, Dave

    1996-01-01

    An intranet is a system which has "domesticated" the technologies of the Internet for specific organizational settings and goals. Although the adaptability of Hypertext Markup Language to intranets is sometimes limited, implementing various protocols and technologies enable organizations to share files among heterogeneous computers,…

  16. A LAN Primer.

    ERIC Educational Resources Information Center

    Hazari, Sunil I.

    1991-01-01

    Local area networks (LANs) are systems of computers and peripherals connected together for the purposes of electronic mail and the convenience of sharing information and expensive resources. In planning the design of such a system, the components to consider are hardware, software, transmission media, topology, operating systems, and protocols.…

  17. Global scientific research commons under the Nagoya Protocol: Towards a collaborative economy model for the sharing of basic research assets.

    PubMed

    Dedeurwaerdere, Tom; Melindi-Ghidi, Paolo; Broggiato, Arianna

    2016-01-01

    This paper aims to get a better understanding of the motivational and transaction cost features of building global scientific research commons, with a view to contributing to the debate on the design of appropriate policy measures under the recently adopted Nagoya Protocol. For this purpose, the paper analyses the results of a world-wide survey of managers and users of microbial culture collections, which focused on the role of social and internalized motivations, organizational networks and external incentives in promoting the public availability of upstream research assets. Overall, the study confirms the hypotheses of the social production model of information and shareable goods, but it also shows the need to complete this model. For the sharing of materials, the underlying collaborative economy in excess capacity plays a key role in addition to the social production, while for data, competitive pressures amongst scientists tend to play a bigger role.

  18. Synchronised integrated online e-health profiles.

    PubMed

    Liang, Jian; Iannella, Renato; Sahama, Tony

    2011-01-01

    Web-based social networking applications have become increasingly important in recent years. The current applications in the healthcare sphere can support the health management, but to date there is no patient-controlled integrator. This paper proposes a platform called Multiple Profile Manager (MPM) that enables a user to create and manage an integrated profile that can be shared across numerous social network sites. Moreover, it is able to facilitate the collection of personal healthcare data, which makes a contribution to the development of public health informatics. Here we want to illustrate how patients and physicians can be benefited from enabling the platform for online social network sites. The MPM simplifies the management of patients' profiles and allows health professionals to obtain a more complete picture of the patients' background so that they can provide better health care. To do so, we demonstrate a prototype of the platform and describe its protocol specification, which is an XMPP (Extensible Messaging and Presence Protocol) [1] extension, for sharing and synchronising profile data (vCard²) between different social networks.

  19. Running a network on a shoestring: the Global Invasive Species Information Network

    USGS Publications Warehouse

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  20. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  1. Cache-based error recovery for shared memory multiprocessor systems

    NASA Technical Reports Server (NTRS)

    Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.

    1989-01-01

    A multiprocessor cache-based checkpointing and recovery scheme for of recovering from transient processor errors in a shared-memory multiprocessor with private caches is presented. New implementation techniques that use checkpoint identifiers and recovery stacks to reduce performance degradation in processor utilization during normal execution are examined. This cache-based checkpointing technique prevents rollback propagation, provides for rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions that take error latency into account are presented.

  2. Evaluation of the Display of Cognitive State Feedback to Drive Adaptive Task Sharing

    PubMed Central

    Dorneich, Michael C.; Passinger, Břetislav; Hamblin, Christopher; Keinrath, Claudia; Vašek, Jiři; Whitlow, Stephen D.; Beekhuyzen, Martijn

    2017-01-01

    This paper presents an adaptive system intended to address workload imbalances between pilots in future flight decks. Team performance can be maximized when task demands are balanced within crew capabilities and resources. Good communication skills enable teams to adapt to changes in workload, and include the balancing of workload between team members This work addresses human factors priorities in the aviation domain with the goal to develop concepts that balance operator workload, support future operator roles and responsibilities, and support new task requirements, while allowing operators to focus on the most safety critical tasks. A traditional closed-loop adaptive system includes the decision logic to turn automated adaptations on and off. This work takes a novel approach of replacing the decision logic, normally performed by the automation, with human decisions. The Crew Workload Manager (CWLM) was developed to objectively display the workload between pilots and recommend task sharing; it is then the pilots who “close the loop” by deciding how to best mitigate unbalanced workload. The workload was manipulated by the Shared Aviation Task Battery (SAT-B), which was developed to provide opportunities for pilots to mitigate imbalances in workload between crew members. Participants were put in situations of high and low workload (i.e., workload was manipulated as opposed to being measured), the workload was then displayed to pilots, and pilots were allowed to decide how to mitigate the situation. An evaluation was performed that utilized the SAT-B to manipulate workload and create workload imbalances. Overall, the CWLM reduced the time spent in unbalanced workload and improved the crew coordination in task sharing while not negatively impacting concurrent task performance. Balancing workload has the potential to improve crew resource management and task performance over time, and reduce errors and fatigue. Paired with a real-time workload measurement system, the CWLM could help teams manage their own task load distribution. PMID:28400716

  3. Evaluation of the Display of Cognitive State Feedback to Drive Adaptive Task Sharing.

    PubMed

    Dorneich, Michael C; Passinger, Břetislav; Hamblin, Christopher; Keinrath, Claudia; Vašek, Jiři; Whitlow, Stephen D; Beekhuyzen, Martijn

    2017-01-01

    This paper presents an adaptive system intended to address workload imbalances between pilots in future flight decks. Team performance can be maximized when task demands are balanced within crew capabilities and resources. Good communication skills enable teams to adapt to changes in workload, and include the balancing of workload between team members This work addresses human factors priorities in the aviation domain with the goal to develop concepts that balance operator workload, support future operator roles and responsibilities, and support new task requirements, while allowing operators to focus on the most safety critical tasks. A traditional closed-loop adaptive system includes the decision logic to turn automated adaptations on and off. This work takes a novel approach of replacing the decision logic, normally performed by the automation, with human decisions. The Crew Workload Manager (CWLM) was developed to objectively display the workload between pilots and recommend task sharing; it is then the pilots who "close the loop" by deciding how to best mitigate unbalanced workload. The workload was manipulated by the Shared Aviation Task Battery (SAT-B), which was developed to provide opportunities for pilots to mitigate imbalances in workload between crew members. Participants were put in situations of high and low workload (i.e., workload was manipulated as opposed to being measured), the workload was then displayed to pilots, and pilots were allowed to decide how to mitigate the situation. An evaluation was performed that utilized the SAT-B to manipulate workload and create workload imbalances. Overall, the CWLM reduced the time spent in unbalanced workload and improved the crew coordination in task sharing while not negatively impacting concurrent task performance. Balancing workload has the potential to improve crew resource management and task performance over time, and reduce errors and fatigue. Paired with a real-time workload measurement system, the CWLM could help teams manage their own task load distribution.

  4. The Development and Piloting of a Mobile Data Collection Protocol to Assess Compliance With a National Tobacco Advertising, Promotion, and Product Display Ban at Retail Venues in the Russian Federation

    PubMed Central

    Grant, Ashley S; Spires, Mark H; Cohen, Joanna E

    2016-01-01

    Background Tobacco control policies that lead to a significant reduction in tobacco industry marketing can improve public health by reducing consumption of tobacco and preventing initiation of tobacco use. Laws that ban or restrict advertising and promotion in point-of-sale (POS) environments, in the moment when consumers decide whether or not to purchase a tobacco product, must be correctly implemented to achieve the desired public health benefits. POS policy compliance assessments can support implementation; however, there are challenges to conducting evaluations that are rigorous, cost-effective, and timely. Data collection must be discreet, accurate, and systematic, and ideally collected both before and after policies take effect. The use of mobile phones and other mobile technology provide opportunities to efficiently collect data and support effective tobacco control policies. The Russian Federation (Russia) passed a comprehensive national tobacco control law that included a ban on most forms of tobacco advertising and promotion, effective November 15, 2013. The legislation further prohibited the display of tobacco products at retail trade sites and eliminated kiosks as a legal trade site, effective June 1, 2014. Objective The objective of the study was to develop and test a mobile data collection protocol including: (1) retailer sampling, (2) adaptation of survey instruments for mobile phones, and (3) data management protocols. Methods Two waves of observations were conducted; wave 1 took place during April-May 2014, after the advertising and promotion bans were effective, and again in August-September 2014, after the product display ban and elimination of tobacco sales in kiosks came into effect. Sampling took place in 5 Russian cities: Moscow, St. Petersburg, Novosibirsk, Yekaterinburg, and Kazan. Lack of access to a comprehensive list of licensed tobacco retailers necessitated a sampling approach that included the development of a walking protocol to identify tobacco retailers to observe. Observation instruments were optimized for use on mobile devices and included the collection of images/photos and the geographic location of retailers. Data were uploaded in real-time to a remote (“cloud-based”) server accessible via Internet and verified with the use of a data management protocol that included submission of daily field notes from the research team for review by project managers. Results The walking protocol was a practical means of identifying 780 relevant retail venues in Russia, in the absence of reliable sampling resources. Mobile phones were convenient tools for completing observation checklists discretely and accurately. Daily field notes and meticulous oversight of collected data were critical to ensuring data quality. Conclusions Mobile technology can support timely and accurate data collection and also help monitor data quality through the use of real-time uploads. These protocols can be adapted to assess compliance with other types of public health policies. PMID:27580800

  5. The Development and Piloting of a Mobile Data Collection Protocol to Assess Compliance With a National Tobacco Advertising, Promotion, and Product Display Ban at Retail Venues in the Russian Federation.

    PubMed

    Grant, Ashley S; Kennedy, Ryan D; Spires, Mark H; Cohen, Joanna E

    2016-08-31

    Tobacco control policies that lead to a significant reduction in tobacco industry marketing can improve public health by reducing consumption of tobacco and preventing initiation of tobacco use. Laws that ban or restrict advertising and promotion in point-of-sale (POS) environments, in the moment when consumers decide whether or not to purchase a tobacco product, must be correctly implemented to achieve the desired public health benefits. POS policy compliance assessments can support implementation; however, there are challenges to conducting evaluations that are rigorous, cost-effective, and timely. Data collection must be discreet, accurate, and systematic, and ideally collected both before and after policies take effect. The use of mobile phones and other mobile technology provide opportunities to efficiently collect data and support effective tobacco control policies. The Russian Federation (Russia) passed a comprehensive national tobacco control law that included a ban on most forms of tobacco advertising and promotion, effective November 15, 2013. The legislation further prohibited the display of tobacco products at retail trade sites and eliminated kiosks as a legal trade site, effective June 1, 2014. The objective of the study was to develop and test a mobile data collection protocol including: (1) retailer sampling, (2) adaptation of survey instruments for mobile phones, and (3) data management protocols. Two waves of observations were conducted; wave 1 took place during April-May 2014, after the advertising and promotion bans were effective, and again in August-September 2014, after the product display ban and elimination of tobacco sales in kiosks came into effect. Sampling took place in 5 Russian cities: Moscow, St. Petersburg, Novosibirsk, Yekaterinburg, and Kazan. Lack of access to a comprehensive list of licensed tobacco retailers necessitated a sampling approach that included the development of a walking protocol to identify tobacco retailers to observe. Observation instruments were optimized for use on mobile devices and included the collection of images/photos and the geographic location of retailers. Data were uploaded in real-time to a remote ("cloud-based") server accessible via Internet and verified with the use of a data management protocol that included submission of daily field notes from the research team for review by project managers. The walking protocol was a practical means of identifying 780 relevant retail venues in Russia, in the absence of reliable sampling resources. Mobile phones were convenient tools for completing observation checklists discretely and accurately. Daily field notes and meticulous oversight of collected data were critical to ensuring data quality. Mobile technology can support timely and accurate data collection and also help monitor data quality through the use of real-time uploads. These protocols can be adapted to assess compliance with other types of public health policies.

  6. Exploring Patterns of Soil Organic Matter Decomposition with Students through the Global Decomposition Project (GDP) and the Interactive Model of Leaf Decomposition (IMOLD)

    NASA Astrophysics Data System (ADS)

    Steiner, S. M.; Wood, J. H.

    2015-12-01

    As decomposition rates are affected by climate change, understanding crucial soil interactions that affect plant growth and decomposition becomes a vital part of contributing to the students' knowledge base. The Global Decomposition Project (GDP) is designed to introduce and educate students about soil organic matter and decomposition through a standardized protocol for collecting, reporting, and sharing data. The Interactive Model of Leaf Decomposition (IMOLD) utilizes animations and modeling to learn about the carbon cycle, leaf anatomy, and the role of microbes in decomposition. Paired together, IMOLD teaches the background information and allows simulation of numerous scenarios, and the GDP is a data collection protocol that allows students to gather usable measurements of decomposition in the field. Our presentation will detail how the GDP protocol works, how to obtain or make the materials needed, and how results will be shared. We will also highlight learning objectives from the three animations of IMOLD, and demonstrate how students can experiment with different climates and litter types using the interactive model to explore a variety of decomposition scenarios. The GDP demonstrates how scientific methods can be extended to educate broader audiences, and data collected by students can provide new insight into global patterns of soil decomposition. Using IMOLD, students will gain a better understanding of carbon cycling in the context of litter decomposition, as well as learn to pose questions they can answer with an authentic computer model. Using the GDP protocols and IMOLD provide a pathway for scientists and educators to interact and reach meaningful education and research goals.

  7. Rate-loss analysis of an efficient quantum repeater architecture

    NASA Astrophysics Data System (ADS)

    Guha, Saikat; Krovi, Hari; Fuchs, Christopher A.; Dutton, Zachary; Slater, Joshua A.; Simon, Christoph; Tittel, Wolfgang

    2015-08-01

    We analyze an entanglement-based quantum key distribution (QKD) architecture that uses a linear chain of quantum repeaters employing photon-pair sources, spectral-multiplexing, linear-optic Bell-state measurements, multimode quantum memories, and classical-only error correction. Assuming perfect sources, we find an exact expression for the secret-key rate, and an analytical description of how errors propagate through the repeater chain, as a function of various loss-and-noise parameters of the devices. We show via an explicit analytical calculation, which separately addresses the effects of the principle nonidealities, that this scheme achieves a secret-key rate that surpasses the Takeoka-Guha-Wilde bound—a recently found fundamental limit to the rate-vs-loss scaling achievable by any QKD protocol over a direct optical link—thereby providing one of the first rigorous proofs of the efficacy of a repeater protocol. We explicitly calculate the end-to-end shared noisy quantum state generated by the repeater chain, which could be useful for analyzing the performance of other non-QKD quantum protocols that require establishing long-distance entanglement. We evaluate that shared state's fidelity and the achievable entanglement-distillation rate, as a function of the number of repeater nodes, total range, and various loss-and-noise parameters of the system. We extend our theoretical analysis to encompass sources with nonzero two-pair-emission probability, using an efficient exact numerical evaluation of the quantum state propagation and measurements. We expect our results to spur formal rate-loss analysis of other repeater protocols and also to provide useful abstractions to seed analyses of quantum networks of complex topologies.

  8. Robot training of upper limb in multiple sclerosis: comparing protocols with or without manipulative task components.

    PubMed

    Carpinella, Ilaria; Cattaneo, Davide; Bertoni, Rita; Ferrarin, Maurizio

    2012-05-01

    In this pilot study, we compared two protocols for robot-based rehabilitation of upper limb in multiple sclerosis (MS): a protocol involving reaching tasks (RT) requiring arm transport only and a protocol requiring both objects' reaching and manipulation (RMT). Twenty-two MS subjects were assigned to RT or RMT group. Both protocols consisted of eight sessions. During RT training, subjects moved the handle of a planar robotic manipulandum toward circular targets displayed on a screen. RMT protocol required patients to reach and manipulate real objects, by moving the robotic arm equipped with a handle which left the hand free for distal tasks. In both trainings, the robot generated resistive and perturbing forces. Subjects were evaluated with clinical and instrumental tests. The results confirmed that MS patients maintained the ability to adapt to the robot-generated forces and that the rate of motor learning increased across sessions. Robot-therapy significantly reduced arm tremor and improved arm kinematics and functional ability. Compared to RT, RMT protocol induced a significantly larger improvement in movements involving grasp (improvement in Grasp ARAT sub-score: RMT 77.4%, RT 29.5%, p=0.035) but not precision grip. Future studies are needed to evaluate if longer trainings and the use of robotic handles would significantly improve also fine manipulation.

  9. Enterprise GIS; economic development data portal.

    DOT National Transportation Integrated Search

    2013-04-01

    The WVDO and the OCCD have identified a need for broad access to geospatial data and applications throughout the organization. The agencies shared a need to establish a framework through which they can access, manage, disseminate, and display their d...

  10. Can teamwork and situational awareness (SA) in ED resuscitations be improved with a technological cognitive aid? Design and a pilot study of a team situation display.

    PubMed

    Parush, A; Mastoras, G; Bhandari, A; Momtahan, K; Day, K; Weitzman, B; Sohmer, B; Cwinn, A; Hamstra, S J; Calder, L

    2017-12-01

    Effective teamwork in ED resuscitations, including information sharing and situational awareness, could be degraded. Technological cognitive aids can facilitate effective teamwork. This study focused on the design of an ED situation display and pilot test its influence on teamwork and situational awareness during simulated resuscitation scenarios. The display design consisted of a central area showing the critical dynamic parameters of the interventions with an events time-line below it. Static information was placed at the sides of the display. We pilot tested whether the situation display could lead to higher scores on the Clinical Teamwork Scale (CTS), improved scores on a context-specific Situational Awareness Global Assessment Technique (SAGAT) tool, and team communication patterns that reflect teamwork and situational awareness. Resuscitation teamwork, as measured by the CTS, was overall better with the presence of the situation display as compared with no situation display. Team members discussed interventions more with the situation display compared with not having the situation display. Situational awareness was better with the situation display only in the trauma scenario. The situation display could be more effective for certain ED team members and in certain cases. Overall, this pilot study implies that a situation display could facilitate better teamwork and team communication in the resuscitation event. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. FAIRDOMHub: a repository and collaboration environment for sharing systems biology research.

    PubMed

    Wolstencroft, Katherine; Krebs, Olga; Snoep, Jacky L; Stanford, Natalie J; Bacall, Finn; Golebiewski, Martin; Kuzyakiv, Rostyk; Nguyen, Quyen; Owen, Stuart; Soiland-Reyes, Stian; Straszewski, Jakub; van Niekerk, David D; Williams, Alan R; Malmström, Lars; Rinn, Bernd; Müller, Wolfgang; Goble, Carole

    2017-01-04

    The FAIRDOMHub is a repository for publishing FAIR (Findable, Accessible, Interoperable and Reusable) Data, Operating procedures and Models (https://fairdomhub.org/) for the Systems Biology community. It is a web-accessible repository for storing and sharing systems biology research assets. It enables researchers to organize, share and publish data, models and protocols, interlink them in the context of the systems biology investigations that produced them, and to interrogate them via API interfaces. By using the FAIRDOMHub, researchers can achieve more effective exchange with geographically distributed collaborators during projects, ensure results are sustained and preserved and generate reproducible publications that adhere to the FAIR guiding principles of data stewardship. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  12. Experimental demonstration of the anti-maser

    NASA Astrophysics Data System (ADS)

    Mazzocco, Anthony; Aviles, Michael; Andrews, Jim; Dawson, Nathan; Crescimanno, Michael

    2012-10-01

    We denote by ``anti-maser'' a coherent perfect absorption (CPA) process in the radio frequency domain. We demonstrate several experimental realizations of the anti-maser suitable for an advanced undergraduate laboratory. Students designed, assembled and tested these devices, as well as the inexpensive laboratory setup and experimental protocol for displaying various CPA phenomenon.

  13. Exploratory Evaluation of a School-Based Child Sexual Abuse Prevention Program

    ERIC Educational Resources Information Center

    Barron, Ian G.; Topping, Keith J.

    2013-01-01

    Internationally, efficacy studies of school-based child sexual abuse prevention programs display a series of methodological shortcomings. Few studies include adolescent participants, recording of disclosures has been inconsistent, and no studies to date have assessed presenter adherence to program protocols or summated the costs of program…

  14. Dual Water Systems: Characterization and Performance for Distribution of Reclaimed Water (WaterRF Report 4333)

    EPA Science Inventory

    The research tasks included: an inventory of cases where dual systems have been implemented; formulation of a protocol to identify claimed benefits, costs, and risks; collection of data (quantitative and anecdotal) to assess performance; display of data in the form of performance...

  15. Development of Communication Conventions in Instructional Electronic Chats.

    ERIC Educational Resources Information Center

    Collins, Mauri P.; Murphy, Karen L.

    1997-01-01

    This study used content analysis to identify the communication conventions and protocols that real-time, interactive electronic chat users developed in instructional settings. Most frequently used conventions included sharing information/techniques for conveying meaning and indicating interest in a topic, using keywords and names of individuals,…

  16. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    NASA Astrophysics Data System (ADS)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  17. Management of Toxic Epidermal Necrolysis with Plasmapheresis and Cyclosporine A: Our 10 Years’ Experience

    PubMed Central

    Giudice, Giuseppe; Maggio, Giulio; Bufano, Loredana; Memeo, Giuseppe

    2017-01-01

    Background: The management of toxic epidermal necrolysis (TEN) is controversial and there is no uniform strategy. Objective: To share our 10 years’ experience in treating severe TEN with a novel protocol based on the association of cyclosporine A and plasmapheresis. Methods: In this case series, we retrospectively collected and assessed the 12 cases of severe TEN treated from 2005 to 2015 at the Burn Unit of the University of Bari Policlinico hospital. Results: Average body surface area was 77; average SCORETEN was 4.3. The 12 patients had been treated with culprit drug withdrawal, systemic corticosteroids, and/or cyclosporine A with no response. The protocol was successfully administered in all 12 cases. Average time to response from protocol start was 4.9 days. Average time to remission from protocol start was 22 days; average hospital stay at our unit was 24.8 days. Four patients developed severe complications; 1 patient died. No complications linked to the protocol therapeutic measures were observed. The relatively small number of cases given the rarity of the condition is a limitation of this report. Conclusion: Our protocol based on the association of cyclosporine A and plasmapheresis is safe and efficacious in treating severe TEN. PMID:28280663

  18. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    PubMed Central

    Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229

  19. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee Pro

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Standards-based wireless sensor network (WSN) protocols are promising candidates for spacecraft avionics systems, offering unprecedented instrumentation flexibility and expandability. Ensuring reliable data transport is key, however, when migrating from wired to wireless data gathering systems. In this paper, we conduct a rigorous laboratory analysis of the relative performances of the ZigBee Pro and ISA100.11a protocols in a representative crewed aerospace environment. Since both operate in the 2.4 GHz radio frequency (RF) band shared by systems such as Wi-Fi, they are subject at times to potentially debilitating RF interference. We compare goodput (application-level throughput) achievable by both under varying levels of 802.11g Wi-Fi traffic. We conclude that while the simpler, more inexpensive ZigBee Pro protocol performs well under moderate levels of interference, the more complex and costly ISA100.11a protocol is needed to ensure reliable data delivery under heavier interference. This paper represents the first published, rigorous analysis of WSN protocols in an aerospace environment that we are aware of and the first published head-to-head comparison of ZigBee Pro and ISA100.11a.

  20. Experimental demonstration of graph-state quantum secret sharing.

    PubMed

    Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S

    2014-11-21

    Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.

  1. fVisiOn: 360-degree viewable glasses-free tabletop 3D display composed of conical screen and modular projector arrays.

    PubMed

    Yoshida, Shunsuke

    2016-06-13

    A novel glasses-free tabletop 3D display to float virtual objects on a flat tabletop surface is proposed. This method employs circularly arranged projectors and a conical rear-projection screen that serves as an anisotropic diffuser. Its practical implementation installs them beneath a round table and produces horizontal parallax in a circumferential direction without the use of high speed or a moving apparatus. Our prototype can display full-color, 5-cm-tall 3D characters on the table. Multiple viewers can share and enjoy its real-time animation from any angle of 360 degrees with appropriate perspectives as if the animated figures were present.

  2. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  3. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  4. Identity-Based Authentication for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao

    Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.

  5. Security of counterfactual quantum cryptography

    NASA Astrophysics Data System (ADS)

    Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Han, Zheng-Fu; Guo, Guang-Can

    2010-10-01

    Recently, a “counterfactual” quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  6. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  7. Security of counterfactual quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yin Zhenqiang; Li Hongwei; Chen Wei

    2010-10-15

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bitmore » error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.« less

  8. Improvements to the Kunkel mutagenesis protocol for constructing primary and secondary phage-display libraries.

    PubMed

    Huang, Renhua; Fang, Pete; Kay, Brian K

    2012-09-01

    Site-directed mutagenesis is routinely performed in protein engineering experiments. One method, termed Kunkel mutagenesis, is frequently used for constructing libraries of peptide or protein variants in M13 bacteriophage, followed by affinity selection of phage particles. To make this method more efficient, the following two modifications were introduced: culture was incubated at 25°C for phage replication, which yielded two- to sevenfold more single-stranded DNA template compared to growth at 37°C, and restriction endonuclease recognition sites were used to remove non-recombinants. With both of the improvements, we could construct primary libraries of high complexity and that were 99-100% recombinant. Finally, with a third modification to the standard protocol of Kunkel mutagenesis, two secondary (mutagenic) libraries of a fibronectin type III (FN3) monobody were constructed with DNA segments that were amplified by error-prone and asymmetric PCR. Two advantages of this modification are that it bypasses the lengthy steps of restriction enzyme digestion and ligation, and that the pool of phage clones, recovered after affinity selection, can be used directly to generate a secondary library. Screening one of the two mutagenic libraries yielded variants that bound two- to fourfold tighter to human Pak1 kinase than the starting clone. The protocols described in this study should accelerate the discovery of phage-displayed recombinant affinity reagents. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE PAGES

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...

    2016-06-01

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  10. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Luo, Mingxing; Zhang, Jun; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.

    2018-07-01

    The orthogonality of the orbital angular momentum (OAM) eigenstates enables a single photon carry an arbitrary number of bits. Moreover, additional degrees of freedom (DOFs) of OAM can span a high-dimensional Hilbert space, which could greatly increase information capacity and security. Moreover, the use of the spin angular momentum-OAM hybrid entangled state can increase Shannon dimensionality, because photons can be hybrid entangled in multiple DOFs. Based on these observations, we develop a hybrid entanglement quantum key distribution (QKD) protocol to achieve three-party quantum key distribution without classical message exchanges. In our proposed protocol, a communicating party uses a spatial light modulator (SLM) and a specific phase hologram to modulate photons' OAM state. Similarly, the other communicating parties use their SLMs and the fixed different phase holograms to modulate the OAM entangled photon pairs, producing the shared key among the parties Alice, Bob and Charlie without classical message exchanges. More importantly, when the same operation is repeated for every party, our protocol could be extended to a multiple-party QKD protocol.

  11. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    PubMed Central

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Mobile Phone App to Support Young People in Making Shared Decisions in Therapy (Power Up): Study Protocol

    PubMed Central

    Martin, Kate; Webber, Helen; Craven, Michael P; Hollis, Chris; Deighton, Jessica; Law, Roslyn; Fonagy, Peter; Wolpert, Miranda

    2017-01-01

    Background Evidence suggests that young people want to be active participants in their care and involved in decisions about their treatment. However, there is a lack of digital shared decision-making tools available to support young people in child and adolescent mental health services (CAMHS). Objective The primary aim of this paper is to present the protocol of a feasibility trial for Power Up, a mobile phone app to empower young people in CAMHS to make their voices heard and participate in decisions around their care. Methods In the development phase, 30 young people, parents, and clinicians will take part in interviews and focus groups to elicit opinions on an early version of the app. In the feasibility testing phase, 60 young people from across 7 to 10 London CAMHS sites will take part in a trial looking at the feasibility and acceptability of measuring the impact of Power Up on shared decision making. Results Data collection for the development phase ended in December 2016. Data collection for the feasibility testing phase will end in December 2017. Conclusions Findings will inform the planning of a cluster controlled trial and contribute to the development and implementation of a shared decision-making app to be integrated into CAMHS. Trial Registration ISRCTN77194423; http://www.isrctn.com/ISRCTN77194423 (Archived by WebCite at http://www.webcitation.org/6td6MINP0). ClinicalTrials.gov NCT02987608; https://clinicaltrials.gov/ct2/show/NCT02987608 (Archived by WebCite at http://www.webcitation.org/6td6PNBZM) PMID:29084708

  14. Motivation Counts: Autonomous But Not Obligated Sharing Promotes Happiness in Preschoolers.

    PubMed

    Wu, Zhen; Zhang, Zhen; Guo, Rui; Gros-Louis, Julie

    2017-01-01

    Research has demonstrated that prosocial sharing is emotionally rewarding, which leads to further prosocial actions; such a positive feedback loop suggests a proximal mechanism of human's tendency to act prosocially. However, it leaves open a question as to how the emotional benefits from sharing develop in young children and whether sharing under pressure promotes happiness as well. The current study directly compared 3- and 5-year-old Chinese children's happiness when sharing was autonomous (the recipient did not contribute to getting the reward) with when sharing was obligated (the recipient and the actor jointly earned the reward). We found that children shared more items overall when sharing was obligated than autonomous, demonstrating their conformity to social norms of merit-based sharing. In children who eventually shared with others, 5-year-olds gave out more stickers in the obligated sharing condition than in the autonomous sharing condition, but 3-year-olds shared the same amount between the conditions, suggesting that 5-year-olds adhered to the merit-based sharing norm more strictly than 3-year-olds. Moreover, in the autonomous sharing condition, children displayed greater happiness when they shared with the recipient than when they kept stickers for themselves, suggesting that costly prosocial giving benefited children with positive mood; however, children did not gain happiness when they shared with the recipient in the obligated sharing condition. These findings demonstrate that children's affective benefits depend on the motivation underlying their prosocial behavior, and further imply that normative force and emotional gains may independently drive preschoolers' prosocial behaviors.

  15. Motivation Counts: Autonomous But Not Obligated Sharing Promotes Happiness in Preschoolers

    PubMed Central

    Wu, Zhen; Zhang, Zhen; Guo, Rui; Gros-Louis, Julie

    2017-01-01

    Research has demonstrated that prosocial sharing is emotionally rewarding, which leads to further prosocial actions; such a positive feedback loop suggests a proximal mechanism of human’s tendency to act prosocially. However, it leaves open a question as to how the emotional benefits from sharing develop in young children and whether sharing under pressure promotes happiness as well. The current study directly compared 3- and 5-year-old Chinese children’s happiness when sharing was autonomous (the recipient did not contribute to getting the reward) with when sharing was obligated (the recipient and the actor jointly earned the reward). We found that children shared more items overall when sharing was obligated than autonomous, demonstrating their conformity to social norms of merit-based sharing. In children who eventually shared with others, 5-year-olds gave out more stickers in the obligated sharing condition than in the autonomous sharing condition, but 3-year-olds shared the same amount between the conditions, suggesting that 5-year-olds adhered to the merit-based sharing norm more strictly than 3-year-olds. Moreover, in the autonomous sharing condition, children displayed greater happiness when they shared with the recipient than when they kept stickers for themselves, suggesting that costly prosocial giving benefited children with positive mood; however, children did not gain happiness when they shared with the recipient in the obligated sharing condition. These findings demonstrate that children’s affective benefits depend on the motivation underlying their prosocial behavior, and further imply that normative force and emotional gains may independently drive preschoolers’ prosocial behaviors. PMID:28620328

  16. Call sign intelligibility improvement using a spatial auditory display

    NASA Technical Reports Server (NTRS)

    Begault, Durand R.

    1993-01-01

    A spatial auditory display was used to convolve speech stimuli, consisting of 130 different call signs used in the communications protocol of NASA's John F. Kennedy Space Center, to different virtual auditory positions. An adaptive staircase method was used to determine intelligibility levels of the signal against diotic speech babble, with spatial positions at 30 deg azimuth increments. Non-individualized, minimum-phase approximations of head-related transfer functions were used. The results showed a maximal intelligibility improvement of about 6 dB when the signal was spatialized to 60 deg or 90 deg azimuth positions.

  17. A guide to processing bat acoustic data for the North American Bat Monitoring Program (NABat)

    USGS Publications Warehouse

    Reichert, Brian; Lausen, Cori; Loeb, Susan; Weller, Ted; Allen, Ryan; Britzke, Eric; Hohoff, Tara; Siemers, Jeremy; Burkholder, Braden; Herzog, Carl; Verant, Michelle

    2018-06-14

    The North American Bat Monitoring Program (NABat) aims to improve the state of conservation science for all species of bats shared by the United States, Canada, and Mexico. To accomplish this goal, NABat offers guidance and standardized protocols for acoustic monitoring of bats. In this document, “A Guide to Processing Bat Acoustic Data for the North American Bat Monitoring Program (NABat),” we provide general recommendations and specific workflows for the process of identifying bat species from acoustic files recorded using the NABat stationary point and mobile transect acoustic monitoring protocols.

  18. Cryptanalysis of Controlled Mutual Quantum Entity Authentication Using Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Yue

    2017-01-01

    By using GHZ-like states and entanglement swapping, Kang et al. [Chin. Phys. B 24 (2015) 090306] proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure, that is, the center, Charlie can eavesdrop the secret keys shared between Alice and Bob without being detected. Supported by the 2014-year Program for Excellent Youth Talents in University of Anhui Province and the Talent Scientific Research Fundation of Tongling University under Grant No. 2015tlxyrc01 and the Program for Academic Leader Reserve Candidates in Tongling University under Grant No. 2014tlxyxs30

  19. Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference

    NASA Astrophysics Data System (ADS)

    Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2018-03-01

    Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.

  20. Improving security of the ping-pong protocol

    NASA Astrophysics Data System (ADS)

    Zawadzki, Piotr

    2013-01-01

    A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.

  1. Psychosocial Profile of Children Having Participated in an Intervention Program for Their Sexual Behavior Problems: The Predictor Role of Maltreatment.

    PubMed

    Tougas, Anne-Marie; Boisvert, Isabelle; Tourigny, Marc; Lemieux, Annie; Tremblay, Claudia; Gagnon, Mélanie M

    2016-01-01

    This study sought to verify if a history of maltreatment may predict the psychosocial profile of children who participated in an intervention program aiming at reducing sexual behavior problems. Data were collected at both the beginning and the end of the intervention program using a clinical protocol and standardized tests selected on the basis of the intervention targets. In general, the results indicate that children who had experienced maltreatment display a psychosocial profile that is similar to that of children who had not experienced maltreatment. However, children who had experienced psychological abuse or neglect may display greater externalized or sexualized behaviors, whereas children who have a parent who had been a victim of sexual abuse may display fewer sexualized behaviors.

  2. Adolescents' Perceptions of the Words "Health" and "Happy"

    ERIC Educational Resources Information Center

    O'Higgins, Siobhan; Sixsmith, Jane; Gabhainn, Saoirse Nic

    2010-01-01

    Purpose: The shared language of youth includes understandings of concepts that can be different from those of adults. Researchers, in their efforts to explore and illuminate the health behaviours and decision-making processes of young people, use generic terms in their data collecting protocols. This study aims to explore what adolescents…

  3. Reading for Understanding: Methodist Youths' Shared Scripture-Reading Practices

    ERIC Educational Resources Information Center

    Rackley, Eric D.

    2018-01-01

    Informed by reading comprehension and comprehension strategies research, this study explores the Scripture-reading practices of four Methodist youths. Several rounds of inductive thematic analyses of Scripture-reading protocols revealed a set of five strategic reading practices youths used to understand Scripture. They drew inferences about the…

  4. SoyBase Simple Semantic Web Architecture and Protocol (SSWAP) Services

    USDA-ARS?s Scientific Manuscript database

    Semantic web technologies offer the potential to link internet resources and data by shared concepts without having to rely on absolute lexical matches. Thus two web sites or web resources which are concerned with similar data types could be identified based on similar semantics. In the biological...

  5. Three-input majority function as the unique optimal function for the bias amplification using nonlocal boxes

    NASA Astrophysics Data System (ADS)

    Mori, Ryuhei

    2016-11-01

    Brassard et al. [Phys. Rev. Lett. 96, 250401 (2006), 10.1103/PhysRevLett.96.250401] showed that shared nonlocal boxes with a CHSH (Clauser, Horne, Shimony, and Holt) probability greater than 3/+√{6 } 6 yield trivial communication complexity. There still exists a gap with the maximum CHSH probability 2/+√{2 } 4 achievable by quantum mechanics. It is an interesting open question to determine the exact threshold for the trivial communication complexity. Brassard et al.'s idea is based on recursive bias amplification by the three-input majority function. It was not obvious if another choice of function exhibits stronger bias amplification. We show that the three-input majority function is the unique optimal function, so that one cannot improve the threshold 3/+√{6 } 6 by Brassard et al.'s bias amplification. In this work, protocols for computing the function used for the bias amplification are restricted to be nonadaptive protocols or a particular adaptive protocol inspired by Pawłowski et al.'s protocol for information causality [Nature (London) 461, 1101 (2009), 10.1038/nature08400]. We first show an adaptive protocol inspired by Pawłowski et al.'s protocol, and then show that the adaptive protocol improves upon nonadaptive protocols. Finally, we show that the three-input majority function is the unique optimal function for the bias amplification if we apply the adaptive protocol to each step of the bias amplification.

  6. Nonpainful wide-area compression inhibits experimental pain.

    PubMed

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  7. Building Capacity for a Long-Term, in-Situ, National-Scale Phenology Monitoring Network: Successes, Challenges and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Weltzin, J. F.; Browning, D. M.

    2014-12-01

    The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability. Network participants can leverage: (1) Standardized monitoring protocols that have been broadly vetted, tested and published; (2) A centralized National Phenology Database (NPDb) for maintaining, archiving and replicating data, with standard metadata, terms-of-use, web-services, and documentation of QA/QC, plus tools for discovery, visualization and download of raw data and derived data products; and/or (3) A national in-situ, multi-taxa phenological monitoring system, Nature's Notebook, which enables participants to observe and record phenology of plants and animals - based on the protocols and information management system (IMS) described above - via either web or mobile applications. The protocols, NPDb and IMS, and Nature's Notebook represent a hierarchy of opportunities for involvement by a broad range of interested stakeholders, from individuals to agencies. For example, some organizations have adopted (e.g., the National Ecological Observatory Network or NEON) -- or are considering adopting (e.g., the Long-Term Agroecosystems Network or LTAR) -- the USA-NPN standardized protocols, but will develop their own database and IMS with web services to promote sharing of data with the NPDb. Other organizations (e.g., the Inventory and Monitoring Programs of the National Wildlife Refuge System and the National Park Service) have elected to use Nature's Notebook to support their phenological monitoring programs. We highlight the challenges and benefits of integrating phenology monitoring within existing and emerging national monitoring networks, and showcase opportunities that exist when standardized protocols are adopted and implemented to promote data interoperability and sharing.

  8. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  9. Quantum teleportation and information splitting via four-qubit cluster state and a Bell state

    NASA Astrophysics Data System (ADS)

    Ramírez, Marlon David González; Falaye, Babatunde James; Sun, Guo-Hua; Cruz-Irisson, M.; Dong, Shi-Hai

    2017-10-01

    Quantum teleportation provides a "bodiless" way of transmitting the quantum state from one object to another, at a distant location, using a classical communication channel and a previously shared entangled state. In this paper, we present a tripartite scheme for probabilistic teleportation of an arbitrary single qubit state, without losing the information of the state being teleported, via a fourqubit cluster state of the form | ϕ>1234 = α|0000>+ β|1010>+ γ|0101>- η|1111>, as the quantum channel, where the nonzero real numbers α, β, γ, and η satisfy the relation j αj2 + | β|2 + | γ|2 + | η|2 = 1. With the introduction of an auxiliary qubit with state |0>, using a suitable unitary transformation and a positive-operator valued measure (POVM), the receiver can recreate the state of the original qubit. An important advantage of the teleportation scheme demonstrated here is that, if the teleportation fails, it can be repeated without teleporting copies of the unknown quantum state, if the concerned parties share another pair of entangled qubit. We also present a protocol for quantum information splitting of an arbitrary two-particle system via the aforementioned cluster state and a Bell-state as the quantum channel. Problems related to security attacks were examined for both the cases and it was found that this protocol is secure. This protocol is highly efficient and easy to implement.

  10. The SWITCH-ON Virtual Water-Science Laboratory

    NASA Astrophysics Data System (ADS)

    Arheimer, Berit; Boot, Gerben; Calero, Joan; Ceola, Serena; Gyllensvärd, Frida; Hrachowitz, Markus; Little, Lorna; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Wagener, Thorsten

    2017-04-01

    The SWITCH-ON Virtual Water-Science Laboratory (VWSL) aims to facilitate collaboration and support reproducible experiments in water research. The goal is to overcome geographical distance for comparative hydrology and increase transparency when using computational tools in hydrological sciences. The VWSL gives access to open data through dedicated software tools for data search and upload, and helps creating collaborative protocols for joint experiments in the virtual environment. The VWSL will help scientists with: • Cooperation around the world - straightforward connections with other scientists in comparative analyses and collaboration, as a mean to accelerate scientific advance in hydrology. • Repeatability of experiments -thorough review of a large variety of numerical experiments, which is a foundational principle in scientific research, and improvement of research standards. • New forms of scientific research - by using online 'living' protocols, scientists you can elaborate ideas incrementally with a large group of colleagues and share data, tools, models, etc. in open science. The VWSL was developed within the EU project "Sharing Water Information to Tackle Changes in Hydrology - for Operational Needs" (Grant agreement No 603587). Visitors can choose to Define, Participate or Review experiments by clicking the start buttons (http://www.switch-on-vwsl.eu/). Anyone can view protocols without log-in (that's important for Open Science) - but to create, participate and edit protocols, you need to Log-in for security reasons. During the work process, the protocol is moved from one view to another as the experiment evolves from idea, to on-going, to be completed. The users of the Lab also get access to useful tools for running collaborative experiments, for instance: Open data Search, Data (and metadata) Upload, and Create Protocol tools. So far, eight collaborative experiments have been completed in the VWSL and resulted in research papers (published or submitted), and there are currently four on-going experiments, which also involves external participants, not paid by the project. The VWSL is now launched and open to everyone but it will be continuously developed and sustained also after the project. This presentation will give an on-line demonstration of the major features of the present VWSL and discuss some future visions and major challenges in this e-infrastructure.

  11. Real-time analysis of dual-display phage immobilization and autoantibody screening using quartz crystal microbalance with dissipation monitoring.

    PubMed

    Rajaram, Kaushik; Losada-Pérez, Patricia; Vermeeren, Veronique; Hosseinkhani, Baharak; Wagner, Patrick; Somers, Veerle; Michiels, Luc

    2015-01-01

    Over the last three decades, phage display technology has been used for the display of target-specific biomarkers, peptides, antibodies, etc. Phage display-based assays are mostly limited to the phage ELISA, which is notorious for its high background signal and laborious methodology. These problems have been recently overcome by designing a dual-display phage with two different end functionalities, namely, streptavidin (STV)-binding protein at one end and a rheumatoid arthritis-specific autoantigenic target at the other end. Using this dual-display phage, a much higher sensitivity in screening specificities of autoantibodies in complex serum sample has been detected compared to single-display phage system on phage ELISA. Herein, we aimed to develop a novel, rapid, and sensitive dual-display phage to detect autoantibodies presence in serum samples using quartz crystal microbalance with dissipation monitoring as a sensing platform. The vertical functionalization of the phage over the STV-modified surfaces resulted in clear frequency and dissipation shifts revealing a well-defined viscoelastic signature. Screening for autoantibodies using antihuman IgG-modified surfaces and the dual-display phage with STV magnetic bead complexes allowed to isolate the target entities from complex mixtures and to achieve a large response as compared to negative control samples. This novel dual-display strategy can be a potential alternative to the time consuming phage ELISA protocols for the qualitative analysis of serum autoantibodies and can be taken as a departure point to ultimately achieve a point of care diagnostic system.

  12. 76 FR 39453 - Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Commitment Schedule (``CCS'').\\10\\ CCS provides the Display Book[supreg] \\11\\ with the amount of shares that... (``BBO''). CCS interest is separate and distinct from other DMM interest in that it serves as the...

  13. 14 CFR 234.11 - Disclosure to consumers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... (b) For each domestic flight for which schedule information is available on its Web site, including domestic code-share flights, a reporting carrier shall display the following information regarding the...) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE REPORTS § 234.11 Disclosure to consumers. (a...

  14. 14 CFR 234.11 - Disclosure to consumers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... (b) For each domestic flight for which schedule information is available on its Web site, including domestic code-share flights, a reporting carrier shall display the following information regarding the...) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE REPORTS § 234.11 Disclosure to consumers. (a...

  15. 14 CFR 234.11 - Disclosure to consumers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... (b) For each domestic flight for which schedule information is available on its Web site, including domestic code-share flights, a reporting carrier shall display the following information regarding the...) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE REPORTS § 234.11 Disclosure to consumers. (a...

  16. 14 CFR 234.11 - Disclosure to consumers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... (b) For each domestic flight for which schedule information is available on its Web site, including domestic code-share flights, a reporting carrier shall display the following information regarding the...) ECONOMIC REGULATIONS AIRLINE SERVICE QUALITY PERFORMANCE REPORTS § 234.11 Disclosure to consumers. (a...

  17. A general protocol for the generation of Nanobodies for structural biology

    PubMed Central

    Pardon, Els; Laeremans, Toon; Triest, Sarah; Rasmussen, Søren G. F.; Wohlkönig, Alexandre; Ruf, Armin; Muyldermans, Serge; Hol, Wim G. J.; Kobilka, Brian K.; Steyaert, Jan

    2015-01-01

    There is growing interest in using antibodies as auxiliary proteins to crystallize proteins. Here, we describe a general protocol for the generation of Nanobodies to be used as crystallization chaperones for the structural investigation of diverse conformational states of flexible (membrane) proteins and complexes thereof. Our technology has the competitive advantage over other recombinant crystallization chaperones in that we fully exploit the natural humoral response against native antigens. Accordingly, we provide detailed protocols for the immunization with native proteins and for the selection by phage display of in vivo matured Nanobodies that bind conformational epitopes of functional proteins. Three representative examples illustrate that the outlined procedures are robust, enabling to solve the structures of the most challenging proteins by Nanobody-assisted X-ray crystallography in a time span of 6 to 12 months. PMID:24577359

  18. Improving the Sandia Test Protocols with Advanced Inverter Functionality Testing of INV3, VV11, FW21, and L/HVRT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Jay Dean

    2013-11-01

    Sandia National Laboratories has created a test protocol for IEC TR 61850-90-7 advanced distributed energy resource (DER) functions, titled "Test Protocols for Advanced Inverter Interoperability Functions," often referred to as the Sandia Test Protocols. This document is currently in draft form, but has been shared with stakeholders around the world with the ultimate goal of collaborating to create a consensus set of test protocols which can be then incorporated into an International Electrotechnical Commission (IEC) and/or Underwriters Laboratories (UL) certification standard. The protocols are designed to ensure functional interoperability of DER (primarily photovoltaic (PV) inverters and energy storage systems) asmore » specified by the IEC technical report through communication and electrical tests. In this report, Sandia exercises the electrical characterization portion of the test protocols for four functions: constant power factor (INV3), volt-var (VV11), frequency-watt (FW21), and Low and High Voltage Ride Through (L/HVRT). The goal of the tests reported here was not to characterize the performance of the equipment under test (EUT), but rather to (a) exercise the draft Sandia Test Protocols in order to identify any revisions needed in test procedures, conditions, or equipment and (b) gain experience with state-of-the-art DER equipment to determine if the tests put unrealistic or overly aggressive requirements on EUT operation. In performing the work according to the current versions of the protocols, Sandia was able to identify weaknesses in the current versions and suggest improvements to the test protocols.« less

  19. An FEC Adaptive Multicast MAC Protocol for Providing Reliability in WLANs

    NASA Astrophysics Data System (ADS)

    Basalamah, Anas; Sato, Takuro

    For wireless multicast applications like multimedia conferencing, voice over IP and video/audio streaming, a reliable transmission of packets within short delivery delay is needed. Moreover, reliability is crucial to the performance of error intolerant applications like file transfer, distributed computing, chat and whiteboard sharing. Forward Error Correction (FEC) is frequently used in wireless multicast to enhance Packet Error Rate (PER) performance, but cannot assure full reliability unless coupled with Automatic Repeat Request forming what is knows as Hybrid-ARQ. While reliable FEC can be deployed at different levels of the protocol stack, it cannot be deployed on the MAC layer of the unreliable IEEE802.11 WLAN due to its inability to exchange ACKs with multiple recipients. In this paper, we propose a Multicast MAC protocol that enhances WLAN reliability by using Adaptive FEC and study it's performance through mathematical analysis and simulation. Our results show that our protocol can deliver high reliability and throughput performance.

  20. Fully device-independent quantum key distribution.

    PubMed

    Vazirani, Umesh; Vidick, Thomas

    2014-10-03

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  1. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  2. Fully Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  3. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    NASA Technical Reports Server (NTRS)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  4. Integrated cockpit display and processor: the best solution for Link-16 applications

    NASA Astrophysics Data System (ADS)

    Smeyne, Alan L.; Savaya, John

    2000-08-01

    Link-16 Data Link systems are being added to current avionics systems to provide increased situational awareness and command data. By using a single intelligent display system, the impact to existing aircraft systems to implement Link-16 capabilities is minimized. Litton Guidance & Control Systems (G&CS), a military avionics supplier for more than forty years, provides Open System Architecture (OSA), large screen aircraft display systems. Based on a common set of plug-in modules, these Smart Multi-Function Displays (SMFD) are available in a variety of sizes and processing capabilities, any one of which can meet the Link-16 requirements. Using a single smart SMFD connected to a Link-16 subsystem has many advantages. With digital moving map capability, the SMFD can monitor and display air and ground tracks of both friendly and hostile forces while providing potential threat data to the operator. The SMFD can also monitor vehicle status and mission data to share between friendly air and surface forces. To support the integrated digital battlefield, Link-16 capability is required and the Litton G&CS SMFD provides the processing/display functionality to implement this capability.

  5. Automatic mobile device synchronization and remote control system for high-performance medical applications.

    PubMed

    Constantinescu, L; Kim, J; Chan, C; Feng, D

    2007-01-01

    The field of telemedicine is in need of generic solutions that harness the power of small, easily carried computing devices to increase efficiency and decrease the likelihood of medical errors. Our study resolved to build a framework to bridge the gap between handheld and desktop solutions by developing an automated network protocol that wirelessly propagates application data and images prepared by a powerful workstation to handheld clients for storage, display and collaborative manipulation. To this end, we present the Mobile Active Medical Protocol (MAMP), a framework capable of nigh-effortlessly linking medical workstation solutions to corresponding control interfaces on handheld devices for remote storage, control and display. The ease-of-use, encapsulation and applicability of this automated solution is designed to provide significant benefits to the rapid development of telemedical solutions. Our results demonstrate that the design of this system allows an acceptable data transfer rate, a usable framerate for diagnostic solutions and enough flexibility to enable its use in a wide variety of cases. To this end, we also present a large-scale multi-modality image viewer as an example application based on the MAMP.

  6. Divergent and convergent synthesis of GalNAc-conjugated dendrimers using dual orthogonal ligations.

    PubMed

    Thomas, Baptiste; Pifferi, Carlo; Daskhan, Gour Chand; Fiore, Michele; Berthet, Nathalie; Renaudet, Olivier

    2015-12-21

    The synthesis of glycodendrimers remains a challenging task. In this paper we propose a protocol based on both oxime ligation (OL) to combine cyclopeptide repeating units as the dendritic core and the copper(i)-catalyzed azide-alkyne cycloaddition (CuAAC) to conjugate peripheral α and β propargylated GalNAc. By contrast with the oxime-based iterative protocol reported in our group, our current strategy can be used in both divergent and convergent routes with similar efficiency and the resulting hexadecavalent glycodendrimers can be easily characterized compared to oxime-linked analogues. A series of glycoconjugates displaying four or sixteen copies of both α and β GalNAc have been prepared and their ability to inhibit the adhesion of the soybean agglutinin (SBA) lectin to polymeric-GalNAc immobilized on microtiter plates has been evaluated. As was anticipated, the higher inhibitory effect (IC50 = 0.46 μM) was measured with the structure displaying αGalNAc with the higher valency (compound 13), which demonstrates that the binding properties of these glycoconjugates are strongly dependent on the orientation and distribution of the GalNAc units.

  7. Robust multiparty quantum secret key sharing over two collective-noise channels

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-jun

    2006-02-01

    Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.

  8. Faithful Entanglement Sharing for Quantum Communication Against Collective Noise

    NASA Astrophysics Data System (ADS)

    Niu, Hui-Chong; Ren, Bao-Cang; Wang, Tie-Jun; Hua, Ming; Deng, Fu-Guo

    2012-08-01

    We present an economical setup for faithful entanglement sharing against collective noise. It is composed of polarizing beam splitters, half wave plates, polarization independent wavelength division multiplexers, and frequency shifters. An arbitrary qubit error on the polarization state of each photon in a multi-photon system caused by the noisy channel can be rejected, without resorting to additional qubits, fast polarization modulators, and nondestructive quantum nondemolition detectors. Its success probability is in principle 100%, which is independent of the noise parameters, and it can be applied directly in any one-way quantum communication protocol based on entanglement.

  9. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.

  10. The Undiagnosed Diseases Network: Accelerating Discovery about Health and Disease.

    PubMed

    Ramoni, Rachel B; Mulvihill, John J; Adams, David R; Allard, Patrick; Ashley, Euan A; Bernstein, Jonathan A; Gahl, William A; Hamid, Rizwan; Loscalzo, Joseph; McCray, Alexa T; Shashi, Vandana; Tifft, Cynthia J; Wise, Anastasia L

    2017-02-02

    Diagnosis at the edges of our knowledge calls upon clinicians to be data driven, cross-disciplinary, and collaborative in unprecedented ways. Exact disease recognition, an element of the concept of precision in medicine, requires new infrastructure that spans geography, institutional boundaries, and the divide between clinical care and research. The National Institutes of Health (NIH) Common Fund supports the Undiagnosed Diseases Network (UDN) as an exemplar of this model of precise diagnosis. Its goals are to forge a strategy to accelerate the diagnosis of rare or previously unrecognized diseases, to improve recommendations for clinical management, and to advance research, especially into disease mechanisms. The network will achieve these objectives by evaluating patients with undiagnosed diseases, fostering a breadth of expert collaborations, determining best practices for translating the strategy into medical centers nationwide, and sharing findings, data, specimens, and approaches with the scientific and medical communities. Building the UDN has already brought insights to human and medical geneticists. The initial focus has been on data sharing, establishing common protocols for institutional review boards and data sharing, creating protocols for referring and evaluating patients, and providing DNA sequencing, metabolomic analysis, and functional studies in model organisms. By extending this precision diagnostic model nationally, we strive to meld clinical and research objectives, improve patient outcomes, and contribute to medical science. Copyright © 2017 American Society of Human Genetics. All rights reserved.

  11. Large-screen display industry: market and technology trends for direct view and projection displays

    NASA Astrophysics Data System (ADS)

    Castellano, Joseph A.; Mentley, David E.

    1996-03-01

    Large screen information displays are defined as dynamic electronic displays that can be viewed by more than one person and are at least 2-feet wide. These large area displays for public viewing provide convenience, entertainment, security, and efficiency to the viewers. There are numerous uses for large screen information displays including those in advertising, transportation, traffic control, conference room presentations, computer aided design, banking, and military command/control. A noticeable characteristic of the large screen display market is the interchangeability of display types. For any given application, the user can usually choose from at least three alternative technologies, and sometimes from many more. Some display types have features that make them suitable for specific applications due to temperature, brightness, power consumption, or other such characteristic. The overall worldwide unit consumption of large screen information displays of all types and for all applications (excluding consumer TV) will increase from 401,109 units in 1995 to 655,797 units in 2002. On a unit consumption basis, applications in business and education represent the largest share of unit consumption over this time period; in 1995, this application represented 69.7% of the total. The market (value of shipments) will grow from DOL3.1 billion in 1995 to DOL3.9 billion in 2002. The market will be dominated by front LCD projectors and LCD overhead projector plates.

  12. B-CAN: a resource sharing platform to improve the operation, visualization and integrated analysis of TCGA breast cancer data.

    PubMed

    Wen, Can-Hong; Ou, Shao-Min; Guo, Xiao-Bo; Liu, Chen-Feng; Shen, Yan-Bo; You, Na; Cai, Wei-Hong; Shen, Wen-Jun; Wang, Xue-Qin; Tan, Hai-Zhu

    2017-12-12

    Breast cancer is a high-risk heterogeneous disease with myriad subtypes and complicated biological features. The Cancer Genome Atlas (TCGA) breast cancer database provides researchers with the large-scale genome and clinical data via web portals and FTP services. Researchers are able to gain new insights into their related fields, and evaluate experimental discoveries with TCGA. However, it is difficult for researchers who have little experience with database and bioinformatics to access and operate on because of TCGA's complex data format and diverse files. For ease of use, we build the breast cancer (B-CAN) platform, which enables data customization, data visualization, and private data center. The B-CAN platform runs on Apache server and interacts with the backstage of MySQL database by PHP. Users can customize data based on their needs by combining tables from original TCGA database and selecting variables from each table. The private data center is applicable for private data and two types of customized data. A key feature of the B-CAN is that it provides single table display and multiple table display. Customized data with one barcode corresponding to many records and processed customized data are allowed in Multiple Tables Display. The B-CAN is an intuitive and high-efficient data-sharing platform.

  13. Co-sensitivity to the incentive properties of palatable food and cocaine in rats; implications for co-morbid addictions.

    PubMed

    Levy, AnneMarie; Salamon, Avi; Tucci, Mark; Limebeer, Cheryl L; Parker, Linda A; Leri, Francesco

    2013-09-01

    Several lines of evidence suggest that there may be a shared vulnerability to acquire behaviors motivated by strong incentive stimuli. Non-food restricted male Sprague-Dawley rats (n = 78) underwent place conditioning with Oreos, and were subsequently tested on cocaine self-administration (SA) on fixed and progressive ratios, as well as extinction and reinstatement by cocaine primes and by consumption of Oreos. Although there was a group preference for the Oreo-paired compartment, at the individual level some rats (69%) displayed a preference and others did not. In cocaine SA, 'preference' rats achieved higher break points on a progressive ratio, and displayed greater responding during extinction and cocaine-induced reinstatement. Within the context of this study, Oreo-cocaine cross-reinstatement was not observed. In a control study, rats (n = 29) conditioned with a less palatable food (rice cakes) also displayed individual differences in place preference, but not on subsequent cocaine tests. These findings indicate that there is a relationship between incentive learning promoted by palatable foods and by cocaine. This supports the hypothesis that co-morbid food-drug addictions may result from a shared vulnerability to acquire behaviors motivated by strong incentives. © 2012 The Authors, Addiction Biology © 2012 Society for the Study of Addiction.

  14. Stereoscopic Integrated Imaging Goggles for Multimodal Intraoperative Image Guidance

    PubMed Central

    Mela, Christopher A.; Patterson, Carrie; Thompson, William K.; Papay, Francis; Liu, Yang

    2015-01-01

    We have developed novel stereoscopic wearable multimodal intraoperative imaging and display systems entitled Integrated Imaging Goggles for guiding surgeries. The prototype systems offer real time stereoscopic fluorescence imaging and color reflectance imaging capacity, along with in vivo handheld microscopy and ultrasound imaging. With the Integrated Imaging Goggle, both wide-field fluorescence imaging and in vivo microscopy are provided. The real time ultrasound images can also be presented in the goggle display. Furthermore, real time goggle-to-goggle stereoscopic video sharing is demonstrated, which can greatly facilitate telemedicine. In this paper, the prototype systems are described, characterized and tested in surgeries in biological tissues ex vivo. We have found that the system can detect fluorescent targets with as low as 60 nM indocyanine green and can resolve structures down to 0.25 mm with large FOV stereoscopic imaging. The system has successfully guided simulated cancer surgeries in chicken. The Integrated Imaging Goggle is novel in 4 aspects: it is (a) the first wearable stereoscopic wide-field intraoperative fluorescence imaging and display system, (b) the first wearable system offering both large FOV and microscopic imaging simultaneously, (c) the first wearable system that offers both ultrasound imaging and fluorescence imaging capacities, and (d) the first demonstration of goggle-to-goggle communication to share stereoscopic views for medical guidance. PMID:26529249

  15. Sharing control between humans and automation using haptic interface: primary and secondary task performance benefits.

    PubMed

    Griffiths, Paul G; Gillespie, R Brent

    2005-01-01

    This paper describes a paradigm for human/automation control sharing in which the automation acts through a motor coupled to a machine's manual control interface. The manual interface becomes a haptic display, continually informing the human about automation actions. While monitoring by feel, users may choose either to conform to the automation or override it and express their own control intentions. This paper's objective is to demonstrate that adding automation through haptic display can be used not only to improve performance on a primary task but also to reduce perceptual demands or free attention for a secondary task. Results are presented from three experiments in which 11 participants completed a lane-following task using a motorized steering wheel on a fixed-base driving simulator. The automation behaved like a copilot, assisting with lane following by applying torques to the steering wheel. Results indicate that haptic assist improves lane following by least 30%, p < .0001, while reducing visual demand by 29%, p < .0001, or improving reaction time in a secondary tone localization task by 18 ms, p = .0009. Potential applications of this research include the design of automation interfaces based on haptics that support human/automation control sharing better than traditional push-button automation interfaces.

  16. Comparative analysis of barophily-related amino acid content in protein domains of Pyrococcus abyssi and Pyrococcus furiosus.

    PubMed

    Yafremava, Liudmila S; Di Giulio, Massimo; Caetano-Anollés, Gustavo

    2013-01-01

    Amino acid substitution patterns between the nonbarophilic Pyrococcus furiosus and its barophilic relative P. abyssi confirm that hydrostatic pressure asymmetry indices reflect the extent to which amino acids are preferred by barophilic archaeal organisms. Substitution patterns in entire protein sequences, shared protein domains defined at fold superfamily level, domains in homologous sequence pairs, and domains of very ancient and very recent origin now provide further clues about the environment that led to the genetic code and diversified life. The pyrococcal proteomes are very similar and share a very early ancestor. Relative amino acid abundance analyses showed that biases in the use of amino acids are due to their shared fold superfamilies. Within these repertoires, only two of the five amino acids that are preferentially barophilic, aspartic acid and arginine, displayed this preference significantly and consistently across structure and in domains appearing in the ancestor. The more primordial asparagine, lysine and threonine displayed a consistent preference for nonbarophily across structure and in the ancestor. Since barophilic preferences are already evident in ancient domains that are at least ~3 billion year old, we conclude that barophily is a very ancient trait that unfolded concurrently with genetic idiosyncrasies in convergence towards a universal code.

  17. [Study of sharing platform of web-based enhanced extracorporeal counterpulsation hemodynamic waveform data].

    PubMed

    Huang, Mingbo; Hu, Ding; Yu, Donglan; Zheng, Zhensheng; Wang, Kuijian

    2011-12-01

    Enhanced extracorporeal counterpulsation (EECP) information consists of both text and hemodynamic waveform data. At present EECP text information has been successfully managed through Web browser, while the management and sharing of hemodynamic waveform data through Internet has not been solved yet. In order to manage EECP information completely, based on the in-depth analysis of EECP hemodynamic waveform file of digital imaging and communications in medicine (DICOM) format and its disadvantages in Internet sharing, we proposed the use of the extensible markup language (XML), which is currently the Internet popular data exchange standard, as the storage specification for the sharing of EECP waveform data. Then we designed a web-based sharing system of EECP hemodynamic waveform data via ASP. NET 2.0 platform. Meanwhile, we specifically introduced the four main system function modules and their implement methods, including DICOM to XML conversion module, EECP waveform data management module, retrieval and display of EECP waveform module and the security mechanism of the system.

  18. MULTI: a shared memory approach to cooperative molecular modeling.

    PubMed

    Darden, T; Johnson, P; Smith, H

    1991-03-01

    A general purpose molecular modeling system, MULTI, based on the UNIX shared memory and semaphore facilities for interprocess communication is described. In addition to the normal querying or monitoring of geometric data, MULTI also provides processes for manipulating conformations, and for displaying peptide or nucleic acid ribbons, Connolly surfaces, close nonbonded contacts, crystal-symmetry related images, least-squares superpositions, and so forth. This paper outlines the basic techniques used in MULTI to ensure cooperation among these specialized processes, and then describes how they can work together to provide a flexible modeling environment.

  19. History-Enriched Spaces for Shared Encounters

    NASA Astrophysics Data System (ADS)

    Konomi, Shin'ichi; Sezaki, Kaoru; Kitsuregawa, Masaru

    We discuss "history-enriched spaces" that use historical data to support shared encounters. We first examine our experiences with DeaiExplorer, a social network display that uses RFID and a historical database to support social interactions at academic conferences. This leads to our discussions on three complementary approaches to addressing the issues of supporting social encounters: (1) embedding historical data in embodied interactions, (2) designing for weakly involved interactions such as social navigation, and (3) designing for privacy. Finally, we briefly describe a preliminary prototype of a proxemics-based awareness tool that considers these approaches.

  20. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    PubMed

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  1. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  2. Geriatric Oral Health: A Review Article

    PubMed Central

    Razak, P Abdul; Richard, K M Jose; Thankachan, Rekha P; Hafiz, K A Abdul; Kumar, K Nanda; Sameer, K M

    2014-01-01

    Oral health is not separate from general health, but maintaining oral health is definitely difficult and different in old age. Even though, few elderly have physical and/or mental situation that call for particular interest in the dental workplace, one should not presume that all elderly community shares these circumstances. In order to achieve health, it is necessary to know few aspects of old age. In due course of old age body tissues get harder, collection of waste products in body cells and loss of lubrication leads to impaired functions of various organs. The design and implementation of comprehensive preventive dentistry protocols for elders presents the dental profession with many challenges. Although a specific protocol must be tailored to meet the unique needs of the individual patient, there are certain factors common to elderly segment of the population that may influence these protocols. PMID:25628498

  3. Coherent population transfer in multi-level Allen-Eberly models

    NASA Astrophysics Data System (ADS)

    Li, Wei; Cen, Li-Xiang

    2018-04-01

    We investigate the solvability of multi-level extensions of the Allen-Eberly model and the population transfer yielded by the corresponding dynamical evolution. We demonstrate that, under a matching condition of the frequency, the driven two-level system and its multi-level extensions possess a stationary-state solution in a canonical representation associated with a unitary transformation. As a consequence, we show that the resulting protocol is able to realize complete population transfer in a nonadiabatic manner. Moreover, we explore the imperfect pulsing process with truncation and display that the nonadiabatic effect in the evolution can lead to suppression to the cutoff error of the protocol.

  4. UAV telemetry communications using ZigBee protocol

    NASA Astrophysics Data System (ADS)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  5. 78 FR 1286 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... (``CCS'').\\12\\ CCS provides the Display Book[supreg] \\13\\ with the amount of shares that the DMM is willing to trade at price points outside, at and inside the Exchange Best Bid or Best Offer (``BBO''). CCS...

  6. Shared services. Pay on display.

    PubMed

    Mathieson, Steve

    2003-07-17

    A year late, the electronic staff records project is now in the hands of the Department of Health. Pilots are underway, but it is unclear when every NHS payroll will be processed by the system. Progress has been slowed by the wide variety in organisations' structures and systems.

  7. U-View: Student Access to Information Using ATMs.

    ERIC Educational Resources Information Center

    Springfield, John J.

    1990-01-01

    A discussion of Boston College's system allowing students to display and print their campus records at automated teller machines (ATMs) around the institution looks at the system's evolution, current operations, human factors affecting system design and operation, shared responsibility, campus acceptance, future enhancements, and cost…

  8. Statistical properties of share volume traded in financial markets

    NASA Astrophysics Data System (ADS)

    Gopikrishnan, Parameswaran; Plerou, Vasiliki; Gabaix, Xavier; Stanley, H. Eugene

    2000-10-01

    We quantitatively investigate the ideas behind the often-expressed adage ``it takes volume to move stock prices,'' and study the statistical properties of the number of shares traded QΔt for a given stock in a fixed time interval Δt. We analyze transaction data for the largest 1000 stocks for the two-year period 1994-95, using a database that records every transaction for all securities in three major US stock markets. We find that the distribution P(QΔt) displays a power-law decay, and that the time correlations in QΔt display long-range persistence. Further, we investigate the relation between QΔt and the number of transactions NΔt in a time interval Δt, and find that the long-range correlations in QΔt are largely due to those of NΔt. Our results are consistent with the interpretation that the large equal-time correlation previously found between QΔt and the absolute value of price change \\|GΔt\\| (related to volatility) are largely due to NΔt.

  9. Lighting Control System for Premises with Display Screen Equipment

    NASA Astrophysics Data System (ADS)

    Kudryashov, A. V.

    2017-11-01

    The use of Display Screen Equipment (DSE) at enterprises allows one to increase the productivity and safety of production, minimize the number of personnel and leads to the simplification of the work of specialists, but on the other side, changes usual working conditions. If the personnel works with displays, visual fatigue develops more quickly which contributes to the emergence of nervous tension, stress and possible erroneous actions. Low interest of the lighting control system developers towards the rooms with displays is dictated by special requirements for coverage by sanitary and hygienic standards (limiting excess workplace illumination). We decided to create a combined lighting system which works considering daylight illumination and artificial light sources. The brightness adjustment of the LED lamps is carried out according to the DALI protocol, adjustment of the natural illumination by means of smart glasses. The technical requirements for a lighting control system, the structural-functional scheme and the algorithm for controlling the operation of the system have been developed. The elements of control units, sensors and actuators have been selected.

  10. The importance of chill rate when characterising colour change of lamb meat during retail display.

    PubMed

    Jacob, R H; Thomson, K L

    2012-02-01

    An experiment was conducted to compare the effect of two chilling rates (Con and Fast) on colour change of lamb meat during simulated retail display. Measurements were made on 3 muscles; LD (m. longisimuss dorsi), SM (m semimembranosus) and ST (m. semitendinous). Meat samples from 32 Merino crossbred lambs were vacuum packed and stored for 5 days at 2 °C, then cut and overwrapped in polyvinyl chloride film on black polystyrene trays, stored in a display cabinet at 4 °C with lights on and measured twice daily for 4 days, using a Hunterlab minilab 45/20L D65, aperture 10°. Sarcomere length was shorter, shear force higher and colour change greater in meat from the Fast treatment compared to the Con treatment. Colour differences between treatments were likely due to oxygenation (bloom) as well as oxidation effects. Chill rate is important when characterising colour change during display and should be considered in measurement protocols. Copyright © 2011 Elsevier Ltd. All rights reserved.

  11. A comparison of the performance and compatibility of protocols used by seven monitoring groups to measure stream habitat in the Pacific Northwest

    EPA Science Inventory

    To comply with legal mandates, meet local management objectives, or both, many federal, state, and tribal organizations have monitoring groups that assess stream habitat at different scales. This myriad of groups has difficulty sharing data and scaling up stream habitat assessmen...

  12. Quarterly Update, January-March 1992

    DTIC Science & Technology

    1992-03-01

    representations to support exploiting that commonality. The project used the Feature-Oriented Domain Analysis ( FODA ) method, developed by the project in 1990, in...9 FODA feature-oriented domain analysis ................................... 14 FTP file transfer protocol...concentrations, and product market share for 23 countries. Along with other SEI staff, members of the Rate Monotonic Analysis for Real-Time Systems (RMARTS

  13. Operationalizing Culturally Responsive Instruction: Preliminary Findings of CRIOP Research

    ERIC Educational Resources Information Center

    Powell, Rebecca; Cantrell, Susan Chambers; Malo-Juvera, Victor; Correll, Pamela

    2016-01-01

    Background: Many scholars have espoused the use of culturally responsive instruction (CRI) for closing achievement gaps, yet there is a paucity of research supporting its effectiveness. In this article, we share results of a mixed methods study that examined the use of the Culturally Responsive Instruction Observation Protocol (CRIOP) as a…

  14. Species Diversity in Planted Pine and Natural Hardwoods 24 years After Sharing and Chipping on the Cumberland Plateau, TN

    Treesearch

    Karen Kuers

    2002-01-01

    Plant species richness in 24 year-old planted lobiolly pine (Pinus taeda L.), eastern white pine (Pinus strobus L.), yellow-poplar (Liriodendron tulipifera L.), naturally regenerated hardwoods, and mature hardwoods was compared using the North Carolina Vegetation Survey protocol. Comparisons were made in...

  15. Application of homomorphism to secure image sharing

    NASA Astrophysics Data System (ADS)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  16. Information trade-offs for optical quantum communication.

    PubMed

    Wilde, Mark M; Hayden, Patrick; Guha, Saikat

    2012-04-06

    Recent work has precisely characterized the achievable trade-offs between three key information processing tasks-classical communication (generation or consumption), quantum communication (generation or consumption), and shared entanglement (distribution or consumption), measured in bits, qubits, and ebits per channel use, respectively. Slices and corner points of this three-dimensional region reduce to well-known protocols for quantum channels. A trade-off coding technique can attain any point in the region and can outperform time sharing between the best-known protocols for accomplishing each information processing task by itself. Previously, the benefits of trade-off coding that had been found were too small to be of practical value (viz., for the dephasing and the universal cloning machine channels). In this Letter, we demonstrate that the associated performance gains are in fact remarkably high for several physically relevant bosonic channels that model free-space or fiber-optic links, thermal-noise channels, and amplifiers. We show that significant performance gains from trade-off coding also apply when trading photon-number resources between transmitting public and private classical information simultaneously over secret-key-assisted bosonic channels. © 2012 American Physical Society

  17. A Distributed Multi-Agent System for Collaborative Information Management and Learning

    NASA Technical Reports Server (NTRS)

    Chen, James R.; Wolfe, Shawn R.; Wragg, Stephen D.; Koga, Dennis (Technical Monitor)

    2000-01-01

    In this paper, we present DIAMS, a system of distributed, collaborative agents to help users access, manage, share and exchange information. A DIAMS personal agent helps its owner find information most relevant to current needs. It provides tools and utilities for users to manage their information repositories with dynamic organization and virtual views. Flexible hierarchical display is integrated with indexed query search-to support effective information access. Automatic indexing methods are employed to support user queries and communication between agents. Contents of a repository are kept in object-oriented storage to facilitate information sharing. Collaboration between users is aided by easy sharing utilities as well as automated information exchange. Matchmaker agents are designed to establish connections between users with similar interests and expertise. DIAMS agents provide needed services for users to share and learn information from one another on the World Wide Web.

  18. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  19. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    PubMed

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  20. Quality assurance of data collection in the multi-site community randomized trial and prevalence survey of the children's healthy living program.

    PubMed

    Yamanaka, Ashley; Fialkowski, Marie Kainoa; Wilkens, Lynne; Li, Fenfang; Ettienne, Reynolette; Fleming, Travis; Power, Julianne; Deenik, Jonathan; Coleman, Patricia; Leon Guerrero, Rachael; Novotny, Rachel

    2016-09-02

    Quality assurance plays an important role in research by assuring data integrity, and thus, valid study results. We aim to describe and share the results of the quality assurance process used to guide the data collection process in a multi-site childhood obesity prevalence study and intervention trial across the US Affiliated Pacific Region. Quality assurance assessments following a standardized protocol were conducted by one assessor in every participating site. Results were summarized to examine and align the implementation of protocol procedures across diverse settings. Data collection protocols focused on food and physical activity were adhered to closely; however, protocols for handling completed forms and ensuring data security showed more variability. Quality assurance protocols are common in the clinical literature but are limited in multi-site community-based studies, especially in underserved populations. The reduction in the number of QA problems found in the second as compared to the first data collection periods for the intervention study attest to the value of this assessment. This paper can serve as a reference for similar studies wishing to implement quality assurance protocols of the data collection process to preserve data integrity and enhance the validity of study findings. NIH clinical trial #NCT01881373.

  1. Wireless Sensor Node for Autonomous Monitoring and Alerts in Remote Environments

    NASA Technical Reports Server (NTRS)

    Panangadan, Anand V. (Inventor); Monacos, Steve P. (Inventor)

    2015-01-01

    A method, apparatus, system, and computer program products provides personal alert and tracking capabilities using one or more nodes. Each node includes radio transceiver chips operating at different frequency ranges, a power amplifier, sensors, a display, and embedded software. The chips enable the node to operate as either a mobile sensor node or a relay base station node while providing a long distance relay link between nodes. The power amplifier enables a line-of-sight communication between the one or more nodes. The sensors provide a GPS signal, temperature, and accelerometer information (used to trigger an alert condition). The embedded software captures and processes the sensor information, provides a multi-hop packet routing protocol to relay the sensor information to and receive alert information from a command center, and to display the alert information on the display.

  2. Safety of Rural Nursing Home-to-Emergency Department Transfers: Improving Communication and Patient Information Sharing Across Settings.

    PubMed

    Tupper, Judith B; Gray, Carolyn E; Pearson, Karen B; Coburn, Andrew F

    2015-01-01

    The "siloed" approach to healthcare delivery contributes to communication challenges and to potential patient harm when patients transfer between settings. This article reports on the evaluation of a demonstration in 10 rural communities to improve the safety of nursing facility (NF) transfers to hospital emergency departments by forming interprofessional teams of hospital, emergency medical service, and NF staff to develop and implement tools and protocols for standardizing critical interfacility communication pathways and information sharing. We worked with each of the 10 teams to document current communication processes and information sharing tools and to design, implement, and evaluate strategies/tools to increase effective communication and sharing of patient information across settings. A mixed methods approach was used to evaluate changes from baseline in documentation of patient information shared across settings during the transfer process. Study findings showed significant improvement in key areas across the three settings, including infection status and baseline mental functioning. Improvement strategies and performance varied across settings; however, accurate and consistent information sharing of advance directives and medication lists remains a challenge. Study results demonstrate that with neutral facilitation and technical support, collaborative interfacility teams can assess and effectively address communication and information sharing problems that threaten patient safety.

  3. Advanced communications technology satellite high burst rate link evaluation terminal communication protocol software user's guide, version 1.0

    NASA Technical Reports Server (NTRS)

    Reinhart, Richard C.

    1993-01-01

    The Communication Protocol Software was developed at the NASA Lewis Research Center to support the Advanced Communications Technology Satellite High Burst Rate Link Evaluation Terminal (ACTS HBR-LET). The HBR-LET is an experimenters terminal to communicate with the ACTS for various experiments by government, university, and industry agencies. The Communication Protocol Software is one segment of the Control and Performance Monitor (C&PM) Software system of the HBR-LET. The Communication Protocol Software allows users to control and configure the Intermediate Frequency Switch Matrix (IFSM) on board the ACTS to yield a desired path through the spacecraft payload. Besides IFSM control, the C&PM Software System is also responsible for instrument control during HBR-LET experiments, uplink power control of the HBR-LET to demonstrate power augmentation during signal fade events, and data display. The Communication Protocol Software User's Guide, Version 1.0 (NASA CR-189162) outlines the commands and procedures to install and operate the Communication Protocol Software. Configuration files used to control the IFSM, operator commands, and error recovery procedures are discussed. The Communication Protocol Software Maintenance Manual, Version 1.0 (NASA CR-189163, to be published) is a programmer's guide to the Communication Protocol Software. This manual details the current implementation of the software from a technical perspective. Included is an overview of the Communication Protocol Software, computer algorithms, format representations, and computer hardware configuration. The Communication Protocol Software Test Plan (NASA CR-189164, to be published) provides a step-by-step procedure to verify the operation of the software. Included in the Test Plan is command transmission, telemetry reception, error detection, and error recovery procedures.

  4. dCache, Sync-and-Share for Big Data

    NASA Astrophysics Data System (ADS)

    Millar, AP; Fuhrmann, P.; Mkrtchyan, T.; Behrmann, G.; Bernardt, C.; Buchholz, Q.; Guelzow, V.; Litvintsev, D.; Schwank, K.; Rossi, A.; van der Reest, P.

    2015-12-01

    The availability of cheap, easy-to-use sync-and-share cloud services has split the scientific storage world into the traditional big data management systems and the very attractive sync-and-share services. With the former, the location of data is well understood while the latter is mostly operated in the Cloud, resulting in a rather complex legal situation. Beside legal issues, those two worlds have little overlap in user authentication and access protocols. While traditional storage technologies, popular in HEP, are based on X.509, cloud services and sync-and-share software technologies are generally based on username/password authentication or mechanisms like SAML or Open ID Connect. Similarly, data access models offered by both are somewhat different, with sync-and-share services often using proprietary protocols. As both approaches are very attractive, dCache.org developed a hybrid system, providing the best of both worlds. To avoid reinventing the wheel, dCache.org decided to embed another Open Source project: OwnCloud. This offers the required modern access capabilities but does not support the managed data functionality needed for large capacity data storage. With this hybrid system, scientists can share files and synchronize their data with laptops or mobile devices as easy as with any other cloud storage service. On top of this, the same data can be accessed via established mechanisms, like GridFTP to serve the Globus Transfer Service or the WLCG FTS3 tool, or the data can be made available to worker nodes or HPC applications via a mounted filesystem. As dCache provides a flexible authentication module, the same user can access its storage via different authentication mechanisms; e.g., X.509 and SAML. Additionally, users can specify the desired quality of service or trigger media transitions as necessary, thus tuning data access latency to the planned access profile. Such features are a natural consequence of using dCache. We will describe the design of the hybrid dCache/OwnCloud system, report on several months of operations experience running it at DESY, and elucidate the future road-map.

  5. Nonpainful wide-area compression inhibits experimental pain

    PubMed Central

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-01-01

    Abstract Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM. PMID:27152691

  6. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  7. Single-shot secure quantum network coding on butterfly network with free public communication

    NASA Astrophysics Data System (ADS)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  8. HomeADL for adaptive ADL monitoring within smart homes.

    PubMed

    Hong, Xin; Nugent, Chris D; Finlay, Dewar D; Mulvenna, Maurice

    2008-01-01

    In this paper we present homeADL: a representation standard for an inference hierarchy of activities of daily living which may be monitored in a sensor equipped smart home. The approach allows a free exchange of ADL monitoring structures between different communities who share the same concern of providing high quality healthcare to the elderly. Its ability of matching different ADL protocols enables a mapping between an ADL protocol to a suitable smart home which makes an effective management of smart homes within a community hence, not only being able to satisfy an individual's healthcare requirements but also efficiently using monitoring resources at hand.

  9. Authentication and Key Establishment in Dynamic Wireless Sensor Networks

    PubMed Central

    Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier

    2010-01-01

    When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321

  10. Time-dependent Increase in the Network Response to the Stimulation of Neuronal Cell Cultures on Micro-electrode Arrays.

    PubMed

    Gertz, Monica L; Baker, Zachary; Jose, Sharon; Peixoto, Nathalia

    2017-05-29

    Micro-electrode arrays (MEAs) can be used to investigate drug toxicity, design paradigms for next-generation personalized medicine, and study network dynamics in neuronal cultures. In contrast with more traditional methods, such as patch-clamping, which can only record activity from a single cell, MEAs can record simultaneously from multiple sites in a network, without requiring the arduous task of placing each electrode individually. Moreover, numerous control and stimulation configurations can be easily applied within the same experimental setup, allowing for a broad range of dynamics to be explored. One of the key dynamics of interest in these in vitro studies has been the extent to which cultured networks display properties indicative of learning. Mouse neuronal cells cultured on MEAs display an increase in response following training induced by electrical stimulation. This protocol demonstrates how to culture neuronal cells on MEAs; successfully record from over 95% of the plated dishes; establish a protocol to train the networks to respond to patterns of stimulation; and sort, plot, and interpret the results from such experiments. The use of a proprietary system for stimulating and recording neuronal cultures is demonstrated. Software packages are also used to sort neuronal units. A custom-designed graphical user interface is used to visualize post-stimulus time histograms, inter-burst intervals, and burst duration, as well as to compare the cellular response to stimulation before and after a training protocol. Finally, representative results and future directions of this research effort are discussed.

  11. The GLOBAL Learning and Observations to Benefit the Environment (GLOBE) Data Visualization and Retrieval System. Building a robust system for scientists and students.

    NASA Astrophysics Data System (ADS)

    Overoye, D.; Lewis, C.; Butler, D. M.; Andersen, T. J.

    2016-12-01

    The Global Learning and Observations to Benefit the Environment (GLOBE) Program is a worldwide hands-on, primary and secondary school-based science and education program founded on Earth Day 1995. Implemented in 117 countries, GLOBE promotes the teaching and learning of science, supporting students, teachers and scientists worldwide to collaborate with each other on inquiry-based investigations of the Earth system. The GLOBE Data Information System (DIS) currently supports users with the ability to enter data from over 50 different science protocols. GLOBE's Data Access and Visualization tools have been developed to accommodate the need to display and retrieve data from this large number of protocols. The community of users is also diverse, including NASA scientists, citizen scientists and grade school students. The challenge for GLOBE is to meet the needs from this diverse set of users with protocol specific displays that are simple enough for a GLOBE school to use, but also provide enough features for a NASA Scientist to retrieve data sets they are interested in. During the last 3 years, the GLOBE visualization system has evolved to meet the needs of these various users, leveraging user feedback and technological advances. Further refinements and enhancements continue. In this session we review the design and capabilities of the GLOBE visualization and data retrieval tool set, discuss the evolution of these tools, and discuss coming directions.

  12. The effect of high-fat diet on rat’s mood, feeding behavior and response to stress

    PubMed Central

    Aslani, S; Vieira, N; Marques, F; Costa, P S; Sousa, N; Palha, J A

    2015-01-01

    An association between obesity and depression has been indicated in studies addressing common physical (metabolic) and psychological (anxiety, low self-esteem) outcomes. Of consideration in both obesity and depression are chronic mild stressors to which individuals are exposed to on a daily basis. However, the response to stress is remarkably variable depending on numerous factors, such as the physical health and the mental state at the time of exposure. Here a chronic mild stress (CMS) protocol was used to assess the effect of high-fat diet (HFD)-induced obesity on response to stress in a rat model. In addition to the development of metabolic complications, such as glucose intolerance, diet-induced obesity caused behavioral alterations. Specifically, animals fed on HFD displayed depressive- and anxious-like behaviors that were only present in the normal diet (ND) group upon exposure to CMS. Of notice, these mood impairments were not further aggravated when the HFD animals were exposed to CMS, which suggest a ceiling effect. Moreover, although there was a sudden drop of food consumption in the first 3 weeks of the CMS protocol in both ND and HFD groups, only the CMS-HFD displayed an overall noticeable decrease in total food intake during the 6 weeks of the CMS protocol. Altogether, the study suggests that HFD impacts on the response to CMS, which should be considered when addressing the consequences of obesity in behavior. PMID:26795748

  13. Analysing change in music therapy interactions of children with communication difficulties

    PubMed Central

    2016-01-01

    Music therapy has been found to improve communicative behaviours and joint attention in children with autism, but it is unclear what in the music therapy sessions drives those changes. We developed an annotation protocol and tools to accumulate large datasets of music therapy, for analysis of interaction dynamics. Analysis of video recordings of improvisational music therapy sessions focused on simple, unambiguous individual and shared behaviours: movement and facing behaviours, rhythmic activity and musical structures and the relationships between them. To test the feasibility of the protocol, early and late sessions of five client–therapist pairs were annotated and analysed to track changes in behaviours. To assess the reliability and validity of the protocol, inter-rater reliability of the annotation tiers was calculated, and the therapists provided feedback about the relevance of the analyses and results. This small-scale study suggests that there are both similarities and differences in the profiles of client–therapist sessions. For example, all therapists faced the clients most of the time, while the clients did not face back so often. Conversely, only two pairs had an increase in regular pulse from early to late sessions. More broadly, similarity across pairs at a general level is complemented by variation in the details. This perhaps goes some way to reconciling client- and context-specificity on one hand and generalizability on the other. Behavioural characteristics seem to influence each other. For instance, shared rhythmic pulse alternated with mutual facing and the occurrence of shared pulse was found to relate to the musical structure. These observations point towards a framework for looking at change in music therapy that focuses on networks of variables or broader categories. The results suggest that even when starting with simple behaviours, we can trace aspects of interaction and change in music therapy, which are seen as relevant by therapists. PMID:27069051

  14. Analysing change in music therapy interactions of children with communication difficulties.

    PubMed

    Spiro, Neta; Himberg, Tommi

    2016-05-05

    Music therapy has been found to improve communicative behaviours and joint attention in children with autism, but it is unclear what in the music therapy sessions drives those changes. We developed an annotation protocol and tools to accumulate large datasets of music therapy, for analysis of interaction dynamics. Analysis of video recordings of improvisational music therapy sessions focused on simple, unambiguous individual and shared behaviours: movement and facing behaviours, rhythmic activity and musical structures and the relationships between them. To test the feasibility of the protocol, early and late sessions of five client-therapist pairs were annotated and analysed to track changes in behaviours. To assess the reliability and validity of the protocol, inter-rater reliability of the annotation tiers was calculated, and the therapists provided feedback about the relevance of the analyses and results. This small-scale study suggests that there are both similarities and differences in the profiles of client-therapist sessions. For example, all therapists faced the clients most of the time, while the clients did not face back so often. Conversely, only two pairs had an increase in regular pulse from early to late sessions. More broadly, similarity across pairs at a general level is complemented by variation in the details. This perhaps goes some way to reconciling client- and context-specificity on one hand and generalizability on the other. Behavioural characteristics seem to influence each other. For instance, shared rhythmic pulse alternated with mutual facing and the occurrence of shared pulse was found to relate to the musical structure. These observations point towards a framework for looking at change in music therapy that focuses on networks of variables or broader categories. The results suggest that even when starting with simple behaviours, we can trace aspects of interaction and change in music therapy, which are seen as relevant by therapists. © 2016 The Authors.

  15. Recognition Is Still a Top Motivator.

    ERIC Educational Resources Information Center

    Cherrington, David J.; Wixom, B. Jackson, Jr.

    1983-01-01

    Motivation theories can be generalized to a common principle of human behavior: people do what they are reinforced or rewarded for doing. The most successful motivational recognition programs share five key elements: a recognition symbol, an attractive means of display, a meaningful presentation, effective promotion, and periodic evaluation. (MLF)

  16. The Economic and Budget Outlook: An Update

    DTIC Science & Technology

    1993-09-01

    transfer payments. income also includes the employer’s share of Social Security and federal unemployment insurance payroll taxes, and the corporate income tax . For...because two of the factors that in- creased 1993 revenues-- corporate income tax - Deposit insurance spending displays the es rebounding from the recession

  17. Sweat, Skepticism, and Uncharted Territory: A Qualitative Study of Opinions on Data Sharing Among Public Health Researchers and Research Participants in Mumbai, India.

    PubMed

    Hate, Ketaki; Meherally, Sanna; Shah More, Neena; Jayaraman, Anuja; Bull, Susan; Parker, Michael; Osrin, David

    2015-07-01

    Efforts to internalize data sharing in research practice have been driven largely by developing international norms that have not incorporated opinions from researchers in low- and middle-income countries. We sought to identify the issues around ethical data sharing in the context of research involving women and children in urban India. We interviewed researchers, managers, and research participants associated with a Mumbai non-governmental organization, as well as researchers from other organizations and members of ethics committees. We conducted 22 individual semi-structured interviews and involved 44 research participants in focus group discussions. We used framework analysis to examine ideas about data and data sharing in general; its potential benefits or harms, barriers, obligations, and governance; and the requirements for consent. Both researchers and participants were generally in favor of data sharing, although limited experience amplified their reservations. We identified three themes: concerns that the work of data producers may not receive appropriate acknowledgment, skepticism about the process of sharing, and the fact that the terrain of data sharing was essentially uncharted and confusing. To increase data sharing in India, we need to provide guidelines, protocols, and examples of good practice in terms of consent, data preparation, screening of applications, and what individuals and organizations can expect in terms of validation, acknowledgment, and authorship. © The Author(s) 2015.

  18. Increasing value and reducing waste: addressing inaccessible research.

    PubMed

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C; Krumholz, Harlan M; Ghersi, Davina; van der Worp, H Bart

    2014-01-18

    The methods and results of health research are documented in study protocols, full study reports (detailing all analyses), journal reports, and participant-level datasets. However, protocols, full study reports, and participant-level datasets are rarely available, and journal reports are available for only half of all studies and are plagued by selective reporting of methods and results. Furthermore, information provided in study protocols and reports varies in quality and is often incomplete. When full information about studies is inaccessible, billions of dollars in investment are wasted, bias is introduced, and research and care of patients are detrimentally affected. To help to improve this situation at a systemic level, three main actions are warranted. First, academic institutions and funders should reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Second, standards for the content of protocols and full study reports and for data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should endorse and enforce policies supporting study registration and wide availability of journal reports, full study reports, and participant-level datasets. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Increasing value and reducing waste: addressing inaccessible research

    PubMed Central

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C.; Krumholz, Harlan M.; Ghersi, Davina; van der Worp, H. Bart

    2015-01-01

    The study protocol, publications, full study report detailing all analyses, and participant-level dataset constitute the main documentation of methods and results for health research. However, journal publications are available for only half of all studies and are plagued by selective reporting of methods and results. The protocol, full study report, and participant-level dataset are rarely available. The quality of information provided in study protocols and reports is variable and often incomplete. Inaccessibility of full information for the vast majority of studies wastes billions of dollars, introduces bias, and has a detrimental impact on patient care and research. To help improve this situation at a systemic level, three main actions are warranted. Firstly, it is important that academic institutions and funders reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Secondly, standards for the content of protocols, full study reports, and data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should implement and enforce policies supporting study registration and availability of journal publications, full study reports, and participant-level datasets. PMID:24411650

  20. Quantum protocols within Spekkens' toy model

    NASA Astrophysics Data System (ADS)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  1. Moving away from methyl bromide: political economy of pesticide transition for California strawberries since 2004.

    PubMed

    Mayfield, Erin N; Norman, Catherine Shelley

    2012-09-15

    We examine the progress of the phaseout of the use of the pesticide methyl bromide in the production of California field strawberries. This phaseout is required under the Montreal Protocol and has been contentious in this sector, which receives exemptions from the schedule initially agreed under the treaty, and in international negotiations over the future of the Protocol. We examine the various ex-ante predictions of the impacts on growers, consumers and trade patterns in light of several years of declining allocations under the Critical Use provisions of the Protocol and the 2010 approval of iodomethane for use in California and subsequent 2012 withdrawal of this alternative from the US market. We find that, contrary to ex-ante industry claims, the years of declining methyl bromide use have been years of rising yields, acreage, exports, revenues and market share for California growers, even when faced with a global recession and increased imports from Mexican growers who retain the right to use the chemical under the Protocol. This has implications for the Protocol as a whole and for the remainder of the US phaseout of this chemical in particular. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Ubiquitous picture-rich content representation

    NASA Astrophysics Data System (ADS)

    Wang, Wiley; Dean, Jennifer; Muzzolini, Russ

    2010-02-01

    The amount of digital images taken by the average consumer is consistently increasing. People enjoy the convenience of storing and sharing their pictures through online (digital) and offline (traditional) media. A set of pictures can be uploaded to: online photo services, web blogs and social network websites. Alternatively, these images can be used to generate: prints, cards, photo books or other photo products. Through uploading and sharing, images are easily transferred from one format to another. And often, a different set of associated content (text, tags) is created across formats. For example, on his web blog, a user may journal his experiences of his recent travel; on his social network website, his friends tag and comment on the pictures; in his online photo album, some pictures are titled and keyword-tagged. When the user wants to tell a complete story, perhaps in a photo book, he must collect, across all formats: the pictures, writings and comments, etc. and organize them in a book format. The user has to arrange the content of his trip in each format. The arrangement, the associations between the images, tags, keywords and text, cannot be shared with other formats. In this paper, we propose a system that allows the content to be easily created and shared across various digital media formats. We define a uniformed data association structure to connect: images, documents, comments, tags, keywords and other data. This content structure allows the user to switch representation formats without reediting. The framework under each format can emphasize (display or hide) content elements based on preference. For example, a slide show view will emphasize the display of pictures with limited text; a blog view will display highlighted images and journal text; and the photo book will try to fit in all images and text content. In this paper, we will discuss the strategy to associate pictures with text content, so that it can naturally tell a story. We will also list sample solutions on different formats such as: picture view, blog view and photo book view.

  3. Analyzing multiple data sets by interconnecting RSAT programs via SOAP Web services: an example with ChIP-chip data.

    PubMed

    Sand, Olivier; Thomas-Chollier, Morgane; Vervisch, Eric; van Helden, Jacques

    2008-01-01

    This protocol shows how to access the Regulatory Sequence Analysis Tools (RSAT) via a programmatic interface in order to automate the analysis of multiple data sets. We describe the steps for writing a Perl client that connects to the RSAT Web services and implements a workflow to discover putative cis-acting elements in promoters of gene clusters. In the presented example, we apply this workflow to lists of transcription factor target genes resulting from ChIP-chip experiments. For each factor, the protocol predicts the binding motifs by detecting significantly overrepresented hexanucleotides in the target promoters and generates a feature map that displays the positions of putative binding sites along the promoter sequences. This protocol is addressed to bioinformaticians and biologists with programming skills (notions of Perl). Running time is approximately 6 min on the example data set.

  4. On entropy determination from magnetic and calorimetric experiments in conventional giant magnetocaloric materials

    NASA Astrophysics Data System (ADS)

    Chen, Jing-Han; Us Saleheen, Ahmad; Adams, Philip W.; Young, David P.; Ali, Naushad; Stadler, Shane

    2018-04-01

    In this work, we discuss measurement protocols for the determination of the magnetic entropy change associated with first-order magneto-structural transitions from both magnetization and calorimetric experiments. The Cu-doped Ni2MnGa Heusler alloy with a first-order magneto-structural phase transition is used as a case study to illustrate how commonly-used magnetization measurement protocols result in spurious entropy evaluations. Two magnetization measurement protocols which allow for the accurate assessment of the magnetic entropy change across first-order magneto-structural transitions are presented. In addition, calorimetric measurements were performed to validate the results from the magnetization measurements. Self-consistent results between the magnetization and calorimetric measurements were obtained when the non-equilibrium thermodynamic state was carefully handled. Such methods could be applicable to other systems displaying giant magnetocaloric effects caused by first-order phase transitions with magnetic and thermal hysteresis.

  5. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin

    2017-06-01

    We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.

  6. Simultaneous video analysis of the kinematics of opercular movement and electromyographic activity during agonistic display in Siamese fighting fish.

    PubMed

    Polnau, D G; Ma, P M

    2001-12-01

    Neuroethology seeks to uncover the neural mechanisms underlying natural behaviour. One of the major challenges in this field is the need to correlate directly neural activity and behavioural output. In most cases, recording of neural activity in freely moving animals is extremely difficult. However, electromyographic recording can often be used in lieu of neural recording to gain an understanding of the motor output program underlying a well-defined behaviour. Electromyographic recording is less invasive than most other recording methods, and does not impede the performance of most natural tasks. Using the opercular display of the Siamese fighting fish as a model, we developed a protocol for correlating directly electromyographic activity and kinematics of opercular movement: electromyographic activity was recorded in the audio channel of a video cassette recorder while video taping the display behaviour. By combining computer-assisted, quantitative video analysis and spike analysis, the kinematics of opercular movement are linked to the motor output program. Since the muscle that mediates opercular abduction in this fish, the dilator operculi, is a relatively small muscle with several subdivisions, we also describe methods for recording from small muscles and marking the precise recording site with electrolytic corrosion. The protocol described here is applicable to studies of a variety of natural behaviour that can be performed in a relatively confined space. It is also useful for analyzing complex or rapidly changing behaviour in which a precise correlation between kinematics and electromyography is required.

  7. Heart Rate Variability of Athletes Across Concussion Recovery Milestones: A Preliminary Study.

    PubMed

    Senthinathan, Arrani; Mainwaring, Lynda M; Hutchison, Michael

    2017-05-01

    To assess heart rate variability (HRV) in athletes with concussion across three phases of recovery. A prospective matched control group design included the collection of HRV and symptoms measured by the Rivermead Post-Concussion Questionnaire. These measures were taken at 3 phases of recovery [(1) symptomatic; (2). asymptomatic; and (3) one-week after return-to-play (RTP)]. The same protocol was completed by noninjured athletes. Interuniversity sports teams at a single institution. 11 athletes, across 7 sports, diagnosed with concussion, and 11 matched-athlete controls volunteered for the study. Physician diagnosed concussion and a sitting to standing protocol for HRV monitoring. The frequency, time, and nonlinear domains of HRV were assessed along with the absolute difference between sitting and standing for each. A 2 x 3 (group x phase) repeated-measures analysis of variance revealed significant interactions for sitting High Frequency (HF) norm, sitting Low Frequency (LF) norm, the difference between sitting and standing HF norm, and difference between sitting and standing LF norm. Acutely, athletes with concussion displayed increased LF norm and decreased HF norm while sitting and a decreased change in their HF and LF norm measures between sitting and standing. A significant group effect for sample entropy when standing was detected, with the concussed group displaying decreased values compared with the matched controls. Athletes with concussion displayed autonomic dysfunction in some measures of HRV that persisted beyond RTP and were related to a previous history of concussion.

  8. A systematic review of the relationship between internet use, self-harm and suicidal behaviour in young people: The good, the bad and the unknown

    PubMed Central

    Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate

    2017-01-01

    Background Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. Methods We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Results Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. Conclusions There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums’ (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518). PMID:28813437

  9. Developmental Competence and Epigenetic Profile of Porcine Embryos Produced by Two Different Cloning Methods.

    PubMed

    Liu, Ying; Lucas-Hahn, Andrea; Petersen, Bjoern; Li, Rong; Hermann, Doris; Hassel, Petra; Ziegler, Maren; Larsen, Knud; Niemann, Heiner; Callesen, Henrik

    2017-06-01

    The "Dolly" based cloning (classical nuclear transfer, [CNT]) and the handmade cloning (HMC) are methods that are nowadays routinely used for somatic cloning of large domestic species. Both cloning protocols share several similarities, but differ with regard to the required in vitro culture, which in turn results in different time intervals until embryo transfer. It is not yet known whether the differences between cloned embryos from the two protocols are due to the cloning methods themselves or the in vitro culture, as some studies have shown detrimental effects of in vitro culture on conventionally produced embryos. The goal of this study was to unravel putative differences between two cloning methods, with regard to developmental competence, expression profile of a panel of developmentally important genes and epigenetic profile of porcine cloned embryos produced by either CNT or HMC, either with (D5 or D6) or without (D0) in vitro culture. Embryos cloned by these two methods had a similar morphological appearance on D0, but displayed different cleavage rates and different quality of blastocysts, with HMC embryos showing higher blastocyst rates (HMC vs. CNT: 35% vs. 10%, p < 0.05) and cell numbers per blastocyst (HMC vs. CNT: 31 vs. 23 on D5 and 42 vs. 18 on D6, p < 0.05) compared to CNT embryos. With regard to histone acetylation and gene expression, CNT and HMC derived cloned embryos were similar on D0, but differed on D6. In conclusion, both cloning methods and the in vitro culture may affect porcine embryo development and epigenetic profile. The two cloning methods essentially produce embryos of similar quality on D0 and after 5 days in vitro culture, but thereafter both histone acetylation and gene expression differ between the two types of cloned embryos.

  10. Sheep polyclonal antibody to map Haemonchus contortus mimotopes using phage display library.

    PubMed

    Buzatti, Andréia; Fernandez, Arnielis Diaz; Arenal, Amilcar; Pereira, Erlán; Monteiro, Alda Lucia Gomes; Molento, Marcelo Beltrão

    2018-05-24

    The aim of this study was to evaluate phage display technology for mapping Haemonchus contortus mimotopes. We screened the PhD-7 Phage Display Peptide Library Kit with a sheep polyclonal antibody against H. contortus. After four rounds of selection, 50 phage peptide clones were selected by biopanning and sequenced. Two clones displaying peptide mimotopes of H. contortus proteins were chosen for sheep immunization: clone 6 - mimotope of glyceraldehyde-3-phosphate dehydrogenase (GAPDH) and clone 17 - mimotope of a disorganized muscle family member (Dim 1). Twelve sheep were allocated into 3 groups of 4 animals as follow: G1: control group; G2/GAPDH: immunized with clone 6; and G3/Dim1: immunized with clone 17. Four immunizations were performed at intervals of seven days (0, 7, 14, and 21 days). On day 28 post initial vaccination, all groups were orally challenged with 2500 H. contortus infective larvae. The mimotope peptides selected by phage display were recognized by IgG from sheep naturaly infected with H. contortus. The immunization protocol showed an increasein IgG anti-M13 phage titers, but no effect was observed in IgG-specific for the anti-mimotope peptides. This is the first report of successful use of a phage display library for the identification of mimotopes of H. contortus proteins.

  11. Efficacy of scalp hair decontamination following exposure to vapours of sulphur mustard simulants 2-chloroethyl ethyl sulphide and methyl salicylate.

    PubMed

    Spiandore, Marie; Piram, Anne; Lacoste, Alexandre; Prevost, Philippe; Maloni, Pascal; Torre, Franck; Asia, Laurence; Josse, Denis; Doumenq, Pierre

    2017-04-01

    Chemical warfare agents are an actual threat and victims' decontamination is a main concern when mass exposure occurs. Skin decontamination with current protocols has been widely documented, as well as surface decontamination. However, considering hair ability to trap chemicals in vapour phase, we investigated hair decontamination after exposure to sulphur mustard simulants methyl salicylate and 2-chloroethyl ethyl sulphide. Four decontamination protocols were tested on hair, combining showering and emergency decontamination (use of Fuller's earth or Reactive Skin Decontamination Lotion RSDL ® ). Both simulants were recovered from hair after treatment, but contents were significantly reduced (42-85% content allowance). Showering alone was the least efficient protocol. Concerning 2-chloroethyl ethyl sulphide, protocols did not display significant differences in decontamination efficacy. For MeS, use of emergency decontaminants significantly increased showering efficacy (10-20% rise), underlining their usefulness before thorough decontamination. Our results highlighted the need to extensively decontaminate hair after chemical exposure. Residual amounts after decontamination are challenging, as their release from hair could lead to health issues. Copyright © 2016. Published by Elsevier B.V.

  12. Boldness, Aggression, and Shoaling Assays for Zebrafish Behavioral Syndromes.

    PubMed

    Way, Gregory P; Southwell, Maura; McRobert, Scott P

    2016-08-29

    A behavioral syndrome exists when specific behaviors interact under different contexts. Zebrafish have been test subjects in recent studies and it is important to standardize protocols to ensure proper analyses and interpretations. In our previous studies, we have measured boldness by monitoring a series of behaviors (time near surface, latency in transitions, number of transitions, and darts) in a 1.5 L trapezoidal tank. Likewise, we quantified aggression by observing bites, lateral displays, darts, and time near an inclined mirror in a rectangular 19 L tank. By dividing a 76 L tank into thirds, we also examined shoaling preferences. The shoaling assay is a highly customizable assay and can be tailored for specific hypotheses. However, protocols for this assay also must be standardized, yet flexible enough for customization. In previous studies, end chambers were either empty, contained 5 or 10 zebrafish, or 5 pearl danios (D. albolineatus). In the following manuscript, we present a detailed protocol and representative data that accompany successful applications of the protocol, which will allow for replication of behavioral syndrome experiments.

  13. Serial Interface through Stream Protocol on EPICS Platform for Distributed Control and Monitoring

    NASA Astrophysics Data System (ADS)

    Das Gupta, Arnab; Srivastava, Amit K.; Sunil, S.; Khan, Ziauddin

    2017-04-01

    Remote operation of any equipment or device is implemented in distributed systems in order to control and proper monitoring of process values. For such remote operations, Experimental Physics and Industrial Control System (EPICS) is used as one of the important software tool for control and monitoring of a wide range of scientific parameters. A hardware interface is developed for implementation of EPICS software so that different equipment such as data converters, power supplies, pump controllers etc. could be remotely operated through stream protocol. EPICS base was setup on windows as well as Linux operating system for control and monitoring while EPICS modules such as asyn and stream device were used to interface the equipment with standard RS-232/RS-485 protocol. Stream Device protocol communicates with the serial line with an interface to asyn drivers. Graphical user interface and alarm handling were implemented with Motif Editor and Display Manager (MEDM) and Alarm Handler (ALH) command line channel access utility tools. This paper will describe the developed application which was tested with different equipment and devices serially interfaced to the PCs on a distributed network.

  14. Opportunities and limitations in using google glass to assist drug dispensing.

    PubMed

    Ehrler, Frederic; Diener, Raphael; Lovis, Christian

    2015-01-01

    The administration of intravenous drugs is a significant source of medical errors. Protocol based care are have been demonstrated to be an efficient way to favor best practices and to avoid simple errors such as those related to expiration date, hygiene regulation among other. The recent availability of the Google Glass, a hands free wearable device offers new opportunities to access care protocols at patients' bedside. In this article, we present a prototype application for displaying care protocols developed through a user centered design. The software enables the navigation through the different steps of care protocols and their validation using barcodes. Three interactions paradigms, tactile, vocal and by eye blink are proposed in order to provide hands free manipulation when necessary. The realization of a concrete project revealed some limitations that should be taken in account in order to ensure the proper behavior of the tool. If no formal evaluation has been performed, the first feedbacks are very positive and encourage us to go forward and test the tool in real care situations.

  15. Global warming potential estimates for the C1-C3 hydrochlorofluorocarbons (HCFCs) included in the Kigali Amendment to the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Papanastasiou, Dimitrios K.; Beltrone, Allison; Marshall, Paul; Burkholder, James B.

    2018-05-01

    Hydrochlorofluorocarbons (HCFCs) are ozone depleting substances and potent greenhouse gases that are controlled under the Montreal Protocol. However, the majority of the 274 HCFCs included in Annex C of the protocol do not have reported global warming potentials (GWPs) which are used to guide the phaseout of HCFCs and the future phase down of hydrofluorocarbons (HFCs). In this study, GWPs for all C1-C3 HCFCs included in Annex C are reported based on estimated atmospheric lifetimes and theoretical methods used to calculate infrared absorption spectra. Atmospheric lifetimes were estimated from a structure activity relationship (SAR) for OH radical reactivity and estimated O(1D) reactivity and UV photolysis loss processes. The C1-C3 HCFCs display a wide range of lifetimes (0.3 to 62 years) and GWPs (5 to 5330, 100-year time horizon) dependent on their molecular structure and the H-atom content of the individual HCFC. The results from this study provide estimated policy-relevant GWP metrics for the HCFCs included in the Montreal Protocol in the absence of experimentally derived metrics.

  16. What Type of Leadership in Higher Education Promotes Job Satisfaction and Increases Retention?

    ERIC Educational Resources Information Center

    Harris, Kenya; Hinds, Lynette; Manansingh, Sherry; Rubino, Michael; Morote, Elsa Sofia

    2016-01-01

    Satisfaction (Happiness at Work) and Employee Intention to stay with an organization, utilizing dimensions of servant leadership practices. The six dimensions of servant leadership practice were Values People, Develops People, Builds Community, Provides Leaderships, Displaying Authenticity, and Shared Leadership. The participants consisted of 59…

  17. Computer Instructional Aids for Undergraduate Control Education.

    ERIC Educational Resources Information Center

    Volz, Richard A.; And Others

    Engineering is coming to rely more and more heavily upon the computer for computations, analyses, and graphic displays which aid the design process. A general purpose simulation system, the Time-shared Automatic Control Laboratory (TACL), and a set of computer-aided design programs, Control Oriented Interactive Graphic Analysis and Design…

  18. Responding to Children's Fears: A Partnership Approach.

    ERIC Educational Resources Information Center

    Sorin, Reesa

    2002-01-01

    Describes a study into children's fears and suggests that forging partnerships between parents, children, and teachers is one positive step toward addressing fear in young children. Defines partnerships and asserts that they can help in better recognizing fear displays in young children and in sharing ideas about best practice in responding to…

  19. Satellites | National Oceanic and Atmospheric Administration

    Science.gov Websites

    and understand our dynamic planet LATEST FEATURES // NOAA-20 satellite shares first polar view satellite (GOES-16) witnessed a frightening display of stratiform, or 'spider' lightning as it's known, in Earth DSCOVR, NOAA's first operational satellite in deep space, orbits a million miles from Earth in

  20. History of Physics and Conceptual Constructions: The Case of Magnetism

    ERIC Educational Resources Information Center

    Voutsina, Lambrini; Ravanis, Konstantinos

    2011-01-01

    This study documents the mental representations of magnetism constructed by students aged 15-17 and attempts to investigate whether these display the characteristics of models with an inner cohesiveness and constancy; whether they share common features with typical historical models of the Sciences; and whether they evolve through conventional…

Top