Sample records for protocol originally designed

  1. Jack Healy Remembers - Anecdotal Evidence for the Origin of the Approximate 24-hour Urine Sampling Protocol Used for Worker Bioassay Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carbaugh, Eugene H.

    2008-10-01

    The origin of the approximate 24-hour urine sampling protocol used at Hanford for routine bioassay is attributed to an informal study done in the mid-1940s. While the actual data were never published and have been lost, anecdotal recollections by staff involved in the initial bioassay program design and administration suggest that the sampling protocol had a solid scientific basis. Numerous alternate methods for normalizing partial day samples to represent a total 24-hour collection have since been proposed and used, but no one method is obviously preferred.

  2. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  3. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  4. Development and Use of Fluorescent Antibody and qPCR Protocols for the Electrostatic Spore Trap

    USDA-ARS?s Scientific Manuscript database

    Fluorescent antibody (FA) and qPCR protocols were evaluated for the newly developed aerobiological sampler (Ionic Spore Trap), which depends upon electrostatic deposition of particulates onto a 25 mm aluminum disk (stub). This device was originally designed for assessment of captured particulates by...

  5. Optimal Outcomes in Young Class 3 Patients With Thalassemia Undergoing HLA-Identical Sibling Bone Marrow Transplantation.

    PubMed

    Gaziev, Javid; Isgrò, Antonella; Sodani, Pietro; Marziali, Marco; Paciaroni, Katia; Gallucci, Cristiano; De Angelis, Gioia; Andreani, Marco; Testi, Manuela; Alfieri, Cecilia; Ribersani, Michela; Galluccio, Tiziana; Battarra, Maria Rosa; Morrone, Aldo; Lucarelli, Guido

    2016-04-01

    Bone marrow transplantation (BMT) for class 3 patients with thalassemia is challenging due to high rates of graft rejection and transplant-related mortality. Since the first studies of BMT in the late 1980s, a number of conditioning regimens have been designed to improve outcomes, but with suboptimal results. Here we report the outcome of transplantation in class 3 patients using a modified protocol. Sixty-three patients between 5 and 16.7 years of age with class 3 thalassemia received HLA-matched sibling BMT following either the original protocol (26 patients) or the modified protocol (37 patients). Both regimens comprised preconditioning cytoreduction with hydroxyurea and azathioprine starting at -45 days pretransplant, and fludarabine from days -16 to -12. Conditioning was performed with busulfan and cyclophosphamide (original protocol) or with busulfan, thiotepa, and cyclophosphamide (modified protocol). The 2 groups showed similar patient demographics. At day 0, the degree of cytoreduction (lymphopenia, neuthropenia, and thrombocytopenia) achieved by the modified protocol was greater than the original protocol. The incidence of graft failure/rejection was significantly higher in the original group (15%; 95% confidence interval [95% CI], 5-32%) compared with the modified group (0%) (P = 0.014). The respective 5-year thalassemia-free survival rates were 73% (95% CI, 51-86%) and 92% (95% CI, 77-97%) (P = 0.047). Both groups showed similar incidences of grades II to IV acute graft-versus host disease. Modified protocol did not increase nonhematological toxicity or infectious complications. The modified treatment protocol effectively and safely prevented graft failure/rejection and significantly increased thalassemia-free survival of class 3 patients with thalassemia.

  6. Dry needling in a manual physiotherapy and therapeutic exercise protocol for patients with chronic mechanical shoulder pain of unspecific origin: a protocol for a randomized control trial.

    PubMed

    Tejera-Falcón, Emma; Toledo-Martel, Nuria Del Carmen; Sosa-Medina, Francisco Manuel; Santana-González, Fátima; Quintana-de la Fe, Miriam Del Pino; Gallego-Izquierdo, Tomás; Pecos-Martín, Daniel

    2017-09-18

    Shoulder pain of musculoskeletal origin is the main cause of upper limb pain of non-traumatic origin. Despite being one of the most common reasons for consultation, there is no established protocol for treatment due to the complexity of its etiology. However, it has been shown that the presence of myofascial trigger points on the shoulder muscles is a common condition associated with patients suffering from shoulder pain. This protocol has been created which describes the design of a randomized controlled trial to evaluate the effectiveness of the inclusion of dry needling (DN) within a protocol of manual physiotherapy and therapeutic exercise in the treatment of chronic shoulder pain of unspecific origin. Thirty-six participants aged 18-65 years will be recruited having mechanical chronic shoulder pain on unspecific origin and meeting the inclusion criteria. These will be randomized to one of two interventions, (i) DN, manual physiotherapy and therapeutic exercise or (ii) sham DN, manual physiotherapy and therapeutic exercise. The protocol will cover 6 weeks of treatment, with a 6-month follow-up. Our main outcome measure will be the Visual Analogue Scale for pain. This is the first study to combine the use of DN, manual physiotherapy and an exercise program with a 6-month follow-up, thus becoming a new contribution to the treatment of chronic shoulder pain, while new lines of research may be established to help determine the effects of DN on chronic shoulder pain and the frequency and proper dosage. International Standard Randomized Controlled Trial Number Register: ISRCTN30604244 ( http://www.controlled-trials.com ) 29 June 2016.

  7. Enhancing creative cognition with a rapid right-parietal neurofeedback procedure.

    PubMed

    Agnoli, Sergio; Zanon, Marco; Mastria, Serena; Avenanti, Alessio; Corazza, Giovanni Emanuele

    2018-02-14

    The present article describes an innovative neurofeedback training (NFT) procedure aimed at increasing creative cognition through the enhancement of specific brain activities previously associated with divergent thinking. We designed and tested two NFT protocols based on training alpha and beta EEG oscillations selectively measured over the right parietal region. A total of 80 participants were involved, 40 in the alpha NFT protocol and 40 in the beta NFT protocol. The NFT loop was closed on a video stream that would advance only when oscillation power exceeded a normalized threshold. The total duration of the protocol was two hours in a single day, hence its classification as rapid. Changes in ideational fluency and originality, measured with a divergent thinking task, were compared between participants receiving real video feedback and participants receiving sham feedback. We controlled for individual differences in creative achievement level. Results showed that the protocols were effective at enhancing alpha and beta activities in the targeted area. Differences between the two protocols emerged in their effectiveness at promoting divergent thinking. While no significant changes in originality resulted from the rapid alpha NFT, increases in both originality and fluency emerged as a consequence of the rapid beta NFT. These results were particularly evident in participants starting with a low creative achievement level. Possible interpretations and future directions are proposed and discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. A new amperometric glucose microsensor: in vitro and short-term in vivo evaluation.

    PubMed

    Ward, W Kenneth; Jansen, Lawrence B; Anderson, Ellen; Reach, Gerard; Klein, Jean-Claude; Wilson, George S

    2002-03-01

    For biosensor fabrication, it is important to optimize materials and methods in order to create predictable function in vitro and in vivo. For this reason, we designed a new glucose sensor ('revised protocol') that utilized an outer permselective membrane made of amphiphobic polyurethane which allows glucose passage through hydrophilic segments. An inner polyethersulfone membrane, stabilized with a trimethoxysilane, provided specificity. Before application of the inner membrane, it was necessary to etch the platinum electrode with a radio frequency oxygen plasma. The revised protocol sensors (n=185) were compared with sensors fabricated with an earlier ('original') protocol (n=204) which used an outer polyurethane without hydrophilic segments and a complex inner membrane of cellulose acetate and Nafion. The function of revised protocol sensors was more predictable in vitro as evidenced by a much lower variation of glucose sensitivity than the original protocol sensors. Revised and original protocol sensors were nearly linear up to a glucose concentration of 20 mM. In vitro interference from 0.1 mM acetaminophen was minimal in both groups of sensors and would be expected to represent about 2% of the total sensor response at normal glucose levels for revised protocol sensors. Prolonged testing of the revised protocol sensors for 11 days during immersion in buffer revealed stable sensitivities (day 1: 6.12+/-1.34 nA/mM; day 3: 6.33+/-1.40; day 8: 7.13+/-1.39; and day 11: 7.56+/-1.47; sensitivity for day 1 vs. each other day: not significant) and no critical loss of glucose oxidase activity. The response of the revised protocol sensors (n=7) to intraperitoneal glucose was tested in rats approximately one day after subcutaneous implantation and the sensors tracked glucose closely with a slight lag of 3-6 min.

  9. Experimental high-speed network

    NASA Astrophysics Data System (ADS)

    McNeill, Kevin M.; Klein, William P.; Vercillo, Richard; Alsafadi, Yasser H.; Parra, Miguel V.; Dallas, William J.

    1993-09-01

    Many existing local area networking protocols currently applied in medical imaging were originally designed for relatively low-speed, low-volume networking. These protocols utilize small packet sizes appropriate for text based communication. Local area networks of this type typically provide raw bandwidth under 125 MHz. These older network technologies are not optimized for the low delay, high data traffic environment of a totally digital radiology department. Some current implementations use point-to-point links when greater bandwidth is required. However, the use of point-to-point communications for a total digital radiology department network presents many disadvantages. This paper describes work on an experimental multi-access local area network called XFT. The work includes the protocol specification, and the design and implementation of network interface hardware and software. The protocol specifies the Physical and Data Link layers (OSI layers 1 & 2) for a fiber-optic based token ring providing a raw bandwidth of 500 MHz. The protocol design and implementation of the XFT interface hardware includes many features to optimize image transfer and provide flexibility for additional future enhancements which include: a modular hardware design supporting easy portability to a variety of host system buses, a versatile message buffer design providing 16 MB of memory, and the capability to extend the raw bandwidth of the network to 3.0 GHz.

  10. The ODD protocol: A review and first update

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; DeAngelis, Donald L.; Polhill, J. Gary; Giske, Jarl; Railsback, Steve F.

    2010-01-01

    The 'ODD' (Overview, Design concepts, and Details) protocol was published in 2006 to standardize the published descriptions of individual-based and agent-based models (ABMs). The primary objectives of ODD are to make model descriptions more understandable and complete, thereby making ABMs less subject to criticism for being irreproducible. We have systematically evaluated existing uses of the ODD protocol and identified, as expected, parts of ODD needing improvement and clarification. Accordingly, we revise the definition of ODD to clarify aspects of the original version and thereby facilitate future standardization of ABM descriptions. We discuss frequently raised critiques in ODD but also two emerging, and unanticipated, benefits: ODD improves the rigorous formulation of models and helps make the theoretical foundations of large models more visible. Although the protocol was designed for ABMs, it can help with documenting any large, complex model, alleviating some general objections against such models.

  11. Texting for Health: The Use of Participatory Methods to Develop Healthy Lifestyle Messages for Teens

    ERIC Educational Resources Information Center

    Hingle, Melanie; Nichter, Mimi; Medeiros, Melanie; Grace, Samantha

    2013-01-01

    Objective: To develop and test messages and a mobile phone delivery protocol designed to influence the nutrition and physical activity knowledge, attitudes, and behavior of adolescents. Design: Nine focus groups, 4 classroom discussions, and an 8-week pilot study exploring message content, format, origin, and message delivery were conducted over…

  12. Integrated Formal Analysis of Timed-Triggered Ethernet

    NASA Technical Reports Server (NTRS)

    Dutertre, Bruno; Shankar, Nstarajan; Owre, Sam

    2012-01-01

    We present new results related to the verification of the Timed-Triggered Ethernet (TTE) clock synchronization protocol. This work extends previous verification of TTE based on model checking. We identify a suboptimal design choice in a compression function used in clock synchronization, and propose an improvement. We compare the original design and the improved definition using the SAL model checker.

  13. Contextual information management: An example of independent-checking in the review of laboratory-based bloodstain pattern analysis.

    PubMed

    Osborne, Nikola K P; Taylor, Michael C

    2018-05-01

    This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow. Copyright © 2018 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  14. Minimization of Hypoglycemia as an Adverse Event During Insulin Infusion: Further Refinement of the Yale Protocol.

    PubMed

    Marvin, Michael R; Inzucchi, Silvio E; Besterman, Brian J

    2016-08-01

    The management of hyperglycemia in the intensive care unit has been a controversial topic for more than a decade, with target ranges varying from 80-110 mg/dL to <200 mg/dL. Multiple insulin infusion protocols exist, including several computerized protocols, which have attempted to achieve these targets. Importantly, compliance with these protocols has not been a focus of clinical studies. GlucoCare™, a Food and Drug Administration (FDA)-cleared insulin-dosing calculator, was originally designed based on the Yale Insulin Infusion Protocol to target 100-140 mg/dL and has undergone several modifications to reduce hypoglycemia. The original Yale protocol was modified from 100-140 mg/dL to a range of 120-140 mg/dL (GlucoCare 120-140) and then to 140 mg/dL (GlucoCare 140, not a range but a single blood glucose [BG] level target) in an iterative and evidence-based manner to eliminate hypoglycemia <70 mg/dL. The final modification [GlucoCare 140(B)] includes the addition of bolus insulin "midprotocol" during an insulin infusion to reduce peak insulin rates for insulin-resistant patients. This study examined the results of these protocol modifications and evaluated the role of compliance with the protocol in the incidence of hypoglycemia <70 mg/dL. Protocol modifications resulted in mean BG levels of 133.4, 136.4, 143.8, and 146.4 mg/dL and hypoglycemic BG readings <70 mg/dL of 0.998%, 0.367%, 0.256%, and 0.04% for the 100-140, 120-140, 140, and 140(B) protocols, respectively (P < 0.001). Adherence to the glucose check interval significantly reduced the incidence of hypoglycemia (P < 0.001). Protocol modifications led to a reduction in peak insulin infusion rates (P < 0.001) and the need for dextrose-containing boluses (P < 0.001). This study demonstrates that refinements in protocol design can improve glucose control in critically ill patients and that the use of GlucoCare 140(B) can eliminate all significant hypoglycemia while achieving mean glucose levels between 140 and 150 mg/dL. In addition, attention to the timely performance of glucose levels can also reduce hypoglycemic events.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grant, Robert

    Under this grant, three significant software packages were developed or improved, all with the goal of improving the ease-of-use of HPC libraries. The first component is a Python package, named DistArray (originally named Odin), that provides a high-level interface to distributed array computing. This interface is based on the popular and widely used NumPy package and is integrated with the IPython project for enhanced interactive parallel distributed computing. The second Python package is the Distributed Array Protocol (DAP) that enables separate distributed array libraries to share arrays efficiently without copying or sending messages. If a distributed array library supports themore » DAP, it is then automatically able to communicate with any other library that also supports the protocol. This protocol allows DistArray to communicate with the Trilinos library via PyTrilinos, which was also enhanced during this project. A third package, PyTrilinos, was extended to support distributed structured arrays (in addition to the unstructured arrays of its original design), allow more flexible distributed arrays (i.e., the restriction to double precision data was lifted), and implement the DAP. DAP support includes both exporting the protocol so that external packages can use distributed Trilinos data structures, and importing the protocol so that PyTrilinos can work with distributed data from external packages.« less

  16. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 1: Project summary

    NASA Technical Reports Server (NTRS)

    Mckee, James W.

    1990-01-01

    This volume (1 of 4) gives a summary of the original AMPS software system configuration, points out some of the problem areas in the original software design that this project is to address, and in the appendix collects all the bimonthly status reports. The purpose of AMPS is to provide a self reliant system to control the generation and distribution of power in the space station. The software in the AMPS breadboard can be divided into three levels: the operating environment software, the protocol software, and the station specific software. This project deals only with the operating environment software and the protocol software. The present station specific software will not change except as necessary to conform to new data formats.

  17. Development of a neuro early mobilisation protocol for use in a neuroscience intensive care unit.

    PubMed

    Brissie, Megan A; Zomorodi, Meg; Soares-Sardinha, Sharmila; Jordan, J Dedrick

    2017-10-01

    Through evaluation of the literature and working with a team of multidisciplinary healthcare providers, our objective was to refine an interprofessional Neuro Early Mobilisation Protocol for complex patients in the Neuroscience Intensive Care Unit. Using the literature as a guide, key stakeholders, from multiple professions, designed and refined a Neuro Early Mobilisation Protocol. This project took place at a large academic medical center in the southeast United States classified as both a Level I Trauma Center and Comprehensive Stroke Center. Goals for protocol development were to: (1) simplify the protocol to allow for ease of use, (2) make the protocol more generalizable to the patient population cared for in the Neuroscience Intensive Care Unit, (3) receive feedback from those using the original protocol on ways to improve the protocol and (4) ensure patients were properly screened for inclusion and exclusion in the protocol. Using expert feedback and the evidence, an evidence-based Neuro Early Mobilisation Protocol was created for use with all patients in the Neuroscience Intensive Care Unit. Future work will consist of protocol implementation and evaluation in order to increase patient mobilisation in the Neuroscience Intensive Care Unit. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Instruments for Assessment of Instructional Practices in Standards-Based Teaching

    NASA Astrophysics Data System (ADS)

    Wainwright, Camille L.

    2006-12-01

    This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.

  19. A rapid reversed-phase thin layer chromatographic protocol for detection of adulteration in ghee (clarified milk fat) with vegetable oils.

    PubMed

    Rani, Anupama; Sharma, Vivek; Arora, Sumit; Lal, Darshan; Kumar, Anil

    2015-04-01

    Detection of milk fat adulteration with foreign fats/oils continues to be a challenge for the dairy industry as well as food testing laboratories, especially in the present scenario of rampant adulteration using the scientific knowledge by unscrupulous persons involved in the trade. In the present investigation a rapid reversed-phase thin layer chromatographic (RP-TLC) protocol was standardized to ascertain the purity of milk fat. RP-TLC protocol did not show any false positive results in the genuine ghee (clarified butter fat) samples of known origin. Adulteration of ghee with coconut oil up to 7. 5 %, soybean oil, sunflower oil and groundnut oil up to 1 %, while, designer oil up to 2 % level could be detected using the standardized RP-TLC protocol. The protocol standardized is rapid and convenient to use.

  20. Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  1. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  2. Usability and Instructional Design Heuristics for E-Learning Evaluation.

    ERIC Educational Resources Information Center

    Reeves, Thomas C.; Benson, Lisa; Elliott, Dean; Grant, Michael; Holschuh, Doug; Kim, Beaumie; Kim, Hyeonjin; Lauber, Erick; Loh, Sebastian

    Heuristic evaluation is a methodology for investigating the usability of software originally developed by Nielsen (1993, 2000). Nielsen's protocol was modified and refined for evaluating e-learning programs by participants in a doctoral seminar held at the University of Georgia in 2001. The modifications primarily involved expanding Nielsen's…

  3. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  4. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  5. A Protocol for Epigenetic Imprinting Analysis with RNA-Seq Data.

    PubMed

    Zou, Jinfeng; Xiang, Daoquan; Datla, Raju; Wang, Edwin

    2018-01-01

    Genomic imprinting is an epigenetic regulatory mechanism that operates through expression of certain genes from maternal or paternal in a parent-of-origin-specific manner. Imprinted genes have been identified in diverse biological systems that are implicated in some human diseases and in embryonic and seed developmental programs in plants. The molecular underpinning programs and mechanisms involved in imprinting are yet to be explored in depth in plants. The recent advances in RNA-Seq-based methods and technologies offer an opportunity to systematically analyze epigenetic imprinting that operates at the whole genome level in the model and crop plants. We are interested using Arabidopsis model system, to investigate gene expression patterns associated with parent of origin and their implications to imprinting during embryo and seed development. Toward this, we have generated early embryo development RNA-Seq-based transcriptome datasets in F1s from a genetic cross between two diverse Arabidopsis thaliana ecotypes Col-0 and Tsu-1. With the data, we developed a protocol for evaluating the maternal and paternal contributions of genes during the early stages of embryo development after fertilization. This protocol is also designed to consider the contamination from other potential seed tissues, sequencing quality, proper processing of sequenced reads and variant calling, and appropriate inference of the parental contributions based on the parent-of-origin-specific single-nucleotide polymorphisms within the expressed genes. The approach, methods and the protocol developed in this study can be used for evaluating the effects of epigenetic imprinting in plants.

  6. The Robinson Protocol: a treadmill anaerobic performance test.

    PubMed

    Robinson, Ellyn M; Graham, Louise B; Headley, Samuel A

    2004-08-01

    The current investigation was designed to further examine the reliability of the Robinson protocol, which is a run-to-exhaustion treadmill test. Robinson (10) originally examined this protocol with 5 subjects. The significance of the initial exploratory study was the impetus for expanding the study to examine the reliability of the protocol with a larger sample. Fifteen male subjects participated in 3 trial runs on the treadmill. The first trial was a modified McConnell (7) test to determine the aerobic capacity of each subject. The second and third trials were identical Robinson protocols (10). The first trial run mean, in seconds (262.04 +/- 74.50), was not significantly different from the second trial run mean (257.30 +/- 72.65), p = 0.526 (2 tailed). As expected, trial 1 and trial 2 were highly correlated (intraclass) (r = 0.927, p < 0.001). These results provide additional support for the hypothesis that the Robinson protocol with a greater subject pool is a reliable protocol that can be used in research studies interested in examining various physiological interventions or anaerobic training.

  7. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.

  8. Design and assessment of engineered CRISPR-Cpf1 and its use for genome editing.

    PubMed

    Li, Bin; Zeng, Chunxi; Dong, Yizhou

    2018-05-01

    Cpf1, a CRISPR endonuclease discovered in Prevotella and Francisella 1 bacteria, offers an alternative platform for CRISPR-based genome editing beyond the commonly used CRISPR-Cas9 system originally discovered in Streptococcus pyogenes. This protocol enables the design of engineered CRISPR-Cpf1 components, both CRISPR RNAs (crRNAs) to guide the endonuclease and Cpf1 mRNAs to express the endonuclease protein, and provides experimental procedures for effective genome editing using this system. We also describe quantification of genome-editing activity and off-target effects of the engineered CRISPR-Cpf1 in human cell lines using both T7 endonuclease I (T7E1) assay and targeted deep sequencing. This protocol enables rapid construction and identification of engineered crRNAs and Cpf1 mRNAs to enhance genome-editing efficiency using the CRISPR-Cpf1 system, as well as assessment of target specificity within 2 months. This protocol may also be appropriate for fine-tuning other types of CRISPR systems.

  9. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  10. An Exercise Protocol Designed to control Energy Expenditure and to have a Positive Impact on Maximal Oxygen Consumption for Long-Term Space Missions

    NASA Astrophysics Data System (ADS)

    Matsuo, Tomoaki; Ohkawara, Kazunori; Seino, Satoshi; Shimojo, Nobutake; Yamada, Shin; Ohshima, Hiroshi; Tanaka, Kiyoji; Mukai, Chiaki

    2013-02-01

    Maximal oxygen consumption decreases during spaceflight, and astronauts also experience controversial weight loss. Future space missions require a more efficient exercise program to maintain work efficiency and to control increased energy expenditure (EE). We have been developing two types of original exercise training protocols which are better suited to astronauts’ daily routine exercise during long-term spaceflight: sprint interval training (SIT) and high-intensity interval aerobic training (HIAT). In this study, we compared the total EE, including excess post-exercise energy expenditure (EPEE), induced by our interval cycling protocols with the total EE of a traditional, continuous aerobic training (CAT). In the results, while the EPEEs after the SIT and HIAT were greater than after the CAT, the total EE for an entire exercise/rest session with the CAT was the greatest of our three exercise protocols. The SIT and HIAT would be potential protocols to control energy expenditure for long space missions.

  11. A modified error correction protocol for CCITT signalling system no. 7 on satellite links

    NASA Astrophysics Data System (ADS)

    Kreuer, Dieter; Quernheim, Ulrich

    1991-10-01

    Comite Consultatif International des Telegraphe et Telephone (CCITT) Signalling System No. 7 (SS7) provides a level 2 error correction protocol particularly suited for links with propagation delays higher than 15 ms. Not being originally designed for satellite links, however, the so called Preventive Cyclic Retransmission (PCR) Method only performs well on satellite channels when traffic is low. A modified level 2 error control protocol, termed Fix Delay Retransmission (FDR) method is suggested which performs better at high loads, thus providing a more efficient use of the limited carrier capacity. Both the PCR and the FDR methods are investigated by means of simulation and results concerning throughput, queueing delay, and system delay, respectively. The FDR method exhibits higher capacity and shorter delay than the PCR method.

  12. A Systems Approach to Designing Effective Clinical Trials Using Simulations

    PubMed Central

    Fusaro, Vincent A.; Patil, Prasad; Chi, Chih-Lin; Contant, Charles F.; Tonellato, Peter J.

    2013-01-01

    Background Pharmacogenetics in warfarin clinical trials have failed to show a significant benefit compared to standard clinical therapy. This study demonstrates a computational framework to systematically evaluate pre-clinical trial design of target population, pharmacogenetic algorithms, and dosing protocols to optimize primary outcomes. Methods and Results We programmatically created an end-to-end framework that systematically evaluates warfarin clinical trial designs. The framework includes options to create a patient population, multiple dosing strategies including genetic-based and non-genetic clinical-based, multiple dose adjustment protocols, pharmacokinetic/pharmacodynamics (PK/PD) modeling and international normalization ratio (INR) prediction, as well as various types of outcome measures. We validated the framework by conducting 1,000 simulations of the CoumaGen clinical trial primary endpoints. The simulation predicted a mean time in therapeutic range (TTR) of 70.6% and 72.2% (P = 0.47) in the standard and pharmacogenetic arms, respectively. Then, we evaluated another dosing protocol under the same original conditions and found a significant difference in TTR between the pharmacogenetic and standard arm (78.8% vs. 73.8%; P = 0.0065), respectively. Conclusions We demonstrate that this simulation framework is useful in the pre-clinical assessment phase to study and evaluate design options and provide evidence to optimize the clinical trial for patient efficacy and reduced risk. PMID:23261867

  13. Solid state recording current meter conversion

    USGS Publications Warehouse

    Cheng, Ralph T.; Wang, Lichen

    1985-01-01

    The authors describe the conversion of an Endeco-174 current meter to a solid-state recording current meter. A removable solid-state module was designed to fit in the space originally occupied by an 8-track tape cartridge. The module contains a CPU and 128 kilobytes of nonvolatile CMOS memory. The solid-state module communicates with any terminal or computer using an RS-232C interface at 4800 baud rate. A primary consideration for conversion was to keep modifications of the current meter to a minimum. The communication protocol was designed to emulate the Endeco tape translation unit, thus the need for a translation unit was eliminated and the original data reduction programs can be used without any modification. After conversion, the data recording section of the current meter contains no moving parts; the storage capacity of the module is equivalent to that of the original tape cartridge.

  14. Moral and Ethical Dilemmas in Canadian Forces Military Operation: Qualitative and Descriptive Analyses of Commanders’ Operational Experiences

    DTIC Science & Technology

    2008-10-01

    aussi remarqué une proportion légèrement plus élevée de comptes rendus irrésolus qui mentionnaient l’honneur et la fierté personnels, comparativement ...military commanders during overseas missions. Note that the original interview protocol was semi-structured and designed to allow the interviewee to...should be selected so that no security classification is required. Identifiers, such as equipment model designation , trade name, military project code

  15. Counterfactual Quantum Deterministic Key Distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2013-01-01

    We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.

  16. Annotating Mutational Effects on Proteins and Protein Interactions: Designing Novel and Revisiting Existing Protocols.

    PubMed

    Li, Minghui; Goncearenco, Alexander; Panchenko, Anna R

    2017-01-01

    In this review we describe a protocol to annotate the effects of missense mutations on proteins, their functions, stability, and binding. For this purpose we present a collection of the most comprehensive databases which store different types of sequencing data on missense mutations, we discuss their relationships, possible intersections, and unique features. Next, we suggest an annotation workflow using the state-of-the art methods and highlight their usability, advantages, and limitations for different cases. Finally, we address a particularly difficult problem of deciphering the molecular mechanisms of mutations on proteins and protein complexes to understand the origins and mechanisms of diseases.

  17. Taking a Concept to Commercialization: Designing Relevant Tests to Address Safety.

    PubMed

    Ferrara, Lisa A

    2016-04-01

    Taking a product from concept to commercialization requires careful navigation of the regulatory pathway through a series of steps: (A) moving the idea through proof of concept and beyond; (B) evaluating new technologies that may provide added value to the idea; (C) designing appropriate test strategies and protocols; and (D) evaluating and mitigating risks. Moving an idea from the napkin stage of development to the final product requires a team effort. When finished, the product rarely resembles the original design, but careful steps throughout the product life cycle ensure that the product meets the vision.

  18. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  19. THE MASTER PROTOCOL CONCEPT

    PubMed Central

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  20. Application of two segmentation protocols during the processing of virtual images in rapid prototyping: ex vivo study with human dry mandibles.

    PubMed

    Ferraz, Eduardo Gomes; Andrade, Lucio Costa Safira; dos Santos, Aline Rode; Torregrossa, Vinicius Rabelo; Rubira-Bullen, Izabel Regina Fischer; Sarmento, Viviane Almeida

    2013-12-01

    The aim of this study was to evaluate the accuracy of virtual three-dimensional (3D) reconstructions of human dry mandibles, produced from two segmentation protocols ("outline only" and "all-boundary lines"). Twenty virtual three-dimensional (3D) images were built from computed tomography exam (CT) of 10 dry mandibles, in which linear measurements between anatomical landmarks were obtained and compared to an error probability of 5 %. The results showed no statistically significant difference among the dry mandibles and the virtual 3D reconstructions produced from segmentation protocols tested (p = 0,24). During the designing of a virtual 3D reconstruction, both "outline only" and "all-boundary lines" segmentation protocols can be used. Virtual processing of CT images is the most complex stage during the manufacture of the biomodel. Establishing a better protocol during this phase allows the construction of a biomodel with characteristics that are closer to the original anatomical structures. This is essential to ensure a correct preoperative planning and a suitable treatment.

  1. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  2. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  3. Inflectional Morphology and Dyslexia: Italian Children's Performance in a Nonword Pluralization Task

    ERIC Educational Resources Information Center

    Vender, Maria; Mantione, Federica; Savazzi, Silvia; Delfitto, Denis; Melloni, Chiara

    2017-01-01

    In this study, we present the results of an original experimental protocol designed to assess the performance in a pluralization task of 52 Italian children divided into two groups: 24 children with developmental dyslexia (mean age 10.0 years old) and 28 typically developing children (mean age 9.11 years old). Our task, inspired by Berko's Wug…

  4. Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations

    NASA Astrophysics Data System (ADS)

    Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin

    2011-12-01

    The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.

  5. Protecting intellectual property associated with Canadian academic clinical trials - approaches and impact

    PubMed Central

    2012-01-01

    Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486

  6. Protecting intellectual property associated with Canadian academic clinical trials--approaches and impact.

    PubMed

    Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen

    2012-12-27

    Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.

  7. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  8. Development and Implementation of Clinical Trial Protocol Templates at the National Institute of Allergy and Infectious Diseases

    PubMed Central

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-01-01

    Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326

  9. Comment on 'Quantum direct communication with authentication'

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Zhan-jun; Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039; Liu, Jun

    2007-02-15

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. Asmore » a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.« less

  10. The United States Department Of Agriculture Northeast Area-wide Tick Control Project: history and protocol.

    PubMed

    Pound, Joe Mathews; Miller, John Allen; George, John E; Fish, Durland

    2009-08-01

    The Northeast Area-wide Tick Control Project (NEATCP) was funded by the United States Department of Agriculture (USDA) as a large-scale cooperative demonstration project of the USDA-Agricultural Research Service (ARS)-patented 4-Poster tick control technology (Pound et al. 1994) involving the USDA-ARS and a consortium of universities, state agencies, and a consulting firm at research locations in the five states of Connecticut (CT), Maryland (MD), New Jersey (NJ), New York (NY), and Rhode Island (RI). The stated objective of the project was "A community-based field trial of ARS-patented tick control technology designed to reduce the risk of Lyme disease in northeastern states." Here we relate the rationale and history of the technology, a chronological listing of events leading to implementation of the project, the original protocol for selecting treatment, and control sites, and protocols for deployment of treatments, sampling, assays, data analyses, and estimates of efficacy.

  11. Optimization of a vitrification protocol for hatched blastocysts from the dromedary camel (Camelus dromedarius).

    PubMed

    Herrid, M; Billah, M; Malo, C; Skidmore, J A

    2016-03-01

    The objective of this study was to modify and optimize a vitrification protocol (open pulled straw) that was originally designed for human oocytes and embryos, to make it suitable for the cryopreservation of camel hatched blastocysts. The original open pulled straw protocol was a complex process with 15-minute exposure of oocytes/embryos in 7.5% ethylene glycol (EG) and 7.5% dimethyl sulfoxide (Me2SO) for equilibration, and cooling in 16% EG + 16% Me2SO + 1 M sucrose. Recognizing a need to better control the cryoprotectant (CPA) concentrations, while avoiding toxicity to the embryos, the effects on the survival rate and developmental potential of camel embryos in vitro were investigated using two different methods of loading the CPAs into the embryos (stepwise and semicontinuous increase in concentration), two different loading temperature/time (room temperature ∼24 °C/15 min and body 37 °C/3 min), and the replacement of Me2SO with EG alone or in combination with glycerol (Gly). A total of 145 in vivo-derived embryos were subjected to these processes, and after warming their morphological quality and integrity, and re-expansion was assessed after 0, 2, 24, 48, 72, and 96 hours of culture. Exposure of embryos in a stepwise method was more beneficial to the survival of embryos than was the semicontinuous process, and loading of CPAs at 37 °C with a short exposure time (3 minutes) resulted in an outcome comparable to the original processing at room temperature with a longer exposure time (15 minutes). The replacement of the Me2SO + EG mixture with EG only or a combination of EG + Gly in the vitrification medium significantly improved the outcome of all these evaluation criteria (P < 0.05). The modified protocol of loading EG at 37 °C for 3 minutes has increased the embryo survival of the original protocol from 67% to 91% and the developmental rate from 57% to 83% at 5-day culture. These results were comparable to or better than those reported in human or other species, indicating that this optimized method is well suited to any commercial embryo transfer program in the dromedary camel. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Oncosurgical Management of Liver Limited Stage IV Colorectal Cancer: Preliminary Data and Protocol for a Randomized Controlled Trial.

    PubMed

    Sutton, Paul; Vimalachandran, Dale; Poston, Graeme; Fenwick, Stephen; Malik, Hassan

    2018-05-09

    Colorectal cancer is the fourth commonest cancer and second commonest cause of cancer-related death in the United Kingdom. Almost 15% of patients have metastases on presentation. An increasing number of surgical strategies and better neoadjuvant treatment options are responsible for more patients undergoing resection of liver metastases, with prolonged survival in a select group of patients who present with synchronous disease. It is clear that the optimal strategy for the management of these patients remains unclear, and there is certainly a complete absence of Level 1 evidence in the literature. The objective of this study is to undertake preliminary work and devise an outline trial protocol to inform the future development of clinical studies to investigate the management of patients with liver limited stage IV colorectal cancer. We have undertaken some preliminary work and begun the process of designing a randomized controlled trial and present a draft trial protocol here. This study is at the protocol development stage only, and as such no results are available. There is no funding in place for this study, and no anticipated start date. We have presented preliminary work and an outline trial protocol which we anticipate will inform the future development of clinical studies to investigate the management of patients with liver limited stage IV colorectal cancer. We do not believe that the trial we have designed will answer the most significant clinical questions, nor that it is feasible to be delivered within the United Kingdom's National Health Service at this current time. ©Paul Sutton, Dale Vimalachandran, Graeme Poston, Stephen Fenwick, Hassan Malik. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 09.05.2018.

  13. Do Bayesian adaptive trials offer advantages for comparative effectiveness research? Protocol for the RE-ADAPT study

    PubMed Central

    Luce, Bryan R; Broglio, Kristine R; Ishak, K Jack; Mullins, C Daniel; Vanness, David J; Fleurence, Rachael; Saunders, Elijah; Davis, Barry R

    2013-01-01

    Background Randomized clinical trials, particularly for comparative effectiveness research (CER), are frequently criticized for being overly restrictive or untimely for health-care decision making. Purpose Our prospectively designed REsearch in ADAptive methods for Pragmatic Trials (RE-ADAPT) study is a ‘proof of concept’ to stimulate investment in Bayesian adaptive designs for future CER trials. Methods We will assess whether Bayesian adaptive designs offer potential efficiencies in CER by simulating a re-execution of the Antihypertensive and Lipid Lowering Treatment to Prevent Heart Attack Trial (ALLHAT) study using actual data from ALLHAT. Results We prospectively define seven alternate designs consisting of various combinations of arm dropping, adaptive randomization, and early stopping and describe how these designs will be compared to the original ALLHAT design. We identify the one particular design that would have been executed, which incorporates early stopping and information-based adaptive randomization. Limitations While the simulation realistically emulates patient enrollment, interim analyses, and adaptive changes to design, it cannot incorporate key features like the involvement of data monitoring committee in making decisions about adaptive changes. Conclusion This article describes our analytic approach for RE-ADAPT. The next stage of the project is to conduct the re-execution analyses using the seven prespecified designs and the original ALLHAT data. PMID:23983160

  14. Methodology for the specification of communication activities within the framework of a multi-layered architecture: Toward the definition of a knowledge base

    NASA Astrophysics Data System (ADS)

    Amyay, Omar

    A method defined in terms of synthesis and verification steps is presented. The specification of the services and protocols of communication within a multilayered architecture of the Open Systems Interconnection (OSI) type is an essential issue for the design of computer networks. The aim is to obtain an operational specification of the protocol service couple of a given layer. Planning synthesis and verification steps constitute a specification trajectory. The latter is based on the progressive integration of the 'initial data' constraints and verification of the specification originating from each synthesis step, through validity constraints that characterize an admissible solution. Two types of trajectories are proposed according to the style of the initial specification of the service protocol couple: operational type and service supplier viewpoint; knowledge property oriented type and service viewpoint. Synthesis and verification activities were developed and formalized in terms of labeled transition systems, temporal logic and epistemic logic. The originality of the second specification trajectory and the use of the epistemic logic are shown. An 'artificial intelligence' approach enables a conceptual model to be defined for a knowledge base system for implementing the method proposed. It is structured in three levels of representation of the knowledge relating to the domain, the reasoning characterizing synthesis and verification activities and the planning of the steps of a specification trajectory.

  15. Modelling and regulating of cardio-respiratory response for the enhancement of interval training

    PubMed Central

    2014-01-01

    Background The interval training method has been a well known exercise protocol which helps strengthen and improve one’s cardiovascular fitness. Purpose To develop an effective training protocol to improve cardiovascular fitness based on modelling and analysis of Heart Rate (HR) and Oxygen Uptake (VO2) dynamics. Methods In order to model the cardiorespiratory response to the onset and offset exercises, the (K4b2, Cosmed) gas analyzer was used to monitor and record the heart rate and oxygen uptake for ten healthy male subjects. An interval training protocol was developed for young health users and was simulated using a proposed RC switching model which was presented to accommodate the variations of the cardiorespiratory dynamics to running exercises. A hybrid system model was presented to describe the adaptation process and a multi-loop PI control scheme was designed for the tuning of interval training regime. Results By observing the original data for each subject, we can clearly identify that all subjects have similar HR and VO2 profiles. The proposed model is capable to simulate the exercise responses during onset and offset exercises; it ensures the continuity of the outputs within the interval training protocol. Under some mild assumptions, a hybrid system model can describe the adaption process and accordingly a multi-loop PI controller can be designed for the tuning of interval training protocol. The self-adaption feature of the proposed controller gives the exerciser the opportunity to reach his desired setpoints after a certain number of training sessions. Conclusions The established interval training protocol targets a range of 70-80% of HRmax which is mainly a training zone for the purpose of cardiovascular system development and improvement. Furthermore, the proposed multi-loop feedback controller has the potential to tune the interval training protocol according to the feedback from an individual exerciser. PMID:24499131

  16. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    PubMed Central

    2013-01-01

    Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. Methods/Design The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. Discussion This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the execution of the program and the resultant threats to the study, we discuss our analytical plan and intentions for endline data collection. Trials registration Current Controlled Trials ISRCTN76061874 PMID:23953975

  17. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  18. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

    PubMed

    Scarani, Valerio; Acín, Antonio; Ribordy, Grégoire; Gisin, Nicolas

    2004-02-06

    We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.

  19. Template-based de novo design for type II kinase inhibitors and its extented application to acetylcholinesterase inhibitors.

    PubMed

    Su, Bo-Han; Huang, Yi-Syuan; Chang, Chia-Yun; Tu, Yi-Shu; Tseng, Yufeng J

    2013-10-31

    There is a compelling need to discover type II inhibitors targeting the unique DFG-out inactive kinase conformation since they are likely to possess greater potency and selectivity relative to traditional type I inhibitors. Using a known inhibitor, such as a currently available and approved drug or inhibitor, as a template to design new drugs via computational de novo design is helpful when working with known ligand-receptor interactions. This study proposes a new template-based de novo design protocol to discover new inhibitors that preserve and also optimize the binding interactions of the type II kinase template. First, sorafenib (Nexavar) and nilotinib (Tasigna), two type II inhibitors with different ligand-receptor interactions, were selected as the template compounds. The five-step protocol can reassemble each drug from a large fragment library. Our procedure demonstrates that the selected template compounds can be successfully reassembled while the key ligand-receptor interactions are preserved. Furthermore, to demonstrate that the algorithm is able to construct more potent compounds, we considered kinase inhibitors and other protein dataset, acetylcholinesterase (AChE) inhibitors. The de novo optimization was initiated using a template compound possessing a less than optimal activity from a series of aminoisoquinoline and TAK-285 inhibiting type II kinases, and E2020 derivatives inhibiting AChE respectively. Three compounds with greater potency than the template compound were discovered that were also included in the original congeneric series. This template-based lead optimization protocol with the fragment library can help to design compounds with preferred binding interactions of known inhibitors automatically and further optimize the compounds in the binding pockets.

  20. Influence of custom-made implant designs on the biomechanical performance for the case of immediate post-extraction placement in the maxillary esthetic zone: a finite element analysis.

    PubMed

    Chen, Jianyu; Zhang, Zhiguang; Chen, Xianshuai; Zhang, Xiao

    2017-05-01

    Due to the increasing adoption of immediate implantation strategies and the rapid development of the computer aided design/computer aided manufacturing technology, a therapeutic concept based on patient-specific implant dentistry has recently been reintroduced by many researchers. However, little information is available on the designs of custom-made dental implant systems, especially their biomechanical behavior. The influence of the custom-made implant designs on the biomechanical performance for both an immediate and a delayed loading protocol in the maxillary esthetic zone was evaluated by means of the finite element (FE) method. FE models of three dental implants were considered: a state of the art cylindrical implant and two custom-made implants designed by reverse engineering technology, namely a root-analogue implant and a root-analogue threaded implant. The von Mises stress distributions and micro-motions around the bone-implant interfaces were calculated using ANSYS software. In a comparison of the three implant designs for both loading protocols, a favorable biomechanical performance was observed for the use of root-analogue threaded implant which approximated the geometry of natural anterior tooth and maintained the original long-axis. The results indicated that bone-implant interfacial micro-motion was reduced and a favorable stress distribution after osseointegration was achieved.

  1. Freeze-drying of nanosuspensions, 1: freezing rate versus formulation design as critical factors to preserve the original particle size distribution.

    PubMed

    Beirowski, Jakob; Inghelbrecht, Sabine; Arien, Albertina; Gieseler, Henning

    2011-05-01

    It has been recently reported in the literature that using a fast freezing rate during freeze-drying of drug nanosuspensions is beneficial to preserve the original particle size distribution. All freezing rates studied were obtained by utilizing a custom-made apparatus and were then indirectly related to conventional vial freeze-drying. However, a standard freeze-dryer is only capable of achieving moderate freezing rates in the shelf fluid circulation system. Therefore, it was the purpose of the present study to evaluate the possibility to establish a typical freezing protocol applicable to a standard freeze-drying unit in combination with an adequate choice of cryoprotective excipients and steric stabilizers to preserve the original particle size distribution. Six different drug nanosuspensions containing itraconazole as a drug model were studied using freeze-thaw experiments and a full factorial design to reveal major factors for the stabilization of drug nanosuspensions and the corresponding interactions. In contrast to previous reports, the freezing regime showed no significant influence on preserving the original particle size distribution, suggesting that the concentrations of both the steric stabilizer and the cryoprotective agent are optimized. Moreover, it could be pinpointed that the combined effect of steric stabilizer and cryoprotectant clearly contribute to nanoparticle stability. Copyright © 2010 Wiley-Liss, Inc.

  2. Evaluation of an adult insulin infusion protocol at an academic medical center.

    PubMed

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P < 0.001), probably because of the narrower target range in the revised protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of severe hypoglycemia were low (2.6%) with the original protocol. Patients' blood glucose levels were within the target range for a shorter time with the new protocol. Fewer episodes of hypoglycemia were recorded with the new protocol, but rates of severe hypoglycemia were similar with both protocols.

  3. Redesigning a large school-based clinical trial in response to changes in community practice

    PubMed Central

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-01-01

    Background Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. Purpose To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. Methods The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer’s active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. Results The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. Limitations The changed design does not allow us to directly measure the effectiveness of hand sanitizer use as a supplement to traditional hand washing practices. Conclusions The need to balance a rigorous study design with one that is acceptable to the community requires investigators to be actively involved with community collaborators and able to adapt study protocols to fit changing community practices. PMID:21730079

  4. Redesigning a large school-based clinical trial in response to changes in community practice.

    PubMed

    Gerald, Lynn B; Gerald, Joe K; McClure, Leslie A; Harrington, Kathy; Erwin, Sue; Bailey, William C

    2011-06-01

    Asthma exacerbations are seasonal with the greatest risk in elementary-age students occurring shortly after returning to school following summer break. Recent research suggests that this seasonality in children is primarily related to viral respiratory tract infections. Regular hand washing is the most effective method to prevent the spread of viral respiratory infections; unfortunately, achieving hand washing recommendations in schools is difficult. Therefore, we designed a study to evaluate the effect of hand sanitizer use in elementary schools on exacerbations among children with asthma. To describe the process of redesigning the trial in response to changes in the safety profile of the hand sanitizer as well as changes in hand hygiene practice in the schools. The original trial was a randomized, longitudinal, subject-blinded, placebo-controlled, community-based crossover trial. The primary aim was to evaluate the incremental effectiveness of hand sanitizer use in addition to usual hand hygiene practices to decrease asthma exacerbations in elementary-age children. Three events occurred that required major modifications to the original study protocol: (1) safety concerns arose regarding the hand sanitizer's active ingredient; (2) no substitute placebo hand sanitizer was available; and (3) community preferences changed regarding hand hygiene practices in the schools. The revised protocol is a randomized, longitudinal, community-based crossover trial. The primary aim is to evaluate the incremental effectiveness of a two-step hand hygiene process (hand hygiene education plus institutionally provided alcohol-based hand sanitizer) versus usual care to decrease asthma exacerbations. Enrollment was completed in May 2009 with 527 students from 30 schools. The intervention began in August 2009 and will continue through May 2011. Study results should be available at the end of 2011. The changed design does not allow us to directly measure the effectiveness of hand sanitizer use as a supplement to traditional hand washing practices. The need to balance a rigorous study design with one that is acceptable to the community requires investigators to be actively involved with community collaborators and able to adapt study protocols to fit changing community practices.

  5. Families of quantum fingerprinting protocols

    NASA Astrophysics Data System (ADS)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  6. Experience with Delay-Tolerant Networking from Orbit

    NASA Technical Reports Server (NTRS)

    Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.

    2010-01-01

    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol

  7. The cryopreservation protocol optimal for progenitor recovery is not optimal for preservation of marrow repopulating ability.

    PubMed

    Balint, B; Ivanović, Z; Petakov, M; Taseski, J; Jovcić, G; Stojanović, N; Milenković, P

    1999-03-01

    The efficiency of five different cryopreservation protocols (our original controlled-rate and noncontrolled-rate protocols) was evaluated on the basis of the recovery after thawing of very primitive pluripotent hemopoietic stem cells (MRA(CFU-GM), pluripotent progenitors (CFU-Sd12) and committed granulocyte-monocyte progenitors (CFU-GM) in mouse bone marrow. Although the nucleated cell recovery and viability determined immediately after the thawing and washing of the cells were found to be similar, whether controlled-rate or noncontrolled-rate cryopreservation protocols were used, the recovery of MRA(CFU-GM), CFU-Sd12 and CFU-GM varied depending on the type of protocol and the cryoprotector (DMSO) concentrations used. It was shown that the controlled-rate protocol was more efficient, enabling better MRA(CFU-GM), CFU-Sd12 and CFU-GM recovery from frozen samples. The most efficient was the controlled-rate protocol of cryopreservation designed to compensate for the release of fusion heat, which enabled a better survival of CFU-Sd12 and CFU-GM when combined with a lower (5%) DMSO concentration. On the contrary, a satisfactory survival rate of very primitive stem cells (MRA(CFU-GM)) was achieved only when 10% DMSO was included with a five-step protocol of cryopreservation. These results point to adequately used controlled-rate freezing as essential for a highly efficient cryopreservation of some of the categories of hematopoietic stem and progenitor cells. At the same time, it was obvious that a higher DMSO concentration was necessary for the cryopreservation of very primitive stem cells, but not, however, for more mature progenitor cells (CFU-S, CFU-GM). These results imply the existence of a mechanism that decreases the intracellular concentration of DMSO in primitive MRA cells, which is not the case for less primitive progenitors.

  8. User-Centered Design of Serious Games for Older Adults Following 3 Years of Experience With Exergames for Seniors: A Study Design.

    PubMed

    Brox, Ellen; Konstantinidis, Stathis Th; Evertsen, Gunn

    2017-01-11

    Seniors need sufficient balance and strength to manage in daily life, and sufficient physical activity is required to achieve and maintain these abilities. This can be a challenge, but fun and motivational exergames can be of help. However, most commercial games are not suited for this age group for several reasons. Many usability studies and user-centered design (UCD) protocols have been developed and applied, but to the best of our knowledge none of them are focusing on seniors' use of games for physical activity. In GameUp, a European cofunded project, some prototype Kinect exergames to enhance the mobility of seniors were developed in a user-centered approach. In this paper we aim to record lessons learned in 3 years of experience with exergames for seniors, considering both the needs of older adults regarding user-centered development of exergames and participation in UCD. We also provide a UCD protocol for exergames tailored to senior needs. An initial UCD protocol was formed based on literature of previous research outcomes. Senior users participated in UCD following the initial protocol. The users formed a steady group that met every second week for 3 years to play exergames and participate in the UCD during the 4 phases of the protocol. Several methods were applied in the 4 different phases of the UCD protocol; the most important methods were structured and semistructured interviews, observations, and group discussions. A total of 16 seniors with an average age above 80 years participated for 3 years in UCD in order to develop the GameUp exergames. As a result of the lessons learned by applying the different methodologies of the UCD protocol, we propose an adjusted UCD protocol providing explanations on how it should be applied for seniors as users. Questionnaires should be turned into semistructured and structured interviews while user consultation sessions should be repeated with the same theme to ensure that the UCD methods produce a valid outcome. By first following the initial and gradually the adjusted UCD protocol, the project resulted in exergame functionalities and interface features for seniors. The main lessons learned during 3 years of experience with exergames for seniors applying UCD are that devoting time to seniors is a key element of success so that trust can be gained, communication can be established, and users' opinions can be recorded. All different game elements should be taken into consideration during the design of exergames for seniors even if they seem obvious. Despite the limitations of this study, one might argue that it provides a best practice guide to the development of serious games for physical activity targeting seniors. ©Ellen Brox, Stathis Th Konstantinidis, Gunn Evertsen. Originally published in JMIR Serious Games (http://games.jmir.org), 11.01.2017.

  9. Open solutions to distributed control in ground tracking stations

    NASA Technical Reports Server (NTRS)

    Heuser, William Randy

    1994-01-01

    The advent of high speed local area networks has made it possible to interconnect small, powerful computers to function together as a single large computer. Today, distributed computer systems are the new paradigm for large scale computing systems. However, the communications provided by the local area network is only one part of the solution. The services and protocols used by the application programs to communicate across the network are as indispensable as the local area network. And the selection of services and protocols that do not match the system requirements will limit the capabilities, performance, and expansion of the system. Proprietary solutions are available but are usually limited to a select set of equipment. However, there are two solutions based on 'open' standards. The question that must be answered is 'which one is the best one for my job?' This paper examines a model for tracking stations and their requirements for interprocessor communications in the next century. The model and requirements are matched with the model and services provided by the five different software architectures and supporting protocol solutions. Several key services are examined in detail to determine which services and protocols most closely match the requirements for the tracking station environment. The study reveals that the protocols are tailored to the problem domains for which they were originally designed. Further, the study reveals that the process control model is the closest match to the tracking station model.

  10. Beyond the Compositional Threshold of Nanoparticle-Based Materials.

    PubMed

    Portehault, David; Delacroix, Simon; Gouget, Guillaume; Grosjean, Rémi; Chan-Chang, Tsou-Hsi-Camille

    2018-04-17

    The design of inorganic nanoparticles relies strongly on the knowledge from solid-state chemistry not only for characterization techniques, but also and primarily for choosing the systems that will yield the desired properties. The range of inorganic solids reported and studied as nanoparticles is however strikingly narrow when compared to the solid-state chemistry portfolio of bulk materials. Efforts to enlarge the collection of inorganic particles are becoming increasingly important for three reasons. First, they can yield materials more performing than current ones for a range of fields including biomedicine, optics, catalysis, and energy. Second, looking outside the box of common compositions is a way to target original properties or to discover genuinely new behaviors. The third reason lies in the path followed to reach these novel nano-objects: exploration and setup of new synthetic approaches. Indeed, willingness to access original nanoparticles faces a synthetic challenge: how to reach nanoparticles of solids that originally belong to the realm of solid-state chemistry and its typical protocols at high temperature? To answer this question, alternative reaction pathways must be sought, which may in turn provide tracks for new, untargeted materials. The corresponding strategies require limiting particle growth by confinement at high temperatures or by decreasing the synthesis temperature. Both approaches, especially the latter, provide a nice playground to discover metastable solids never reported before. The aim of this Account is to raise attention to the topic of the design of new inorganic nanoparticles. To do so, we take the perspective of our own work in the field, by first describing synthetic challenges and how they are addressed by current protocols. We then use our achievements to highlight the possibilities offered by new nanomaterials and to introduce synthetic approaches that are not in the focus of recent literature but hold, in our opinion, great promise. We will span methods of low temperature "chimie douce" aqueous synthesis coupled to microwave heating, sol-gel chemistry and processing coupled to solid state reactions, and then molten salt synthesis. These protocols pave the way to metastable low valence oxyhydroxides, vanadates, perovskite oxides, boron carbon nitrides, and metal borides, all obtained at the nanoscale with structural and morphological features differing from "usual" nanomaterials. These nano-objects show original properties, from sensing, thermoelectricity, charge and spin transports, photoluminescence, and catalysis, which require advanced characterization of surface states. We then identify future trends of synthetic methodologies that will merit further attention in this burgeoning field, by emphasizing the importance of unveiling reaction mechanisms and coupling experiments with modeling.

  11. Newborn screening for cystic fibrosis in Wisconsin: comparison of biochemical and molecular methods.

    PubMed

    Gregg, R G; Simantel, A; Farrell, P M; Koscik, R; Kosorok, M R; Laxova, A; Laessig, R; Hoffman, G; Hassemer, D; Mischler, E H; Splaingard, M

    1997-06-01

    To evaluate neonatal screening for cystic fibrosis (CF), including study of the screening procedures and characteristics of false-positive infants, over the past 10 years in Wisconsin. An important objective evolving from the original design has been to compare use of a single-tier immunoreactive trypsinogen (IRT) screening method with that of a two-tier method using IRT and analyses of samples for the most common cystic fibrosis transmembrane regulator (CFTR) (DeltaF508) mutation. We also examined the benefit of including up to 10 additional CFTR mutations in the screening protocol. From 1985 to 1994, using either the IRT or IRT/DNA protocol, 220 862 and 104 308 neonates, respectively, were screened for CF. For the IRT protocol, neonates with an IRT >/=180 ng/mL were considered positive, and the standard sweat chloride test was administered to determine CF status. For the IRT/DNA protocol, samples from the original dried-blood specimen on the Guthrie card of neonates with an IRT >/=110 ng/mL were tested for the presence of the DeltaF508 CFTR allele, and if the DNA test revealed one or two DeltaF508 alleles, a sweat test was obtained. Both screening procedures had very high specificity. The sensitivity tended to be higher with the IRT/DNA protocol, but the differences were not statistically significant. The positive predictive value of the IRT/DNA screening protocol was 15.2% compared with 6.4% if the same samples had been screened by the IRT method. Assessment of the false-positive IRT/DNA population revealed that the two-tier method eliminates the disproportionate number of infants with low Apgar scores and also the high prevalence of African-Americans identified previously in our study of newborns with high IRT levels. We found that 55% of DNA-positive CF infants were homozygous for DeltaF508 and 40% had one DeltaF508 allele. Adding analyses for 10 more CFTR mutations has only a small effect on the sensitivity but is likely to add significantly to the cost of screening. Advantages of the IRT/DNA protocol over IRT analysis include improved positive predictive value, reduction of false-positive infants, and more rapid diagnosis with elimination of recall specimens.

  12. Functional genomics platform for pooled screening and mammalian genetic interaction maps

    PubMed Central

    Kampmann, Martin; Bassik, Michael C.; Weissman, Jonathan S.

    2014-01-01

    Systematic genetic interaction maps in microorganisms are powerful tools for identifying functional relationships between genes and defining the function of uncharacterized genes. We have recently implemented this strategy in mammalian cells as a two-stage approach. First, genes of interest are robustly identified in a pooled genome-wide screen using complex shRNA libraries. Second, phenotypes for all pairwise combinations of hit genes are measured in a double-shRNA screen and used to construct a genetic interaction map. Our protocol allows for rapid pooled screening under various conditions without a requirement for robotics, in contrast to arrayed approaches. Each stage of the protocol can be implemented in ~2 weeks, with additional time for analysis and generation of reagents. We discuss considerations for screen design, and present complete experimental procedures as well as a full computational analysis suite for identification of hits in pooled screens and generation of genetic interaction maps. While the protocols outlined here were developed for our original shRNA-based approach, they can be applied more generally, including to CRISPR-based approaches. PMID:24992097

  13. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  14. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  15. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  16. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  17. Application of UHPLC for the determination of free amino acids in different cheese varieties.

    PubMed

    Mayer, Helmut K; Fiechter, Gregor

    2013-10-01

    A rapid ultra-high performance liquid chromatography (UHPLC) protocol for the determination of amino acids as their respective 6-aminoquinolyl-N-hydroxysuccinimidyl carbamate (AQC) derivatives was successfully applied for assessing free amino acid levels in commercial cheese samples representing typical product groups (ripening protocols) in cheesemaking. Based on the Waters AccQ.Tag™ method as a high performance liquid chromatography (HPLC) amino acid solution designed for hydrolyzate analyses, method adaptation onto UHPLC was performed, and detection of AQC derivatives was changed from former fluorescence (λ(Ex) 250 nm/λ(Em) 395 nm) to UV (254 nm). Compared to the original HPLC method, UHPLC proved to be superior by facilitating excellent separations of 18 amino acids within 12 min only, thus demonstrating significantly shortened runtimes (>35 min for HPLC) while retaining the original separation chemistry and amino acid elution pattern. Free amino acid levels of the analyzed cheese samples showed a high extent of variability depending on the cheese type, with highest total amounts found for original Italian extra-hard cheeses (up to 9,000 mg/100 g) and lowest for surface mold- or bacterial smear-ripened soft cheeses (200-600 mg/100 g). Despite the intrinsic variability in both total and specific concentrations, the established UHPLC method enabled reliable and interference-free amino acid profiling throughout all cheese types, thus demonstrating a valuable tool to generate high quality data for the characterization of cheese ripening.

  18. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  19. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  20. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  1. Worldwide trends in volume and quality of published protocols of randomized controlled trials

    PubMed Central

    Alldinger, Ingo; Cieslak, Kasia P.; Wennink, Roos; Clarke, Mike; Ali, Usama Ahmed; Besselink, Marc G. H.

    2017-01-01

    Introduction Publishing protocols of randomized controlled trials (RCT) facilitates a more detailed description of study rational, design, and related ethical and safety issues, which should promote transparency. Little is known about how the practice of publishing protocols developed over time. Therefore, this study describes the worldwide trends in volume and methodological quality of published RCT protocols. Methods A systematic search was performed in PubMed and EMBASE, identifying RCT protocols published over a decade from 1 September 2001. Data were extracted on quality characteristics of RCT protocols. The primary outcome, methodological quality, was assessed by individual methodological characteristics (adequate generation of allocation, concealment of allocation and intention-to-treat analysis). A comparison was made by publication period (First, September 2001- December 2004; Second, January 2005-May 2008; Third, June 2008-September 2011), geographical region and medical specialty. Results The number of published RCT protocols increased from 69 in the first, to 390 in the third period (p<0.0001). Internal medicine and paediatrics were the most common specialty topics. Whereas most published RCT protocols in the first period originated from North America (n = 30, 44%), in the second and third period this was Europe (respectively, n = 65, 47% and n = 190, 48%, p = 0.02). Quality of RCT protocols was higher in Europe and Australasia, compared to North America (OR = 0.63, CI = 0.40–0.99, p = 0.04). Adequate generation of allocation improved with time (44%, 58%, 67%, p = 0.001), as did concealment of allocation (38%, 53%, 55%, p = 0.03). Surgical protocols had the highest quality among the three specialty topics used in this study (OR = 1.94, CI = 1.09–3.45, p = 0.02). Conclusion Publishing RCT protocols has become popular, with a five-fold increase in the past decade. The quality of published RCT protocols also improved, although variation between geographical regions and across medical specialties was seen. This emphasizes the importance of international standards of comprehensive training in RCT methodology. PMID:28296925

  2. Clock Scan Protocol for Image Analysis: ImageJ Plugins.

    PubMed

    Dobretsov, Maxim; Petkau, Georg; Hayar, Abdallah; Petkau, Eugen

    2017-06-19

    The clock scan protocol for image analysis is an efficient tool to quantify the average pixel intensity within, at the border, and outside (background) a closed or segmented convex-shaped region of interest, leading to the generation of an averaged integral radial pixel-intensity profile. This protocol was originally developed in 2006, as a visual basic 6 script, but as such, it had limited distribution. To address this problem and to join similar recent efforts by others, we converted the original clock scan protocol code into two Java-based plugins compatible with NIH-sponsored and freely available image analysis programs like ImageJ or Fiji ImageJ. Furthermore, these plugins have several new functions, further expanding the range of capabilities of the original protocol, such as analysis of multiple regions of interest and image stacks. The latter feature of the program is especially useful in applications in which it is important to determine changes related to time and location. Thus, the clock scan analysis of stacks of biological images may potentially be applied to spreading of Na + or Ca ++ within a single cell, as well as to the analysis of spreading activity (e.g., Ca ++ waves) in populations of synaptically-connected or gap junction-coupled cells. Here, we describe these new clock scan plugins and show some examples of their applications in image analysis.

  3. PyPele Rewritten To Use MPI

    NASA Technical Reports Server (NTRS)

    Hockney, George; Lee, Seungwon

    2008-01-01

    A computer program known as PyPele, originally written as a Pythonlanguage extension module of a C++ language program, has been rewritten in pure Python language. The original version of PyPele dispatches and coordinates parallel-processing tasks on cluster computers and provides a conceptual framework for spacecraft-mission- design and -analysis software tools to run in an embarrassingly parallel mode. The original version of PyPele uses SSH (Secure Shell a set of standards and an associated network protocol for establishing a secure channel between a local and a remote computer) to coordinate parallel processing. Instead of SSH, the present Python version of PyPele uses Message Passing Interface (MPI) [an unofficial de-facto standard language-independent application programming interface for message- passing on a parallel computer] while keeping the same user interface. The use of MPI instead of SSH and the preservation of the original PyPele user interface make it possible for parallel application programs written previously for the original version of PyPele to run on MPI-based cluster computers. As a result, engineers using the previously written application programs can take advantage of embarrassing parallelism without need to rewrite those programs.

  4. Reformulation of a clinical-dose system for carbon-ion radiotherapy treatment planning at the National Institute of Radiological Sciences, Japan

    NASA Astrophysics Data System (ADS)

    Inaniwa, Taku; Kanematsu, Nobuyuki; Matsufuji, Naruhiro; Kanai, Tatsuaki; Shirai, Toshiyuki; Noda, Koji; Tsuji, Hiroshi; Kamada, Tadashi; Tsujii, Hirohiko

    2015-04-01

    At the National Institute of Radiological Sciences (NIRS), more than 8,000 patients have been treated for various tumors with carbon-ion (C-ion) radiotherapy in the past 20 years based on a radiobiologically defined clinical-dose system. Through clinical experience, including extensive dose escalation studies, optimum dose-fractionation protocols have been established for respective tumors, which may be considered as the standards in C-ion radiotherapy. Although the therapeutic appropriateness of the clinical-dose system has been widely demonstrated by clinical results, the system incorporates several oversimplifications such as dose-independent relative biological effectiveness (RBE), empirical nuclear fragmentation model, and use of dose-averaged linear energy transfer to represent the spectrum of particles. We took the opportunity to update the clinical-dose system at the time we started clinical treatment with pencil beam scanning, a new beam delivery method, in 2011. The requirements for the updated system were to correct the oversimplifications made in the original system, while harmonizing with the original system to maintain the established dose-fractionation protocols. In the updated system, the radiation quality of the therapeutic C-ion beam was derived with Monte Carlo simulations, and its biological effectiveness was predicted with a theoretical model. We selected the most used C-ion beam with αr = 0.764 Gy-1 and β = 0.0615 Gy-2 as reference radiation for RBE. The C-equivalent biological dose distribution is designed to allow the prescribed survival of tumor cells of the human salivary gland (HSG) in entire spread-out Bragg peak (SOBP) region, with consideration to the dose dependence of the RBE. This C-equivalent biological dose distribution is scaled to a clinical dose distribution to harmonize with our clinical experiences with C-ion radiotherapy. Treatment plans were made with the original and the updated clinical-dose systems, and both physical and clinical dose distributions were compared with regard to the prescribed dose level, beam energy, and SOBP width. Both systems provided uniform clinical dose distributions within the targets consistent with the prescriptions. The mean physical doses delivered to targets by the updated system agreed with the doses by the original system within ±1.5% for all tested conditions. The updated system reflects the physical and biological characteristics of the therapeutic C-ion beam more accurately than the original system, while at the same time allowing the continued use of the dose-fractionation protocols established with the original system at NIRS.

  5. Rosetta:MSF: a modular framework for multi-state computational protein design.

    PubMed

    Löffler, Patrick; Schmitz, Samuel; Hupfeld, Enrico; Sterner, Reinhard; Merkl, Rainer

    2017-06-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta's protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta's single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design.

  6. Rosetta:MSF: a modular framework for multi-state computational protein design

    PubMed Central

    Hupfeld, Enrico; Sterner, Reinhard

    2017-01-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta’s protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta’s single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design. PMID:28604768

  7. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System

    NASA Astrophysics Data System (ADS)

    Memon, Nasir D.; Wong, Ping W.

    1999-04-01

    Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

  8. Fixation and Commitment while Designing and Its Measurement

    ERIC Educational Resources Information Center

    Gero, John S.

    2011-01-01

    This paper introduces the notion that fixation and commitment while designing can be measured by studying the protocol of the design session. It is hypothesized that the dynamic entropy of the linkograph of the protocol provides the basis for such a measurement. The hypothesis is empirically tested using a design protocol and the results…

  9. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  10. Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla

    2002-04-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.

  11. A Novel Combination Therapy for Patients With Dry Eye Disease: A Pilot Study.

    PubMed

    Smith, Will; McMahon, David; Nymark, Maria

    2018-05-01

    Context • Approximately 25% of the US population suffers from dry eyes or some abnormality of the exposed ocular surface. Investigation of effective modalities for their management is needed. Objective • The study intended to examine the efficacy of a proprietary, daily, Dry Eye Protocol consisting of daily use of a moist, heated, ocular compress and intake of an omega-3 dietary supplement in treatment of ocular surface disease. Design • The research team designed a 4-wk, clinically based, open-label, multicenter cohort study. Setting • The study took place at 6 private eye care practices throughout the United States: Beverly Hills, CA, USA; San Diego, CA, USA; Sunnyvale, CA, USA; Park City, UT, USA; Tarpon Spring, FL, USA; and Kennewick, WA, USA. Participants • Participants were adults between 18 and 75 y of age who had established ocular surface disease based on clinical findings and the results of testing using the ocular surface disease index (OSDI). Intervention • For period of 30 d, participants used a combined daily protocol that included (1) application of a moist, heated, eye compress and (2) a nutritional therapy via an omega-3 supplement in an oral triglyceride form. Outcome Measures • Measures included the OSDI and a test of tear break-up time (TBUT). Results • Of the original 35 participants, 33 completed the 4-wk protocol. The participants using the proprietary Dry Eye Protocol showed significant improvements from baseline, demonstrated by a 49% decrease in OSDI scores (P = .0015); and 46% of participants reported becoming asymptomatic of dry eye symptoms. A significant improvement was also observed in TBUT, increasing from 3.0 to 5.4 s. Conclusions • Daily use of the proprietary Dry Eye Protocol that included a high dosage of triglyceride omega-3 and use of a moist, heated, compress daily showed significant improvement for participants in OSDI and TBUT and should be considered to be a first-line therapy for patients with dry eye disease.

  12. Standardizing data exchange for clinical research protocols and case report forms: An assessment of the suitability of the Clinical Data Interchange Standards Consortium (CDISC) Operational Data Model (ODM).

    PubMed

    Huser, Vojtech; Sastry, Chandan; Breymaier, Matthew; Idriss, Asma; Cimino, James J

    2015-10-01

    Efficient communication of a clinical study protocol and case report forms during all stages of a human clinical study is important for many stakeholders. An electronic and structured study representation format that can be used throughout the whole study life-span can improve such communication and potentially lower total study costs. The most relevant standard for representing clinical study data, applicable to unregulated as well as regulated studies, is the Operational Data Model (ODM) in development since 1999 by the Clinical Data Interchange Standards Consortium (CDISC). ODM's initial objective was exchange of case report forms data but it is increasingly utilized in other contexts. An ODM extension called Study Design Model, introduced in 2011, provides additional protocol representation elements. Using a case study approach, we evaluated ODM's ability to capture all necessary protocol elements during a complete clinical study lifecycle in the Intramural Research Program of the National Institutes of Health. ODM offers the advantage of a single format for institutions that deal with hundreds or thousands of concurrent clinical studies and maintain a data warehouse for these studies. For each study stage, we present a list of gaps in the ODM standard and identify necessary vendor or institutional extensions that can compensate for such gaps. The current version of ODM (1.3.2) has only partial support for study protocol and study registration data mainly because it is outside the original development goal. ODM provides comprehensive support for representation of case report forms (in both the design stage and with patient level data). Inclusion of requirements of observational, non-regulated or investigator-initiated studies (outside Food and Drug Administration (FDA) regulation) can further improve future revisions of the standard. Published by Elsevier Inc.

  13. Microbiological Research Under the Nagoya Protocol: Facts and Fiction.

    PubMed

    Overmann, Jörg; Scholz, Amber Hartman

    2017-02-01

    The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. A prospective gating method to acquire a diverse set of free-breathing CT images for model-based 4DCT

    NASA Astrophysics Data System (ADS)

    O'Connell, D.; Ruan, D.; Thomas, D. H.; Dou, T. H.; Lewis, J. H.; Santhanam, A.; Lee, P.; Low, D. A.

    2018-02-01

    Breathing motion modeling requires observation of tissues at sufficiently distinct respiratory states for proper 4D characterization. This work proposes a method to improve sampling of the breathing cycle with limited imaging dose. We designed and tested a prospective free-breathing acquisition protocol with a simulation using datasets from five patients imaged with a model-based 4DCT technique. Each dataset contained 25 free-breathing fast helical CT scans with simultaneous breathing surrogate measurements. Tissue displacements were measured using deformable image registration. A correspondence model related tissue displacement to the surrogate. Model residual was computed by comparing predicted displacements to image registration results. To determine a stopping criteria for the prospective protocol, i.e. when the breathing cycle had been sufficiently sampled, subsets of N scans where 5  ⩽  N  ⩽  9 were used to fit reduced models for each patient. A previously published metric was employed to describe the phase coverage, or ‘spread’, of the respiratory trajectories of each subset. Minimum phase coverage necessary to achieve mean model residual within 0.5 mm of the full 25-scan model was determined and used as the stopping criteria. Using the patient breathing traces, a prospective acquisition protocol was simulated. In all patients, phase coverage greater than the threshold necessary for model accuracy within 0.5 mm of the 25 scan model was achieved in six or fewer scans. The prospectively selected respiratory trajectories ranked in the (97.5  ±  4.2)th percentile among subsets of the originally sampled scans on average. Simulation results suggest that the proposed prospective method provides an effective means to sample the breathing cycle with limited free-breathing scans. One application of the method is to reduce the imaging dose of a previously published model-based 4DCT protocol to 25% of its original value while achieving mean model residual within 0.5 mm.

  15. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  16. Pharmaceutical trials in general practice: the first 100 protocols. An audit by the clinical research ethics committee of the Royal College of General Practitioners.

    PubMed Central

    Wise, P.; Drury, M.

    1996-01-01

    OBJECTIVE: To assess the outcome of 100 general practice based, multicentre research projects submitted to the ethics committee of the Royal College of General Practitioners by pharmaceutical companies or their agents between 1984 and 1989. DESIGN: Analysis of consecutive submitted protocols for stated objectives, study design, and outcomes; detailed review of committee minutes and correspondence in relation to amendment and approval; assessment of final reports submitted at conclusion of studies. SUBJECTS: 82 finally approved protocols, embracing 34,523 proposed trial subjects and 1195 proposed general practice investigators. MAIN OUTCOME MEASURES: Success at enrolling subjects and investigators; commencement and completion data; validity of final report's assessment of efficacy, safety, tolerability, and acceptability; and method of use and dissemination of findings. RESULTS: 18 studies were not approved and 45 had to be amended. Randomised controlled trials comprised 46 of the original submissions. Remuneration considerations, inadequate information or consent sheets, pregnancy safety, the need to discontinue existing therapy, and suboptimal scientific content were major reasons for rejecting studies or asking for amendments. Of the 82 approved studies 8 were not started. Shortfalls of investigators (of 39%) and trial subjects (of 37%) and an overall 23% withdrawal rate were responsible for a significant incidence of inconclusive results. Within the six year follow up interval, only 19 of the studies had been formally published. CONCLUSIONS: This audit identified substantial ethical concerns in the process of approving multicentre general practice pharmaceutical research. PMID:8939118

  17. Automated selection of stabilizing mutations in designed and natural proteins.

    PubMed

    Borgo, Benjamin; Havranek, James J

    2012-01-31

    The ability to engineer novel protein folds, conformations, and enzymatic activities offers enormous potential for the development of new protein therapeutics and biocatalysts. However, many de novo and redesigned proteins exhibit poor hydrophobic packing in their predicted structures, leading to instability or insolubility. The general utility of rational, structure-based design would greatly benefit from an improved ability to generate well-packed conformations. Here we present an automated protocol within the RosettaDesign framework that can identify and improve poorly packed protein cores by selecting a series of stabilizing point mutations. We apply our method to previously characterized designed proteins that exhibited a decrease in stability after a full computational redesign. We further demonstrate the ability of our method to improve the thermostability of a well-behaved native protein. In each instance, biophysical characterization reveals that we were able to stabilize the original proteins against chemical and thermal denaturation. We believe our method will be a valuable tool for both improving upon designed proteins and conferring increased stability upon native proteins.

  18. Automated selection of stabilizing mutations in designed and natural proteins

    PubMed Central

    Borgo, Benjamin; Havranek, James J.

    2012-01-01

    The ability to engineer novel protein folds, conformations, and enzymatic activities offers enormous potential for the development of new protein therapeutics and biocatalysts. However, many de novo and redesigned proteins exhibit poor hydrophobic packing in their predicted structures, leading to instability or insolubility. The general utility of rational, structure-based design would greatly benefit from an improved ability to generate well-packed conformations. Here we present an automated protocol within the RosettaDesign framework that can identify and improve poorly packed protein cores by selecting a series of stabilizing point mutations. We apply our method to previously characterized designed proteins that exhibited a decrease in stability after a full computational redesign. We further demonstrate the ability of our method to improve the thermostability of a well-behaved native protein. In each instance, biophysical characterization reveals that we were able to stabilize the original proteins against chemical and thermal denaturation. We believe our method will be a valuable tool for both improving upon designed proteins and conferring increased stability upon native proteins. PMID:22307603

  19. A fast and mild decellularization protocol for obtaining extracellular matrix.

    PubMed

    Mirzarafie, Ariana; Grainger, Rhian K; Thomas, Ben; Bains, William; Ustok, Fatma I; Lowe, Chris R

    2014-04-01

    Degradation of extracellular matrix (ECM) function with age is a major cause of loss of tissue function with age that we would wish to reverse. Tissue engineering to provide replacement tissue requires an ECM-mimicking scaffold for cell organization. The standard protocols for achieving this take 10 days and include steps that may change the protein structure of the ECM. Here we describe a much shorter protocol for decellularizing chicken muscle, skin, and tendon samples that achieves the same efficiency as the original protocol without protein cross-link interference. Our protocol can be completed in 72 hr.

  20. Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs

    NASA Astrophysics Data System (ADS)

    Wang, Cong; Xu, Gang; Yang, Yi-Xian

    2013-07-01

    In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.

  1. LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network

    NASA Astrophysics Data System (ADS)

    Lu, Xiaofeng; Hui, Pan; Towsley, Don; Pu, Juhua; Xiong, Zhang

    In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.

  2. Evaluation of Vitamin D Standardization Program protocols for standardizing serum 25-hydroxyvitamin D data: a case study of the program's potential for national nutrition and health surveys12345

    PubMed Central

    Cashman, Kevin D; Kiely, Mairead; Kinsella, Michael; Durazo-Arvizu, Ramón A; Tian, Lu; Zhang, Yue; Lucey, Alice; Flynn, Albert; Gibney, Michael J; Vesper, Hubert W; Phinney, Karen W; Coates, Paul M; Picciano, Mary F; Sempos, Christopher T

    2013-01-01

    Background: The Vitamin D Standardization Program (VDSP) has developed protocols for standardizing procedures of 25-hydroxyvitamin D [25(OH)D] measurement in National Health/Nutrition Surveys to promote 25(OH)D measurements that are accurate and comparable over time, location, and laboratory procedure to improve public health practice. Objective: We applied VDSP protocols to existing ELISA-derived serum 25(OH)D data from the Irish National Adult Nutrition Survey (NANS) as a case-study survey and evaluated their effectiveness by comparison of the protocol-projected estimates with those from a reanalysis of survey serums by using liquid chromatography–tandem mass spectrometry (LC–tandem MS). Design: The VDSP reference system and protocols were applied to ELISA-based serum 25(OH)D data from the representative NANS sample (n = 1118). A reanalysis of 99 stored serums by using standardized LC–tandem MS and resulting regression equations yielded predicted standardized serum 25(OH)D values, which were then compared with LC–tandem MS reanalyzed values for all serums. Results: Year-round prevalence rates for serum 25(OH)D concentrations <30, <40, and <50 nmol/L were 6.5%, 21.9%, and 40.0%, respectively, via original ELISA measurements and 11.4%, 25.3%, and 43.7%, respectively, when VDSP protocols were applied. Differences in estimates at <30- and <40-nmol/L thresholds, but not at the <50-nmol/L threshold, were significant (P < 0.05). A reanalysis of all serums by using LC–tandem MS confirmed prevalence estimates as 11.2%, 27.2%, and 45.0%, respectively. Prevalences of serum 25(OH)D concentrations >125 nmol/L were 1.2%, 0.3%, and 0.6% by means of ELISA, VDSP protocols, and LC–tandem MS, respectively. Conclusion: VDSP protocols hold a major potential for national nutrition and health surveys in terms of the standardization of serum 25(OH)D data. PMID:23615829

  3. 12 CFR 365.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... OF GENERAL POLICY REAL ESTATE LENDING STANDARDS Registration of Residential Mortgage Loan Originators... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees...) identified in paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify...

  4. 12 CFR 365.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... OF GENERAL POLICY REAL ESTATE LENDING STANDARDS Registration of Residential Mortgage Loan Originators... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees...) identified in paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify...

  5. 12 CFR 365.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OF GENERAL POLICY REAL ESTATE LENDING STANDARDS Registration of Residential Mortgage Loan Originators... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees...) identified in paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify...

  6. 12 CFR 365.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... OF GENERAL POLICY REAL ESTATE LENDING STANDARDS Registration of Residential Mortgage Loan Originators... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees...) identified in paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify...

  7. Sensitive, Rapid Detection of Bacterial Spores

    NASA Technical Reports Server (NTRS)

    Kern, Roger G.; Venkateswaran, Kasthuri; Chen, Fei; Pickett, Molly; Matsuyama, Asahi

    2009-01-01

    A method of sensitive detection of bacterial spores within delays of no more than a few hours has been developed to provide an alternative to a prior three-day NASA standard culture-based assay. A capability for relatively rapid detection of bacterial spores would be beneficial for many endeavors, a few examples being agriculture, medicine, public health, defense against biowarfare, water supply, sanitation, hygiene, and the food-packaging and medical-equipment industries. The method involves the use of a commercial rapid microbial detection system (RMDS) that utilizes a combination of membrane filtration, adenosine triphosphate (ATP) bioluminescence chemistry, and analysis of luminescence images detected by a charge-coupled-device camera. This RMDS has been demonstrated to be highly sensitive in enumerating microbes (it can detect as little as one colony-forming unit per sample) and has been found to yield data in excellent correlation with those of culture-based methods. What makes the present method necessary is that the specific RMDS and the original protocols for its use are not designed for discriminating between bacterial spores and other microbes. In this method, a heat-shock procedure is added prior to an incubation procedure that is specified in the original RMDS protocols. In this heat-shock procedure (which was also described in a prior NASA Tech Briefs article on enumerating sporeforming bacteria), a sample is exposed to a temperature of 80 C for 15 minutes. Spores can survive the heat shock, but nonspore- forming bacteria and spore-forming bacteria that are not in spore form cannot survive. Therefore, any colonies that grow during incubation after the heat shock are deemed to have originated as spores.

  8. Security Implications of OPC, OLE, DCOM, and RPC in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2006-01-01

    OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding],more » DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.« less

  9. Development of an efficient real-time quantitative PCR protocol for detection of Xanthomonas arboricola pv. pruni in Prunus species.

    PubMed

    Palacio-Bielsa, Ana; Cubero, Jaime; Cambra, Miguel A; Collados, Raquel; Berruete, Isabel M; López, María M

    2011-01-01

    Xanthomonas arboricola pv. pruni, the causal agent of bacterial spot disease of stone fruit, is considered a quarantine organism by the European Union and the European and Mediterranean Plant Protection Organization (EPPO). The bacterium can undergo an epiphytic phase and/or be latent and can be transmitted by plant material, but currently, only visual inspections are used to certify plants as being X. arboricola pv. pruni free. A novel and highly sensitive real-time TaqMan PCR detection protocol was designed based on a sequence of a gene for a putative protein related to an ABC transporter ATP-binding system in X. arboricola pv. pruni. Pathogen detection can be completed within a few hours with a sensitivity of 10(2) CFU ml(-1), thus surpassing the sensitivity of the existing conventional PCR. Specificity was assessed for X. arboricola pv. pruni strains from different origins as well as for closely related Xanthomonas species, non-Xanthomonas species, saprophytic bacteria, and healthy Prunus samples. The efficiency of the developed protocol was evaluated with field samples of 14 Prunus species and rootstocks. For symptomatic leaf samples, the protocol was very efficient even when washed tissues of the leaves were directly amplified without any previous DNA extraction. For samples of 117 asymptomatic leaves and 285 buds, the protocol was more efficient after a simple DNA extraction, and X. arboricola pv. pruni was detected in 9.4% and 9.1% of the 402 samples analyzed, respectively, demonstrating its frequent epiphytic or endophytic phase. This newly developed real-time PCR protocol can be used as a quantitative assay, offers a reliable and sensitive test for X. arboricola pv. pruni, and is suitable as a screening test for symptomatic as well as asymptomatic plant material.

  10. Designing of routing algorithms in autonomous distributed data transmission system for mobile computing devices with ‘WiFi-Direct’ technology

    NASA Astrophysics Data System (ADS)

    Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.

    2017-02-01

    The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.

  11. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system.

    PubMed

    Kawano, Tomonori

    2013-03-01

    There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.

  12. Empirical Examinations of Modifications and Adaptations to Evidence-Based Psychotherapies: Methodologies, Impact, and Future Directions.

    PubMed

    Stirman, Shannon Wiltsey; Gamarra, Jennifer; Bartlett, Brooke; Calloway, Amber; Gutner, Cassidy

    2017-12-01

    This review describes methods used to examine the modifications and adaptations to evidence-based psychological treatments (EBPTs), assesses what is known about the impact of modifications and adaptations to EBPTs, and makes recommendations for future research and clinical care. One hundred eight primary studies and three meta-analyses were identified. All studies examined planned adaptations, and many simultaneously investigated multiple types of adaptations. With the exception of studies on adding or removing specific EBPT elements, few studies compared adapted EBPTs to the original protocols. There was little evidence that adaptations in the studies were detrimental, but there was also limited consistent evidence that adapted protocols outperformed the original protocols, with the exception of adding components to EBPTs. Implications for EBPT delivery and future research are discussed.

  13. Comment on "Secure quantum private information retrieval using phase-encoded queries"

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2016-12-01

    In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.

  14. The use of high-fidelity human patient simulation as an evaluative tool in the development of clinical research protocols and procedures.

    PubMed

    Wright, Melanie C; Taekman, Jeffrey M; Barber, Linda; Hobbs, Gene; Newman, Mark F; Stafford-Smith, Mark

    2005-12-01

    Errors in clinical research can be costly, in terms of patient safety, data integrity, and data collection. Data inaccuracy in early subjects of a clinical study may be associated with problems in the design of the protocol, procedures, and data collection tools. High-fidelity patient simulation centers provide an ideal environment to apply human-centered design to clinical trial development. A draft of a complex clinical protocol was designed, evaluated and modified using a high-fidelity human patient simulator in the Duke University Human Simulation and Patient Safety Center. The process included walk-throughs, detailed modifications of the protocol and development of procedural aids. Training of monitors and coordinators provided an opportunity for observation of performance that was used to identify further improvements to the protocol. Evaluative steps were used to design the research protocol and procedures. Iterative modifications were made to the protocol and data collection tools. The success in use of human simulation in the preparation of a complex clinical drug trial suggests the benefits of human patient simulation extend beyond training and medical equipment evaluation. Human patient simulation can provide a context for informal expert evaluation of clinical protocol design and for formal "rehearsal" to evaluate the efficacy of procedures and support tools.

  15. SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks

    NASA Astrophysics Data System (ADS)

    Oberoi, Vikram; Chigan, Chunxiao

    2005-05-01

    Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.

  16. Gender-Specific Combination HIV Prevention for Youth in High-Burden Settings: The MP3 Youth Observational Pilot Study Protocol.

    PubMed

    Buttolph, Jasmine; Inwani, Irene; Agot, Kawango; Cleland, Charles M; Cherutich, Peter; Kiarie, James N; Osoti, Alfred; Celum, Connie L; Baeten, Jared M; Nduati, Ruth; Kinuthia, John; Hallett, Timothy B; Alsallaq, Ramzi; Kurth, Ann E

    2017-03-08

    Nearly three decades into the epidemic, sub-Saharan Africa (SSA) remains the region most heavily affected by human immunodeficiency virus (HIV), with nearly 70% of the 34 million people living with HIV globally residing in the region. In SSA, female and male youth (15 to 24 years) are at a disproportionately high risk of HIV infection compared to adults. As such, there is a need to target HIV prevention strategies to youth and to tailor them to a gender-specific context. This protocol describes the process for the multi-staged approach in the design of the MP3 Youth pilot study, a gender-specific, combination, HIV prevention intervention for youth in Kenya. The objective of this multi-method protocol is to outline a rigorous and replicable methodology for a gender-specific combination HIV prevention pilot study for youth in high-burden settings, illustrating the triangulated methods undertaken to ensure that age, sex, and context are integral in the design of the intervention. The mixed-methods, cross-sectional, longitudinal cohort pilot study protocol was developed by first conducting a systematic review of the literature, which shaped focus group discussions around prevention package and delivery options, and that also informed age- and sex- stratified mathematical modeling. The review, qualitative data, and mathematical modeling created a triangulated evidence base of interventions to be included in the pilot study protocol. To design the pilot study protocol, we convened an expert panel to select HIV prevention interventions effective for youth in SSA, which will be offered in a mobile health setting. The goal of the pilot study implementation and evaluation is to apply lessons learned to more effective HIV prevention evidence and programming. The combination HIV prevention package in this protocol includes (1) offering HIV testing and counseling for all youth; (2) voluntary medical circumcision and condoms for males; (3) pre-exposure prophylaxis (PrEP), conditional cash transfer (CCT), and contraceptives for females; and (4) referrals for HIV care among those identified as HIV-positive. The combination package platform selected is mobile health teams in an integrated services delivery model. A cross-sectional analysis will be conducted to determine the uptake of the interventions. To determine long-term impact, the protocol outlines enrolling selected participants in mutually exclusive longitudinal cohorts (HIV-positive, PrEP, CCT, and HIV-negative) followed by using mobile phone text messages (short message service, SMS) and in-person surveys to prospectively assess prevention method uptake, adherence, and risk compensation behaviors. Cross-sectional and sub-cohort analyses will be conducted to determine intervention packages uptake. The literature review, focus groups, and modeling indicate that offering age- and gender- specific combination HIV prevention interventions that include biomedical, behavioral, and structural interventions can have an impact on HIV risk reduction. Implementing this protocol will show the feasibility of delivering these services at scale. The MP3 Youth study is one of the few combination HIV prevention intervention protocols incorporating youth- and gender-specific interventions in one delivery setting. Lessons learned from the design of the protocol can be incorporated into the national guidance for combination HIV prevention for youth in Kenya and other high-burden SSA settings. ClinicalTrials.gov NCT01571128; http://clinicaltrials.gov/ct2/show/NCT01571128?term=MP3+youth&rank=1 (Archived by WebCite at http://www.webcitation.org/6nmioPd54). ©Jasmine Buttolph, Irene Inwani, Kawango Agot, Charles M Cleland, Peter Cherutich, James N Kiarie, Alfred Osoti, Connie L Celum, Jared M Baeten, Ruth Nduati, John Kinuthia, Timothy B Hallett, Ramzi Alsallaq, Ann E Kurth. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 08.03.2017.

  17. Structural Brain Atlases: Design, Rationale, and Applications in Normal and Pathological Cohorts

    PubMed Central

    Mandal, Pravat K.; Mahajan, Rashima; Dinov, Ivo D.

    2015-01-01

    Structural magnetic resonance imaging (MRI) provides anatomical information about the brain in healthy as well as in diseased conditions. On the other hand, functional MRI (fMRI) provides information on the brain activity during performance of a specific task. Analysis of fMRI data requires the registration of the data to a reference brain template in order to identify the activated brain regions. Brain templates also find application in other neuroimaging modalities, such as diffusion tensor imaging and multi-voxel spectroscopy. Further, there are certain differences (e.g., brain shape and size) in the brains of populations of different origin and during diseased conditions like in Alzheimer’s disease (AD), population and disease-specific brain templates may be considered crucial for accurate registration and subsequent analysis of fMRI as well as other neuroimaging data. This manuscript provides a comprehensive review of the history, construction and application of brain atlases. A chronological outline of the development of brain template design, starting from the Talairach and Tournoux atlas to the Chinese brain template (to date), along with their respective detailed construction protocols provides the backdrop to this manuscript. The manuscript also provides the automated workflow-based protocol for designing a population-specific brain atlas from structural MRI data using LONI Pipeline graphical workflow environment. We conclude by discussing the scope of brain templates as a research tool and their application in various neuroimaging modalities. PMID:22647262

  18. REFOLDdb: a new and sustainable gateway to experimental protocols for protein refolding.

    PubMed

    Mizutani, Hisashi; Sugawara, Hideaki; Buckle, Ashley M; Sangawa, Takeshi; Miyazono, Ken-Ichi; Ohtsuka, Jun; Nagata, Koji; Shojima, Tomoki; Nosaki, Shohei; Xu, Yuqun; Wang, Delong; Hu, Xiao; Tanokura, Masaru; Yura, Kei

    2017-04-24

    More than 7000 papers related to "protein refolding" have been published to date, with approximately 300 reports each year during the last decade. Whilst some of these papers provide experimental protocols for protein refolding, a survey in the structural life science communities showed a necessity for a comprehensive database for refolding techniques. We therefore have developed a new resource - "REFOLDdb" that collects refolding techniques into a single, searchable repository to help researchers develop refolding protocols for proteins of interest. We based our resource on the existing REFOLD database, which has not been updated since 2009. We redesigned the data format to be more concise, allowing consistent representations among data entries compared with the original REFOLD database. The remodeled data architecture enhances the search efficiency and improves the sustainability of the database. After an exhaustive literature search we added experimental refolding protocols from reports published 2009 to early 2017. In addition to this new data, we fully converted and integrated existing REFOLD data into our new resource. REFOLDdb contains 1877 entries as of March 17 th , 2017, and is freely available at http://p4d-info.nig.ac.jp/refolddb/ . REFOLDdb is a unique database for the life sciences research community, providing annotated information for designing new refolding protocols and customizing existing methodologies. We envisage that this resource will find wide utility across broad disciplines that rely on the production of pure, active, recombinant proteins. Furthermore, the database also provides a useful overview of the recent trends and statistics in refolding technology development.

  19. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  20. Improvements of Quantum Private Comparison Protocol Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Zhou, Ming-Kuai

    2018-01-01

    Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.

  1. Elicitation: a tool for enriching the bioactive composition of foods.

    PubMed

    Baenas, Nieves; García-Viguera, Cristina; Moreno, Diego A

    2014-09-01

    Elicitation is a good strategy to induce physiological changes and stimulate defense or stress-induced responses in plants. The elicitor treatments trigger the synthesis of phytochemical compounds in fruits, vegetables and herbs. These metabolites have been widely investigated as bioactive compounds responsible of plant cell adaptation to the environment, specific organoleptic properties of foods, and protective effects in human cells against oxidative processes in the development of neurodegenerative and cardiovascular diseases and certain types of cancer. Biotic (biological origin), abiotic (chemical or physical origin) elicitors and phytohormones have been applied alone or in combinations, in hydroponic solutions or sprays, and in different selected time points of the plant growth or during post-harvest. Understanding how plant tissues and their specific secondary metabolic pathways respond to specific treatments with elicitors would be the basis for designing protocols to enhance the production of secondary metabolites, in order to produce quality and healthy fresh foods.

  2. Design exploration and verification platform, based on high-level modeling and FPGA prototyping, for fast and flexible digital communication in physics experiments

    NASA Astrophysics Data System (ADS)

    Magazzù, G.; Borgese, G.; Costantino, N.; Fanucci, L.; Incandela, J.; Saponara, S.

    2013-02-01

    In many research fields as high energy physics (HEP), astrophysics, nuclear medicine or space engineering with harsh operating conditions, the use of fast and flexible digital communication protocols is becoming more and more important. The possibility to have a smart and tested top-down design flow for the design of a new protocol for control/readout of front-end electronics is very useful. To this aim, and to reduce development time, costs and risks, this paper describes an innovative design/verification flow applied as example case study to a new communication protocol called FF-LYNX. After the description of the main FF-LYNX features, the paper presents: the definition of a parametric SystemC-based Integrated Simulation Environment (ISE) for high-level protocol definition and validation; the set up of figure of merits to drive the design space exploration; the use of ISE for early analysis of the achievable performances when adopting the new communication protocol and its interfaces for a new (or upgraded) physics experiment; the design of VHDL IP cores for the TX and RX protocol interfaces; their implementation on a FPGA-based emulator for functional verification and finally the modification of the FPGA-based emulator for testing the ASIC chipset which implements the rad-tolerant protocol interfaces. For every step, significant results will be shown to underline the usefulness of this design and verification approach that can be applied to any new digital protocol development for smart detectors in physics experiments.

  3. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  4. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  5. A 13-week research-based biochemistry laboratory curriculum.

    PubMed

    Lefurgy, Scott T; Mundorff, Emily C

    2017-09-01

    Here, we present a 13-week research-based biochemistry laboratory curriculum designed to provide the students with the experience of engaging in original research while introducing foundational biochemistry laboratory techniques. The laboratory experience has been developed around the directed evolution of an enzyme chosen by the instructor, with mutations designed by the students. Ideal enzymes for this curriculum are able to be structurally modeled, solubly expressed, and monitored for activity by UV/Vis spectroscopy, and an example curriculum for haloalkane dehalogenase is given. Unique to this curriculum is a successful implementation of saturation mutagenesis and high-throughput screening of enzyme function, along with bioinformatics analysis, homology modeling, structural analysis, protein expression and purification, polyacrylamide gel electrophoresis, UV/Vis spectroscopy, and enzyme kinetics. Each of these techniques is carried out using a novel student-designed mutant library or enzyme variant unique to the lab team and, importantly, not described previously in the literature. Use of a well-established set of protocols promotes student data quality. Publication may result from the original student-generated hypotheses and data, either from the class as a whole or individual students that continue their independent projects upon course completion. © 2017 by The International Union of Biochemistry and Molecular Biology, 45(5):437-448, 2017. © 2017 The International Union of Biochemistry and Molecular Biology.

  6. The practical application of adaptive study design in early phase clinical trials: a retrospective analysis of time savings.

    PubMed

    Lorch, U; Berelowitz, K; Ozen, C; Naseem, A; Akuffo, E; Taubel, J

    2012-05-01

    The interest in adaptive study design is evident from the growing amount of clinical research employing this model in the mid to later stages of medicines development. Little has been published on the practical application and merits of adaptive study design in early phase clinical research. This paper describes a retrospective analysis performed on a sample of 29 industry lead adaptive early phase studies commencing between 1 January 2006 and 31 December 2010 in a clinical trials unit in London, England. All studies containing at least one adaptive feature in the original protocol were included in the analysis. The scope of the analysis was to assess whether the use of adaptive study designs provided tangible benefits over the use of conventional study designs using time savings as the main measure. We conclude that the use of adaptive study design saves time in early phase research programs. This is achieved by abolishing the need for substantial amendments or by mitigating their impact on timelines and by using adaptive scheduling efficiencies.

  7. Variability in Criteria for Emergency Medical Services Routing of Acute Stroke Patients to Designated Stroke Center Hospitals.

    PubMed

    Dimitrov, Nikolay; Koenig, William; Bosson, Nichole; Song, Sarah; Saver, Jeffrey L; Mack, William J; Sanossian, Nerses

    2015-09-01

    Comprehensive stroke systems of care include routing to the nearest designated stroke center hospital, bypassing non-designated hospitals. Routing protocols are implemented at the state or county level and vary in qualification criteria and determination of destination hospital. We surveyed all counties in the state of California for presence and characteristics of their prehospital stroke routing protocols. Each county's local emergency medical services agency (LEMSA) was queried for the presence of a stroke routing protocol. We reviewed these protocols for method of stroke identification and criteria for patient transport to a stroke center. Thirty-three LEMSAs serve 58 counties in California with populations ranging from 1,175 to nearly 10 million. Fifteen LEMSAs (45%) had stroke routing protocols, covering 23 counties (40%) and 68% of the state population. Counties with protocols had higher population density (1,500 vs. 140 persons per square mile). In the six counties without designated stroke centers, patients meeting criteria were transported out of county. Stroke identification in the field was achieved using the Cincinnati Prehospital Stroke Screen in 72%, Los Angeles Prehospital Stroke Screen in 7% and a county-specific protocol in 22%. California EMS prehospital acute stroke routing protocols cover 68% of the state population and vary in characteristics including activation by symptom onset time and destination facility features, reflecting matching of system design to local geographic resources.

  8. Improving the lens design and performance of a contemporary electromagnetic shock wave lithotripter

    PubMed Central

    Neisius, Andreas; Smith, Nathan B.; Sankin, Georgy; Kuntz, Nicholas John; Madden, John Francis; Fovargue, Daniel E.; Mitran, Sorin; Lipkin, Michael Eric; Simmons, Walter Neal; Preminger, Glenn M.; Zhong, Pei

    2014-01-01

    The efficiency of shock wave lithotripsy (SWL), a noninvasive first-line therapy for millions of nephrolithiasis patients, has not improved substantially in the past two decades, especially in regard to stone clearance. Here, we report a new acoustic lens design for a contemporary electromagnetic (EM) shock wave lithotripter, based on recently acquired knowledge of the key lithotripter field characteristics that correlate with efficient and safe SWL. The new lens design addresses concomitantly three fundamental drawbacks in EM lithotripters, namely, narrow focal width, nonidealized pulse profile, and significant misalignment in acoustic focus and cavitation activities with the target stone at high output settings. Key design features and performance of the new lens were evaluated using model calculations and experimental measurements against the original lens under comparable acoustic pulse energy (E+) of 40 mJ. The −6-dB focal width of the new lens was enhanced from 7.4 to 11 mm at this energy level, and peak pressure (41 MPa) and maximum cavitation activity were both realigned to be within 5 mm of the lithotripter focus. Stone comminution produced by the new lens was either statistically improved or similar to that of the original lens under various in vitro test conditions and was significantly improved in vivo in a swine model (89% vs. 54%, P = 0.01), and tissue injury was minimal using a clinical treatment protocol. The general principle and associated techniques described in this work can be applied to design improvement of all EM lithotripters. PMID:24639497

  9. Improving the lens design and performance of a contemporary electromagnetic shock wave lithotripter.

    PubMed

    Neisius, Andreas; Smith, Nathan B; Sankin, Georgy; Kuntz, Nicholas John; Madden, John Francis; Fovargue, Daniel E; Mitran, Sorin; Lipkin, Michael Eric; Simmons, Walter Neal; Preminger, Glenn M; Zhong, Pei

    2014-04-01

    The efficiency of shock wave lithotripsy (SWL), a noninvasive first-line therapy for millions of nephrolithiasis patients, has not improved substantially in the past two decades, especially in regard to stone clearance. Here, we report a new acoustic lens design for a contemporary electromagnetic (EM) shock wave lithotripter, based on recently acquired knowledge of the key lithotripter field characteristics that correlate with efficient and safe SWL. The new lens design addresses concomitantly three fundamental drawbacks in EM lithotripters, namely, narrow focal width, nonidealized pulse profile, and significant misalignment in acoustic focus and cavitation activities with the target stone at high output settings. Key design features and performance of the new lens were evaluated using model calculations and experimental measurements against the original lens under comparable acoustic pulse energy (E+) of 40 mJ. The -6-dB focal width of the new lens was enhanced from 7.4 to 11 mm at this energy level, and peak pressure (41 MPa) and maximum cavitation activity were both realigned to be within 5 mm of the lithotripter focus. Stone comminution produced by the new lens was either statistically improved or similar to that of the original lens under various in vitro test conditions and was significantly improved in vivo in a swine model (89% vs. 54%, P = 0.01), and tissue injury was minimal using a clinical treatment protocol. The general principle and associated techniques described in this work can be applied to design improvement of all EM lithotripters.

  10. The potential of SNP-based PCR-RFLP capillary electrophoresis analysis to authenticate and detect admixtures of Mediterranean olive oils.

    PubMed

    Bazakos, Christos; Khanfir, Emna; Aoun, Mariem; Spano, Thodhoraq; Zein, Zeina El; Chalak, Lamis; Riachy, Milad El; Abou-Sleymane, Gretta; Ali, Sihem Ben; Grati Kammoun, Naziha; Kalaitzis, Panagiotis

    2016-07-01

    Authentication and traceability of extra virgin olive oil is a challenging research task due to the complexity of fraudulent practices. In this context, the monovarietal olive oils of Protected Designation of Origin (PDO) and Protected Geographical Indication (PGI) require new tests and cutting edge analytical technologies to detect mislabeling and misleading origin. Toward this direction, DNA-based technologies could serve as a complementary to the analytical techniques assay. Single nucleotide polymorphisms are ideal molecular markers since they require short PCR analytical targets which are a prerequisite for forensic applications in olive oil sector. In the present study, a small number of polymorphic SNPs were used with an SNP-based PCR-RFLP capillary electrophoresis platform to discriminate six out of 13 monovarietal olive oils of Mediterranean origin from three different countries, Greece, Tunisia, and Lebanon. Moreover, the high sensitivity of capillary electrophoresis in combination with the DNA extraction protocol lowered the limit of detection to 10% in an admixture of Tsounati in a Koroneiki olive oil matrix. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Representing the work of medical protocols for organizational simulation.

    PubMed Central

    Fridsma, D. B.

    1998-01-01

    Developing and implementing patient care protocols within a specific organizational setting requires knowledge of the protocol, the organization, and the way in which the organization does its work. Computer-based simulation tools have been used in many industries to provide managers with prospective insight into problems of work process and organization design mismatch. Many of these simulation tools are designed for well-understood routine work processes in which there are few contingent tasks. In this paper, we describe theoretic that make it possible to simulate medical protocols using an information-processing theory framework. These simulations will allow medical administrators to test different protocol and organizational designs before actually using them within a particular clinical setting. PMID:9929231

  12. Generalized Teleportation and Entanglement Recycling

    NASA Astrophysics Data System (ADS)

    Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan

    2013-01-01

    We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.

  13. Generalized teleportation and entanglement recycling.

    PubMed

    Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan

    2013-01-04

    We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.

  14. Cognitive Protocol Stack Design

    DTIC Science & Technology

    2015-12-30

    SECURITY CLASSIFICATION OF: In the ARO “ Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international...areas related to cognitive networking, opening also new lines of research that was not possible to forecast at the beginning of the project. In a...Distribution Unlimited Final Report: Cognitive Protocol Stack Design The views, opinions and/or findings contained in this report are those of the author(s

  15. j5 DNA assembly design automation.

    PubMed

    Hillson, Nathan J

    2014-01-01

    Modern standardized methodologies, described in detail in the previous chapters of this book, have enabled the software-automated design of optimized DNA construction protocols. This chapter describes how to design (combinatorial) scar-less DNA assembly protocols using the web-based software j5. j5 assists biomedical and biotechnological researchers construct DNA by automating the design of optimized protocols for flanking homology sequence as well as type IIS endonuclease-mediated DNA assembly methodologies. Unlike any other software tool available today, j5 designs scar-less combinatorial DNA assembly protocols, performs a cost-benefit analysis to identify which portions of an assembly process would be less expensive to outsource to a DNA synthesis service provider, and designs hierarchical DNA assembly strategies to mitigate anticipated poor assembly junction sequence performance. Software integrated with j5 add significant value to the j5 design process through graphical user-interface enhancement and downstream liquid-handling robotic laboratory automation.

  16. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group.

    PubMed

    Pradhan, Menno; Brinkman, Sally A; Beatty, Amanda; Maika, Amelia; Satriawan, Elan; de Ree, Joppe; Hasan, Amer

    2013-08-16

    This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the execution of the program and the resultant threats to the study, we discuss our analytical plan and intentions for endline data collection. Current Controlled Trials ISRCTN76061874.

  17. Development and evaluation of a study design typology for human research.

    PubMed

    Carini, Simona; Pollock, Brad H; Lehmann, Harold P; Bakken, Suzanne; Barbour, Edward M; Gabriel, Davera; Hagler, Herbert K; Harper, Caryn R; Mollah, Shamim A; Nahm, Meredith; Nguyen, Hien H; Scheuermann, Richard H; Sim, Ida

    2009-11-14

    A systematic classification of study designs would be useful for researchers, systematic reviewers, readers, and research administrators, among others. As part of the Human Studies Database Project, we developed the Study Design Typology to standardize the classification of study designs in human research. We then performed a multiple observer masked evaluation of active research protocols in four institutions according to a standardized protocol. Thirty-five protocols were classified by three reviewers each into one of nine high-level study designs for interventional and observational research (e.g., N-of-1, Parallel Group, Case Crossover). Rater classification agreement was moderately high for the 35 protocols (Fleiss' kappa = 0.442) and higher still for the 23 quantitative studies (Fleiss' kappa = 0.463). We conclude that our typology shows initial promise for reliably distinguishing study design types for quantitative human research.

  18. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols†

    PubMed Central

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  19. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  20. Cancer prevention trial of a synergistic mixture of green tea concentrate plus Capsicum (CAPSOL-T) in a random population of subjects ages 40-84

    PubMed Central

    2014-01-01

    Background Experts agree that one of the more promising strategies in cancer management is early detection coupled with early intervention. In this study, we evaluated an early cancer detection strategy of cancer presence based on serum levels of the cancer-specific transcript variants of ENOX2 in serum coupled with an ENOX2-targeted nutraceutical preparation of green tea concentrate plus Capsicum (Capsol-T®) as a strategy of Curative Prevention® involving early detection coupled with early intervention in early stage cancer when in its most susceptible and manageable stages. Experimental design One hundred ten (110) subjects were tested for cancer presence using the ONCOblot® Tissue of Origin 2-D gel/western blot protocol for detection of serum presence of transcript variants of the ENOX2 protein. Subjects testing positive for ENOX2 received 350 mg of Capsol-T® in capsule form every 4 h including during the night for periods of at least 3 to 6 months or longer after which they were again tested for ENOX2 presence using the ONCOblot® Tissue of Origin Cancer Test protocol. Results Of the 110 subjects, both male and female, ages 40 to 84, with no evidence of clinical symptoms of cancer, 40% were positive for ENOX2 presence in the ONCOblot® Tissue of Origin Cancer Test. After completion of 3 to 17 months of Capsol-T® use, 94% of subjects subsequently tested negative for ENOX2 presence. Conclusions Oral Capsol-T® is well tolerated and, for ENOX2 presence in serum in the absence of clinical cancer symptoms, is consistently effective in reducing the serum ENOX2 levels to below detectable limits. PMID:24393573

  1. Adding Dimension to Evaluative Research Through the Use of Protocol Material.

    ERIC Educational Resources Information Center

    Tittle, Carol Kehr

    A rationale and illustration of the use of original records or protocol materials in an evaluation research report are described. Records of school observations and audiotape transcripts were selected to represent the concepts or categories which were developed in the process of evaluation. These qualitative data were collected in a project which…

  2. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system

    PubMed Central

    Kawano, Tomonori

    2013-01-01

    There have been a wide variety of approaches for handling the pieces of DNA as the “unplugged” tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given “passwords” and/or secret numbers using DNA sequences. The “passwords” of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original “passwords.” The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed. PMID:23750303

  3. Mechanical verification of a schematic Byzantine clock synchronization algorithm

    NASA Technical Reports Server (NTRS)

    Shankar, Natarajan

    1991-01-01

    Schneider generalizes a number of protocols for Byzantine fault tolerant clock synchronization and presents a uniform proof for their correctness. The authors present a machine checked proof of this schematic protocol that revises some of the details in Schneider's original analysis. The verification was carried out with the EHDM system developed at the SRI Computer Science Laboratory. The mechanically checked proofs include the verification that the egocentric mean function used in Lamport and Melliar-Smith's Interactive Convergence Algorithm satisfies the requirements of Schneider's protocol.

  4. Carbon nanotube enhanced label-free detection of microRNAs based on hairpin probe triggered solid-phase rolling-circle amplification

    NASA Astrophysics Data System (ADS)

    Tian, Qianqian; Wang, Ying; Deng, Ruijie; Lin, Lei; Liu, Yang; Li, Jinghong

    2014-12-01

    The detection of microRNAs (miRNAs) is imperative for gaining a better understanding of the functions of these biomarkers and has great potential for the early diagnosis of human disease. High sensitivity and selectivity for miRNA detection brings new challenges. Herein, an ultrasensitive protocol for electrochemical detection of miRNA is designed through carbon nanotube (CNT) enhanced label-free detection based on hairpin probe triggered solid-phase rolling-circle amplification (RCA). Traditionally, RCA, widely applied for signal enhancement in the construction of a variety of biosensors, has an intrinsic limitation of ultrasensitive detection, as it is difficult to separate the enzymes, templates, and padlock DNAs from the RCA products in the homogeneous solution. We purposely designed a solid-phase RCA strategy, using CNTs as the solid substrate, integrated with a hairpin structured probe to recognize target miRNA. In the presence of miRNA the stem-loop structure will be unfolded, triggering the CNT based RCA process. Due to the efficient blocking effect originating from the polymeric RCA products, the label-free assay of miRNA exhibits an ultrasensitive detection limit of 1.2 fM. Furthermore, the protocol possesses excellent specificity for resolving lung cancer-related let-7 family members which have only one-nucleotide variations. The high sensitivity and selectivity give the method great potential for applications in online diagnostics and in situ detection in long-term development.The detection of microRNAs (miRNAs) is imperative for gaining a better understanding of the functions of these biomarkers and has great potential for the early diagnosis of human disease. High sensitivity and selectivity for miRNA detection brings new challenges. Herein, an ultrasensitive protocol for electrochemical detection of miRNA is designed through carbon nanotube (CNT) enhanced label-free detection based on hairpin probe triggered solid-phase rolling-circle amplification (RCA). Traditionally, RCA, widely applied for signal enhancement in the construction of a variety of biosensors, has an intrinsic limitation of ultrasensitive detection, as it is difficult to separate the enzymes, templates, and padlock DNAs from the RCA products in the homogeneous solution. We purposely designed a solid-phase RCA strategy, using CNTs as the solid substrate, integrated with a hairpin structured probe to recognize target miRNA. In the presence of miRNA the stem-loop structure will be unfolded, triggering the CNT based RCA process. Due to the efficient blocking effect originating from the polymeric RCA products, the label-free assay of miRNA exhibits an ultrasensitive detection limit of 1.2 fM. Furthermore, the protocol possesses excellent specificity for resolving lung cancer-related let-7 family members which have only one-nucleotide variations. The high sensitivity and selectivity give the method great potential for applications in online diagnostics and in situ detection in long-term development. Electronic supplementary information (ESI) available: Preparation of the chemically modified multi-walled carbon nanotubes (CNTs), characterization of the CNTs and modified CNTs, preparation of the circular probe, gel electrophoresis of the RCA products, and DNA probes as noted in the text. See DOI: 10.1039/c4nr05243a

  5. Full-Scale Wind-Tunnel Investigation of Wing-Cooling Ducts Effects of Propeller Slipstream, Special Report

    NASA Technical Reports Server (NTRS)

    Nickle, F. R.; Freeman, Arthur B.

    1939-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  6. Major cultural-compatibility complex: considerations on cross-cultural dissemination of patient safety programmes.

    PubMed

    Jeong, Heon-Jae; Pham, Julius C; Kim, Minji; Engineer, Cyrus; Pronovost, Peter J

    2012-07-01

    As the importance of patient safety has been broadly acknowledged, various improvement programmes have been developed. Many of the programmes with proven efficacy have been disseminated internationally. However, some of those attempts may encounter unexpected cross-cultural obstacles and may fail to harvest the expected success. Each country has different cultural background that has shaped the behavior of the constituents for centuries. It is crucial to take into account these cultural differences in effectively disseminating these programmes. As an organ transplantation requires tissue-compatibility between the donor and the recipient, there needs to be compatibility between the country where the program was originally developed and the nation implementing the program. Though no detailed guidelines exist to predict success, small-scale pilot tests can help evaluate whether a safety programme will work in a new cultural environment. Furthermore, a pilot programme helps reveal the source of potential conflict, so we can modify the original programme accordingly to better suit the culture to which it is to be applied. In addition to programme protocols, information about the cultural context of the disseminated programme should be conveyed during dissemination. Original programme designers should work closely with partnering countries to ensure that modifications do not jeopardise the original intention of the programme. By following this approach, we might limit barriers originating from cultural differences and increase the likelihood of success in cross-cultural dissemination.

  7. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction

    NASA Astrophysics Data System (ADS)

    Ma, Hong-Xin; Huang, Peng; Bai, Dong-Yun; Wang, Shi-Yu; Bao, Wan-Su; Zeng, Gui-Hua

    2018-04-01

    It has been found that non-Gaussian operations can be applied to increase and distill entanglement between Gaussian entangled states. We show the successful use of the non-Gaussian operation, in particular, photon subtraction operation, on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol. The proposed method can be implemented based on existing technologies. Security analysis shows that the photon subtraction operation can remarkably increase the maximal transmission distance of the CV-MDI-QKD protocol, which precisely make up for the shortcoming of the original CV-MDI-QKD protocol, and one-photon subtraction operation has the best performance. Moreover, the proposed protocol provides a feasible method for the experimental implementation of the CV-MDI-QKD protocol.

  8. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  9. Origin, timing, and gene expression profile of adventitious rooting in Arabidopsis hypocotyls and stems.

    PubMed

    Welander, Margareta; Geier, Thomas; Smolka, Anders; Ahlman, Annelie; Fan, Jing; Zhu, Li-Hua

    2014-02-01

    Adventitious root (AR) formation is indispensable for vegetative propagation, but difficult to achieve in many crops. Understanding its molecular mechanisms is thus important for such species. Here we aimed at developing a rooting protocol for direct AR formation in stems, locating cellular AR origins in stems and exploring molecular differences underlying adventitious rooting in hypocotyls and stems. In-vitro-grown hypocotyls or stems of wild-type and transgenic ecotype Columbia (Col-0) of Arabidopsis thaliana were rooted on rooting media. Anatomy of AR formation, qRT-PCR of some rooting-related genes and in situ GUS expression were carried out during rooting from hypocotyls and stems. We developed a rooting protocol for AR formation in stems and traced back root origins in stems by anatomical and in situ expression studies. Unlike rooting in hypocotyls, rooting in stems was slower, and AR origins were mainly from lateral parenchyma of vascular bundles and neighboring starch sheath cells as well as, to a lesser extent, from phloem cap and xylem parenchyma. Transcript levels of GH3-3, LBD16, LBD29, and LRP1 in hypocotyls and stems were similar, but transcript accumulation was delayed in stems. In situ expression signals of DR5::GUS, LBD16::GUS, LBD29::GUS, and rolB::GUS reporters in stems mainly occurred at the root initiation sites, suggesting their involvement in AR formation. We have developed an efficient rooting protocol using half-strength Lepoivre medium for studying AR formation in stems, traced back the cellular AR origins in stems, and correlated expression of rooting-related genes with root initiation sites.

  10. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  11. An example problem illustrating the application of the national lime association mixture design and testing protocol (MDTP) to ascertain engineering properties of lime-treated subgrades for mechanistic pavement design/analysis.

    DOT National Transportation Integrated Search

    2001-09-01

    This document presents an example of mechanistic design and analysis using a mix design and : testing protocol. More specifically, it addresses the structural properties of lime-treated subgrade, : subbase, and base layers through mechanistic design ...

  12. Special Plans and Operations: Assessment of Allegations Concerning Traumatic Brain Injury Research Integrity in Iraq

    DTIC Science & Technology

    2011-03-31

    protocols conducted in Iraq. His office had been designated by the 1 A research protocol is a formal document detailing the study methodology and the...Human Research Protections Program plan requires scientific peer review to ensure that research is scientifically sound in its design and methods, and...ofthe approved research protocol and IRB minutes, revealed that there was no mention of "active rehabilitation and exercise" under the design

  13. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  14. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  15. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  16. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  17. Autoregressive Modeling of Drift and Random Error to Characterize a Continuous Intravascular Glucose Monitoring Sensor.

    PubMed

    Zhou, Tony; Dickson, Jennifer L; Geoffrey Chase, J

    2018-01-01

    Continuous glucose monitoring (CGM) devices have been effective in managing diabetes and offer potential benefits for use in the intensive care unit (ICU). Use of CGM devices in the ICU has been limited, primarily due to the higher point accuracy errors over currently used traditional intermittent blood glucose (BG) measures. General models of CGM errors, including drift and random errors, are lacking, but would enable better design of protocols to utilize these devices. This article presents an autoregressive (AR) based modeling method that separately characterizes the drift and random noise of the GlySure CGM sensor (GlySure Limited, Oxfordshire, UK). Clinical sensor data (n = 33) and reference measurements were used to generate 2 AR models to describe sensor drift and noise. These models were used to generate 100 Monte Carlo simulations based on reference blood glucose measurements. These were then compared to the original CGM clinical data using mean absolute relative difference (MARD) and a Trend Compass. The point accuracy MARD was very similar between simulated and clinical data (9.6% vs 9.9%). A Trend Compass was used to assess trend accuracy, and found simulated and clinical sensor profiles were similar (simulated trend index 11.4° vs clinical trend index 10.9°). The model and method accurately represents cohort sensor behavior over patients, providing a general modeling approach to any such sensor by separately characterizing each type of error that can arise in the data. Overall, it enables better protocol design based on accurate expected CGM sensor behavior, as well as enabling the analysis of what level of each type of sensor error would be necessary to obtain desired glycemic control safety and performance with a given protocol.

  18. Observational study of adherence to a traditional Mediterranean diet, sociocultural characteristics and cardiovascular disease risk factors of older Greek Australians from MEDiterranean ISlands (MEDIS-Australia Study): Protocol and rationale.

    PubMed

    Thodis, Antonia; Itsiopoulos, Catherine; Kouris-Blazos, Antigone; Brazionis, Laima; Tyrovolas, Stefanos; Polychronopoulos, Evangelos; Panagiotakos, Demosthenes B

    2018-02-01

    To describe the study protocol of the MEDiterranean ISlands-Australia (MEDIS-Australia) Study modelled on the MEDIS Study conducted in Greece. The present study aims to explore adherence to the traditional Mediterranean diet pattern, determine enablers and barriers to adherence, explore the definition of Greek cuisine, and associations between adherence to the diet pattern and risk factors for cardiovascular disease (CVD) and metabolic syndrome in older Greek Australians originally from Greek islands and Cyprus. Now long-term immigrants, with at least 50 years in Australia, characteristics and risk factor profiles of older Greek islander-born Australians will be compared and contrasted to their counterparts living on Greek islands to evaluate the influence of migration on adherence. The present study is an observational study of cross-sectional design using a modified lifestyle and semi-quantitative food frequency questionnaire to capture sociodemographic, health, psychosocial and dietary characteristics, including cuisine, of 150 older Greek islander-born Australians. Anthropometric measures and medical history will be collected. Participants will be aged over 65 years, live independently, are originally from a Greek island and are free from CVD. Data collection is underway. Characteristics and behaviours associated with adherence, if identified, could be evaluated in future studies. For example, exploration of enablers or barriers to adherence to a Mediterranean dietary pattern in an Australian population. © 2017 Dietitians Association of Australia.

  19. A Healthy Eating Education Program for Midwives to Investigate and Explore Their Knowledge, Understanding, and Confidence to Support Pregnant Women to Eat Healthily: Protocol for a Mixed-Methods Study.

    PubMed

    Othman, Shwikar Mahmoud Etman; Steen, Mary P; Jayasekara, Rasika; Fleet, Julie-Anne

    2018-05-25

    Nutrition and healthy eating behaviors during pregnancy are vitally important for the health of a mother and her developing baby. However, some midwives have reported a lack of evidence-based nutrition knowledge for providing information about healthy eating to women during pregnancy. In this study, the aim is to design and evaluate a healthy eating education program to enhance midwives' knowledge, understanding, and confidence to support pregnant women in South Australia to make healthy eating choices. This mixed-methods study consists of two phases. The first phase, Phase 1, consists of an education program for midwives, "Healthy Eating in Pregnancy," to be delivered through a workshop or webinar. Each midwife will attend one workshop or webinar, which will be approximately two hours in length. This program will be evaluated through pre-, immediate-, and post-educational questionnaires utilizing a website specifically designed for this study. The participants will be midwives who are members of the Australian College of Midwives and the Australian Nursing and Midwives Federation, and users of social media (eg, Facebook and Twitter) residing and employed in South Australia. Phase 2 will consist of semistructured interviews with a purposive sample of midwives. These interviews will be undertaken to gain an in-depth understanding of midwives' views and how confident they feel educating pregnant women after receiving the healthy eating education. Interviews will be face-to-face or conducted by telephone with midwives who have participated in the healthy eating educational program. A systematic review has previously been undertaken to inform this study protocol. This paper describes and discusses the protocol for this mixed-methods study, which will be completed in April 2019. The results from the systematic review suggest that there is clear justification to undertake this mixed-methods study to investigate and explore midwives' knowledge, understanding and confidence to support healthy eating in pregnant women. The results and conclusions from the systematic review provided some guidance for the design and development of this study protocol. This mixed-methods study will address a gap in the literature. The results from quantitative and qualitative data sources in this proposed study will help to draw conclusions to address the research topic. RR1-10.2196/9861. ©Shwikar Mahmoud Etman Othman, Mary P Steen, Rasika Jayasekara, Julie-Anne Fleet. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 25.05.2018.

  20. Workarounds in the Workplace: A Second Look.

    PubMed

    Seaman, Jennifer B; Erlen, Judith A

    2015-01-01

    Nursing workarounds have garnered increased attention over the past 15 years, corresponding with an increased focus on patient safety and evidence-based practice and a rise in the use of health information technologies (HITs). Workarounds have typically been viewed as deviations from best practice that put patients at risk for poor outcomes. However, this narrow view fails to take into consideration the multifactorial origins of workarounds. The authors explore the ways in which evidence-based protocols and HIT, designed to improve patient safety and quality, can have an unintended consequence of increasing the likelihood of nurses engaging in workarounds. The article also examines workarounds considering the ethical obligations of both nurses and administrative leaders to optimize patient safety and quality.

  1. Autopoiesis + extended cognition + nature = can buildings think?

    PubMed Central

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and biocomputation. I trace computation and botanic simulations back to Alan Turing's little-known 1950s Morphogenetic drawings, reaction-diffusion algorithms, and pioneering artificial intelligence (AI) in order to establish bioarchitecture's generative point of origin. I ask provocatively, Can buildings think? as a question echoing Turing's own, "Can machines think?" PMID:26478784

  2. Device USB interface and software development for electric parameter measuring instrument

    NASA Astrophysics Data System (ADS)

    Li, Deshi; Chen, Jian; Wu, Yadong

    2003-09-01

    Aimed at general devices development, this paper discussed the development of USB interface and software development. With an example, using PDIUSBD12 which support parallel interface, the paper analyzed its technical characteristics. Designed different interface circuit with 80C52 singlechip microcomputer and TMS320C54 series digital signal processor, analyzed the address allocation, register access. According to USB1.1 standard protocol, designed the device software and application layer protocol. The paper designed the data exchange protocol, and carried out system functions.

  3. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  4. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  5. Biolistic Transformation of Wheat.

    PubMed

    Tassy, Caroline; Barret, Pierre

    2017-01-01

    The wheat genome encodes some 100,000 genes. To understand how the expression of these genes is regulated it will be necessary to carry out many genetic transformation experiments. Robust protocols that allow scientists to transform a wide range of wheat genotypes are therefore required. In this chapter, we describe a protocol for biolistic transformation of wheat that uses immature embryos and small quantities of DNA cassettes. An original method for DNA cassette purification is also described. This protocol can be used to transform a wide range of wheat genotypes and other related species.

  6. Next-Generation WDM Network Design and Routing

    NASA Astrophysics Data System (ADS)

    Tsang, Danny H. K.; Bensaou, Brahim

    2003-08-01

    Call for Papers The Editors of JON are soliciting papers on WDM Network Design and Routing. The aim in this focus issue is to publish original research on topics including - but not limited to - the following: - WDM network architectures and protocols - GMPLS network architectures - Wavelength converter placement in WDM networks - Routing and wavelength assignment (RWA) in WDM networks - Protection and restoration strategies and algorithms in WDM networks - Traffic grooming in WDM networks - Dynamic routing strategies and algorithms - Optical Burst Switching - Support of Multicast - Protection and restoration in WDM networks - Performance analysis and optimization in WDM networks Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating "WDM Network Design" in the "Comments" field of the online submission form. For all other questions relating to this focus issue, please send an e-mail to jon@osa.org, subject line "WDM Network Design." Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Schedule Paper Submission Deadline: November 1, 2003 Notification to Authors: January 15, 2004 Final Manuscripts to Publisher: February 15, 2004 Publication of Focus Issue: February/March 2004

  7. Next-Generation WDM Network Design and Routing

    NASA Astrophysics Data System (ADS)

    Tsang, Danny H. K.; Bensaou, Brahim

    2003-10-01

    Call for Papers The Editors of JON are soliciting papers on WDM Network Design and Routing. The aim in this focus issue is to publish original research on topics including - but not limited to - the following: - WDM network architectures and protocols - GMPLS network architectures - Wavelength converter placement in WDM networks - Routing and wavelength assignment (RWA) in WDM networks - Protection and restoration strategies and algorithms in WDM networks - Traffic grooming in WDM networks - Dynamic routing strategies and algorithms - Optical burst switching - Support of multicast - Protection and restoration in WDM networks - Performance analysis and optimization in WDM networks Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating "WDM Network Design" in the "Comments" field of the online submission form. For all other questions relating to this focus issue, please send an e-mail to jon@osa.org, subject line "WDM Network Design." Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Schedule - Paper Submission Deadline: November 1, 2003 - Notification to Authors: January 15, 2004 - Final Manuscripts to Publisher: February 15, 2004 - Publication of Focus Issue: February/March 2004

  8. Next-Generation WDM Network Design and Routing

    NASA Astrophysics Data System (ADS)

    Tsang, Danny H. K.; Bensaou, Brahim

    2003-09-01

    Call for Papers The Editors of JON are soliciting papers on WDM Network Design and Routing. The aim in this focus issue is to publish original research on topics including - but not limited to - the following: - WDM network architectures and protocols - GMPLS network architectures - Wavelength converter placement in WDM networks - Routing and wavelength assignment (RWA) in WDM networks - Protection and restoration strategies and algorithms in WDM networks - Traffic grooming in WDM networks - Dynamic routing strategies and algorithms - Optical burst switching - Support of multicast - Protection and restoration in WDM networks - Performance analysis and optimization in WDM networks Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating "WDM Network Design" in the "Comments" field of the online submission form. For all other questions relating to this focus issue, please send an e-mail to jon@osa.org, subject line "WDM Network Design." Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Schedule - Paper Submission Deadline: November 1, 2003 - Notification to Authors: January 15, 2004 - Final Manuscripts to Publisher: February 15, 2004 - Publication of Focus Issue: February/March 2004

  9. 23 CFR 1340.5 - Selection of observation sites.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... STATE OBSERVATIONAL SURVEYS OF SEAT BELT USE Survey Design Requirements § 1340.5 Selection of... observation sites. The survey design shall include at a minimum the following protocols: (1) Protocol when...

  10. 23 CFR 1340.5 - Selection of observation sites.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... STATE OBSERVATIONAL SURVEYS OF SEAT BELT USE Survey Design Requirements § 1340.5 Selection of... observation sites. The survey design shall include at a minimum the following protocols: (1) Protocol when...

  11. 23 CFR 1340.5 - Selection of observation sites.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... STATE OBSERVATIONAL SURVEYS OF SEAT BELT USE Survey Design Requirements § 1340.5 Selection of... observation sites. The survey design shall include at a minimum the following protocols: (1) Protocol when...

  12. Comparison of thermal and microwave paleointensity estimates in specimens that violate Thellier's laws

    NASA Astrophysics Data System (ADS)

    Grappone, J. M., Jr.; Biggin, A. J.; Barrett, T. J.; Hill, M. J.

    2017-12-01

    Deep in the Earth, thermodynamic behavior drives the geodynamo and creates the Earth's magnetic field. Determining how the strength of the field, its paleointensity (PI), varies with time, is vital to our understanding of Earth's evolution. Thellier-style paleointensity experiments assume the presence of non-interacting, single domain (SD) magnetic particles, which follow Thellier's laws. Most natural rocks however, contain larger, multi-domain (MD) or interacting single domain (ISD) particles that often violate these laws and cause experiments to fail. Even for samples that pass reliability criteria designed to minimize the impact of MD or ISD grains, different PI techniques can give systematically different estimates, implying violation of Thellier's laws. Our goal is to identify any disparities in PI results that may be explainable by protocol-specific MD and ISD behavior and determine optimum methods to maximize accuracy. Volcanic samples from the Hawai'ian SOH1 borehole previously produced method-dependent PI estimates. Previous studies showed consistently lower PI values when using a microwave (MW) system and the perpendicular method than using the original thermal Thellier-Thellier (OT) technique. However, the data were ambiguous regarding the cause of the discrepancy. The diverging estimates appeared to be either the result of using OT instead of the perpendicular method or the result of using MW protocols instead of thermal protocols. Comparison experiments were conducted using the thermal perpendicular method and microwave OT technique to bridge the gap. Preliminary data generally show that the perpendicular method gives lower estimates than OT for comparable Hlab values. MW estimates are also generally lower than thermal estimates using the same protocol.

  13. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations.

    PubMed

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. From designed door's thickness, the door designed by the MC simulation and Wu-McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations.

  14. Editing wild points in isolation - Fast agreement for reliable systems (Preliminary version)

    NASA Technical Reports Server (NTRS)

    Kearns, Phil; Evans, Carol

    1989-01-01

    Consideration is given to the intuitively appealing notion of discarding sensor values which are strongly suspected of being erroneous in a modified approximate agreement protocol. Approximate agreement with editing imposes a time bound upon the convergence of the protocol - no such bound was possible for the original approximate agreement protocol. This new approach is potentially useful in the construction of asynchronous fault tolerant systems. The main result is that a wild-point replacement technique called t-worst editing can be shown to guarantee convergence of the approximate agreement protocol to a valid agreement value. Results are presented for a four-processor synchronous system in which a single processor may be faulty.

  15. Mothers After Gestational Diabetes in Australia Diabetes Prevention Program (MAGDA-DPP) post-natal intervention: an update to the study protocol for a randomized controlled trial.

    PubMed

    Shih, Sophy T F; Davis-Lameloise, Nathalie; Janus, Edward D; Wildey, Carol; Versace, Vincent L; Hagger, Virginia; Asproloupos, Dino; O'Reilly, Sharleen L; Phillips, Paddy A; Ackland, Michael; Skinner, Timothy; Oats, Jeremy; Carter, Rob; Best, James D; Dunbar, James A

    2014-06-30

    The Mothers After Gestational Diabetes in Australia Diabetes Prevention Program (MAGDA-DPP) is a randomized controlled trial (RCT) that aims to assess the effectiveness of a structured diabetes prevention intervention for women who had gestational diabetes. The original protocol was published in Trials (http://www.trialsjournal.com/content/14/1/339). This update reports on an additional exclusion criterion and change in first eligibility screening to provide greater clarity. The new exclusion criterion "surgical or medical intervention to treat obesity" has been added to the original protocol. The risks of developing diabetes will be affected by any medical or surgical intervention as its impact on obesity will alter the outcomes being assessed by MAGDA-DPP. The screening procedures have also been updated to reflect the current recruitment operation. The first eligibility screening is now taking place either during or after pregnancy, depending on recruitment strategy. Australian New Zealand Clinical Trials Registry ANZCTRN 12610000338066.

  16. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists

    PubMed Central

    Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people. PMID:29682348

  17. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists.

    PubMed

    Russell, Rachel; Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  18. A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance

    NASA Astrophysics Data System (ADS)

    Sasaki, Toshihiko; Koashi, Masato

    2017-06-01

    The round-robin differential phase shift (RRDPS) quantum key distribution (QKD) protocol is a unique QKD protocol whose security has not been understood through an information-disturbance trade-off relation, and a sufficient amount of privacy amplification was given independently of signal disturbance. Here, we discuss the security of the RRDPS protocol in the asymptotic regime when a good estimate of the bit error rate is available as a measure of signal disturbance. The uniqueness of the RRDPS protocol shows up as a peculiar form of information-disturbance trade-off curve. When the length of a block of pulses used for encoding and the signal disturbance are both small, it provides a significantly better key rate than that from the original security proof. On the other hand, when the block length is large, the use of the signal disturbance makes little improvement in the key rate. Our analysis will bridge a gap between the RRDPS protocol and the conventional QKD protocols.

  19. In-Space Networking on NASA's SCAN Testbed

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Eddy, Wesley M.; Clark, Gilbert J.; Johnson, Sandra K.

    2016-01-01

    The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios and a flight computer for supporting in-space communication research. New technologies being studied using the SCaN Testbed include advanced networking, coding, and modulation protocols designed to support the transition of NASAs mission systems from primarily point to point data links and preplanned routes towards adaptive, autonomous internetworked operations needed to meet future mission objectives. Networking protocols implemented on the SCaN Testbed include the Advanced Orbiting Systems (AOS) link-layer protocol, Consultative Committee for Space Data Systems (CCSDS) Encapsulation Packets, Internet Protocol (IP), Space Link Extension (SLE), CCSDS File Delivery Protocol (CFDP), and Delay-Tolerant Networking (DTN) protocols including the Bundle Protocol (BP) and Licklider Transmission Protocol (LTP). The SCaN Testbed end-to-end system provides three S-band data links and one Ka-band data link to exchange space and ground data through NASAs Tracking Data Relay Satellite System or a direct-to-ground link to ground stations. The multiple data links and nodes provide several upgradable elements on both the space and ground systems. This paper will provide a general description of the testbeds system design and capabilities, discuss in detail the design and lessons learned in the implementation of the network protocols, and describe future plans for continuing research to meet the communication needs for evolving global space systems.

  20. Microfluidic Transduction Harnesses Mass Transport Principles to Enhance Gene Transfer Efficiency.

    PubMed

    Tran, Reginald; Myers, David R; Denning, Gabriela; Shields, Jordan E; Lytle, Allison M; Alrowais, Hommood; Qiu, Yongzhi; Sakurai, Yumiko; Li, William C; Brand, Oliver; Le Doux, Joseph M; Spencer, H Trent; Doering, Christopher B; Lam, Wilbur A

    2017-10-04

    Ex vivo gene therapy using lentiviral vectors (LVs) is a proven approach to treat and potentially cure many hematologic disorders and malignancies but remains stymied by cumbersome, cost-prohibitive, and scale-limited production processes that cannot meet the demands of current clinical protocols for widespread clinical utilization. However, limitations in LV manufacture coupled with inefficient transduction protocols requiring significant excess amounts of vector currently limit widespread implementation. Herein, we describe a microfluidic, mass transport-based approach that overcomes the diffusion limitations of current transduction platforms to enhance LV gene transfer kinetics and efficiency. This novel ex vivo LV transduction platform is flexible in design, easy to use, scalable, and compatible with standard cell transduction reagents and LV preparations. Using hematopoietic cell lines, primary human T cells, primary hematopoietic stem and progenitor cells (HSPCs) of both murine (Sca-1 + ) and human (CD34 + ) origin, microfluidic transduction using clinically processed LVs occurs up to 5-fold faster and requires as little as one-twentieth of LV. As an in vivo validation of the microfluidic-based transduction technology, HSPC gene therapy was performed in hemophilia A mice using limiting amounts of LV. Compared to the standard static well-based transduction protocols, only animals transplanted with microfluidic-transduced cells displayed clotting levels restored to normal. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  1. Macro to microfluidics system for biological environmental monitoring.

    PubMed

    Delattre, Cyril; Allier, Cédric P; Fouillet, Yves; Jary, Dorothée; Bottausci, Frederic; Bouvier, Denis; Delapierre, Guillaume; Quinaud, Manuelle; Rival, Arnaud; Davoust, Laurent; Peponnet, Christine

    2012-01-01

    Biological environmental monitoring (BEM) is a growing field of research which challenges both microfluidics and system automation. The aim is to develop a transportable system with analysis throughput which satisfies the requirements: (i) fully autonomous, (ii) complete protocol integration from sample collection to final analysis, (iii) detection of diluted molecules or biological species in a large real life environmental sample volume, (iv) robustness and (v) flexibility and versatility. This paper discusses all these specifications in order to define an original fluidic architecture based on three connected modules, a sampling module, a sample preparation module and a detection module. The sample preparation module highly concentrates on the pathogens present in a few mL samples of complex and unknown solutions and purifies the pathogens' nucleic acids into a few μL of a controlled buffer. To do so, a two-step concentration protocol based on magnetic beads is automated in a reusable macro-to-micro fluidic system. The detection module is a PCR based miniaturized platform using digital microfluidics, where reactions are performed in 64 nL droplets handled by electrowetting on dielectric (EWOD) actuation. The design and manufacture of the two modules are reported as well as their respective performances. To demonstrate the integration of the complete protocol in the same system, first results of pathogen detection are shown. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Cryptographically supported NFC tags in medication for better inpatient safety.

    PubMed

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  3. Designing Endocrine Disruption Out of the Next Generation of Chemicals

    PubMed Central

    Schug, T.T; Abagyan, R.; Blumberg, B.; Collins, T.J.; Crews, D.; DeFur, P.L.; Dickerson, S.M.; Edwards, T.M.; Gore, A.C.; Guillette, L.J.; Hayes, T.; Heindel, J.J.; Moores, A.; Patisaul, H.B.; Tal, T.L.; Thayer, K.A.; Vandenberg, L.N.; Warner, J.; Watson, C.S.; Saal, F.S. vom; Zoeller, R.T.; O’Brien, K.P.; Myers, J.P.

    2013-01-01

    A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical’s potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at “the drawing board.” It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a ‘proof-of-principle’ test, we ran 6 endocrine disrupting chemicals (EDCs) that act via different endocrinological mechanisms through the protocol using published literature. Each was identified as endocrine active by one or more tiers. We believe that this voluntary testing protocol will be a dynamic tool to facilitate efficient and early identification of potentially problematic chemicals, while ultimately reducing the risks to public health. PMID:25110461

  4. Designing Endocrine Disruption Out of the Next Generation of Chemicals.

    PubMed

    Schug, T T; Abagyan, R; Blumberg, B; Collins, T J; Crews, D; DeFur, P L; Dickerson, S M; Edwards, T M; Gore, A C; Guillette, L J; Hayes, T; Heindel, J J; Moores, A; Patisaul, H B; Tal, T L; Thayer, K A; Vandenberg, L N; Warner, J; Watson, C S; Saal, F S Vom; Zoeller, R T; O'Brien, K P; Myers, J P

    2013-01-01

    A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical's potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at "the drawing board." It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a 'proof-of-principle' test, we ran 6 endocrine disrupting chemicals (EDCs) that act via different endocrinological mechanisms through the protocol using published literature. Each was identified as endocrine active by one or more tiers. We believe that this voluntary testing protocol will be a dynamic tool to facilitate efficient and early identification of potentially problematic chemicals, while ultimately reducing the risks to public health.

  5. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  6. 12 CFR 34.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...

  7. 12 CFR 34.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...

  8. 12 CFR 34.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...

  9. 12 CFR 34.103 - Registration of mortgage loan originators.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....103 Section 34.103 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... not act as mortgage loan originators unless the bank has 10 or fewer full time or equivalent employees... paragraphs (e)(1)(i)(E) and (F) of this section must comply with Registry protocols to verify their identity...

  10. Computational Enzyme Design: Advances, hurdles and possible ways forward

    PubMed Central

    Linder, Mats

    2012-01-01

    This mini review addresses recent developments in computational enzyme design. Successful protocols as well as known issues and limitations are discussed from an energetic perspective. It will be argued that improved results can be obtained by including a dynamic treatment in the design protocol. Finally, a molecular dynamics-based approach for evaluating and refining computational designs is presented. PMID:24688650

  11. Telemetry Standards, RCC Standard 106-17. Chapter 26. TmNSDataMessage Transfer Protocol

    DTIC Science & Technology

    2017-07-01

    Channel (RTSPDataChannel) ............................................ 26-13 26.4.3 Reliability Critical (RC) Delivery Protocol...error status code specified in RFC 2326 for "Request-URI Too Large" is 虮". 26.4.1.5 Request Types RTSPDataSources shall return valid ...to the following requirements. • Valid TmNSDataMessages shall be delivered containing the original Packages matching the requested

  12. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    PubMed

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  13. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.

    PubMed

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-08-08

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.

  14. 77 FR 47707 - Public Housing Assessment System (PHAS): Physical Condition Scoring Notice and Revised Dictionary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-09

    ... Standards (UPCS) inspection protocol was designed to be a uniform inspection process and standard for HUD's... frequency of inspections based on the results the UPCS inspection. UPCS was designed to assess the condition... physical assessment score. HUD Response: The UPCS inspection protocol as designed assesses the physical...

  15. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations

    PubMed Central

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    Aim The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. Background High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. Materials and methods The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. Results From designed door's thickness, the door designed by the MC simulation and Wu–McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Conclusion Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations. PMID:26900357

  16. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    DTIC Science & Technology

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  17. Anomalous Aortic Origin of Coronary Arteries in the Young: Echocardiographic Evaluation With Surgical Correlation.

    PubMed

    Lorber, Richard; Srivastava, Shubhika; Wilder, Travis J; McIntyre, Susan; DeCampli, William M; Williams, William G; Frommelt, Peter C; Parness, Ira A; Blackstone, Eugene H; Jacobs, Marshall L; Mertens, Luc; Brothers, Julie A; Herlong, J René

    2015-11-01

    This study sought to compare findings from institutional echocardiographic reports with imaging core laboratory (ICL) review of corresponding echocardiographic images and operative reports in 159 patients with anomalous aortic origin of a coronary artery (AAOCA). The study also sought to develop a "best practice" protocol for imaging and interpreting images in establishing the diagnosis of AAOCA. AAOCA is associated with sudden death in the young. Underlying anatomic risk factors that can cause ischemia-related events include coronary arterial ostial stenosis, intramural course of the proximal coronary within the aortic wall, interarterial course, and potential compression between the great arteries. Consistent protocols for diagnosing and evaluating these features are lacking, potentially precluding the ability to risk stratify patients based on evidence and plan surgical strategy. For a prescribed set of anatomic AAOCA features, percentages of missing data in institutional echocardiographic reports were calculated. For each feature, agreement among institutional echocardiographic reports, ICL review of images, and surgical reports was evaluated using the weighted kappa statistic. An echocardiographic imaging protocol was developed heuristically to reduce differences between institutional reports and ICL review. A total of 13%, 33%, and 62% of echocardiograms were missing images enabling diagnosis of intra-arterial course, proximal intramural course, and high ostial takeoff, respectively. There was poor agreement between institutional reports and ICL review for diagnosis of origin of coronary artery, interarterial course, intramural course, and acute angle takeoff (kappa = 0.74, 0.11, -0.03, 0.13, respectively). Surgical findings were also significantly different from those of reports, and to a lesser extent ICL reviews. The resulting protocol contains technical recommendations for imaging each of these features. Poor agreement between institutional reports and ICL review for AAOCA suggests need for an imaging protocol to permit evidence-based risk stratification and surgical planning. Even then, delineation of echocardiographic details in AAOCA will remain imperfect. Copyright © 2015 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  18. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  19. An optimized immunohistochemistry protocol for detecting the guidance cue Netrin-1 in neural tissue.

    PubMed

    Salameh, Samer; Nouel, Dominique; Flores, Cecilia; Hoops, Daniel

    2018-01-01

    Netrin-1, an axon guidance protein, is difficult to detect using immunohistochemistry. We performed a multi-step, blinded, and controlled protocol optimization procedure to establish an efficient and effective fluorescent immunohistochemistry protocol for characterizing Netrin-1 expression. Coronal mouse brain sections were used to test numerous antigen retrieval methods and combinations thereof in order to optimize the stain quality of a commercially available Netrin-1 antibody. Stain quality was evaluated by experienced neuroanatomists for two criteria: signal intensity and signal-to-noise ratio. After five rounds of testing protocol variants, we established a modified immunohistochemistry protocol that produced a Netrin-1 signal with good signal intensity and a high signal-to-noise ratio. The key protocol modifications are as follows: •Use phosphate buffer (PB) as the blocking solution solvent.•Use 1% sodium dodecyl sulfate (SDS) treatment for antigen retrieval. The original protocol was optimized for use with the Netrin-1 antibody produced by Novus Biologicals. However, we subsequently further modified the protocol to work with the antibody produced by Abcam. The Abcam protocol uses PBS as the blocking solution solvent and adds a citrate buffer antigen retrieval step.

  20. The Design of Finite State Machine for Asynchronous Replication Protocol

    NASA Astrophysics Data System (ADS)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  1. Dose-response relationship between cigarette smoking and site-specific cancer risk: protocol for a systematic review with an original design combining umbrella and traditional reviews.

    PubMed

    Lugo, Alessandra; Bosetti, Cristina; Peveri, Giulia; Rota, Matteo; Bagnardi, Vincenzo; Gallus, Silvano

    2017-11-01

    Only a limited number of meta-analyses providing risk curve functions of dose-response relationships between various smoking-related variables and cancer-specific risk are available. To identify all relevant original publications on the issue, we will conduct a series of comprehensive systematic reviews based on three subsequent literature searches: (1) an umbrella review, to identify meta-analyses, pooled analyses and systematic reviews published before 28 April 2017 on the association between cigarette smoking and the risk of 28 (namely all) malignant neoplasms; (2) for each cancer site, an updated review of original publications on the association between cigarette smoking and cancer risk, starting from the last available comprehensive review identified through the umbrella review; and (3) a review of all original articles on the association between cigarette smoking and site-specific cancer risk included in the publications identified through the umbrella review and the updated reviews. The primary outcomes of interest will be (1) the excess incidence/mortality of various cancers for smokers compared with never smokers; and (2) the dose-response curves describing the association between smoking intensity, duration and time since stopping and incidence/mortality for various cancers. For each cancer site, we will perform a meta-analysis by pooling study-specific estimates for smoking status. We will also estimate the dose-response curves for other smoking-related variables through random-effects meta-regression models based on a non-linear dose-response relationship framework. Ethics approval is not required for this study. Main results will be published in peer-reviewed journals and will also be included in a publicly available website. We will provide therefore the most complete and updated estimates on the association between various measures of cigarette smoking and site-specific cancer risk. This will allow us to obtain precise estimates on the cancer burden attributable to cigarette smoking. This protocol was registered in the International Prospective Register of Systematic Reviews (CRD42017063991). © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. El nombre 'Forastero' no más: A new protocol for meaningful cacao germplasm classification.

    USDA-ARS?s Scientific Manuscript database

    The title of this article (The name ‘Forastero’ no more) is to convey an attempt in this paper to try to convince the cacao scientific community not to use the term Forastero to identify cacao germplasm of non-Criollo origin. The term Forastero originated in Latin America to differentiate the intro...

  4. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    PubMed

    Ó Conchúir, Shane; Barlow, Kyle A; Pache, Roland A; Ollikainen, Noah; Kundert, Kale; O'Meara, Matthew J; Smith, Colin A; Kortemme, Tanja

    2015-01-01

    The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks) to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  5. Apples to apples: the origin and magnitude of differences in asbestos cancer risk estimates derived using varying protocols.

    PubMed

    Berman, D Wayne

    2011-08-01

    Given that new protocols for assessing asbestos-related cancer risk have recently been published, questions arise concerning how they compare to the "IRIS" protocol currently used by regulators. The newest protocols incorporate findings from 20 additional years of literature. Thus, differences between the IRIS and newer Berman and Crump protocols are examined to evaluate whether these protocols can be reconciled. Risks estimated by applying these protocols to real exposure data from both laboratory and field studies are also compared to assess the relative health protectiveness of each protocol. The reliability of risks estimated using the two protocols are compared by evaluating the degree with which each potentially reproduces the known epidemiology study risks. Results indicate that the IRIS and Berman and Crump protocols can be reconciled; while environment-specific variation within fiber type is apparently due primarily to size effects (not addressed by IRIS), the 10-fold (average) difference between amphibole asbestos risks estimated using each protocol is attributable to an arbitrary selection of the lowest of available mesothelioma potency factors in the IRIS protocol. Thus, the IRIS protocol may substantially underestimate risk when exposure is primarily to amphibole asbestos. Moreover, while the Berman and Crump protocol is more reliable than the IRIS protocol overall (especially for predicting amphibole risk), evidence is presented suggesting a new fiber-size-related adjustment to the Berman and Crump protocol may ultimately succeed in reconciling the entire epidemiology database. However, additional data need to be developed before the performance of the adjusted protocol can be fully validated. © 2011 Society for Risk Analysis.

  6. Quick Vegas: Improving Performance of TCP Vegas for High Bandwidth-Delay Product Networks

    NASA Astrophysics Data System (ADS)

    Chan, Yi-Cheng; Lin, Chia-Liang; Ho, Cheng-Yuan

    An important issue in designing a TCP congestion control algorithm is that it should allow the protocol to quickly adjust the end-to-end communication rate to the bandwidth on the bottleneck link. However, the TCP congestion control may function poorly in high bandwidth-delay product networks because of its slow response with large congestion windows. In this paper, we propose an enhanced version of TCP Vegas called Quick Vegas, in which we present an efficient congestion window control algorithm for a TCP source. Our algorithm improves the slow-start and congestion avoidance techniques of original Vegas. Simulation results show that Quick Vegas significantly improves the performance of connections as well as remaining fair when the bandwidth-delay product increases.

  7. Drive Control System for Pipeline Crawl Robot Based on CAN Bus

    NASA Astrophysics Data System (ADS)

    Chen, H. J.; Gao, B. T.; Zhang, X. H.; Deng2, Z. Q.

    2006-10-01

    Drive control system plays important roles in pipeline robot. In order to inspect the flaw and corrosion of seabed crude oil pipeline, an original mobile pipeline robot with crawler drive unit, power and monitor unit, central control unit, and ultrasonic wave inspection device is developed. The CAN bus connects these different function units and presents a reliable information channel. Considering the limited space, a compact hardware system is designed based on an ARM processor with two CAN controllers. With made-to-order CAN protocol for the crawl robot, an intelligent drive control system is developed. The implementation of the crawl robot demonstrates that the presented drive control scheme can meet the motion control requirements of the underwater pipeline crawl robot.

  8. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  9. Integration of Molecular Dynamics Based Predictions into the Optimization of De Novo Protein Designs: Limitations and Benefits.

    PubMed

    Carvalho, Henrique F; Barbosa, Arménio J M; Roque, Ana C A; Iranzo, Olga; Branco, Ricardo J F

    2017-01-01

    Recent advances in de novo protein design have gained considerable insight from the intrinsic dynamics of proteins, based on the integration of molecular dynamics simulations protocols on the state-of-the-art de novo protein design protocols used nowadays. With this protocol we illustrate how to set up and run a molecular dynamics simulation followed by a functional protein dynamics analysis. New users will be introduced to some useful open-source computational tools, including the GROMACS molecular dynamics simulation software package and ProDy for protein structural dynamics analysis.

  10. Automatic Determination of the Need for Intravenous Contrast in Musculoskeletal MRI Examinations Using IBM Watson's Natural Language Processing Algorithm.

    PubMed

    Trivedi, Hari; Mesterhazy, Joseph; Laguna, Benjamin; Vu, Thienkhai; Sohn, Jae Ho

    2018-04-01

    Magnetic resonance imaging (MRI) protocoling can be time- and resource-intensive, and protocols can often be suboptimal dependent upon the expertise or preferences of the protocoling radiologist. Providing a best-practice recommendation for an MRI protocol has the potential to improve efficiency and decrease the likelihood of a suboptimal or erroneous study. The goal of this study was to develop and validate a machine learning-based natural language classifier that can automatically assign the use of intravenous contrast for musculoskeletal MRI protocols based upon the free-text clinical indication of the study, thereby improving efficiency of the protocoling radiologist and potentially decreasing errors. We utilized a deep learning-based natural language classification system from IBM Watson, a question-answering supercomputer that gained fame after challenging the best human players on Jeopardy! in 2011. We compared this solution to a series of traditional machine learning-based natural language processing techniques that utilize a term-document frequency matrix. Each classifier was trained with 1240 MRI protocols plus their respective clinical indications and validated with a test set of 280. Ground truth of contrast assignment was obtained from the clinical record. For evaluation of inter-reader agreement, a blinded second reader radiologist analyzed all cases and determined contrast assignment based on only the free-text clinical indication. In the test set, Watson demonstrated overall accuracy of 83.2% when compared to the original protocol. This was similar to the overall accuracy of 80.2% achieved by an ensemble of eight traditional machine learning algorithms based on a term-document matrix. When compared to the second reader's contrast assignment, Watson achieved 88.6% agreement. When evaluating only the subset of cases where the original protocol and second reader were concordant (n = 251), agreement climbed further to 90.0%. The classifier was relatively robust to spelling and grammatical errors, which were frequent. Implementation of this automated MR contrast determination system as a clinical decision support tool may save considerable time and effort of the radiologist while potentially decreasing error rates, and require no change in order entry or workflow.

  11. Multiplex PCR for detection of plasmid-mediated colistin resistance determinants, mcr-1, mcr-2, mcr-3, mcr-4 and mcr-5 for surveillance purposes

    PubMed Central

    Rebelo, Ana Rita; Bortolaia, Valeria; Kjeldgaard, Jette S; Pedersen, Susanne K; Leekitcharoenphon, Pimlapas; Hansen, Inge M; Guerra, Beatriz; Malorny, Burkhard; Borowiak, Maria; Hammerl, Jens Andre; Battisti, Antonio; Franco, Alessia; Alba, Patricia; Perrin-Guyomard, Agnes; Granier, Sophie A; De Frutos Escobar, Cristina; Malhotra-Kumar, Surbhi; Villa, Laura; Carattoli, Alessandra; Hendriksen, Rene S

    2018-01-01

    Background and aim Plasmid-mediated colistin resistance mechanisms have been identified worldwide in the past years. A multiplex polymerase chain reaction (PCR) protocol for detection of all currently known transferable colistin resistance genes (mcr-1 to mcr-5, and variants) in Enterobacteriaceae was developed for surveillance or research purposes. Methods: We designed four new primer pairs to amplify mcr-1, mcr-2, mcr-3 and mcr-4 gene products and used the originally described primers for mcr-5 to obtain a stepwise separation of ca 200 bp between amplicons. The primer pairs and amplification conditions allow for single or multiple detection of all currently described mcr genes and their variants present in Enterobacteriaceae. The protocol was validated testing 49 European Escherichia coli and Salmonella isolates of animal origin. Results: Multiplex PCR results in bovine and porcine isolates from Spain, Germany, France and Italy showed full concordance with whole genome sequence data. The method was able to detect mcr-1, mcr-3 and mcr-4 as singletons or in different combinations as they were present in the test isolates. One new mcr-4 variant, mcr-4.3, was also identified. Conclusions: This method allows rapid identification of mcr-positive bacteria and overcomes the challenges of phenotypic detection of colistin resistance. The multiplex PCR should be particularly interesting in settings or laboratories with limited resources for performing genetic analysis as it provides information on the mechanism of colistin resistance without requiring genome sequencing. PMID:29439754

  12. Designing typefaces for maps. A protocol of tests.

    NASA Astrophysics Data System (ADS)

    Biniek, Sébastien; Touya, Guillaume; Rouffineau, Gilles; Huot-Marchand, Thomas

    2018-05-01

    The text management in map design is a topic generally linked to placement and composition issues. Whereas the type design issue is rarely addressed or at least only partially. Moreover the typefaces especially designed for maps are rare. This paper presents a protocol of tests to evaluate characters for digital topographic maps and fonts that were designed for the screen through the use of geographical information systems using this protocol. It was launched by the Atelier National de Recherche Typographique Research (ANRT, located in Nancy, France) and took place over his `post-master' course in 2013. The purpose is to isolate different issues inherent to text in a topographic map: map background, nonlinear text placement and toponymic hierarchies. Further research is necessary to improve this kind of approach.

  13. Participatory design of a collaborative clinical trial protocol writing system.

    PubMed

    Weng, Chunhua; McDonald, David W; Sparks, Dana; McCoy, Jason; Gennari, John H

    2007-06-01

    To explore concrete approaches to socio-technical design of collaborative healthcare information systems and to design a groupware technology for collaborative clinical trial protocol writing. We conducted "quick and dirty ethnography" through semi-structured interviews, observational studies, and work artifacts analysis to understand the group work for protocol development. We used participatory design through evolutionary prototyping to explore the feature space of a collaborative writing system. Our design strategies include role-based user advocacy, formative evaluation, and change management. Quick and dirty ethnography helped us efficiently understand relevant work practice, and participatory design helped us engage users into design and bring out their tacit work knowledge. Our approach that intertwined both techniques helped achieve a "work-informed and user-oriented" design. This research leads to a collaborative writing system that supports in situ communication, group awareness, and effective work progress tracking. The usability evaluation results have been satisfactory. The system design is being transferred to an organizational tool for daily use.

  14. Adjuvant Docetaxel and Cyclophosphamide (DC) with Prophylactic Granulocyte Colony-Stimulating Factor (G-CSF) on Days 8 &12 in Breast Cancer Patients: A Retrospective Analysis

    PubMed Central

    Yerushalmi, Rinat; Goldvaser, Hadar; Sulkes, Aaron; Ben-Aharon, Irit; Hendler, Daniel; Neiman, Victoria; Ciuraru, Noa Beatrice; Bonilla, Luisa; Amit, Limor; Zer, Alona; Granot, Tal; Rizel, Shulamith; Stemmer, Salomon M.

    2014-01-01

    Purpose Four cycles of docetaxel/cyclophosphamide (DC) resulted in superior survival than doxorubicin/cyclophosphamide in the treatment of early breast cancer. The original study reported a 5% incidence of febrile neutropenia (FN) recommending prophylactic antibiotics with no granulocyte colony-stimulating factor (G-CSF) support. The worldwide adoption of this protocol yielded several reports on substantially higher rates of FN events. We explored the use of growth factor (GF) support on days 8 and 12 of the cycle with the original DC protocol. Methods Our study included all consecutive patients with stages I–II breast cancer who were treated with the DC protocol at the Institute of Oncology, Davidoff Center (Rabin Medical Center, Petah Tikva, Israel) from April, 2007 to March, 2012. Patient, tumor characteristics, and toxicity were reported. Results: In total, 123 patients received the DC regimen. Median age was 60 years, (range, 25–81 years). Thirty-three patients (26.8%) were aged 65 years and older. Most of the women (87%) adhered to the planned G-CSF protocol (days 8 &12). 96% of the patients completed the 4 planned cycles of chemotherapy. Six patients (5%) had dose reductions, 6 (5%) had treatment delays due to non-medical reasons. Thirteen patients (10.6%) experienced at least one event of FN (3 patients had 2 events), all requiring hospitalization. Eight patients (6.5%) required additional support with G-CSF after the first chemotherapy cycle, 7 because of FN and one due to neutropenia and diarrhea. In Conclusion Primary prophylactic G-CSF support on days 8 and 12 of the cycle provides a tolerable option to deliver the DC protocol. Our results are in line with other retrospective protocols using longer schedules of GF support. PMID:25330205

  15. Adjuvant Docetaxel and Cyclophosphamide (DC) with prophylactic granulocyte colony-stimulating factor (G-CSF) on days 8 &12 in breast cancer patients: a retrospective analysis.

    PubMed

    Yerushalmi, Rinat; Goldvaser, Hadar; Sulkes, Aaron; Ben-Aharon, Irit; Hendler, Daniel; Neiman, Victoria; Ciuraru, Noa Beatrice; Bonilla, Luisa; Amit, Limor; Zer, Alona; Granot, Tal; Rizel, Shulamith; Stemmer, Salomon M

    2014-01-01

    Four cycles of docetaxel/cyclophosphamide (DC) resulted in superior survival than doxorubicin/cyclophosphamide in the treatment of early breast cancer. The original study reported a 5% incidence of febrile neutropenia (FN) recommending prophylactic antibiotics with no granulocyte colony-stimulating factor (G-CSF) support. The worldwide adoption of this protocol yielded several reports on substantially higher rates of FN events. We explored the use of growth factor (GF) support on days 8 and 12 of the cycle with the original DC protocol. Our study included all consecutive patients with stages I-II breast cancer who were treated with the DC protocol at the Institute of Oncology, Davidoff Center (Rabin Medical Center, Petah Tikva, Israel) from April, 2007 to March, 2012. Patient, tumor characteristics, and toxicity were reported. In total, 123 patients received the DC regimen. Median age was 60 years, (range, 25-81 years). Thirty-three patients (26.8%) were aged 65 years and older. Most of the women (87%) adhered to the planned G-CSF protocol (days 8 &12). 96% of the patients completed the 4 planned cycles of chemotherapy. Six patients (5%) had dose reductions, 6 (5%) had treatment delays due to non-medical reasons. Thirteen patients (10.6%) experienced at least one event of FN (3 patients had 2 events), all requiring hospitalization. Eight patients (6.5%) required additional support with G-CSF after the first chemotherapy cycle, 7 because of FN and one due to neutropenia and diarrhea. Primary prophylactic G-CSF support on days 8 and 12 of the cycle provides a tolerable option to deliver the DC protocol. Our results are in line with other retrospective protocols using longer schedules of GF support.

  16. Lighting Automation Flying an Earthlike Habitat

    NASA Technical Reports Server (NTRS)

    Clark, Toni A.; Kolomenski, Andrei

    2017-01-01

    Currently, spacecraft lighting systems are not demonstrating innovations in automation due to perceived costs in designing circuitry for the communication and automation of lights. The majority of spacecraft lighting systems employ lamps or zone specific manual switches and dimmers. This type of 'hardwired' solution does not easily convert to automation. With advances in solid state lighting, the potential to enhance a spacecraft habitat is lost if the communication and automation problem is not tackled. If we are to build long duration environments, which provide earth-like habitats, minimize crew time, and optimize spacecraft power reserves, innovation in lighting automation is a must. This project researched the use of the DMX512 communication protocol originally developed for high channel count lighting systems. DMX512 is an internationally governed, industry-accepted, lighting communication protocol with wide industry support. The lighting industry markets a wealth of hardware and software that utilizes DMX512, and there may be incentive to space certify the system. Our goal in this research is to enable the development of automated spacecraft habitats for long duration missions. To transform how spacecraft lighting environments are automated, our project conducted a variety of tests to determine a potential scope of capability. We investigated utilization and application of an industry accepted lighting control protocol, DMX512 by showcasing how the lighting system could help conserve power, assist with lighting countermeasures, and utilize spatial body tracking. We hope evaluation and the demonstrations we built will inspire other NASA engineers, architects and researchers to consider employing DMX512 "smart lighting" capabilities into their system architecture. By using DMX512 we will prove the 'wheel' does not need to be reinvented in terms of smart lighting and future spacecraft can use a standard lighting protocol to produce an effective, optimized and potentially earthlike habitat.

  17. Quality of Mobile Phone and Tablet Mobile Apps for Speech Sound Disorders: Protocol for an Evidence-Based Appraisal.

    PubMed

    Furlong, Lisa M; Morris, Meg E; Erickson, Shane; Serry, Tanya A

    2016-11-29

    Although mobile apps are readily available for speech sound disorders (SSD), their validity has not been systematically evaluated. This evidence-based appraisal will critically review and synthesize current evidence on available therapy apps for use by children with SSD. The main aims are to (1) identify the types of apps currently available for Android and iOS mobile phones and tablets, and (2) to critique their design features and content using a structured quality appraisal tool. This protocol paper presents and justifies the methods used for a systematic review of mobile apps that provide intervention for use by children with SSD. The primary outcomes of interest are (1) engagement, (2) functionality, (3) aesthetics, (4) information quality, (5) subjective quality, and (6) perceived impact. Quality will be assessed by 2 certified practicing speech-language pathologists using a structured quality appraisal tool. Two app stores will be searched from the 2 largest operating platforms, Android and iOS. Systematic methods of knowledge synthesis shall include searching the app stores using a defined procedure, data extraction, and quality analysis. This search strategy shall enable us to determine how many SSD apps are available for Android and for iOS compatible mobile phones and tablets. It shall also identify the regions of the world responsible for the apps' development, the content and the quality of offerings. Recommendations will be made for speech-language pathologists seeking to use mobile apps in their clinical practice. This protocol provides a structured process for locating apps and appraising the quality, as the basis for evaluating their use in speech pathology for children in English-speaking nations. ©Lisa M Furlong, Meg E Morris, Shane Erickson, Tanya A Serry. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.11.2016.

  18. Lighting Automation - Flying an Earthlike Habitat

    NASA Technical Reports Server (NTRS)

    Clark, Tori A. (Principal Investigator); Kolomenski, Andrei

    2017-01-01

    Currently, spacecraft lighting systems are not demonstrating innovations in automation due to perceived costs in designing circuitry for the communication and automation of lights. The majority of spacecraft lighting systems employ lamps or zone specific manual switches and dimmers. This type of 'hardwired' solution does not easily convert to automation. With advances in solid state lighting, the potential to enhance a spacecraft habitat is lost if the communication and automation problem is not tackled. If we are to build long duration environments, which provide earth-like habitats, minimize crew time, and optimize spacecraft power reserves, innovation in lighting automation is a must. This project researched the use of the DMX512 communication protocol originally developed for high channel count lighting systems. DMX512 is an internationally governed, industry-accepted, lighting communication protocol with wide industry support. The lighting industry markets a wealth of hardware and software that utilizes DMX512, and there may be incentive to space certify the system. Our goal in this research is to enable the development of automated spacecraft habitats for long duration missions. To transform how spacecraft lighting environments are automated, our project conducted a variety of tests to determine a potential scope of capability. We investigated utilization and application of an industry accepted lighting control protocol, DMX512 by showcasing how the lighting system could help conserve power, assist with lighting countermeasures, and utilize spatial body tracking. We hope evaluation and the demonstrations we built will inspire other NASA engineers, architects and researchers to consider employing DMX512 "smart lighting" capabilities into their system architecture. By using DMX512 we will prove the 'wheel' does not need to be reinvented in terms of smart lighting and future spacecraft can use a standard lighting protocol to produce an effective, optimized and potentially earthlike habitat.

  19. DEVELOPMENT OF A RATIONALLY BASED DESIGN PROTOCOL FOR THE ULTRAVIOLET LIGHT DISINFECTION PROCESS

    EPA Science Inventory

    A protocol is demonstrated for the design and evaluation of ultraviolet (UV) disinfection systems based on a mathematical model. The disinfection model incorporates the system's physical dimensions, the residence time distribution of the reactor and dispersion characteristics, th...

  20. Instructor Handbook for the Protocol Modules on Classroom Management. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Langer, Philip; Borg, Walter R.

    This handbook is designed to acquaint the teacher educator with the training materials in classroom management prepared by the Utah State University Protocol Training Project. It deals with the protocol materials generally and with each module specifically, and includes the following sections: (a) an introduction to and rationale for protocol…

  1. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks

    PubMed Central

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-01-01

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs. PMID:28786915

  2. Running key mapping in a quantum stream cipher by the Yuen 2000 protocol

    NASA Astrophysics Data System (ADS)

    Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki

    2008-03-01

    A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

  3. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  4. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  5. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  6. Data quality and feasibility of the Experience Sampling Method across the spectrum of severe psychiatric disorders: a protocol for a systematic review and meta-analysis.

    PubMed

    Vachon, Hugo; Rintala, Aki; Viechtbauer, Wolfgang; Myin-Germeys, Inez

    2018-01-18

    Due to a number of methodological advantages and theoretical considerations, more and more studies in clinical psychology research employ the Experience Sampling Method (ESM) as a data collection technique. Despite this growing interest, the absence of methodological guidelines related to the use of ESM has resulted in a large heterogeneity of designs while the potential effects of the design itself on the response behavior of the participants remain unknown. The objectives of this systematic review are to investigate the associations between the design characteristics and the data quality and feasibility of studies relying on ESM in severe psychiatric disorders. We will search for all published studies using ambulatory assessment with patients suffering from major depressive disorder, bipolar disorder, and psychotic disorder or individuals at high risk for these disorders. Electronic database searches will be performed in PubMed and Web of Science with no restriction on the publication date. Two reviewers will independently screen original studies in a title/abstract phase and a full-text phase based on the inclusion criteria. The information related to the design and sample characteristics, data quality, and feasibility will be extracted. We will provide results in terms of a descriptive synthesis, and when applicable, a meta-analysis of the findings will be conducted. Our results will attempt to highlight how the feasibility and data quality of ambulatory assessment might be related to the methodological characteristics of the study designs in severe psychiatric disorders. We will discuss these associations in different subsamples if sufficient data are available and will examine limitations in the reporting of the methods of ambulatory studies in the current literature. The protocol for this systematic review was registered on PROSPERO (PROSPERO 2017: CRD42017060322 ) and is available in full on the University of York website ( http://www.crd.york.ac.uk/PROSPERO/display_record.asp?ID=CRD42017060322 ).

  7. Design Science Research toward Designing/Prototyping a Repeatable Model for Testing Location Management (LM) Algorithms for Wireless Networking

    ERIC Educational Resources Information Center

    Peacock, Christopher

    2012-01-01

    The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…

  8. 22 CFR 2.4 - Designation of official guests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Designation of official guests. 2.4 Section 2.4... Protocol. The designation of a person as an official guest is final. Pursuant to section 2658 of title 22... official guests is hereby delegated to the Chief of Protocol. (22 U.S.C. 2658) [45 FR 55716, Aug. 21, 1980] ...

  9. 34 CFR Appendix to Part 5 - Unknown Title

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the Department. Research protocol, design, processing, and other technical information to the extent... report submitted for comment prior to acceptance. Research protocol, design, processing, and other...-10) Pt. 5, App. Appendix to Part 5 [The following are some examples of specific records (or specific...

  10. The use of participant-observation protocol in an industrial engineering research.

    PubMed

    Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor

    2012-01-01

    Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.

  11. An improved protocol for the preparation of total genomic DNA from isolates of yeast and mould using Whatman FTA filter papers.

    PubMed

    Borman, Andrew M; Fraser, Mark; Linton, Christopher J; Palmer, Michael D; Johnson, Elizabeth M

    2010-06-01

    Here, we present a significantly improved version of our previously published method for the extraction of fungal genomic DNA from pure cultures using Whatman FTA filter paper matrix technology. This modified protocol is extremely rapid, significantly more cost effective than our original method, and importantly, substantially reduces the problem of potential cross-contamination between sequential filters when employing FTA technology.

  12. Development of a second generation palladium-catalyzed cycloalkenylation and its application to bioactive natural product synthesis.

    PubMed

    Toyota, Masahiro

    2013-07-01

    A novel palladium-catalyzed intramolecular oxidative alkylation of unactivated olefins is described. This protocol was devised to solve one of the drawbacks of the original palladium-catalyzed cycloalkenylation that we developed. We call this new procedure the 'second generation palladium-catalyzed cycloalkenylation'. This protocol has been applied to the total syntheses of cis-195A, trans-195A, boonein, scholareins A, C, D, and alpha-skytanthine.

  13. Enhancing QKD security with weak measurements

    NASA Astrophysics Data System (ADS)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  14. The MEDIGATE graphical user interface for entry of physical findings: design principles and implementation. Medical Examination Direct Iconic and Graphic Augmented Text Entry System.

    PubMed

    Yoder, J W; Schultz, D F; Williams, B T

    1998-10-01

    The solution to many of the problems of the computer-based recording of the medical record has been elusive, largely due to difficulties in the capture of those data elements that comprise the records of the Present Illness and of the Physical Findings. Reliable input of data has proven to be more complex than originally envisioned by early work in the field. This has led to more research and development into better data collection protocols and easy to use human-computer interfaces as support tools. The Medical Examination Direct Iconic and Graphic Augmented Text Entry System (MEDIGATE System) is a computer enhanced interactive graphic and textual record of the findings from physical examinations designed to provide ease of user input and to support organization and processing of the data characterizing these findings. The primary design objective of the MEDIGATE System is to develop and evaluate different interface designs for recording observations from the physical examination in an attempt to overcome some of the deficiencies in this major component of the individual record of health and illness.

  15. PCA-based polling strategy in machine learning framework for coronary artery disease risk assessment in intravascular ultrasound: A link between carotid and coronary grayscale plaque morphology.

    PubMed

    Araki, Tadashi; Ikeda, Nobutaka; Shukla, Devarshi; Jain, Pankaj K; Londhe, Narendra D; Shrivastava, Vimal K; Banchhor, Sumit K; Saba, Luca; Nicolaides, Andrew; Shafique, Shoaib; Laird, John R; Suri, Jasjit S

    2016-05-01

    Percutaneous coronary interventional procedures need advance planning prior to stenting or an endarterectomy. Cardiologists use intravascular ultrasound (IVUS) for screening, risk assessment and stratification of coronary artery disease (CAD). We hypothesize that plaque components are vulnerable to rupture due to plaque progression. Currently, there are no standard grayscale IVUS tools for risk assessment of plaque rupture. This paper presents a novel strategy for risk stratification based on plaque morphology embedded with principal component analysis (PCA) for plaque feature dimensionality reduction and dominant feature selection technique. The risk assessment utilizes 56 grayscale coronary features in a machine learning framework while linking information from carotid and coronary plaque burdens due to their common genetic makeup. This system consists of a machine learning paradigm which uses a support vector machine (SVM) combined with PCA for optimal and dominant coronary artery morphological feature extraction. Carotid artery proven intima-media thickness (cIMT) biomarker is adapted as a gold standard during the training phase of the machine learning system. For the performance evaluation, K-fold cross validation protocol is adapted with 20 trials per fold. For choosing the dominant features out of the 56 grayscale features, a polling strategy of PCA is adapted where the original value of the features is unaltered. Different protocols are designed for establishing the stability and reliability criteria of the coronary risk assessment system (cRAS). Using the PCA-based machine learning paradigm and cross-validation protocol, a classification accuracy of 98.43% (AUC 0.98) with K=10 folds using an SVM radial basis function (RBF) kernel was achieved. A reliability index of 97.32% and machine learning stability criteria of 5% were met for the cRAS. This is the first Computer aided design (CADx) system of its kind that is able to demonstrate the ability of coronary risk assessment and stratification while demonstrating a successful design of the machine learning system based on our assumptions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. A new method to assess Pavlovian conditioning of psychostimulant drug effects.

    PubMed

    Damianopoulos, E N; Carey, R J

    1994-07-01

    Experimental studies of psychoactive drugs by pavlovian drug-conditioning methods, which originally began with investigations of drug-induced responses mediated by the autonomic nervous system, have now been expanded to include drug-induced response effects expressed as modulations of spontaneous motoric behaviors. In the latter application, however, equivalent behavioral response outcomes in post-treatment tests for conditioning can occur following a psychostimulant drug treatment either through drug interference effects on habituation processes, drug-induced stress effects and/or by pavlovian conditioning of the drug-induced motoric activation effect. Current methodologies for the study of pavlovian conditioned drug effects and/or drug sensitization cannot distinguish among these possibilities. This methodological inadequacy was addressed by a modification of the conventional paired-unpaired treatment protocol. In the new protocol, the animal is sequentially placed into two test compartments with the drug treatment administered in conjunction with placement into the second test compartment. This design permits a differentiation of a pavlovian conditioned drug responses from non-conditioned drug effects through continuous measurement of the non-drug behavioral baseline in both the drug and non-drug control treatment groups combined with multiple response measurements and post-treatment tests for conditioning at variable post-conditioning intervals. The present study details the use of the new modified pavlovian protocol with repeated cocaine (10 mg/kg) treatment. A cocaine conditioned response at 1, 7, and 21 days post-conditioning was identified and distinguished from habituation and stress effects.

  17. Combined use of a new SNP-based assay and multilocus SSR markers to assess genetic diversity of Xylella fastidiosa subsp. pauca infecting citrus and coffee plants.

    PubMed

    Montes-Borrego, Miguel; Lopes, Joao R S; Jiménez-Díaz, Rafael M; Landa, Blanca B

    2015-03-01

    Two haplotypes of Xylella fastidiosa subsp. pauca (Xfp) that correlated with their host of origin were identified in a collection of 90 isolates infecting citrus and coffee plants in Brazil, based on a single-nucleotide polymorphism in the gyrB sequence. A new single-nucleotide primer extension (SNuPE) protocol was designed for rapid identification of Xfp according to the host source. The protocol proved to be robust for the prediction of the Xfp host source in blind tests using DNA from cultures of the bacterium, infected plants, and insect vectors allowed to feed on Xfp-infected citrus plants. AMOVA and STRUCTURE analyses of microsatellite data separated most Xfp populations on the basis of their host source, indicating that they were genetically distinct. The combined use of the SNaPshot protocol and three previously developed multilocus SSR markers showed that two haplotypes and distinct isolates of Xfp infect citrus and coffee in Brazil and that multiple, genetically different isolates can be present in a single orchard or infect a single tree. This combined approach will be very useful in studies of the epidemiology of Xfp-induced diseases, host specificity of bacterial genotypes, the occurrence of Xfp host jumping, vector feeding habits, etc., in economically important cultivated plants or weed host reservoirs of Xfp in Brazil and elsewhere. Copyright© by the Spanish Society for Microbiology and Institute for Catalan Studies.

  18. Comparison of seven protocols to identify fecal contamination sources using Escherichia coli

    USGS Publications Warehouse

    Stoeckel, D.M.; Mathes, M.V.; Hyer, K.E.; Hagedorn, C.; Kator, H.; Lukasik, J.; O'Brien, T. L.; Fenger, T.W.; Samadpour, M.; Strickler, K.M.; Wiggins, B.A.

    2004-01-01

    Microbial source tracking (MST) uses various approaches to classify fecal-indicator microorganisms to source hosts. Reproducibility, accuracy, and robustness of seven phenotypic and genotypic MST protocols were evaluated by use of Escherichia coli from an eight-host library of known-source isolates and a separate, blinded challenge library. In reproducibility tests, measuring each protocol's ability to reclassify blinded replicates, only one (pulsed-field gel electrophoresis; PFGE) correctly classified all test replicates to host species; three protocols classified 48-62% correctly, and the remaining three classified fewer than 25% correctly. In accuracy tests, measuring each protocol's ability to correctly classify new isolates, ribotyping with EcoRI and PvuII approached 100% correct classification but only 6% of isolates were classified; four of the other six protocols (antibiotic resistance analysis, PFGE, and two repetitive-element PCR protocols) achieved better than random accuracy rates when 30-100% of challenge isolates were classified. In robustness tests, measuring each protocol's ability to recognize isolates from nonlibrary hosts, three protocols correctly classified 33-100% of isolates as "unknown origin," whereas four protocols classified all isolates to a source category. A relevance test, summarizing interpretations for a hypothetical water sample containing 30 challenge isolates, indicated that false-positive classifications would hinder interpretations for most protocols. Study results indicate that more representation in known-source libraries and better classification accuracy would be needed before field application. Thorough reliability assessment of classification results is crucial before and during application of MST protocols.

  19. Dual sensory loss: development of a dual sensory loss protocol and design of a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Dual sensory loss (DSL) has a negative impact on health and wellbeing and its prevalence is expected to increase due to demographic aging. However, specialized care or rehabilitation programs for DSL are scarce. Until now, low vision rehabilitation does not sufficiently target concurrent impairments in vision and hearing. This study aims to 1) develop a DSL protocol (for occupational therapists working in low vision rehabilitation) which focuses on optimal use of the senses and teaches DSL patients and their communication partners to use effective communication strategies, and 2) describe the multicenter parallel randomized controlled trial (RCT) designed to test the effectiveness and cost-effectiveness of the DSL protocol. Methods/design To develop a DSL protocol, literature was reviewed and content was discussed with professionals in eye/ear care (interviews/focus groups) and DSL patients (interviews). A pilot study was conducted to test and confirm the DSL protocol. In addition, a two-armed international multi-center RCT will evaluate the effectiveness and cost-effectiveness of the DSL protocol compared to waiting list controls, in 124 patients in low vision rehabilitation centers in the Netherlands and Belgium. Discussion This study provides a treatment protocol for rehabilitation of DSL within low vision rehabilitation, which aims to be a valuable addition to the general low vision rehabilitation care. Trial registration Netherlands Trial Register (NTR) identifier: NTR2843 PMID:23941667

  20. Environmental Compliance Assessment Protocol-Centers for Disease Control and Prevention (ECAP-CDC)

    DTIC Science & Technology

    1993-10-01

    propellers, or appliances. 2. Military weapons or equipment designed for combat use. 3. Rockets or equipment designed for research, or experimental or...should be reproduced and used during the assessment to take notes. It is designed to be inserted between each page of the protocols, allowing the...procedures are designed as an aid and should not be considered exhaus- tive. Use of the guide requires the evaluator’s judgement to play a role in

  1. Preliminary validation of a new methodology for estimating dose reduction protocols in neonatal chest computed radiographs

    NASA Astrophysics Data System (ADS)

    Don, Steven; Whiting, Bruce R.; Hildebolt, Charles F.; Sehnert, W. James; Ellinwood, Jacquelyn S.; Töpfer, Karin; Masoumzadeh, Parinaz; Kraus, Richard A.; Kronemer, Keith A.; Herman, Thomas; McAlister, William H.

    2006-03-01

    The risk of radiation exposure is greatest for pediatric patients and, thus, there is a great incentive to reduce the radiation dose used in diagnostic procedures for children to "as low as reasonably achievable" (ALARA). Testing of low-dose protocols presents a dilemma, as it is unethical to repeatedly expose patients to ionizing radiation in order to determine optimum protocols. To overcome this problem, we have developed a computed-radiography (CR) dose-reduction simulation tool that takes existing images and adds synthetic noise to create realistic images that correspond to images generated with lower doses. The objective of our study was to determine the extent to which simulated, low-dose images corresponded with original (non-simulated) low-dose images. To make this determination, we created pneumothoraces of known volumes in five neonate cadavers and obtained images of the neonates at 10 mR, 1 mR and 0.1 mR (as measured at the cassette plate). The 10-mR exposures were considered "relatively-noise-free" images. We used these 10 mR-images and our simulation tool to create simulated 0.1- and 1-mR images. For the simulated and original images, we identified regions of interest (ROI) of the entire chest, free-in-air region, and liver. We compared the means and standard deviations of the ROI grey-scale values of the simulated and original images with paired t tests. We also had observers rate simulated and original images for image quality and for the presence or absence of pneumothoraces. There was no statistically significant difference in grey-scale-value means nor standard deviations between simulated and original entire chest ROI regions. The observer performance suggests that an exposure >=0.2 mR is required to detect the presence or absence of pneumothoraces. These preliminary results indicate that the use of the simulation tool is promising for achieving ALARA exposures in children.

  2. Design and challenges of a randomized controlled trial for reducing risk factors of metabolic syndrome in Mexican women through water intake

    PubMed Central

    Hernández-Cordero, Sonia; González-Castell, Dinorah; Rodríguez-Ramírez, Sonia; Villanueva-Borbolla, María Ángeles; Unar, Mishel; Barquera, Simón; de Cossío, Teresita González; Rivera-Dommarco, Juan; Popkin, Barry M

    2014-01-01

    Objective To describe the design, methods, and challenges encountered during a randomized clinical trial aimed to promote water intake for reducing risks of metabolic syndrome in Mexican women. Materials and methods In a randomized clinical trial in Cuernavaca, Mexico, overweight and obese (body mass index [BMI] ≥ 25 < 39) women, 18 – < 45 years old with an intake of sugar-sweetened beverages ≥ 250 kilocalories per day (kcal/day) were randomly allocated to the water and education provision group (n = 120) or the education provision only group (n = 120). Results We screened 1 756 women. The main difficulties encountered were identifying participants with the recruitment criteria, delivering water to participants, and the time demanded from the study participants. Conclusions The trial’s main challenges were difficulties surrounding recruitment, delivery of the intervention, and the time demanded from the study participants. Modifications were effectively implemented without jeopardizing the original protocol. PMID:24715012

  3. Operating a terrestrial Internet router onboard and alongside a small satellite

    NASA Astrophysics Data System (ADS)

    Wood, L.; da Silva Curiel, A.; Ivancic, W.; Hodgson, D.; Shell, D.; Jackson, C.; Stewart, D.

    2006-07-01

    After twenty months of flying, testing and demonstrating a Cisco mobile access router, originally designed for terrestrial use, onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we use our experience to examine the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use with a large set of latent capabilities to draw on when needed, as well as the familiarity that comes from reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies have been taken to small satellites—and also some significant differences between the two in operational models and assumptions that must be borne in mind.

  4. An intelligent case-adjustment algorithm for the automated design of population-based quality auditing protocols.

    PubMed

    Advani, Aneel; Jones, Neil; Shahar, Yuval; Goldstein, Mary K; Musen, Mark A

    2004-01-01

    We develop a method and algorithm for deciding the optimal approach to creating quality-auditing protocols for guideline-based clinical performance measures. An important element of the audit protocol design problem is deciding which guide-line elements to audit. Specifically, the problem is how and when to aggregate individual patient case-specific guideline elements into population-based quality measures. The key statistical issue involved is the trade-off between increased reliability with more general population-based quality measures versus increased validity from individually case-adjusted but more restricted measures done at a greater audit cost. Our intelligent algorithm for auditing protocol design is based on hierarchically modeling incrementally case-adjusted quality constraints. We select quality constraints to measure using an optimization criterion based on statistical generalizability coefficients. We present results of the approach from a deployed decision support system for a hypertension guideline.

  5. SpaceWire Protocol ID: What Does It Mean To You?

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parks, Steve

    2006-01-01

    Spacewire is becoming a popular solution for satellite high-speed data buses because it is a simple standard that provides great flexibility for a wide range of system requirements. It is simple in packet format and protocol, allowing users to easily tailor their implementation for their specific application. Some of the attractive aspects of Spacewire that make it easy to implement also make it hard for future reuse. Protocol reuse is difficult because Spacewire does not have a defined mechanism to communicate with the higher layers of the protocol stack. This has forced users of Spacewire to define unique packet formats and define how these packets are to be processed. Each mission writes their own Interface Control Document (ICD) and tailors Spacewire for their specific requirements making reuse difficult. Part of the reason for this habit may be because engineers typically optimize designs for their own requirements in the absence of a standard. This is an inefficient use of project resources and costs more to develop missions. A new packet format for Spacewire has been defined as a solution for this problem. This new packet format is a compliment to the Spacewire standard that will support protocol development upon Spacewire. The new packet definition does not replace the current packet structure, i.e., does not make the standard obsolete, but merely extends the standard for those who want to develop protocols over Spacewire. The Spacewire packet is defined with the first part being the Destination Address, which may be one or more bytes. This is followed by the packet cargo, which is user defined. The cargo is truncated with an End-Of-Packet (EOP) marker. This packet structure offers low packet overhead and allows the user to define how the contents are to be formatted. It also provides for many different addressing schemes, which provide flexibility in the system. This packet flexibility is typically an attractive part of the Spacewire. The new extended packet format adds one new field to the packet that greatly enhances the capability of Spacewire. This new field called the Protocol Identifier (ID) is used to identify the packet contents and the associated processing for the packet. This feature along with the restriction in the packet format that uses the Protocol ID, allows a deterministic method of decoding packets that was not before possible. The first part of the packet is still the Destination Address, which still conforms to the original standard but with one restriction. The restriction is that the first byte seen at the destination by the user needs to be a logical address, independent of the addressing scheme used. The second field is defined as the Protocol ID, which is usually one byte in length. The packet cargo (user defined) follows the Protocol ID. After the packet cargo is the EOP, which defines the end of packet. The value of the Protocol ID is assigned by the Spacewire working group and the protocol description published for others to use. The development of Protocols for Spacewire is currently the area of greatest activity by the Spacewire working group. The first protocol definition by the working group has been completed and is now in the process of formal standardization. There are many other protocols in development for missions that have not yet received formal Protocol ID assignment, but even if the protocols are not formally assigned a value, this effort will provide synergism for future developments.

  6. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  7. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  8. Ready-to-Use Tissue Construct for Military Bone and Cartilage Trauma

    DTIC Science & Technology

    2012-10-01

    times. We hypothesize that our Ready-to-Use constructs can successfully restore 3 cm critical size segmental defects in dog tibiae. We will examine the...defects) of the grant. The approved IACUC protocol permits 3 pilot dogs for Aim 1 and 3 pilot dogs for Aim 2. Several minor modifications to the...original IACUC protocol were required which are provided in the Appendix. All the pilot dogs were to receive scaffolds composed of 90% poly-caprolactone

  9. Unlinkable Serial Transactions: Protocols and Applications

    DTIC Science & Technology

    1999-11-01

    4) intends for the blind signature to be secure from “one-more” forgery attacks [Pointcheval and Stern 1996]. Such forgery enables the originator to...protocols we describe. The signature indicated by S in message 2 uses the vendor’s signature key for service S and is only used to sign blinded hashes. We...make use of blind signatures ; although, not surprisingly, their sys- tems are rather different from the ones given here [Fujioka et al. 1993; Cranor 1996

  10. Bringing memory fMRI to the clinic: comparison of seven memory fMRI protocols in temporal lobe epilepsy.

    PubMed

    Towgood, Karren; Barker, Gareth J; Caceres, Alejandro; Crum, William R; Elwes, Robert D C; Costafreda, Sergi G; Mehta, Mitul A; Morris, Robin G; von Oertzen, Tim J; Richardson, Mark P

    2015-04-01

    fMRI is increasingly implemented in the clinic to assess memory function. There are multiple approaches to memory fMRI, but limited data on advantages and reliability of different methods. Here, we compared effect size, activation lateralisation, and between-sessions reliability of seven memory fMRI protocols: Hometown Walking (block design), Scene encoding (block design and event-related design), Picture encoding (block and event-related), and Word encoding (block and event-related). All protocols were performed on three occasions in 16 patients with temporal lobe epilepsy (TLE). Group T-maps showed activity bilaterally in medial temporal lobe for all protocols. Using ANOVA, there was an interaction between hemisphere and seizure-onset lateralisation (P = 0.009) and between hemisphere, protocol and seizure-onset lateralisation (P = 0.002), showing that the distribution of memory-related activity between left and right temporal lobes differed between protocols and between patients with left-onset and right-onset seizures. Using voxelwise intraclass Correlation Coefficient, between-sessions reliability was best for Hometown and Scenes (block and event). The between-sessions spatial overlap of activated voxels was also greatest for Hometown and Scenes. Lateralisation of activity between hemispheres was most reliable for Scenes (block and event) and Words (event). Using receiver operating characteristic analysis to explore the ability of each fMRI protocol to classify patients as left-onset or right-onset TLE, only the Words (event) protocol achieved a significantly above-chance classification of patients at all three sessions. We conclude that Words (event) protocol shows the best combination of between-sessions reliability of the distribution of activity between hemispheres and reliable ability to distinguish between left-onset and right-onset patients. © 2015 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.

  11. Comparing Mobile Health Strategies to Improve Medication Adherence for Veterans With Coronary Heart Disease (Mobile4Meds): Protocol for a Mixed-Methods Study.

    PubMed

    Park, Linda G; Collins, Eileen G; Shim, Janet K; Whooley, Mary A

    2017-07-18

    Adherence to antiplatelet medications is critical to prevent life threatening complications (ie, stent thrombosis) after percutaneous coronary interventions (PCIs), yet rates of nonadherence range from 21-57% by 12 months. Mobile interventions delivered via text messaging or mobile apps represent a practical and inexpensive strategy to promote behavior change and enhance medication adherence. The Mobile4Meds study seeks to determine whether text messaging or a mobile app, compared with an educational website control provided to all Veterans, can improve adherence to antiplatelet therapy among patients following acute coronary syndrome (ACS) or PCI. The three aims of the study are to: (1) determine preferences for content and frequency of text messaging to promote medication adherence through focus groups; (2) identify the most patient-centered app that promotes adherence, through a content analysis of all commercially available apps for medication adherence and focus groups centered on usability; and (3) compare adherence to antiplatelet medications in Veterans after ACS/PCI via a randomized clinical trial (RCT). We will utilize a mixed-methods design that uses focus groups to achieve the first and second aims (N=32). Patients will be followed for 12 months after being randomly assigned to one of three arms: (1) customized text messaging, (2) mobile app, or (3) website-control groups (N=225). Medication adherence will be measured with electronic monitoring devices, pharmacy records, and self-reports. Enrollment for the focus groups is currently in progress. We expect to enroll patients for the RCT in the beginning of 2018. Determining the efficacy of mobile technology using a Veteran-designed protocol to promote medication adherence will have a significant impact on Veteran health and public health, particularly for individuals with chronic diseases that require strict medication adherence. ClinicalTrials.gov NCT03022669. ©Linda G Park, Eileen G Collins, Janet K Shim, Mary A Whooley. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.07.2017.

  12. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally tractable and lead to simplifications for any simulated or analytical performance evaluations of the cross-layer designs.

  13. A multicentre evaluation of two intensive care unit triage protocols for use in an influenza pandemic.

    PubMed

    Cheung, Winston K; Myburgh, John; Seppelt, Ian M; Parr, Michael J; Blackwell, Nikki; Demonte, Shannon; Gandhi, Kalpesh; Hoyling, Larissa; Nair, Priya; Passer, Melissa; Reynolds, Claire; Saunders, Nicholas M; Saxena, Manoj K; Thanakrishnan, Govindasamy

    2012-08-06

    To determine the increase in intensive care unit (ICU) bed availability that would result from the use of the New South Wales and Ontario Health Plan for an Influenza Pandemic (OHPIP) triage protocols. Prospective evaluation study conducted in eight Australian, adult, general ICUs, between September 2009 and May 2010. All patients who were admitted to the ICU, excluding those who had elective surgery, were prospectively evaluated using the two triage protocols, simulating a pandemic situation. Both protocols were originally developed to determine which patients should be excluded from accessing ICU resources during an influenza pandemic. Increase in ICU bed availability. At admission, the increases in ICU bed availability using Tiers 1, 2 and 3 of the NSW triage protocol were 3.5%, 14.7% and 22.7%, respectively, and 52.8% using the OHPIP triage protocol (P < 0.001). Re-evaluation of patients at 12 hours after admission using Tiers 1, 2 and 3 of the NSW triage protocol incrementally increased ICU bed availability by 19.2%, 16.1% and 14.1%, respectively (P < 0.001). The maximal cumulative increases in ICU bed availability using Tiers 1, 2 and 3 of the NSW triage protocol were 23.7%, 31.6% and 37.5%, respectively, at 72 hours (P < 0.001), and 65.0% using the OHPIP triage protocol, at 120 hours (P < 0.001). Both triage protocols resulted in increases in ICU bed availability, but the OHPIP protocol provided the greatest increase overall. With the NSW triage protocol, ICU bed availability increased as the protocol was escalated.

  14. Superimpose methods for uncooled infrared camera applied to the micro-scale thermal characterization of composite materials

    NASA Astrophysics Data System (ADS)

    Morikawa, Junko

    2015-05-01

    The mobile type apparatus for a quantitative micro-scale thermography using a micro-bolometer was developed based on our original techniques such as an achromatic lens design to capture a micro-scale image in long-wave infrared, a video signal superimposing for the real time emissivity correction, and a pseudo acceleration of a timeframe. The total size of the instrument was designed as it was put in the 17 cm x 28 cm x 26 cm size carrying box. The video signal synthesizer enabled to record a direct digital signal of monitoring temperature or positioning data. The encoded digital signal data embedded in each image was decoded to read out. The protocol to encode/decode the measured data was originally defined. The mixed signals of IR camera and the imposed data were applied to the pixel by pixel emissivity corrections and the pseudo-acceleration of the periodical thermal phenomena. Because the emissivity of industrial materials and biological tissues were usually inhomogeneous, it has the different temperature dependence on each pixel. The time-scale resolution for the periodic thermal event was improved with the algorithm for "pseudoacceleration". It contributes to reduce the noise by integrating the multiple image data, keeping a time resolution. The anisotropic thermal properties of some composite materials such as thermal insulating materials of cellular plastics and the biometric composite materials were analyzed using these techniques.

  15. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey

    PubMed Central

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.

    2016-01-01

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN. PMID:27916822

  16. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.

    PubMed

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M

    2016-11-29

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN.

  17. Design and Development of a Portable WiFi enabled BIA device

    NASA Astrophysics Data System (ADS)

    Križaj, D.; Baloh, M.; Brajkovič, R.; Žagar, T.

    2013-04-01

    A bioimpedance device (BIA) for evaluation of sarcopenia - age related muscle mass loss - is designed, developed and evaluated. The requirements were based on lightweight design, flexible and user enabled incorporation of measurement protocols and WiFi protocol for remote device control, full internet integration and fast development and usage of measurement protocols. The current design is based on usage of a microcontroller with integrated AD/DA converters. The prototype system was assembled and the operation and connectivity to different handheld devices and laptop computers was successfully tested. The designed BIA device can be accessed using TCP sockets and once the connection is established the data transfer runs successfully at the specified speed. The accuracy of currently developed prototype is about 5% for the impedance modulus and 5 deg. for the phase for the frequencies below 20 kHz with an unfiltered excitation signal and no additional amplifiers employed.

  18. Effects of space environment on structural materials - A preliminary study and development of materials characterization protocols

    NASA Technical Reports Server (NTRS)

    Miglionico, C.; Stein, C.; Murr, L. E.

    1991-01-01

    A preliminary study of materials exposed in space in LEO for nearly six years in the NASA Long-Duration Exposure Facility is presented. It is demonstrated that it will be necessary to isolate surface debris and reaction products from materials exposed in space. Replication techniques originally designed for electron microscopy examination of surfaces can be applied to lift off and isolate such surface features. Debris and reaction products were examined through a variety of analytical techniques, including the surface morphology by SEM, and internal microstructures by STEM and TEM, EDS, and SAD. The results illustrate the role that atomic oxygen and micrometeorites play in surface alteration and reaction in LEO space environments, as well as the role of debris created from other proximate materials.

  19. Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.

    PubMed

    Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y

    2017-08-14

    Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.

  20. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.

    2009-03-27

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated manymore » questions on the performance and operational cost of these buildings.« less

  1. A protocol of rope skipping exercise for primary school children: A pilot test

    NASA Astrophysics Data System (ADS)

    Radzi, A. N. M.; Rambely, A. S.; Chellapan, K.

    2014-06-01

    This paper aims to investigate the methods and sample used in rope skipping as an exercise approach. A systematic literature review was approached in identifying skipping performance in the related researches. The methods were compared to determine the best methodological approach for the targeted skipping based research measure. A pilot test was performed among seven students below 12 years old. As the outcome of the review, a skipping protocol design has been proposed for 10 years old primary school students. The proposed protocol design is to be submitted to PPUKM Ethical Committee for approval prior to its implementation in investigation memory enhancement in relation to designed skipping activities.

  2. Zebrafish embryology and cartilage staining protocols for high school students.

    PubMed

    Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A

    2009-06-01

    The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.

  3. Development and clinical evaluation of a new sensor design for buccal pulse oximetry in horses.

    PubMed

    Reiners, J K; Rossdeutscher, W; Hopster, K; Kästner, S B R

    2018-03-01

    The use of pulse oximetry in horses is limited due to inadequate readings with conventional transmission sensor probes. The objectives of this study were to 1) develop an improved sensor design for horses to be used at an appropriate anatomical site, and 2) evaluate this design in an experimental study. In vivo experiment. A new sensor design for reflectance pulse oximetry at the buccal mucosa was developed. A conventional Nonin 2000SL sensor for transmission pulse oximetry was included into this design. Three different prototypes (N1, N2a, N2b) were constructed and used with the Nonin 2500A Vet pulse oximetry monitor. Thirteen anaesthetised warmblood horses were included into a desaturation protocol (100-70% SaO 2 ). SpO 2 and pulse frequency values were recorded, using SaO 2 calculated from blood gas analysis and invasive pulse frequency measurements as reference methods. Bias and precision were evaluated by calculations of the root mean square deviation (A rms ). The agreement of the methods was tested with Bland-Altman analysis. The quality of the pulse frequency readings determined the quality of the SpO 2 -readings. Good pulse signal strength resulted in a SpO 2 -accuracy comparable to that of the original sensor (Nonin 2000SL: A rms = 3%; N1: A rms = 3.60%; N2b: A rms = 3.46%). Especially at heart rates ≤30 bpm, pulse rate readings that were about twice as high as the reference value occurred. Their exclusion from the dataset resulted in a pulse rate accuracy similar to that of the original sensor. Bland-Altman plots showed limits of agreement typical of pulse oximeters. The pulse frequency accuracy requires further improvement. The usability in clinical cases needs to be tested. The new sensor design has been shown to be suitable for buccal pulse oximetry in horses. © 2017 EVJ Ltd.

  4. NeuroMorpho.Org implementation of digital neuroscience: dense coverage and integration with the NIF

    PubMed Central

    Halavi, Maryam; Polavaram, Sridevi; Donohue, Duncan E.; Hamilton, Gail; Hoyt, Jeffrey; Smith, Kenneth P.; Ascoli, Giorgio A.

    2009-01-01

    Neuronal morphology affects network connectivity, plasticity, and information processing. Uncovering the design principles and functional consequences of dendritic and axonal shape necessitates quantitative analysis and computational modeling of detailed experimental data. Digital reconstructions provide the required neuromorphological descriptions in a parsimonious, comprehensive, and reliable numerical format. NeuroMorpho.Org is the largest web-accessible repository service for digitally reconstructed neurons and one of the integrated resources in the Neuroscience Information Framework (NIF). Here we describe the NeuroMorpho.Org approach as an exemplary experience in designing, creating, populating, and curating a neuroscience digital resource. The simple three-tier architecture of NeuroMorpho.Org (web client, web server, and relational database) encompasses all necessary elements to support a large-scale, integrate-able repository. The data content, while heterogeneous in scientific scope and experimental origin, is unified in format and presentation by an in house standardization protocol. The server application (MRALD) is secure, customizable, and developer-friendly. Centralized processing and expert annotation yields a comprehensive set of metadata that enriches and complements the raw data. The thoroughly tested interface design allows for optimal and effective data search and retrieval. Availability of data in both original and standardized formats ensures compatibility with existing resources and fosters further tool development. Other key functions enable extensive exploration and discovery, including 3D and interactive visualization of branching, frequently measured morphometrics, and reciprocal links to the original PubMed publications. The integration of NeuroMorpho.Org with version-1 of the NIF (NIFv1) provides the opportunity to access morphological data in the context of other relevant resources and diverse subdomains of neuroscience, opening exciting new possibilities in data mining and knowledge discovery. The outcome of such coordination is the rapid and powerful advancement of neuroscience research at both the conceptual and technological level. PMID:18949582

  5. NeuroMorpho.Org implementation of digital neuroscience: dense coverage and integration with the NIF.

    PubMed

    Halavi, Maryam; Polavaram, Sridevi; Donohue, Duncan E; Hamilton, Gail; Hoyt, Jeffrey; Smith, Kenneth P; Ascoli, Giorgio A

    2008-09-01

    Neuronal morphology affects network connectivity, plasticity, and information processing. Uncovering the design principles and functional consequences of dendritic and axonal shape necessitates quantitative analysis and computational modeling of detailed experimental data. Digital reconstructions provide the required neuromorphological descriptions in a parsimonious, comprehensive, and reliable numerical format. NeuroMorpho.Org is the largest web-accessible repository service for digitally reconstructed neurons and one of the integrated resources in the Neuroscience Information Framework (NIF). Here we describe the NeuroMorpho.Org approach as an exemplary experience in designing, creating, populating, and curating a neuroscience digital resource. The simple three-tier architecture of NeuroMorpho.Org (web client, web server, and relational database) encompasses all necessary elements to support a large-scale, integrate-able repository. The data content, while heterogeneous in scientific scope and experimental origin, is unified in format and presentation by an in house standardization protocol. The server application (MRALD) is secure, customizable, and developer-friendly. Centralized processing and expert annotation yields a comprehensive set of metadata that enriches and complements the raw data. The thoroughly tested interface design allows for optimal and effective data search and retrieval. Availability of data in both original and standardized formats ensures compatibility with existing resources and fosters further tool development. Other key functions enable extensive exploration and discovery, including 3D and interactive visualization of branching, frequently measured morphometrics, and reciprocal links to the original PubMed publications. The integration of NeuroMorpho.Org with version-1 of the NIF (NIFv1) provides the opportunity to access morphological data in the context of other relevant resources and diverse subdomains of neuroscience, opening exciting new possibilities in data mining and knowledge discovery. The outcome of such coordination is the rapid and powerful advancement of neuroscience research at both the conceptual and technological level.

  6. [Criminal process record Winckelmann (Triest, 1768). Comments on the criminal process dealing with the murder of Johann Joachim Winckelmann from the forensic historical and legal medicine viewpoint].

    PubMed

    Risse, M; Weiler, G

    2001-01-01

    Johann Joachim Winckelmann, German historian of ancient art and archaeologist, was born on 9 December 1717 in Stendal, a town in Saxony-Anhalt. At the age of 50 he was murdered on 8 June 1768 in a Trieste hotel. The voluminous original record of the criminal proceedings against his murderer, Francesco Arcangeli, was presumed lost for about 150 years. A new edition in the wording of the original text appeared in 1964. This long sought historical document gives cause for forensic-historical reflections under consideration of the autopsy protocol about Winckelmann, which is likewise a historical document. A considerable change of paradigm in comparison to current autopsy protocols is observed with regard to the evaluation of injuries and the circumstances of death.

  7. Reestablishment of an Unknown State and Its Orthogonal Complement State with Assistance

    NASA Astrophysics Data System (ADS)

    Chen, Ai-Xi; Wu, Shu-Dong

    2003-12-01

    In this paper, we propose a protocol where one can realize reestablishment of an unknown state and its orthogonal complement state with a certain probability. In the first stage of the protocol, teleportation is performed between Alice (a sender) and Bob (a receiver) through a nonmaximally entangled quantum channel. In the process of teleportation, Alice performs nonmaximally entangled state measurement. In the second stage of the protocol, Victor (a state preparer) disentangles leftover nonmaximally entangled states by a single-particle measurement. With the assistance of Victor Alice can reestablish the original state or produce its orthogonal state. The project partially supported by National Natural Science Foundation of China under Grant Nos. 90103026 and 60078023

  8. Carbon Nanotube Material Quality Assessment

    NASA Technical Reports Server (NTRS)

    Yowell, Leonard; Arepalli, Sivaram; Sosa, Edward; Niolaev, Pavel; Gorelik, Olga

    2006-01-01

    The nanomaterial activities at NASA Johnson Space Center focus on carbon nanotube production, characterization and their applications for aerospace systems. Single wall carbon nanotubes are produced by arc and laser methods. Characterization of the nanotube material is performed using the NASA JSC protocol developed by combining analytical techniques of SEM, TEM, UV-VIS-NIR absorption, Raman, and TGA. A possible addition of other techniques such as XPS, and ICP to the existing protocol will be discussed. Changes in the quality of the material collected in different regions of the arc and laser production chambers is assessed using the original JSC protocol. The observed variations indicate different growth conditions in different regions of the production chambers.

  9. OSI-compatible protocols for mobile-satellite communications: The AMSS experience

    NASA Technical Reports Server (NTRS)

    Moher, Michael

    1990-01-01

    The protocol structure of the international aeronautical mobile satellite service (AMSS) is reviewed with emphasis on those aspects of protocol performance, validation, and conformance which are peculiar to mobile services. This is in part an analysis of what can be learned from the AMSS experience with protocols which is relevant to the design of other mobile satellite data networks, e.g., land mobile.

  10. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  11. Optimization of Native and Formaldehyde iPOND Techniques for Use in Suspension Cells.

    PubMed

    Wiest, Nathaniel E; Tomkinson, Alan E

    2017-01-01

    The isolation of proteins on nascent DNA (iPOND) technique developed by the Cortez laboratory allows a previously unparalleled ability to examine proteins associated with replicating and newly synthesized DNA in mammalian cells. Both the original, formaldehyde-based iPOND technique and a more recent derivative, accelerated native iPOND (aniPOND), have mostly been performed in adherent cell lines. Here, we describe modifications to both protocols for use with suspension cell lines. These include cell culture, pulse, and chase conditions that optimize sample recovery in both protocols using suspension cells and several key improvements to the published aniPOND technique that reduce sample loss, increase signal to noise, and maximize sample recovery. Additionally, we directly and quantitatively compare the iPOND and aniPOND protocols to test the strengths and limitations of both. Finally, we present a detailed protocol to perform the optimized aniPOND protocol in suspension cell lines. © 2017 Elsevier Inc. All rights reserved.

  12. Aging of monolithic zirconia dental prostheses: Protocol for a 5-year prospective clinical study using ex vivo analyses.

    PubMed

    Koenig, Vinciane; Wulfman, Claudine P; Derbanne, Mathieu A; Dupont, Nathalie M; Le Goff, Stéphane O; Tang, Mie-Leng; Seidel, Laurence; Dewael, Thibaut Y; Vanheusden, Alain J; Mainjot, Amélie K

    2016-12-15

    Recent introduction of computer-aided design/computer-aided manufacturing (CAD/CAM) monolithic zirconia dental prostheses raises the issue of material low thermal degradation (LTD), a well-known problem with zirconia hip prostheses. This phenomenon could be accentuated by masticatory mechanical stress. Until now zirconia LTD process has only been studied in vitro . This work introduces an original protocol to evaluate LTD process of monolithic zirconia prostheses in the oral environment and to study their general clinical behavior, notably in terms of wear. 101 posterior monolithic zirconia tooth elements (molars and premolars) are included in a 5-year prospective clinical trial. On each element, several areas between 1 and 2 mm 2 (6 on molars, 4 on premolars) are determined on restoration surface: areas submitted or non-submitted to mastication mechanical stress, glazed or non-glazed. Before prosthesis placement, ex vivo analyses regarding LTD and wear are performed using Raman spectroscopy, SEM imagery and 3D laser profilometry. After placement, restorations are clinically evaluated following criteria of the World Dental Federation (FDI), complemented by the analysis of fracture clinical risk factors. Two independent examiners perform the evaluations. Clinical evaluation and ex vivo analyses are carried out after 6 months and then each year for up to 5 years. For clinicians and patients, the results of this trial will justify the use of monolithic zirconia restorations in dental practice. For researchers, the originality of a clinical study including ex vivo analyses of material aging will provide important data regarding zirconia properties.Trial registration: ClinicalTrials.gov Identifier: NCT02150226.

  13. Patient-centred screening for primary immunodeficiency, a multi-stage diagnostic protocol designed for non-immunologists: 2011 update

    PubMed Central

    de Vries, E

    2012-01-01

    Members of the European Society for Immunodeficiencies (ESID) and other colleagues have updated the multi-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs). The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage. PMID:22132890

  14. A survey on temperature-aware routing protocols in wireless body sensor networks.

    PubMed

    Oey, Christian Henry Wijaya; Moh, Sangman

    2013-08-02

    The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN) is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node's circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.

  15. A Survey on Temperature-Aware Routing Protocols in Wireless Body Sensor Networks

    PubMed Central

    Oey, Christian Henry Wijaya; Moh, Sangman

    2013-01-01

    The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN) is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node's circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols. PMID:23917259

  16. SU-F-R-11: Designing Quality and Safety Informatics Through Implementation of a CT Radiation Dose Monitoring Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, JM; Samei, E; Departments of Physics, Electrical and Computer Engineering, and Biomedical Engineering, and Medical Physics Graduate Program, Duke University, Durham, NC

    2016-06-15

    Purpose: Recent legislative and accreditation requirements have driven rapid development and implementation of CT radiation dose monitoring solutions. Institutions must determine how to improve quality, safety, and consistency of their clinical performance. The purpose of this work was to design a strategy and meaningful characterization of results from an in-house, clinically-deployed dose monitoring solution. Methods: A dose monitoring platform was designed by our imaging physics group that focused on extracting protocol parameters, dose metrics, and patient demographics and size. Compared to most commercial solutions, which focus on individual exam alerts and global thresholds, the program sought to characterize overall consistencymore » and targeted thresholds based on eight analytic interrogations. Those were based on explicit questions related to protocol application, national benchmarks, protocol and size-specific dose targets, operational consistency, outliers, temporal trends, intra-system variability, and consistent use of electronic protocols. Using historical data since the start of 2013, 95% and 99% intervals were used to establish yellow and amber parameterized dose alert thresholds, respectively, as a function of protocol, scanner, and size. Results: Quarterly reports have been generated for three hospitals for 3 quarters of 2015 totaling 27880, 28502, 30631 exams, respectively. Four adult and two pediatric protocols were higher than external institutional benchmarks. Four protocol dose levels were being inconsistently applied as a function of patient size. For the three hospitals, the minimum and maximum amber outlier percentages were [1.53%,2.28%], [0.76%,1.8%], [0.94%,1.17%], respectively. Compared with the electronic protocols, 10 protocols were found to be used with some inconsistency. Conclusion: Dose monitoring can satisfy requirements with global alert thresholds and patient dose records, but the real value is in optimizing patient-specific protocols, balancing image quality trade-offs that dose-reduction strategies promise, and improving the performance and consistency of a clinical operation. Data plots that capture patient demographics and scanner performance demonstrate that value.« less

  17. The SIMNET Network and Protocols. Revision

    DTIC Science & Technology

    1991-06-01

    governed by a set of rules and conventions that we call the SIMNET protocols. 1.1 About this report The purpose of this document ;. s to describe...the recipient( s ). A Request APDU is used for the transaction service to convey a unit of data from the originator to the recipient( s ). • A ...have an effect on several nearby vehicles. i I I It is also possible for a round to be fired, yet never impact. This occurs, for example, S when

  18. Development of a Behavior Change Intervention to Improve Sexual Health Service Use Among University Undergraduate Students: Mixed Methods Study Protocol.

    PubMed

    Cassidy, Christine; Steenbeek, Audrey; Langille, Donald; Martin-Misener, Ruth; Curran, Janet

    2017-11-02

    University students are at risk for acquiring sexually transmitted infections and suffering other negative health outcomes. Sexual health services offer preventive and treatment interventions that aim to reduce these infections and associated health consequences. However, university students often delay or avoid seeking sexual health services. An in-depth understanding of the factors that influence student use of sexual health services is needed to underpin effective sexual health interventions. In this study, we aim to design a behavior change intervention to address university undergraduate students' use of sexual health services at two universities in Nova Scotia, Canada. This mixed methods study consists of three phases that follow a systematic approach to intervention design outlined in the Behaviour Change Wheel. In Phase 1, we examine patterns of sexual health service use among university students in Nova Scotia, Canada, using an existing dataset. In Phase 2, we identify the perceived barriers and enablers to students' use of sexual health services. This will include focus groups with university undergraduate students, health care providers, and university administrators using a semistructured guide, informed by the Capability, Opportunity, Motivation-Behaviour Model and Theoretical Domains Framework. In Phase 3, we identify behavior change techniques and intervention components to develop a theory-based intervention to improve students' use of sexual health services. This study will be completed in March 2018. Results from each phase and the finalized intervention design will be reported in 2018. Previous intervention research to improve university students' use of sexual health services lacks a theoretical assessment of barriers. This study will employ a mixed methods research design to examine university students' use of sexual health service and apply behavior change theory to design a theory- and evidence-based sexual health service intervention. Our approach will provide a comprehensive foundation to co-design a theory-based intervention with service users, health care providers, and administrators to improve sexual health service use among university students and ultimately improve their overall health and well-being. ©Christine Cassidy, Audrey Steenbeek, Donald Langille, Ruth Martin-Misener, Janet Curran. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 02.11.2017.

  19. Systematic review of economic analyses in patient safety: a protocol designed to measure development in the scope and quality of evidence

    PubMed Central

    Carter, Alexander W; Mandavia, Rishi; Mayer, Erik; Marti, Joachim; Mossialos, Elias; Darzi, Ara

    2017-01-01

    Introduction Recent avoidable failures in patient care highlight the ongoing need for evidence to support improvements in patient safety. According to the most recent reviews, there is a dearth of economic evidence related to patient safety. These reviews characterise an evidence gap in terms of the scope and quality of evidence available to support resource allocation decisions. This protocol is designed to update and improve on the reviews previously conducted to determine the extent of methodological progress in economic analyses in patient safety. Methods and analysis A broad search strategy with two core themes for original research (excluding opinion pieces and systematic reviews) in ‘patient safety’ and ‘economic analyses’ has been developed. Medline, Econlit and National Health Service Economic Evaluation Database bibliographic databases will be searched from January 2007 using a combination of medical subject headings terms and research-derived search terms (see table 1). The method is informed by previous reviews on this topic, published in 2012. Screening, risk of bias assessment (using the Cochrane collaboration tool) and economic evaluation quality assessment (using the Drummond checklist) will be conducted by two independent reviewers, with arbitration by a third reviewer as needed. Studies with a low risk of bias will be assessed using the Drummond checklist. High-quality economic evaluations are those that score >20/35. A qualitative synthesis of evidence will be performed using a data collection tool to capture the study design(s) employed, population(s), setting(s), disease area(s), intervention(s) and outcome(s) studied. Methodological quality scores will be compared with previous reviews where possible. Effect size(s) and estimate uncertainty will be captured and used in a quantitative synthesis of high-quality evidence, where possible. Ethics and dissemination Formal ethical approval is not required as primary data will not be collected. The results will be disseminated through a peer-reviewed publication, presentations and social media. Trial registration number CRD42017057853. PMID:28821527

  20. Quarantine and protocol

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The purpose of the Orbiting Quarantine Facility is to provide maximum protection of the terrestrial biosphere by ensuring that the returned Martian samples are safe to bring to Earth. The protocol designed to detect the presence of biologically active agents in the Martian soil is described. The protocol determines one of two things about the sample: (1) that it is free from nonterrestrial life forms and can be sent to a terrestrial containment facility where extensive chemical, biochemical, geological, and physical investigations can be conducted; or (2) that it exhibits "biological effects" of the type that dictate second order testing. The quarantine protocol is designed to be conducted on a small portion of the returned sample, leaving the bulk of the sample undisturbed for study on Earth.

  1. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  2. Evaluating the Process of Generating a Clinical Trial Protocol

    PubMed Central

    Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.

    2002-01-01

    The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.

  3. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS

  4. Evaluation of Interoperability Protocols in Repositories of Electronic Theses and Dissertations

    ERIC Educational Resources Information Center

    Hakimjavadi, Hesamedin; Masrek, Mohamad Noorman

    2013-01-01

    Purpose: The purpose of this study is to evaluate the status of eight interoperability protocols within repositories of electronic theses and dissertations (ETDs) as an introduction to further studies on feasibility of deploying these protocols in upcoming areas of interoperability. Design/methodology/approach: Three surveys of 266 ETD…

  5. A Smart Insole to Promote Healthy Aging for Frail Elderly Individuals: Specifications, Design, and Preliminary Results.

    PubMed

    Piau, Antoine; Charlon, Yoann; Campo, Eric; Vellas, Bruno; Nourhashemi, Fati

    2015-05-25

    Older individuals frequently experience reversible "frailty syndrome,", increasing incidence of disability. Although physical exercise interventions may delay functional decline, there are difficulties in implementing them and performing seamless follow-up at home. Very few technological solutions attempt to address this challenge and improve individual participation. Our objectives are to (1) develop a technological solution designed to support active aging of frail older persons, (2) conduct a first laboratory evaluation of the device, and (3) design a multidimensional clinical trial to validate our solution. We conducted a first phase of multidisciplinary meetings to identify real end users and health professional's unmet needs, and to produce specifications for the architecture of the solution. In a second phase, we performed laboratory tests of the first proposed prototype (a smart insole) with 3 healthy volunteers. We then designed an ongoing clinical trial to finalize the multidimensional evaluation and improvement of the solution. To respond to the needs expressed by the stakeholders (frailty monitoring and adherence improvement), we developed a prototype of smart shoe insole to monitor key parameters of frailty during daily life and promote walking. It is a noninvasive wireless insole, which automatically measures gait parameters and transmits information to a remote terminal via a secure Internet connection. To ensure the solution's autonomy and transparency, we developed an original energy harvesting system, which transforms mechanical energy produced by the user's walking movement into electrical energy. The first laboratory tests of this technological solution showed good reliability measures and also a good acceptability for the users. We have planned an original iterative medical research protocol to validate our solution in real life. Our smart insole could support preventive strategies against disability in primary care by empowering the older patients without increasing the busy health professional's workload. Clinicaltrials.gov NCT02316600; https://clinicaltrials.gov/ct2/results?term=NCT02316600&Search=Search. Accessed: 2015-05-13 . (Archived by WebCite at http://www.webcitation.org/6YUTkObrQ). ©Antoine Piau, Yoann Charlon, Eric Campo, Bruno Vellas, Fati Nourhashemi. Originally published in JMIR Rehabilitation and Assistive Technology (http://rehab.jmir.org), 25.05.2015.

  6. Comparison of a Stimulus Equivalence Protocol and Traditional Lecture for Teaching Single-Subject Designs

    ERIC Educational Resources Information Center

    Lovett, Sadie; Rehfeldt, Ruth Anne; Garcia, Yors; Dunning, Johnna

    2011-01-01

    This study compared the effects of a computer-based stimulus equivalence protocol to a traditional lecture format in teaching single-subject experimental design concepts to undergraduate students. Participants were assigned to either an equivalence or a lecture group, and performance on a paper-and-pencil test that targeted relations among the…

  7. Tooth Tissue Engineering: The Importance of Blood Products as a Supplement in Tissue Culture Medium for Human Pulp Dental Stem Cells.

    PubMed

    Pisciolaro, Ricardo Luiz; Duailibi, Monica Talarico; Novo, Neil Ferreira; Juliano, Yara; Pallos, Debora; Yelick, Pamela Crotty; Vacanti, Joseph Phillip; Ferreira, Lydia Masako; Duailibi, Silvio Eduardo

    2015-11-01

    One of the goals in using cells for tissue engineering (TE) and cell therapy consists of optimizing the medium for cell culture. The present study compares three different blood product supplements for improved cell proliferation and protection against DNA damage in cultured human dental pulp stem cells for tooth TE applications. Human cells from dental pulp were first characterized as adult stem cells (ectomesenchymal mixed origin) by flow cytometry. Next, four different cell culture conditions were tested: I, supplement-free; II, supplemented with fetal bovine serum; III, allogeneic human serum; and IV, autologous human serum. Cultured cells were then characterized for cell proliferation, mineralized nodule formation, and colony-forming units (CFU) capability. After 28 days in culture, the comet assay was performed to assess possible damage in cellular DNA. Our results revealed that Protocol IV achieved higher cell proliferation than Protocol I (p = 0.0112). Protocols II and III resulted in higher cell proliferation than Protocol I, but no statistical differences were found relative to Protocol IV. The comet assay revealed less cell damage in cells cultured using Protocol IV as compared to Protocols II and III. The damage percentage observed on Protocol II was significantly higher than all other protocols. CFUs capability was highest using Protocol IV (p = 0.0018) and III, respectively, and the highest degree of mineralization was observed using Protocol IV as compared to Protocols II and III. Protocol IV resulted in significantly improved cell proliferation, and no cell damage was observed. These results demonstrate that human blood product supplements can be used as feasible supplements for culturing adult human dental stem cells.

  8. Adaptive Probabilistic Protocols for Advanced Networks/Assuring the Integrity of Highly Decentralized Communications Systems

    DTIC Science & Technology

    2005-03-01

    to obtain a protocol customized to the needs of a specific setting, under control of an automated theorem proving system that can guarantee...new “compositional” method for protocol design and implementation, in which small microprotocols are combined to obtain a protocol customized to the...and Network Centric Enterprise (NCES) visions. This final report documents a wide range of contributions and technology transitions, including: A

  9. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  10. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  11. Comparison of breathing gated CT images generated using a 5DCT technique and a commercial clinical protocol in a porcine model

    PubMed Central

    O’Connell, Dylan P.; Thomas, David H.; Dou, Tai H.; Lamb, James M.; Feingold, Franklin; Low, Daniel A.; Fuld, Matthew K.; Sieren, Jered P.; Sloan, Chelsea M.; Shirk, Melissa A.; Hoffman, Eric A.; Hofmann, Christian

    2015-01-01

    Purpose: To demonstrate that a “5DCT” technique which utilizes fast helical acquisition yields the same respiratory-gated images as a commercial technique for regular, mechanically produced breathing cycles. Methods: Respiratory-gated images of an anesthetized, mechanically ventilated pig were generated using a Siemens low-pitch helical protocol and 5DCT for a range of breathing rates and amplitudes and with standard and low dose imaging protocols. 5DCT reconstructions were independently evaluated by measuring the distances between tissue positions predicted by a 5D motion model and those measured using deformable registration, as well by reconstructing the originally acquired scans. Discrepancies between the 5DCT and commercial reconstructions were measured using landmark correspondences. Results: The mean distance between model predicted tissue positions and deformably registered tissue positions over the nine datasets was 0.65 ± 0.28 mm. Reconstructions of the original scans were on average accurate to 0.78 ± 0.57 mm. Mean landmark displacement between the commercial and 5DCT images was 1.76 ± 1.25 mm while the maximum lung tissue motion over the breathing cycle had a mean value of 27.2 ± 4.6 mm. An image composed of the average of 30 deformably registered images acquired with a low dose protocol had 6 HU image noise (single standard deviation) in the heart versus 31 HU for the commercial images. Conclusions: An end to end evaluation of the 5DCT technique was conducted through landmark based comparison to breathing gated images acquired with a commercial protocol under highly regular ventilation. The techniques were found to agree to within 2 mm for most respiratory phases and most points in the lung. PMID:26133604

  12. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    NASA Astrophysics Data System (ADS)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  13. Simulation Modeling and Performance Evaluation of Space Networks

    NASA Technical Reports Server (NTRS)

    Jennings, Esther H.; Segui, John

    2006-01-01

    In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions

  14. Patient-centred screening for primary immunodeficiency: a multi-stage diagnostic protocol designed for non-immunologists

    PubMed Central

    de Vries, E

    2006-01-01

    Efficient early identification of primary immunodeficiency disease (PID) is important for prognosis, but is not an easy task for non-immunologists. The Clinical Working Party of the European Society for Immunodeficiencies (ESID) has composed a multi-stage diagnostic protocol that is based on expert opinion, in order to increase the awareness of PID among doctors working in different fields. The protocol starts from the clinical presentation of the patient; immunological skills are not needed for its use. The multi-stage design allows cost-effective screening for PID within the large pool of potential cases in all hospitals in the early phases, while more expensive tests are reserved for definitive classification in collaboration with an immunologist at a later stage. Although many PIDs present in childhood, others may present at any age. The protocols presented here are therefore aimed at both adult physicians and paediatricians. While designed for use throughout Europe, there will be national differences which may make modification of this generic algorithm necessary. PMID:16879238

  15. Mercury Assessment and Monitoring Protocol for the Bear Creek Watershed, Colusa County, California

    USGS Publications Warehouse

    Suchanek, Thomas H.; Hothem, Roger L.; Rytuba, James J.; Yee, Julie L.

    2010-01-01

    This report summarizes the known information on the occurrence and distribution of mercury (Hg) in physical/chemical and biological matrices within the Bear Creek watershed. Based on these data, a matrix-specific monitoring protocol for the evaluation of the effectiveness of activities designed to remediate Hg contamination in the Bear Creek watershed is presented. The monitoring protocol documents procedures for collecting and processing water, sediment, and biota for estimation of total Hg (TotHg) and monomethyl mercury (MMeHg) in the Bear Creek watershed. The concurrent sampling of TotHg and MMeHg in biota as well as water and sediment from 10 monitoring sites is designed to assess the relative bioavailability of Hg released from Hg sources in the watershed and identify environments conducive to Hg methylation. These protocols are designed to assist landowners, land managers, water quality regulators, and scientists in determining whether specific restoration/mitigation actions lead to significant progress toward achieving water quality goals to reduce Hg in Bear and Sulphur Creeks.

  16. A protocol for isolating insect mitochondrial genomes: a case study of NUMT in Melipona flavolineata (Hymenoptera: Apidae).

    PubMed

    Françoso, Elaine; Gomes, Fernando; Arias, Maria Cristina

    2016-07-01

    Nuclear mitochondrial DNA insertions (NUMTs) are mitochondrial DNA sequences that have been transferred into the nucleus and are recognized by the presence of indels and stop codons. Although NUMTs have been identified in a diverse range of species, their discovery was frequently accidental. Here, our initial goal was to develop and standardize a simple method for isolating NUMTs from the nuclear genome of a single bee. Subsequently, we tested our new protocol by determining whether the indels and stop codons of the cytochrome c oxidase subunit I (COI) sequence of Melipona flavolineata are of nuclear origin. The new protocol successfully demonstrated the presence of a COI NUMT. In addition to NUMT investigations, the protocol described here will also be very useful for studying mitochondrial mutations related to diseases and for sequencing complete mitochondrial genomes with high read coverage by Next-Generation technology.

  17. Post-trial follow-up methodology in large randomized controlled trials: a systematic review protocol.

    PubMed

    Llewellyn-Bennett, Rebecca; Bowman, Louise; Bulbulia, Richard

    2016-12-15

    Clinical trials typically have a relatively short follow-up period, and may both underestimate potential benefits of treatments investigated, and fail to detect hazards, which can take much longer to emerge. Prolonged follow-up of trial participants after the end of the scheduled trial period can provide important information on both efficacy and safety outcomes. This protocol describes a systematic review to qualitatively compare methods of post-trial follow-up used in large randomized controlled trials. A systematic search of electronic databases and clinical trial registries will use a predefined search strategy. All large (more than 1000 adult participants) randomized controlled trials will be evaluated. Two reviewers will screen and extract data according to this protocol with the aim of 95% concordance of papers checked and discrepancies will be resolved by a third reviewer. Trial methods, participant retention rates and prevalence of missing data will be recorded and compared. The potential for bias will be evaluated using the Cochrane Risk of Bias tool (applied to the methods used during the in-trial period) with the aim of investigating whether the quality of the post-trial follow-up methodology might be predicted by the quality of the methods used for the original trial. Post-trial follow-up can provide valuable information about the long-term benefits and hazards of medical interventions. However, it can be logistically challenging and costly. The aim of this systematic review is to describe how trial participants have been followed-up post-trial in order to inform future post-trial follow-up designs. Not applicable for PROSPERO registration.

  18. Development of an improved rapid BACpro® protocol and a method for direct identification from blood-culture-positive bottles using matrix-assisted laser desorption ionization time-of-flight mass spectrometry.

    PubMed

    Yonezawa, Takatoshi; Watari, Tomohisa; Ashizawa, Kazuho; Hanada, Daisuke; Yanagiya, Takako; Watanabe, Naoki; Terada, Takashi; Tomoda, Yutaka; Fujii, Satoshi

    2018-05-01

    Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) has been incorporated into pathogenic bacterial identification methods and has improved their rapidity. Various methods have been reported to directly identify bacteria with MALDI-TOF MS by pretreating culture medium in blood culture bottles. Rapid BACpro® (Nittobo Medical Co., Ltd.) is a pretreatment kit for effective collection of bacteria with cationic copolymers. However, the Rapid BACpro® pretreatment kit is adapted only for MALDI Biotyper (Bruker Daltonics K.K.), and there has been a desire to expand its use to VITEK MS (VMS; bioMerieux SA). We improved the protocol and made it possible to analyze with VMS. The culture medium bacteria collection method was changed to a method with centrifugation after hemolysis using saponin; the cationic copolymer concentration was changed to 30% of the original concentration; the sequence with which reagents were added was changed; and a change was made to an ethanol/formic acid extraction method. The improved protocol enhanced the identification performance. When VMS was used, the identification rate was 100% with control samples. With clinical samples, the identification agreement rate with the cell smear method was 96.3%. The improved protocol is effective in blood culture rapid identification, being both simpler and having an improved identification performance compared with the original. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  20. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Nicely, Lucas D; Zhang, Haibin

    Modern large-scale networks require the ability to withstand arbitrary failures (i.e., Byzantine failures). Byzantine reliable broadcast algorithms can be used to reliably disseminate information in the presence of Byzantine failures. We design a novel Byzantine reliable broadcast protocol for loosely connected and synchronous networks. While previous such protocols all assume correct senders, our protocol is the first to handle Byzantine senders. To achieve this goal, we have developed new techniques for fault detection and fault tolerance. Our protocol is efficient, and under normal circumstances, no expensive public-key cryptographic operations are used. We implement and evaluate our protocol, demonstrating that ourmore » protocol has high throughput and is superior to the existing protocols in uncivil executions.« less

  2. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  3. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  4. Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects: The PROMOTE Study Protocol.

    PubMed

    Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T

    2016-11-01

    The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.

  5. [Treatment and follow up protocol in differentiated thyroid carcinomas of follicular origin].

    PubMed

    Rodrigues, Fernando; Limbert, Edward; Marques, Ana Paula; Santos, Ana Paula; Lopes, Carlos; Rodrigues, Elizabete; Borges, Fátima; Carrilho, Francisco; Castro, João Jácome de; Neto, João; Salgado, Lucília; Oliveira, Maria João

    2005-01-01

    Differentiated thyroid carcinoma of follicular origin (DTCFO), although not very frequent, has registered a raising incidence in the last decades. In the majority of the cases, DTCFO is a curable disease when treated and monitored by experienced, multidisciplinary teams. These factors contribute to an increasing number of DTCFO survivors requiring life-long monitoring, due to the possibility of occurrence of recurrences many years after the initial treatment. Several aspects of the treatment and management of these patients are still controversial. The present protocol represents the consensus of the members of the Grupo de Estudo da Tiróide of the Sociedade Portuguesa de Endocrinologia, Diabetes e Metabolismo. It aims to define guidelines, in agreement with the current state of the art and contemplating the necessary adaptations to local constrains, that ensure decreased mortality and protection of patients' quality of life, avoiding unnecessarily aggressive or ineffective treatments, optimizing the use of the available resources.

  6. Design and Implementation of BDS RTCM SSR Message

    NASA Astrophysics Data System (ADS)

    Xiao, Xia; Cheng, Fang; Liu, Feng; Lu, XiaoChun

    2017-09-01

    Based on the real-time differential positioning system of Beidou wide area, a set of Beidou high-precision differential information transmission protocol is studied and designed. After the system generates satellite precise orbit and clock difference products, it needs to be sent to the users in a certain data format through C band GEO communication satellite. The transport protocol should be designed according to the data volume and update rate of the system. At the same time, it is necessary to combine the signal system, satellite resources and the restriction and restriction of the receiver implementation technology. It refers to the relevant fields and international similar systems of technology and standards to design. This paper establishes a set of technical indicators which can measure the pros and cons of differential message organization and broadcasting strategy. Through modeling, simulation and actual test, this paper makes a comprehensive comparison of different strategies. Finally, a transmission protocol design scheme which has good performance and meets the system service requirements is presented.

  7. A polymeric master replication technology for mass fabrication of poly(dimethylsiloxane) microfluidic devices.

    PubMed

    Li, Hai-Fang; Lin, Jin-Ming; Su, Rong-Guo; Cai, Zong Wei; Uchiyama, Katsumi

    2005-05-01

    A protocol of producing multiple polymeric masters from an original glass master mold has been developed, which enables the production of multiple poly(dimethylsiloxane) (PDMS)-based microfluidic devices in a low-cost and efficient manner. Standard wet-etching techniques were used to fabricate an original glass master with negative features, from which more than 50 polymethylmethacrylate (PMMA) positive replica masters were rapidly created using the thermal printing technique. The time to replicate each PMMA master was as short as 20 min. The PMMA replica masters have excellent structural features and could be used to cast PDMS devices for many times. An integration geometry designed for laser-induced fluorescence (LIF) detection, which contains normal deep microfluidic channels and a much deeper optical fiber channel, was successfully transferred into PDMS devices. The positive relief on seven PMMA replica masters is replicated with regard to the negative original glass master, with a depth average variation of 0.89% for 26-microm deep microfluidic channels and 1.16% for the 90 mum deep fiber channel. The imprinted positive relief in PMMA from master-to-master is reproducible with relative standard deviations (RSDs) of 1.06% for the maximum width and 0.46% for depth in terms of the separation channel. The PDMS devices fabricated from the PMMA replica masters were characterized and applied to the separation of a fluorescein isothiocyanate (FITC)-labeled epinephrine sample.

  8. Biomimetic Composite Scaffold for Breast Reconstruction Following Tumor Resection

    DTIC Science & Technology

    2005-09-01

    developing an innovative biomimetic scaffold materials by combining two natural polymers: silk fibroin (from Bombyx mori silk worm) and chitosan (from...M.D. Anderson Cancer Center (UTMDACC) is a component of the University of Texas System. It is one of the nation’s original three Comprehensive Cancer...follow protocols • Properly collect, measure, and document data from the lab, clinic, and/or animal facilities 22 Table 2. Origin of Country and

  9. Saffron Samples of Different Origin: An NMR Study of Microwave-Assisted Extracts

    PubMed Central

    Sobolev, Anatoly P.; Carradori, Simone; Capitani, Donatella; Vista, Silvia; Trella, Agata; Marini, Federico; Mannina, Luisa

    2014-01-01

    An NMR analytical protocol is proposed to characterize saffron samples of different geographical origin (Greece, Spain, Hungary, Turkey and Italy). A microwave-assisted extraction procedure was developed to obtain a comparable recovery of metabolites with respect to the ISO specifications, reducing the solvent volume and the extraction time needed. Metabolite profiles of geographically different saffron extracts were compared showing significant differences in the content of some metabolites. PMID:28234327

  10. Lessons learned on the design and the conduct of Post-Authorization Safety Studies: review of 3 years of PRAC oversight.

    PubMed

    Engel, Pierre; Almas, Mariana Ferreira; De Bruin, Marieke Louise; Starzyk, Kathryn; Blackburn, Stella; Dreyer, Nancy Ann

    2017-04-01

    To describe and characterize the first cohort of Post-Authorization Safety Study (PASS) protocols reviewed under the recent European pharmacovigilance legislation. A systematic approach was used to compile all publicly available information on PASS protocols and assessments submitted from July 2012 to July 2015 from Pharmacovigilance Risk Assessment Committee (PRAC) minutes, European Medicines Agency (EMA) and European Network of Pharmacovigilance and Pharmacoepidemiology (ENCePP) webpages. During the study period, 189 different PASS protocols were submitted to the PRAC, half of which were entered in the ENCePP electronic register of post-authorization studies (EU-PAS) by July 2015. Those protocols were assessed during 353 PRAC reviews. The EMA published only 31% of the PRAC feedback, of which the main concerns were study design (37%) and feasibility (30%). Among the 189 PASS, slightly more involved primary data capture (58%). PASS assessing drug utilization mainly leveraged secondary data sources (58%). The majority of the PASS did not include a comparator (65%) and 35% of PASS also evaluated clinical effectiveness endpoints. To the best of our knowledge this is the first comprehensive review of three years of PASS protocols submitted under the new pharmacovigilance legislation. Our results show that both EMA and PASS sponsors could respectively increase the availability of protocol assessments and documents in the EU-PAS. Protocol content review and the high number of PRAC comments related to methodological issues and feasibility concerns should raise awareness among PASS stakeholders to design more thoughtful studies according to pharmacoepidemiological principles and existing guidelines. © 2016 The British Pharmacological Society.

  11. The Growing Awareness Inventory: Building Capacity for Culturally Responsive Science and Mathematics with a Structured Observation Protocol

    ERIC Educational Resources Information Center

    Brown, Julie C.; Crippen, Kent J.

    2016-01-01

    This study represents a first iteration in the design process of the Growing Awareness Inventory (GAIn), a structured observation protocol for building the awareness of preservice teachers (PSTs) for resources in mathematics and science classrooms that can be used for culturally responsive pedagogy (CRP). The GAIn is designed to develop awareness…

  12. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  13. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  14. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  15. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  16. DNA tetrominoes: the construction of DNA nanostructures using self-organised heterogeneous deoxyribonucleic acids shapes.

    PubMed

    Ong, Hui San; Rahim, Mohd Syafiq; Firdaus-Raih, Mohd; Ramlan, Effirul Ikhwan

    2015-01-01

    The unique programmability of nucleic acids offers alternative in constructing excitable and functional nanostructures. This work introduces an autonomous protocol to construct DNA Tetris shapes (L-Shape, B-Shape, T-Shape and I-Shape) using modular DNA blocks. The protocol exploits the rich number of sequence combinations available from the nucleic acid alphabets, thus allowing for diversity to be applied in designing various DNA nanostructures. Instead of a deterministic set of sequences corresponding to a particular design, the protocol promotes a large pool of DNA shapes that can assemble to conform to any desired structures. By utilising evolutionary programming in the design stage, DNA blocks are subjected to processes such as sequence insertion, deletion and base shifting in order to enrich the diversity of the resulting shapes based on a set of cascading filters. The optimisation algorithm allows mutation to be exerted indefinitely on the candidate sequences until these sequences complied with all the four fitness criteria. Generated candidates from the protocol are in agreement with the filter cascades and thermodynamic simulation. Further validation using gel electrophoresis indicated the formation of the designed shapes. Thus, supporting the plausibility of constructing DNA nanostructures in a more hierarchical, modular, and interchangeable manner.

  17. Protocols for Improvement of Black Pepper (Piper nigrum L.) Utilizing Biotechnological Tools.

    PubMed

    Nirmal Babu, K; Divakaran, Minoo; Yamuna, G; Ravindran, P N; Peter, K V

    2016-01-01

    Black pepper, Piper nigrum L., the "King of spices" is the most widely used spice growing in the South-Western region of India. The humid tropical evergreen forest bordering the Malabar Coast (Western Ghats is one of the hot spot areas of plant bio-diversity on earth) is its center of origin and diversity. However, the crop faces constraints like rampant fungal and viral diseases, lack of disease free planting material, hence biotechnological tools can be utilized to address these problems and strides have been made successfully. The standardization of micropropagation, somatic embryogenesis, in vitro conservation, protoplast isolation, and genetic transformation protocols are described here. The protocols could be utilized to achieve similar goals in the related species of Piper too.

  18. Protocols for the Design of Kinase-focused Compound Libraries.

    PubMed

    Jacoby, Edgar; Wroblowski, Berthold; Buyck, Christophe; Neefs, Jean-Marc; Meyer, Christophe; Cummings, Maxwell D; van Vlijmen, Herman

    2018-05-01

    Protocols for the design of kinase-focused compound libraries are presented. Kinase-focused compound libraries can be differentiated based on the design goal. Depending on whether the library should be a discovery library specific for one particular kinase, a general discovery library for multiple distinct kinase projects, or even phenotypic screening, there exists today a variety of in silico methods to design candidate compound libraries. We address the following scenarios: 1) Datamining of SAR databases and kinase focused vendor catalogues; 2) Predictions and virtual screening; 3) Structure-based design of combinatorial kinase inhibitors; 4) Design of covalent kinase inhibitors; 5) Design of macrocyclic kinase inhibitors; and 6) Design of allosteric kinase inhibitors and activators. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Rapid Sampling of Hydrogen Bond Networks for Computational Protein Design.

    PubMed

    Maguire, Jack B; Boyken, Scott E; Baker, David; Kuhlman, Brian

    2018-05-08

    Hydrogen bond networks play a critical role in determining the stability and specificity of biomolecular complexes, and the ability to design such networks is important for engineering novel structures, interactions, and enzymes. One key feature of hydrogen bond networks that makes them difficult to rationally engineer is that they are highly cooperative and are not energetically favorable until the hydrogen bonding potential has been satisfied for all buried polar groups in the network. Existing computational methods for protein design are ill-equipped for creating these highly cooperative networks because they rely on energy functions and sampling strategies that are focused on pairwise interactions. To enable the design of complex hydrogen bond networks, we have developed a new sampling protocol in the molecular modeling program Rosetta that explicitly searches for sets of amino acid mutations that can form self-contained hydrogen bond networks. For a given set of designable residues, the protocol often identifies many alternative sets of mutations/networks, and we show that it can readily be applied to large sets of residues at protein-protein interfaces or in the interior of proteins. The protocol builds on a recently developed method in Rosetta for designing hydrogen bond networks that has been experimentally validated for small symmetric systems but was not extensible to many larger protein structures and complexes. The sampling protocol we describe here not only recapitulates previously validated designs with performance improvements but also yields viable hydrogen bond networks for cases where the previous method fails, such as the design of large, asymmetric interfaces relevant to engineering protein-based therapeutics.

  20. Addressing Participant Validity in a Small Internet Health Survey (The Restore Study): Protocol and Recommendations for Survey Response Validation.

    PubMed

    Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Rosser, B R Simon; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William

    2018-04-24

    While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. This paper reports the challenges of survey validation inherent in a small Web-based health survey research. The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. ©James Dewitt, Benjamin Capistrant, Nidhi Kohli, B R Simon Rosser, Darryl Mitteldorf, Enyinnaya Merengwa, William West. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.04.2018.

  1. Discrimination of almonds (Prunus dulcis) geographical origin by minerals and fatty acids profiling.

    PubMed

    Amorello, Diana; Orecchio, Santino; Pace, Andrea; Barreca, Salvatore

    2016-09-01

    Twenty-one almond samples from three different geographical origins (Sicily, Spain and California) were investigated by determining minerals and fatty acids compositions. Data were used to discriminate by chemometry almond origin by linear discriminant analysis. With respect to previous PCA profiling studies, this work provides a simpler analytical protocol for the identification of almonds geographical origin. Classification by using mineral contents data only was correct in 77% of the samples, while, by using fatty acid profiles, the percentages of samples correctly classified reached 82%. The coupling of mineral contents and fatty acid profiles lead to an increased efficiency of the classification with 87% of samples correctly classified.

  2. Study protocol for the recruitment of female sex workers and their non-commercial partners into couple-based HIV research

    PubMed Central

    2012-01-01

    Background Researchers are increasingly recognizing the importance of addressing sexual and drug-related HIV risk within the context of intimate relationships rather than solely focusing on individual behaviors. Practical and effective methods are needed to recruit, screen, and enroll the high risk and hard-to-reach couples who would most benefit from HIV interventions, such as drug-using female sex workers (FSWs) and their intimate, non-commercial partners. This paper outlines a bi-national, multidisciplinary effort to develop and implement a study protocol for research on the social context and epidemiology of HIV, sexually transmitted infections (STI), and high risk behaviors among FSWs and their non-commercial male partners in Tijuana and Ciudad Juarez, Mexico. We provide an overview of our study and specifically focus on the sampling, recruitment, screening, and successful enrollment of high risk couples into a public health study in this context. Methods/Design We used targeted and snowball sampling to recruit couples through the female partner first and administered a primary screener to check her initial eligibility. Willing and eligible females then invited their primary male partners for couple-based screening using a couple verification screening (CVS) instrument adapted from previous studies. The CVS rechecked eligibility and separately asked each partner the same questions about their relationship to "test" if the couple was legitimate. We adapted the original protocol to consider issues of gender and power within the local cultural and socioeconomic context and expanded the question pool to create multiple versions of the CVS that were randomly administered to potential couples to determine eligibility and facilitate study enrollment. Discussion The protocol successfully enrolled 214 high risk couples into a multi-site public health study. This work suggests the importance of collaborating to construct a study protocol, understanding the local population and context, and drawing on multiple sources of input to determine eligibility and verify the legitimacy of relationships. We provide a practical set of tools that other researchers should find helpful in the study of high risk couples in international settings, with particular relevance to studies of FSWs and their intimate partners. PMID:22348625

  3. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    NASA Astrophysics Data System (ADS)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  4. Design of primers and probes for quantitative real-time PCR methods.

    PubMed

    Rodríguez, Alicia; Rodríguez, Mar; Córdoba, Juan J; Andrade, María J

    2015-01-01

    Design of primers and probes is one of the most crucial factors affecting the success and quality of quantitative real-time PCR (qPCR) analyses, since an accurate and reliable quantification depends on using efficient primers and probes. Design of primers and probes should meet several criteria to find potential primers and probes for specific qPCR assays. The formation of primer-dimers and other non-specific products should be avoided or reduced. This factor is especially important when designing primers for SYBR(®) Green protocols but also in designing probes to ensure specificity of the developed qPCR protocol. To design primers and probes for qPCR, multiple software programs and websites are available being numerous of them free. These tools often consider the default requirements for primers and probes, although new research advances in primer and probe design should be progressively added to different algorithm programs. After a proper design, a precise validation of the primers and probes is necessary. Specific consideration should be taken into account when designing primers and probes for multiplex qPCR and reverse transcription qPCR (RT-qPCR). This chapter provides guidelines for the design of suitable primers and probes and their subsequent validation through the development of singlex qPCR, multiplex qPCR, and RT-qPCR protocols.

  5. Recording information on protein complexes in an information management system

    PubMed Central

    Savitsky, Marc; Diprose, Jonathan M.; Morris, Chris; Griffiths, Susanne L.; Daniel, Edward; Lin, Bill; Daenke, Susan; Bishop, Benjamin; Siebold, Christian; Wilson, Keith S.; Blake, Richard; Stuart, David I.; Esnouf, Robert M.

    2011-01-01

    The Protein Information Management System (PiMS) is a laboratory information management system (LIMS) designed for use with the production of proteins in a research environment. The software is distributed under the CCP4 licence, and so is available free of charge to academic laboratories. Like most LIMS, the underlying PiMS data model originally had no support for protein–protein complexes. To support the SPINE2-Complexes project the developers have extended PiMS to meet these requirements. The modifications to PiMS, described here, include data model changes, additional protocols, some user interface changes and functionality to detect when an experiment may have formed a complex. Example data are shown for the production of a crystal of a protein complex. Integration with SPINE2-Complexes Target Tracker application is also described. PMID:21605682

  6. Remote Operations and Ground Control Centers

    NASA Technical Reports Server (NTRS)

    Bryant, Barry S.; Lankford, Kimberly; Pitts, R. Lee

    2004-01-01

    The Payload Operations Integration Center (POIC) at the Marshall Space Flight Center supports the International Space Station (ISS) through remote interfaces around the world. The POIC was originally designed as a gateway to space for remote facilities; ranging from an individual user to a full-scale multiuser environment. This achievement was accomplished while meeting program requirements and accommodating the injection of modern technology on an ongoing basis to ensure cost effective operations. This paper will discuss the open POIC architecture developed to support similar and dissimilar remote operations centers. It will include technologies, protocols, and compromises which on a day to day basis support ongoing operations. Additional areas covered include centralized management of shared resources and methods utilized to provide highly available and restricted resources to remote users. Finally, the effort of coordinating the actions of participants will be discussed.

  7. [PVFS 2000: An operational parallel file system for Beowulf

    NASA Technical Reports Server (NTRS)

    Ligon, Walt

    2004-01-01

    The approach has been to develop Parallel Virtual File System version 2 (PVFS2) , retaining the basic philosophy of the original file system but completely rewriting the code. It shows the architecture of the server and client components. BMI - BMI is the network abstraction layer. It is designed with a common driver and modules for each protocol supported. The interface is non-blocking, and provides mechanisms for optimizations including pinning user buffers. Currently TCP/IP and GM(Myrinet) modules have been implemented. Trove -Trove is the storage abstraction layer. It provides for storing both data spaces and name/value pairs. Trove can also be implemented using different underlying storage mechanisms including native files, raw disk partitions, SQL and other databases. The current implementation uses native files for data spaces and Berkeley db for name/value pairs.

  8. Recording information on protein complexes in an information management system.

    PubMed

    Savitsky, Marc; Diprose, Jonathan M; Morris, Chris; Griffiths, Susanne L; Daniel, Edward; Lin, Bill; Daenke, Susan; Bishop, Benjamin; Siebold, Christian; Wilson, Keith S; Blake, Richard; Stuart, David I; Esnouf, Robert M

    2011-08-01

    The Protein Information Management System (PiMS) is a laboratory information management system (LIMS) designed for use with the production of proteins in a research environment. The software is distributed under the CCP4 licence, and so is available free of charge to academic laboratories. Like most LIMS, the underlying PiMS data model originally had no support for protein-protein complexes. To support the SPINE2-Complexes project the developers have extended PiMS to meet these requirements. The modifications to PiMS, described here, include data model changes, additional protocols, some user interface changes and functionality to detect when an experiment may have formed a complex. Example data are shown for the production of a crystal of a protein complex. Integration with SPINE2-Complexes Target Tracker application is also described. Copyright © 2011 Elsevier Inc. All rights reserved.

  9. Technical Note: Simple, scalable, and sensitive protocol for retrieving Bacillus anthracis (and other live bacteria) from heroin.

    PubMed

    Grass, Gregor; Ahrens, Bjoern; Schleenbecker, Uwe; Dobrzykowski, Linda; Wagner, Matthias; Krüger, Christian; Wölfel, Roman

    2016-02-01

    We describe a culture-based method suitable for isolating Bacillus anthracis and other live bacteria from heroin. This protocol was developed as a consequence of the bioforensic need to retrieve bacteria from batches of the drug associated with cases of injectional anthrax among heroin-consumers in Europe. This uncommon manifestation of infection with the notorious pathogen B. anthracis has resulted in 26 deaths between the years 2000 to 2013. Thus far, no life disease agent has been isolated from heroin during forensic investigations surrounding these incidences. Because of the conjectured very small number of disease-causing endospores in the contaminated drug it is likely that too few target sequences are available for molecular genetic analysis. Therefore, a direct culture-based approach was chosen here. Endospores of attenuated B. anthracis artificially spiked into heroin were successfully retrieved at 84-98% recovery rates using a wash solution consisting of 0.5% Tween 20 in water. Using this approach, 82 samples of un-cut heroin originating from the German Federal Criminal Police Office's heroin analysis program seized during the period between 2000 and 2014 were tested and found to be surprisingly poor in retrievable bacteria. Notably, while no B. anthracis was isolated from the drug batches, other bacteria were successfully cultured. The resulting methodical protocol is therefore suitable for analyzing un-cut heroin which can be anticipated to comprise the original microbiota from the drug's original source without interference from contaminations introduced by cutting. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Energy consumption and control response evaluations of AODV routing in WSANs for building-temperature control.

    PubMed

    Booranawong, Apidet; Teerapabkajorndet, Wiklom; Limsakul, Chusak

    2013-06-27

    The main objective of this paper is to investigate the effects of routing protocols on wireless sensor and actuator networks (WSANs), focusing on the control system response and the energy consumption of nodes in a network. We demonstrate that routing algorithms designed without considering the relationship between communication and control cannot be appropriately used in wireless networked control applications. For this purpose, an ad-hoc on-demand distance vector (AODV) routing, an IEEE 802.15.4, and a building-temperature control system are employed for this exploration. The findings from our scenarios show that the AODV routing can select a path with a high traffic load for data transmission. It takes a long time before deciding to change a new route although it experiences the unsuccessful transmission of packets. As a result, the desirable control target cannot be achieved in time, and nodes consume more energy due to frequent packet collisions and retransmissions. Consequently, we propose a simple routing solution to alleviate these research problems by modifying the original AODV routing protocol. The delay-threshold is considered to avoid any congested connection during routing procedures. The simulation results demonstrate that our solution can be appropriately applied in WSANs. Both the energy consumption and the control system response are improved.

  11. SWIFT MODELLER: a Java based GUI for molecular modeling.

    PubMed

    Mathur, Abhinav; Shankaracharya; Vidyarthi, Ambarish S

    2011-10-01

    MODELLER is command line argument based software which requires tedious formatting of inputs and writing of Python scripts which most people are not comfortable with. Also the visualization of output becomes cumbersome due to verbose files. This makes the whole software protocol very complex and requires extensive study of MODELLER manuals and tutorials. Here we describe SWIFT MODELLER, a GUI that automates formatting, scripting and data extraction processes and present it in an interactive way making MODELLER much easier to use than before. The screens in SWIFT MODELLER are designed keeping homology modeling in mind and their flow is a depiction of its steps. It eliminates the formatting of inputs, scripting processes and analysis of verbose output files through automation and makes pasting of the target sequence as the only prerequisite. Jmol (3D structure visualization tool) has been integrated into the GUI which opens and demonstrates the protein data bank files created by the MODELLER software. All files required and created by the software are saved in a folder named after the work instance's date and time of execution. SWIFT MODELLER lowers the skill level required for the software through automation of many of the steps in the original software protocol, thus saving an enormous amount of time per instance and making MODELLER very easy to work with.

  12. CFDP: The Revised Standard and Some Handy Lab Tools

    NASA Astrophysics Data System (ADS)

    Montesinos, Juan Antonio; Valverde, Alberto; Taylor, Chris; Magistrati, Giorgio

    2014-08-01

    The original recommendation for the CCSDS File Delivery Protocol (CFDP) was published in 2002 and since then it has been adopted by many NASA missions for transferring files to and from the flight segment. Conversely, ESA missions have tended to rely on adaptation of the ECSS Packet Utilisation Standard. However, there are now ESA missions under design that will be using CFDP as the standard mechanism for file transfer. The first mission that is using CFDP as File Transfer Protocol is Euclid, to be launch in 2020 and destined to orbit the second Lagrange point (L2). The CFDP engine will be integrated in the Euclid mass memory, allowing the large data files produced by the scientific instruments to be directly downloaded on a KA band link. Moreover, it has also been proposed to be used in the JUICE mission, that will study the Jupiter moons. Due to the considerable distance from Earth, Juice has extremely challenging data transfer requirements but due to the flexibility of CFDP the requirements of both missions can be met.This report aims at presenting an overview of CFDP, the new modifications presently proposed to the standard and the tools that in the Data System division at ESTEC are using for simulation, testing and verification.

  13. Solution Hybrid Selection Capture for the Recovery of Functional Full-Length Eukaryotic cDNAs From Complex Environmental Samples

    PubMed Central

    Bragalini, Claudia; Ribière, Céline; Parisot, Nicolas; Vallon, Laurent; Prudent, Elsa; Peyretaillade, Eric; Girlanda, Mariangela; Peyret, Pierre; Marmeisse, Roland; Luis, Patricia

    2014-01-01

    Eukaryotic microbial communities play key functional roles in soil biology and potentially represent a rich source of natural products including biocatalysts. Culture-independent molecular methods are powerful tools to isolate functional genes from uncultured microorganisms. However, none of the methods used in environmental genomics allow for a rapid isolation of numerous functional genes from eukaryotic microbial communities. We developed an original adaptation of the solution hybrid selection (SHS) for an efficient recovery of functional complementary DNAs (cDNAs) synthesized from soil-extracted polyadenylated mRNAs. This protocol was tested on the Glycoside Hydrolase 11 gene family encoding endo-xylanases for which we designed 35 explorative 31-mers capture probes. SHS was implemented on four soil eukaryotic cDNA pools. After two successive rounds of capture, >90% of the resulting cDNAs were GH11 sequences, of which 70% (38 among 53 sequenced genes) were full length. Between 1.5 and 25% of the cloned captured sequences were expressed in Saccharomyces cerevisiae. Sequencing of polymerase chain reaction-amplified GH11 gene fragments from the captured sequences highlighted hundreds of phylogenetically diverse sequences that were not yet described, in public databases. This protocol offers the possibility of performing exhaustive exploration of eukaryotic gene families within microbial communities thriving in any type of environment. PMID:25281543

  14. A survey of system architecture requirements for health care-based wireless sensor networks.

    PubMed

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  15. Development of a Protocol for Automated Glucose Measurement Transmission Used in Clinical Decision Support Systems Based on the Continua Design Guidelines.

    PubMed

    Meyer, Markus; Donsa, Klaus; Truskaller, Thomas; Frohner, Matthias; Pohn, Birgit; Felfernig, Alexander; Sinner, Frank; Pieber, Thomas

    2018-01-01

    A fast and accurate data transmission from glucose meter to clinical decision support systems (CDSSs) is crucial for the management of type 2 diabetes mellitus since almost all therapeutic interventions are derived from glucose measurements. Aim was to develop a prototype of an automated glucose measurement transmission protocol based on the Continua Design Guidelines and to embed the protocol into a CDSS used by healthcare professionals. A literature and market research was performed to analyze the state-of-the-art and thereupon develop, integrate and validate an automated glucose measurement transmission protocol in an iterative process. Findings from literature and market research guided towards the development of a standardized glucose measurement transmission protocol using a middleware. The interface description to communicate with the glucose meter was illustrated and embedded into a CDSS. A prototype of an interoperable transmission of glucose measurements was developed and implemented in a CDSS presenting a promising way to reduce medication errors and improve user satisfaction.

  16. Guidelines for the Design and Conduct of Clinical Studies in Knee Articular Cartilage Repair

    PubMed Central

    Mithoefer, Kai; Saris, Daniel B.F.; Farr, Jack; Kon, Elizaveta; Zaslav, Kenneth; Cole, Brian J.; Ranstam, Jonas; Yao, Jian; Shive, Matthew; Levine, David; Dalemans, Wilfried; Brittberg, Mats

    2011-01-01

    Objective: To summarize current clinical research practice and develop methodological standards for objective scientific evaluation of knee cartilage repair procedures and products. Design: A comprehensive literature review was performed of high-level original studies providing information relevant for the design of clinical studies on articular cartilage repair in the knee. Analysis of cartilage repair publications and synopses of ongoing trials were used to identify important criteria for the design, reporting, and interpretation of studies in this field. Results: Current literature reflects the methodological limitations of the scientific evidence available for articular cartilage repair. However, clinical trial databases of ongoing trials document a trend suggesting improved study designs and clinical evaluation methodology. Based on the current scientific information and standards of clinical care, detailed methodological recommendations were developed for the statistical study design, patient recruitment, control group considerations, study endpoint definition, documentation of results, use of validated patient-reported outcome instruments, and inclusion and exclusion criteria for the design and conduct of scientifically sound cartilage repair study protocols. A consensus statement among the International Cartilage Repair Society (ICRS) and contributing authors experienced in clinical trial design and implementation was achieved. Conclusions: High-quality clinical research methodology is critical for the optimal evaluation of current and new cartilage repair technologies. In addition to generally applicable principles for orthopedic study design, specific criteria and considerations apply to cartilage repair studies. Systematic application of these criteria and considerations can facilitate study designs that are scientifically rigorous, ethical, practical, and appropriate for the question(s) being addressed in any given cartilage repair research project. PMID:26069574

  17. EVALUATION OF AMMONIUM PERCHLORATE IN THE ENDOCRINE DISRUPTOR SCREENING AND TESTING PROGRAM'S MALE PUBERTAL PROTOCOL: ABILITY TO DETECT EFFECTS OF THYROID ENDPOINTS.

    EPA Science Inventory

    The U.S EPA Endocrine Disruptor Screening Program Tier 1 male pubertal protocol was designed to detect reproductive development and thyroid function. One purpose of this in vivo protocol is to detect thyrotoxicants via a number of different mechanisms of action. Here we evaluate ...

  18. Electronic-To-Optical-To-Electronic Packet-Data Conversion

    NASA Technical Reports Server (NTRS)

    Monacos, Steve

    1996-01-01

    Space-time multiplexer (STM) cell-based communication system designed to take advantage of both high throughput attainable in optical transmission links and flexibility and functionality of electronic processing, storage, and switching. Long packets segmented and transmitted optically by wavelength-division multiplexing. Performs optoelectronic and protocol conversion between electronic "store-and-forward" protocols and optical "hot-potato" protocols.

  19. Development of a Decision Support System to Predict Physicians' Rehabilitation Protocols for Patients with Knee Osteoarthritis

    ERIC Educational Resources Information Center

    Hawamdeh, Ziad M.; Alshraideh, Mohammad A.; Al-Ajlouni, Jihad M.; Salah, Imad K.; Holm, Margo B.; Otom, Ali H.

    2012-01-01

    To design a medical decision support system (MDSS) that would accurately predict the rehabilitation protocols prescribed by the physicians for patients with knee osteoarthritis (OA) using only their demographic and clinical characteristics. The demographic and clinical variables for 170 patients receiving one of three treatment protocols for knee…

  20. Enhancing reproducibility: Failures from Reproducibility Initiatives underline core challenges.

    PubMed

    Mullane, Kevin; Williams, Michael

    2017-08-15

    Efforts to address reproducibility concerns in biomedical research include: initiatives to improve journal publication standards and peer review; increased attention to publishing methodological details that enable experiments to be reconstructed; guidelines on standards for study design, implementation, analysis and execution; meta-analyses of multiple studies within a field to synthesize a common conclusion and; the formation of consortia to adopt uniform protocols and internally reproduce data. Another approach to addressing reproducibility are Reproducibility Initiatives (RIs), well-intended, high-profile, systematically peer-vetted initiatives that are intended to replace the traditional process of scientific self-correction. Outcomes from the RIs reported to date have questioned the usefulness of this approach, particularly when the RI outcome differs from other independent self-correction studies that have reproduced the original finding. As a failed RI attempt is a single outcome distinct from the original study, it cannot provide any definitive conclusions necessitating additional studies that the RI approach has neither the ability nor intent of conducting making it a questionable replacement for self-correction. A failed RI attempt also has the potential to damage the reputation of the author of the original finding. Reproduction is frequently confused with replication, an issue that is more than semantic with the former denoting "similarity" and the latter an "exact copy" - an impossible outcome in research because of known and unknown technical, environmental and motivational differences between the original and reproduction studies. To date, the RI framework has negatively impacted efforts to improve reproducibility, confounding attempts to determine whether a research finding is real. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Teleconsultation in children with abdominal pain: a comparison of physician triage recommendations and an established paediatric telephone triage protocol.

    PubMed

    Staub, Gabrielle Marmier; von Overbeck, Jan; Blozik, Eva

    2013-09-30

    Quality assessment and continuous quality feedback to the staff is crucial for safety and efficiency of teleconsultation and triage. This study evaluates whether it is feasible to use an already existing telephone triage protocol to assess the appropriateness of point-of-care and time-to-treat recommendations after teleconsultations. Based on electronic patient records, we retrospectively compared the point-of-care and time-to-treat recommendations of the paediatric telephone triage protocol with the actual recommendations of trained physicians for children with abdominal pain, following a teleconsultation. In 59 of 96 cases (61%) these recommendations were congruent with the paediatric telephone protocol. Discrepancies were either of organizational nature, due to factors such as local referral policies or gatekeeping insurance models, or of medical origin, such as milder than usual symptoms or clear diagnosis of a minor ailment. A paediatric telephone triage protocol may be applicable in healthcare systems other than the one in which it has been developed, if triage rules are adapted to match the organisational aspects of the local healthcare system.

  2. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  3. Regional citrate anticoagulation in hemodialysis: an observational study of safety, efficacy, and effect on calcium balance during routine care.

    PubMed

    Singer, Richard F; Williams, Oliver; Mercado, Chari; Chen, Bonny; Talaulikar, Girish; Walters, Giles; Roberts, Darren M

    2016-01-01

    Regional citrate hemodialysis anticoagulation is used when heparin is contraindicated, but most protocols require large infusions of calcium and frequent intradialytic plasma ionized calcium measurements. The objective of this study was to determine the safety, efficacy, and effect on calcium balance of regional citrate anticoagulation using sparse plasma ionized calcium sampling. The design of this study was observational. The setting of this study was the hospital hemodialysis center. The subjects of this study were the hospital hemodialysis patients. Dialysate calcium concentration by atomic absorption spectroscopy and total dialysate weight were used as measurements. Regional citrate anticoagulation was introduced using zero calcium dialysate, pre-dialyzer citrate infusion, and post-dialyzer calcium infusion. Infusions were adjusted based on pre- and post-dialyzer calcium measurements obtained at least twice during a 4-h dialysis. The protocol was simplified after the first 357 sessions to dispense with post-dialyzer calcium measurements. Heparin-anticoagulated sessions were performed using acetate-acidified 1.25 mmol/L calcium or citrate-acidified 1.5 mmol/L calcium dialysate. Calcium balance assessment was by complete dialysate recovery. Safety and efficacy were assessed prospectively using a point-of-care database to record ionized calcium and clinical events. Groups were compared using t test, ANOVA, Wilcoxon rank sum, or Kruskal-Wallis as appropriate. Seventy-five patients received regional citrate-anticoagulated dialysis over 1051 dialysis sessions. Of these, 357 dialysis sessions were performed using the original citrate anticoagulation protocol and 694 using the simplified protocol. Dialysis was effective and safe. Only 3 dialyzers clotted; 1 patient suffered symptomatic hypercalcemia and none suffered symptomatic hypocalcemia. Calcium balance was assessed in 15 regional citrate-anticoagulated dialysis sessions and 30 heparin-anticoagulated sessions. The median calcium loss was 0.8 mmol/h dialyzed in both groups (p = 0.43), and end of treatment ionized calcium was the same in both groups (1.07 ± 0.04 mmol/L). Our findings for calcium balance, efficacy, and safety are valid only for the protocol studied, which excluded patient with severe liver dysfunction. Regional citrate dialysis can be performed safely and effectively using a sparse plasma calcium sampling protocol. The calcium balance induced by this protocol is not different to that seen in standard heparin-anticoagulated dialysis, but in the absence of prospective studies, it is unknown whether this is optimal for patient care.

  4. Rethinking Traffic Management: Design of Optimizable Networks

    DTIC Science & Technology

    2008-06-01

    Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated

  5. The design of scenario-based training from the resilience engineering perspective: a study with grid electricians.

    PubMed

    Saurin, Tarcisio Abreu; Wachs, Priscila; Righi, Angela Weber; Henriqson, Eder

    2014-07-01

    Although scenario-based training (SBT) can be an effective means to help workers develop resilience skills, it has not yet been analyzed from the resilience engineering (RE) perspective. This study introduces a five-stage method for designing SBT from the RE view: (a) identification of resilience skills, work constraints and actions for re-designing the socio-technical system; (b) design of template scenarios, allowing the simulation of the work constraints and the use of resilience skills; (c) design of the simulation protocol, which includes briefing, simulation and debriefing; (d) implementation of both scenarios and simulation protocol; and (e) evaluation of the scenarios and simulation protocol. It is reported how the method was applied in an electricity distribution company, in order to train grid electricians. The study was framed as an application of design science research, and five research outputs are discussed: method, constructs, model of the relationships among constructs, instantiations of the method, and theory building. Concerning the last output, the operationalization of the RE perspective on three elements of SBT is presented: identification of training objectives; scenario design; and debriefing. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Issues in designing transport layer multicast facilities

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Weaver, Alfred C.

    1990-01-01

    Multicasting denotes a facility in a communications system for providing efficient delivery from a message's source to some well-defined set of locations using a single logical address. While modem network hardware supports multidestination delivery, first generation Transport Layer protocols (e.g., the DoD Transmission Control Protocol (TCP) (15) and ISO TP-4 (41)) did not anticipate the changes over the past decade in underlying network hardware, transmission speeds, and communication patterns that have enabled and driven the interest in reliable multicast. Much recent research has focused on integrating the underlying hardware multicast capability with the reliable services of Transport Layer protocols. Here, we explore the communication issues surrounding the design of such a reliable multicast mechanism. Approaches and solutions from the literature are discussed, and four experimental Transport Layer protocols that incorporate reliable multicast are examined.

  7. Guidelines for experimental design protocol and validation procedure for the measurement of heat resistance of microorganisms in milk.

    PubMed

    Condron, Robin; Farrokh, Choreh; Jordan, Kieran; McClure, Peter; Ross, Tom; Cerf, Olivier

    2015-01-02

    Studies on the heat resistance of dairy pathogens are a vital part of assessing the safety of dairy products. However, harmonized methodology for the study of heat resistance of food pathogens is lacking, even though there is a need for such harmonized experimental design protocols and for harmonized validation procedures for heat treatment studies. Such an approach is of particular importance to allow international agreement on appropriate risk management of emerging potential hazards for human and animal health. This paper is working toward establishment of a harmonized protocol for the study of the heat resistance of pathogens, identifying critical issues for establishment of internationally agreed protocols, including a harmonized framework for reporting and interpretation of heat inactivation studies of potentially pathogenic microorganisms. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Diagnosing a Failed Proof in Fault-Tolerance: A Disproving Challenge Problem

    NASA Technical Reports Server (NTRS)

    Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo

    2006-01-01

    This paper proposes a challenge problem in disproving. We describe a fault-tolerant distributed protocol designed at NASA for use in a fly-by-wire system for next-generation commercial aircraft. An early design of the protocol contains a subtle bug that is highly unlikely to be caught in fault injection testing. We describe a failed proof of the protocol's correctness in a mechanical theorem prover (PVS) with a complex unfinished proof conjecture. We use a model checking suite (SAL) to generate a concrete counterexample to the unproven conjecture to demonstrate the existence of a bug. However, we argue that the effort required in our approach is too high and propose what conditions a better solution would satisfy. We carefully describe the protocol and bug to provide a challenging but feasible case study for disproving research.

  9. Site visits to initiate recruitment in a clinical trial: does it matter who conducts the visit? Protocol for implementation in trials.

    PubMed

    Nollett, Claire; Kelson, Mark; Hood, Kerenza

    2016-11-01

    The Study Within a Trial (SWAT) program exists to 'embed research within research, so as to resolve uncertainties about the different ways of designing, conducting, analyzing, and interpreting evaluations of health and social care' (1). Published in this journal in 2013, a template for the first SWAT protocol outlined an investigation into the effects of site visits by the principal investigator on recruitment in multicentre randomized controlled trials (1). We have now designed a SWAT protocol to extend this question and ask 'does it matter who conducts the site visit?' Our aim is to provide a protocol that trials can implement to address this research question. © 2016 Chinese Cochrane Center, West China Hospital of Sichuan University and John Wiley & Sons Australia, Ltd.

  10. Comparability of the effect of storage time and temperature on serum anti-Müllerian hormone measurement between original and modified enzyme-linked immunosorbent assay.

    PubMed

    Yue, Chao-Yan; Ying, Chun-Mei

    2017-01-01

    To explore the effect of modified enzyme-linked immunosorbent assay on the AMH results is increased or decreased, and to investigate the effect of storage time and temperature on AMH measurements with and without sample premixing assay buffer using the Kangrun ELISA method. Serum AMH concentration were measured by ELISA, consistency between two kits, and comparability between original and the modified assay under different stored conditions were analyzed by Passing-Bablok regression analysis and Bland-Altman bias evaluation. There was a strong consistency between AMH concentrations measured in Kangrun ELISA and Ansh Labs ultra-sensitive AMH ELISA. Pre-mixing serum specimens with assay buffer gave consistent results compared with original assay. Modified protocol can reduce the amplitude of increase affected by sample aged and give the most consistent results regardless of storage conditions. Pre-mixing protocol did not influence the results of fresh serum or frozen serum incubation <3days at 4°C and -80°C, but when specimens detected after collection and stored in other storage conditions, should be pre-mixed with assay buffer to insure its accuracy. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. The Unanticipated Challenges Associated With Implementing an Observational Study Protocol in a Large-Scale Physical Activity and Global Positioning System Data Collection.

    PubMed

    McCrorie, Paul; Walker, David; Ellaway, Anne

    2018-04-30

    Large-scale primary data collections are complex, costly, and time-consuming. Study protocols for trial-based research are now commonplace, with a growing number of similar pieces of work being published on observational research. However, useful additions to the literature base are publications that describe the issues and challenges faced while conducting observational studies. These can provide researchers with insightful knowledge that can inform funding proposals or project development work. In this study, we identify and reflectively discuss the unforeseen or often unpublished issues associated with organizing and implementing a large-scale objectively measured physical activity and global positioning system (GPS) data collection. The SPACES (Studying Physical Activity in Children's Environments across Scotland) study was designed to collect objectively measured physical activity and GPS data from 10- to 11-year-old children across Scotland, using a postal delivery method. The 3 main phases of the project (recruitment, delivery of project materials, and data collection and processing) are described within a 2-stage framework: (1) intended design and (2) implementation of the intended design. Unanticipated challenges arose, which influenced the data collection process; these encompass four main impact categories: (1) cost, budget, and funding; (2) project timeline; (3) participation and engagement; and (4) data challenges. The main unforeseen issues that impacted our timeline included the informed consent process for children under the age of 18 years; the use of, and coordination with, the postal service to deliver study information and equipment; and the variability associated with when participants began data collection and the time taken to send devices and consent forms back (1-12 months). Unanticipated budgetary issues included the identification of some study materials (AC power adapter) not fitting through letterboxes, as well as the employment of fieldworkers to increase recruitment and the return of consent forms. Finally, we encountered data issues when processing physical activity and GPS data that had been initiated across daylight saving time. We present learning points and recommendations that may benefit future studies of similar methodology in their early stages of development. ©Paul McCrorie, David Walker, Anne Ellaway. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 30.04.2018.

  12. Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.; Siminiceanu, Radu

    2006-01-01

    Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.

  13. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  14. HABITAT ASSESSMENT METHODS

    EPA Science Inventory

    This chapter summarizes and evaluated the habitat assessment protocols of five agencies, USEPA/EMAP/SW, USGS/NAWQA, USEPA/RBP, Ohio EPA, and MDNR/MBSS. It begins with a description of the origin of the habitat indices most widely used by these agencies. Then the habitat assessmen...

  15. A psychoengineering paradigm for the neurocognitive mechanisms of biofeedback and neurofeedback.

    PubMed

    Gaume, A; Vialatte, A; Mora-Sánchez, A; Ramdani, C; Vialatte, F B

    2016-09-01

    We believe that the missing keystone to design effective and efficient biofeedback and neurofeedback protocols is a comprehensive model of the mechanisms of feedback learning. In this manuscript we review the learning models in behavioral, developmental and cognitive psychology, and derive a synthetic model of the psychological perspective on biofeedback. We afterwards review the neural correlates of feedback learning mechanisms, and present a general neuroscience model of biofeedback. We subsequently show how biomedical engineering principles can be applied to design efficient feedback protocols. We finally present an integrative psychoengineering model of the feedback learning processes, and provide new guidelines for the efficient design of biofeedback and neurofeedback protocols. We identify five key properties, (1) perceptibility=can the subject perceive the biosignal?, (2) autonomy=can the subject regulate by himself?, (3) mastery=degree of control over the biosignal, (4) motivation=rewards system of the biofeedback, and (5) learnability=possibility of learning. We conclude with guidelines for the investigation and promotion of these properties in biofeedback protocols. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Sampled-data-based consensus and containment control of multiple harmonic oscillators: A motion-planning approach

    NASA Astrophysics Data System (ADS)

    Liu, Yongfang; Zhao, Yu; Chen, Guanrong

    2016-11-01

    This paper studies the distributed consensus and containment problems for a group of harmonic oscillators with a directed communication topology. First, for consensus without a leader, a class of distributed consensus protocols is designed by using motion planning and Pontryagin's principle. The proposed protocol only requires relative information measurements at the sampling instants, without requiring information exchange over the sampled interval. By using stability theory and the properties of stochastic matrices, it is proved that the distributed consensus problem can be solved in the motion planning framework. Second, for the case with multiple leaders, a class of distributed containment protocols is developed for followers such that their positions and velocities can ultimately converge to the convex hull formed by those of the leaders. Compared with the existing consensus algorithms, a remarkable advantage of the proposed sampled-data-based protocols is that the sampling periods, communication topologies and control gains are all decoupled and can be separately designed, which relaxes many restrictions in controllers design. Finally, some numerical examples are given to illustrate the effectiveness of the analytical results.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldsmith, Steven Y.; Spires, Shannon V.

    There are currently two proposed standards for agent communication languages, namely, KQML (Finin, Lobrou, and Mayfield 1994) and the FIPA ACL. Neither standard has yet achieved primacy, and neither has been evaluated extensively in an open environment such as the Internet. It seems prudent therefore to design a general-purpose agent communications facility for new agent architectures that is flexible yet provides an architecture that accepts many different specializations. In this paper we exhibit the salient features of an agent communications architecture based on distributed metaobjects. This architecture captures design commitments at a metaobject level, leaving the base-level design and implementationmore » up to the agent developer. The scope of the metamodel is broad enough to accommodate many different communication protocols, interaction protocols, and knowledge sharing regimes through extensions to the metaobject framework. We conclude that with a powerful distributed object substrate that supports metaobject communications, a general framework can be developed that will effectively enable different approaches to agent communications in the same agent system. We have implemented a KQML-based communications protocol and have several special-purpose interaction protocols under development.« less

  18. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  19. A communication protocol for mobile satellite systems affected by rain attenuation

    NASA Technical Reports Server (NTRS)

    Lay, Norman; Dessouky, Khaled

    1992-01-01

    A communication protocol is described that has been developed as part of a K/Ka-band mobile terminal breadboard system to be demonstrated through NASA's Advanced Communications Technology Satellite (ACTS) in 1993. The protocol is aimed at providing the means for enhancing link availability and continuity by supporting real-time data rate selection and changes during rain events. Particular attention is given to the system architecture; types of links, connections, and packets; the protocol procedures; and design rationales.

  20. Xrootd in dCache - design and experiences

    NASA Astrophysics Data System (ADS)

    Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas

    2011-12-01

    dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.

  1. Application of an Original Wildfire Smoke Health Cost Benefits Transfer Protocol to the Western US, 2005-2015

    NASA Astrophysics Data System (ADS)

    Jones, Benjamin A.; Berrens, Robert P.

    2017-11-01

    Recent growth in the frequency and severity of US wildfires has led to more wildfire smoke and increased public exposure to harmful air pollutants. Populations exposed to wildfire smoke experience a variety of negative health impacts, imposing economic costs on society. However, few estimates of smoke health costs exist and none for the entire Western US, in particular, which experiences some of the largest and most intense wildfires in the US. The lack of cost estimates is troublesome because smoke health impacts are an important consideration of the overall costs of wildfire. To address this gap, this study provides the first time series estimates of PM2.5 smoke costs across mortality and several morbidity measures for the Western US over 2005-2015. This time period includes smoke from several megafires and includes years of record-breaking acres burned. Smoke costs are estimated using a benefits transfer protocol developed for contexts when original health data are not available. The novelty of our protocol is that it synthesizes the literature on choices faced by researchers when conducting a smoke cost benefit transfer. On average, wildfire smoke in the Western US creates 165 million in annual morbidity and mortality health costs.

  2. Application of an Original Wildfire Smoke Health Cost Benefits Transfer Protocol to the Western US, 2005-2015.

    PubMed

    Jones, Benjamin A; Berrens, Robert P

    2017-11-01

    Recent growth in the frequency and severity of US wildfires has led to more wildfire smoke and increased public exposure to harmful air pollutants. Populations exposed to wildfire smoke experience a variety of negative health impacts, imposing economic costs on society. However, few estimates of smoke health costs exist and none for the entire Western US, in particular, which experiences some of the largest and most intense wildfires in the US. The lack of cost estimates is troublesome because smoke health impacts are an important consideration of the overall costs of wildfire. To address this gap, this study provides the first time series estimates of PM2.5 smoke costs across mortality and several morbidity measures for the Western US over 2005-2015. This time period includes smoke from several megafires and includes years of record-breaking acres burned. Smoke costs are estimated using a benefits transfer protocol developed for contexts when original health data are not available. The novelty of our protocol is that it synthesizes the literature on choices faced by researchers when conducting a smoke cost benefit transfer. On average, wildfire smoke in the Western US creates $165 million in annual morbidity and mortality health costs.

  3. Revised Methods for Characterizing Stream Habitat in the National Water-Quality Assessment Program

    USGS Publications Warehouse

    Fitzpatrick, Faith A.; Waite, Ian R.; D'Arconte, Patricia J.; Meador, Michael R.; Maupin, Molly A.; Gurtz, Martin E.

    1998-01-01

    Stream habitat is characterized in the U.S. Geological Survey's National Water-Quality Assessment (NAWQA) Program as part of an integrated physical, chemical, and biological assessment of the Nation's water quality. The goal of stream habitat characterization is to relate habitat to other physical, chemical, and biological factors that describe water-quality conditions. To accomplish this goal, environmental settings are described at sites selected for water-quality assessment. In addition, spatial and temporal patterns in habitat are examined at local, regional, and national scales. This habitat protocol contains updated methods for evaluating habitat in NAWQA Study Units. Revisions are based on lessons learned after 6 years of applying the original NAWQA habitat protocol to NAWQA Study Unit ecological surveys. Similar to the original protocol, these revised methods for evaluating stream habitat are based on a spatially hierarchical framework that incorporates habitat data at basin, segment, reach, and microhabitat scales. This framework provides a basis for national consistency in collection techniques while allowing flexibility in habitat assessment within individual Study Units. Procedures are described for collecting habitat data at basin and segment scales; these procedures include use of geographic information system data bases, topographic maps, and aerial photographs. Data collected at the reach scale include channel, bank, and riparian characteristics.

  4. Intake Procedures in Colorado Animal Shelters

    PubMed Central

    Fagre, Anna; Olea-Popelka, Francisco; Ruch-Gallie, Rebecca

    2017-01-01

    Simple Summary Many animal shelters receive animals from different regions of the United States; particularly following natural disasters or other mass displacements. After Hurricane Katrina; Colorado experienced a surge of animal intakes from regions of the country possessing higher parasitic burden. Little is known about the extent to which shelters tailor their infectious disease screening procedures and other intake protocols based on animal origin. Using a questionnaire; shelter personnel from across the state of Colorado provided information on shelter characteristics including where they receive animals from; general intake procedures; and perceptions on infectious disease risk. We found that more shelters that take dogs in from out of state screen for heartworm and other parasitic diseases than do shelters that only take animals from within the state. No difference was seen for feline screening procedures. We also found that few shelters use widespread screening protocols and instead screen based on suspicion. Lastly; many vaccination protocols in shelters do not comply with The Association of Shelter Veterinarians Guidelines for Standards of Care in Animal Shelters. This study highlights the importance of tailoring animal intake procedures based on where the animal was transferred from. Abstract The purpose of this study was to describe intake procedures in Colorado animal shelters, compare infectious disease screening protocols in shelters taking in animals from out-of-state to shelters only accepting animals from Colorado, and analyze perceived risk of diseases in Colorado by responding shelter personnel. A questionnaire was designed and administered to shelter personnel across the state of Colorado via the survey tool SurveyMonkey© (http://www.surveymonkey.com) or a mailed hard copy. Information collected concerned general shelter characteristics and intake procedures performed in various circumstances as reported by responding shelter personnel. Only 12.5% (5/40) of respondents reported providing core vaccines to all animals upon intake at their shelter, with young age (65.0%; 26/40), pregnancy (55.0%; 22/40), and mild existing illness (40.0%; 16/40) being cited as the top reasons for not administering core vaccines. A significantly larger proportion of shelters taking animals in from around the U.S. screened for Dirofilaria immitis than shelters taking in animals only from within the state of Colorado (p = 0.001), though a majority of respondents considered cats and dogs to be at risk of heartworm and endoparasitic infection in the state of Colorado. Based on the results of this questionnaire, relatively few shelters test dogs and cats for infectious diseases and some of those utilize tests for diagnostic purposes rather than routine screening. Additionally, vaccination protocols in several shelters are not consistent with The Association of Shelter Veterinarians Guidelines for Standards of Care in Animal Shelters. This study provides important information on intake procedures in Colorado animal shelters and highlights the importance of educating shelter staff on varying risk of infection based on the history and origin of the animal being taken in. PMID:28475139

  5. Design and Evaluation of a Protocol to Assess Electronic Travel Aids for Persons Who Are Visually Impaired

    ERIC Educational Resources Information Center

    Havik, Else M.; Steyvers, Frank J. J. M.; van der Velde, Hanneke; Pinkster, J. Christiaan; Kooijman, Aart C.

    2010-01-01

    This study evaluated a protocol that was developed to assess how beneficial electronic travel aids are for persons who are visually impaired. Twenty persons with visual impairments used an electronic travel device (Trekker) for six weeks to conform to the protocol, which proved useful in identifying successful users of the device. (Contains 2…

  6. Transitions: A Classroom Management Concept Related to Effective Teaching. Student Guide. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Utah State Univ., Logan. Utah Protocol Materials Project.

    This student guide is part of a protocol learning module designed to teach the prospective teacher to make smooth transitions from one activity to another, in order to deter disruptive behavior in the course of the transition. The entire module consists of this guide, a protocol film, and testing materials. The student guide contains: (a)…

  7. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    PubMed

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  8. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks

    PubMed Central

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-01-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079

  9. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  10. Verification and validation of a reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  11. Assessing the effectiveness of the NICHD investigative interview protocol when interviewing French-speaking alleged victims of child sexual abuse in Quebec.

    PubMed

    Cyr, Mireille; Lamb, Michael E

    2009-05-01

    The study was designed to assess the effectiveness of the flexibly structured NICHD Investigative Interview Protocol for child sexual abuse (CSA) investigative interviews by police officers and mental health workers in Quebec. The NICHD Protocol was designed to operationalize "best practice" guidelines and to help forensic interviewers use open-ended prompts to facilitate free recall by alleged victims. A total of 83 interviews with 3- to 13-year-old alleged victims were matched with 83 interviews conducted by the same interviewers before they were trained to use the Protocol. Interviews were matched with respect to the children's ages, children-perpetrator relationships, and the types and frequency of abuse. Coders categorized each of the prompts used to elicit information about the abuse and tabulated the numbers of new forensically relevant details provided in each response. Interviewers used three times as many open-ended prompts in Protocol interviews than in non-Protocol interviews, whereas use of all other types of questions was halved, and the total number of questions asked decreased by 25%. Protocol-guided interviews yielded more details than comparison interviews. The mean number of details per prompt increased from 3 to 5 details when the Protocol was used. Even with young children, interviewers using the Protocol employed more invitations to elicit forensically relevant details. French-speaking investigators using the NICHD Protocol used open-ended prompts rather than focused questions when interviewing alleged victims. In addition, these interviewers needed fewer questions to get relevant information when using the Protocol. A French version of the NICHD Protocol is now available to police officers and social workers who investigate the alleged sexual abuse of young children in French-speaking countries. This French version allowed trained interviewers to increase the use of invitations and reduce the use of more focused and risky questions. When the number of questions was controlled, more central details and more details in total were obtained in Protocol interviews, because the average prompt elicited more detailed answers in Protocol interviews. However, learning to use the NICHD Protocol required extended training and continued feedback sessions to maintain the high quality of interviewing.

  12. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  13. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  14. Department of Clinical Investigation Annual Research Progress Report, Fiscal Year 1993. Volume 1

    DTIC Science & Technology

    1993-10-01

    monocytes, total periphernuclear cells, and alveolar macrophages from four study groups : patients with concurrent Mycobacterium tuberculosis (MTBI and...research design, similar to the Solomon Four Group design will be utilized to determine if the educational intervention provided has an impact on nurses...members with approved protocols: 173 Number of approved protocols held by this group : 230 Drug evaluation/comparison studies : 94 (Does not include

  15. Test Protocol for Room-to-Room Distribution of Outside Air by Residential Ventilation Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barley, C. D.; Anderson, R.; Hendron, B.

    2007-12-01

    This test and analysis protocol has been developed as a practical approach for measuring outside air distribution in homes. It has been used successfully in field tests and has led to significant insights on ventilation design issues. Performance advantages of more sophisticated ventilation systems over simpler, less-costly designs have been verified, and specific problems, such as airflow short-circuiting, have been identified.

  16. Enhanced Internet firewall design using stateful filters final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchins, J.A.; Simons, R.W.

    1997-08-01

    The current state-of-the-art in firewall design provides a lot of security for company networks, but normally at the expense of performance and/or functionality. Sandia researched a new approach to firewall design which incorporates a highly stateful approach, allowing much more flexibility for protocol checking and manipulation while retaining performance. A prototype system was built and multiple protocol policy modules implemented to test the concept. The resulting system, though implemented on a low-power workstation, performed almost at the same performance as Sandia`s current firewall.

  17. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference

    PubMed Central

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale. PMID:28243453

  18. Selection for production-related traits in Pelargonium zonale: improved design and analysis make all the difference.

    PubMed

    Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter

    2017-01-01

    Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale .

  19. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, J; Chan, F; Newman, B

    2014-06-15

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze themore » scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds.« less

  20. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  1. A survey on routing protocols for large-scale wireless sensor networks.

    PubMed

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. "Large-scale" means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed.

  2. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    PubMed Central

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed. PMID:22163808

  3. Fully device-independent quantum key distribution.

    PubMed

    Vazirani, Umesh; Vidick, Thomas

    2014-10-03

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  4. PET/CT in giant cell arteritis: High 18F-FDG uptake in the temporal, occipital and vertebral arteries.

    PubMed

    Rehak, Z; Vasina, J; Ptacek, J; Kazda, T; Fojtik, Z; Nemec, P

    18 F-FDG PET/CT imaging is useful in patients with fever of unknown origin and can detect giant cell arteritis in extracranial large arteries. However, it is usually assumed that temporal arteries cannot be visualized with a PET/CT scanner due to their small diameter. Three patients with clinical symptoms of temporal arteritis were examined using a standard whole body PET/CT protocol (skull base - mid thighs) followed by a head PET/CT scan using the brain protocol. High 18 F-FDG uptake in the aorta and some arterial branches were detected in all 3 patients with the whole body protocol. Using the brain protocol, head imaging led to detection of high 18 F-FDG uptake in temporal arteries as well as in their branches (3 patients), in occipital arteries (2 patients) and also in vertebral arteries (3 patients). Copyright © 2016 Elsevier España, S.L.U. y SEMNIM. All rights reserved.

  5. Fully Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  6. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

    PubMed Central

    Liu, Li; Guo, Fen-Zhuo; Qin, Su-Juan; Wen, Qiao-Yan

    2017-01-01

    Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen. PMID:28198808

  7. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  8. 48 CFR 1352.235-70 - Protection of human subjects.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...

  9. 48 CFR 1352.235-71 - Protection of human subjects-exemption.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...

  10. 48 CFR 1352.235-70 - Protection of human subjects.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...

  11. 48 CFR 1352.235-71 - Protection of human subjects-exemption.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...

  12. 48 CFR 1352.235-70 - Protection of human subjects.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...

  13. 48 CFR 1352.235-71 - Protection of human subjects-exemption.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...

  14. 48 CFR 1352.235-71 - Protection of human subjects-exemption.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...

  15. 48 CFR 1352.235-71 - Protection of human subjects-exemption.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...

  16. 48 CFR 1352.235-70 - Protection of human subjects.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...

  17. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  18. An energy-aware routing protocol for query-based applications in wireless sensor networks.

    PubMed

    Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.

  19. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  20. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    PubMed Central

    Crespi, Noel

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640

  1. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  2. Engagement, Alignment, and Rigor as Vital Signs of High-Quality Instruction: A Classroom Visit Protocol for Instructional Improvement and Research

    ERIC Educational Resources Information Center

    Early, Diane M.; Rogge, Ronald D.; Deci, Edward L.

    2014-01-01

    This paper investigates engagement (E), alignment (A), and rigor (R) as vital signs of high-quality teacher instruction as measured by the EAR Classroom Visit Protocol, designed by the Institute for Research and Reform in Education (IRRE). Findings indicated that both school leaders and outside raters could learn to score the protocol with…

  3. Distributed robust finite-time nonlinear consensus protocols for multi-agent systems

    NASA Astrophysics Data System (ADS)

    Zuo, Zongyu; Tie, Lin

    2016-04-01

    This paper investigates the robust finite-time consensus problem of multi-agent systems in networks with undirected topology. Global nonlinear consensus protocols augmented with a variable structure are constructed with the aid of Lyapunov functions for each single-integrator agent dynamics in the presence of external disturbances. In particular, it is shown that the finite settling time of the proposed general framework for robust consensus design is upper bounded for any initial condition. This makes it possible for network consensus problems to design and estimate the convergence time offline for a multi-agent team with a given undirected information flow. Finally, simulation results are presented to demonstrate the performance and effectiveness of our finite-time protocols.

  4. Design of MPPT Controller Monitoring Software Based on QT Framework

    NASA Astrophysics Data System (ADS)

    Meng, X. Z.; Lu, P. G.

    2017-10-01

    The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.

  5. Advanced immediate functional loading: requirements for long-term success in modern implant dentistry.

    PubMed

    Romanos, Georgios E

    2014-01-01

    There are benefits to be derived from the use of advanced surgical protocols in conjunction with immediate functional loading using various dental implant designs and implant-abutment connections. Clinical protocols with simultaneous bone grafting, immediate implant placement, and/or sinus augmentations when a shortened treatment period is needed are included in this report, with the aim of providing understanding of the main protocol characteristics and prerequisites for long-term success in implant dentistry. This article presents three clinical cases that illustrate possibilities for advanced immediate loading using different implant designs. It demonstrates treatment of severe bone defects and the facilitation of placing implants in regenerated bone that can be immediately loaded.

  6. Electroretinogram analysis of the visual response in zebrafish larvae.

    PubMed

    Chrispell, Jared D; Rebrik, Tatiana I; Weiss, Ellen R

    2015-03-16

    The electroretinogram (ERG) is a noninvasive electrophysiological method for determining retinal function. Through the placement of an electrode on the surface of the cornea, electrical activity generated in response to light can be measured and used to assess the activity of retinal cells in vivo. This manuscript describes the use of the ERG to measure visual function in zebrafish. Zebrafish have long been utilized as a model for vertebrate development due to the ease of gene suppression by morpholino oligonucleotides and pharmacological manipulation. At 5-10 dpf, only cones are functional in the larval retina. Therefore, the zebrafish, unlike other animals, is a powerful model system for the study of cone visual function in vivo. This protocol uses standard anesthesia, micromanipulation and stereomicroscopy protocols that are common in laboratories that perform zebrafish research. The outlined methods make use of standard electrophysiology equipment and a low light camera to guide the placement of the recording microelectrode onto the larval cornea. Finally, we demonstrate how a commercially available ERG stimulator/recorder originally designed for use with mice can easily be adapted for use with zebrafish. ERG of larval zebrafish provides an excellent method of assaying cone visual function in animals that have been modified by morpholino oligonucleotide injection as well as newer genome engineering techniques such as Zinc Finger Nucleases (ZFNs), Transcription Activator-Like Effector Nucleases (TALENs), and Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR)/Cas9, all of which have greatly increased the efficiency and efficacy of gene targeting in zebrafish. In addition, we take advantage of the ability of pharmacological agents to penetrate zebrafish larvae to evaluate the molecular components that contribute to the photoresponse. This protocol outlines a setup that can be modified and used by researchers with various experimental goals.

  7. A dedicated neonatal brain imaging system

    PubMed Central

    Winchman, Tobias; Padormo, Francesco; Teixeira, Rui; Wurie, Julia; Sharma, Maryanne; Fox, Matthew; Hutter, Jana; Cordero‐Grande, Lucilio; Price, Anthony N.; Allsop, Joanna; Bueno‐Conde, Jose; Tusor, Nora; Arichi, Tomoki; Edwards, A. D.; Rutherford, Mary A.; Counsell, Serena J.; Hajnal, Joseph V.

    2016-01-01

    Purpose The goal of the Developing Human Connectome Project is to acquire MRI in 1000 neonates to create a dynamic map of human brain connectivity during early development. High‐quality imaging in this cohort without sedation presents a number of technical and practical challenges. Methods We designed a neonatal brain imaging system (NBIS) consisting of a dedicated 32‐channel receive array coil and a positioning device that allows placement of the infant's head deep into the coil for maximum signal‐to‐noise ratio (SNR). Disturbance to the infant was minimized by using an MRI‐compatible trolley to prepare and transport the infant and by employing a slow ramp‐up and continuation of gradient noise during scanning. Scan repeats were minimized by using a restart capability for diffusion MRI and retrospective motion correction. We measured the 1) SNR gain, 2) number of infants with a completed scan protocol, and 3) number of anatomical images with no motion artifact using NBIS compared with using an adult 32‐channel head coil. Results The NBIS has 2.4 times the SNR of the adult coil and 90% protocol completion rate. Conclusion The NBIS allows advanced neonatal brain imaging techniques to be employed in neonatal brain imaging with high protocol completion rates. Magn Reson Med 78:794–804, 2017. © 2016 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution‐NonCommercial‐NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non‐commercial and no modifications or adaptations are made. PMID:27643791

  8. Development of a Web Portal for Physical Activity and Symptom Tracking in Oncology Patients: Protocol for a Prospective Cohort Study.

    PubMed

    Marthick, Michael; Dhillon, Haryana M; Alison, Jennifer A; Cheema, Birinder S; Shaw, Tim

    2018-05-15

    Significant benefits accrue from increasing physical activity levels in people with a history of cancer. Physical activity levels can be increased using behavioral change interventions in this population. Access to Web portals and provision of activity monitors to provide feedback may support behavior change by encouraging patient engagement in physical therapy. The Web portal evaluated in this study will provide a system to monitor physical activity and sleep, for use by both clinician and patient, along with symptom and health-related quality of life tracking capabilities. The aim of this study was to outline a protocol for a feasibility study focused on a Web-based portal that provides activity monitoring and personalized messaging to increase physical activity in people with cancer. Using a longitudinal cohort design, people with cancer will be serially allocated to 3 intervention cohorts of 20 participants each and followed for 10 weeks. Cohort 1 will be provided a wearable activity monitor and access to a Web-based portal. Cohort 2 will receive the same content as Cohort 1 and in addition will receive a weekly activity summary message. Cohort 3 will receive the same content as Cohorts 1 and 2 and in addition will receive a personalized weekly coaching message. Feasibility of the use of the portal is the primary outcome. Results are expected in early 2018. Outcome measures will include goal attainment and completion rate. This study will provide information about the feasibility of investigating eHealth initiatives to promote physical activity in people with cancer. RR1-10.2196/9586. ©Michael Marthick, Haryana M Dhillon, Jennifer A Alison, Birinder S Cheema, Tim Shaw. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 15.05.2018.

  9. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    PubMed

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics Committee and of "second opinions" from authorized physicians.

  10. Efficacy of bone substitute material in preserving volume when placing a maxillary immediate complete denture: study protocol for the PANORAMIX randomized controlled trial.

    PubMed

    Rignon-Bret, Christophe; Hadida, Alain; Aidan, Alexis; Nguyen, Thien-Huong; Pasquet, Gerard; Fron-Chabouis, Helene; Wulfman, Claudine

    2016-05-20

    Bone preservation is an essential issue in the context of last teeth extraction and complete edentulism. The intended treatment, whether a complete denture or an implant placement, is facilitated with a voluminous residual ridge. Bone resorption after multiple extractions has not been as well studied as the bone resorption that occurs after the extraction of a single tooth. Recent advances in bone substitute materials have revived this issue. The purpose of this study is to evaluate the interest in using bone substitute material to fill the socket after last teeth extraction in a maxillary immediate complete denture procedure compared with the conventional protocol without socket filling. A randomized, controlled, clinical trial was designed. The 34 participants eligible for maxillary immediate complete denture were divided into two groups. Complete dentures were prepared despite persistence of the last anterior teeth. The control group received a conventional treatment including denture placement immediately after extractions. In the experimental group, in addition to the immediate denture placement, a xenograft bone-substitute material (Bio-Oss Collagen®) was placed in the fresh sockets. The primary outcome of the study is to compare mean bone ridge height loss 1 year after maxillary immediate complete denture placement, with or without bone-substitute material, in incisor and canine sockets. The secondary outcomes are to compare the average bone ridge height and width loss for each extraction site. An original quantitative evaluation method using cone beam computed tomography was designed for reproducible measurements, with a radio-opaque denture duplicate. Two independent operators perform the radiologic measurements. The immediate complete denture technique limits bone resorption in multiple extraction situations and thus allows better denture retention and better options for implant placement. To compare the benefit of using any bone socket-filling material, we proposed a quantitative evaluation protocol of resorption in the specific case of the last anterior maxillary teeth extraction with immediate denture placement. ClinicalTrials.gov, NCT02120053 . Registered on 18 April 2014.

  11. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  12. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  13. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  14. An Approach to Verification and Validation of a Reliable Multicasting Protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1994-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or offnominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  15. An approach to verification and validation of a reliable multicasting protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  16. Design and development of compact monitoring system for disaster remote health centres.

    PubMed

    Santhi, S; Sadasivam, G S

    2015-02-01

    To enhance speedy communication between the patient and the doctor through newly proposed routing protocol at the mobile node. The proposed model is applied for a telemedicine application during disaster recovery management. In this paper, Energy Efficient Link Stability Routing Protocol (EELSRP) has been developed by simulation and real time. This framework is designed for the immediate healing of affected persons in remote areas, especially at the time of the disaster where there is no hospital proximity. In case of disasters, there might be an outbreak of infectious diseases. In such cases, the patient's medical record is also transferred by the field operator from disaster place to the hospital to facilitate the identification of the disease-causing agent and to prescribe the necessary medication. The heterogeneous networking framework provides reliable, energy efficientand speedy communication between the patient and the doctor using the proposed routing protocol at the mobile node. The performance of the simulation and real time versions of the Energy Efficient Link Stability Routing Protocol (EELSRP) protocol has been analyzed. Experimental results prove the efficiency of the real-time version of EESLRP protocol. The packet delivery ratio and throughput of the real time version of EELSRP protocol is increased by 3% and 10%, respectively, when compared to the simulated version of EELSRP. The end-to-end delay and energy consumption are reduced by 10% and 2% in the real time version of EELSRP.

  17. Latency correction of event-related potentials between different experimental protocols

    NASA Astrophysics Data System (ADS)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  18. The Effect of Therapeutic Exercise on Long-Standing Adductor-Related Groin Pain in Athletes: Modified Hölmich Protocol

    PubMed Central

    Yousefzadeh, Abbas; Olyaei, Gholam Reza; Naseri, Nasrin; Khazaeipour, Zahra

    2018-01-01

    Objective The Hölmich protocol in therapeutic exercise is the most appropriate method for the treatment of long-standing adductor-related groin pain (LSAGP). Herein, we evaluated a modified Hölmich protocol to resolve the possible limitations intrinsic to the Hölmich protocol in terms of the rate of return to sport and the recovery period for athletes with LSAGP. Design The study followed a single-blind, before/after study design, where 15 athletes with LSAGP (mean age = 26.13 years; SD = 4.48) performed a 10-week modified Hölmich therapeutic exercise protocol. Results Outcome scores related to pain, hip adductor and abductor muscle strengths, and the ratio of maximum isometric and eccentric hip adduction to abduction strength increased significantly. Likewise, hip abduction and internal rotation ROM improved significantly compared to that at baseline. Furthermore, functional records (t-test, Edgren Side Step Test, and Triple Hop Test) showed significant improvement after treatment. Finally, 13 athletes (86.6% of the participants) successfully returned to sports activity in a mean time of 12.06 weeks (SD = 3.41). Conclusion The findings of this study objectively show that the modified Hölmich protocol may be safer and more effective than the Hölmich protocol in athletes with LSAGP in promoting their return to sports activity. This trial is registered with  IRCT2016080829269N1. PMID:29721339

  19. The BACnet Campus Challenge - Part 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Masica, Ken; Tom, Steve

    Here, the BACnet protocol was designed to achieve interoperability among building automation vendors and evolve over time to include new functionality as well as support new communication technologies such as the Ethernet and IP protocols as they became prevalent and economical in the market place. For large multi-building, multi-vendor campus environments, standardizing on the BACnet protocol as an implementation strategy can be a key component in meeting the challenge of an interoperable, flexible, and scalable building automation system. The interoperability of BACnet is especially important when large campuses with legacy equipment have DDC upgrades to facilities performed over different timemore » frames and use different contractors that install equipment from different vendors under the guidance of different campus HVAC project managers. In these circumstances, BACnet can serve as a common foundation for interoperability when potential variability exists in approaches to the design-build process by numerous parties over time. Likewise, BACnet support for a range of networking protocols and technologies can be a key strategy for achieving flexible and scalable automation systems as campuses and enterprises expand networking infrastructures using standard interoperable protocols like IP and Ethernet.« less

  20. The BACnet Campus Challenge - Part 1

    DOE PAGES

    Masica, Ken; Tom, Steve

    2015-12-01

    Here, the BACnet protocol was designed to achieve interoperability among building automation vendors and evolve over time to include new functionality as well as support new communication technologies such as the Ethernet and IP protocols as they became prevalent and economical in the market place. For large multi-building, multi-vendor campus environments, standardizing on the BACnet protocol as an implementation strategy can be a key component in meeting the challenge of an interoperable, flexible, and scalable building automation system. The interoperability of BACnet is especially important when large campuses with legacy equipment have DDC upgrades to facilities performed over different timemore » frames and use different contractors that install equipment from different vendors under the guidance of different campus HVAC project managers. In these circumstances, BACnet can serve as a common foundation for interoperability when potential variability exists in approaches to the design-build process by numerous parties over time. Likewise, BACnet support for a range of networking protocols and technologies can be a key strategy for achieving flexible and scalable automation systems as campuses and enterprises expand networking infrastructures using standard interoperable protocols like IP and Ethernet.« less

  1. Development of the protocol for purification of artemisinin based on combination of commercial and computationally designed adsorbents.

    PubMed

    Piletska, Elena V; Karim, Kal; Cutler, Malcolm; Piletsky, Sergey A

    2013-01-01

    A polymeric adsorbent for extraction of the antimalarial drug artemisinin from Artemisia annua L. was computationally designed. This polymer demonstrated a high capacity for artemisinin (120 mg g(-1) ), quantitative recovery (87%) and was found to be an effective material for purification of artemisinin from complex plant matrix. The artemisinin quantification was conducted using an optimised HPLC-MS protocol, which was characterised by high precision and linearity in the concentration range between 0.05 and 2 μg mL(-1) . Optimisation of the purification protocol also involved screening of commercial adsorbents for the removal of waxes and other interfering natural compounds, which inhibit the crystallisation of artemisinin. As a result of a two step-purification protocol crystals of artemisinin were obtained, and artemisinin purity was evaluated as 75%. By performing the second stage of purification twice, the purity of artemisinin can be further improved to 99%. The developed protocol produced high-purity artemisinin using only a few purification steps that makes it suitable for large scale industrial manufacturing process. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Violation of a Leggett–Garg inequality with ideal non-invasive measurements

    PubMed Central

    Knee, George C.; Simmons, Stephanie; Gauger, Erik M.; Morton, John J.L.; Riemann, Helge; Abrosimov, Nikolai V.; Becker, Peter; Pohl, Hans-Joachim; Itoh, Kohei M.; Thewalt, Mike L.W.; Briggs, G. Andrew D.; Benjamin, Simon C.

    2012-01-01

    The quantum superposition principle states that an entity can exist in two different states simultaneously, counter to our 'classical' intuition. Is it possible to understand a given system's behaviour without such a concept? A test designed by Leggett and Garg can rule out this possibility. The test, originally intended for macroscopic objects, has been implemented in various systems. However to date no experiment has employed the 'ideal negative result' measurements that are required for the most robust test. Here we introduce a general protocol for these special measurements using an ancillary system, which acts as a local measuring device but which need not be perfectly prepared. We report an experimental realization using spin-bearing phosphorus impurities in silicon. The results demonstrate the necessity of a non-classical picture for this class of microscopic system. Our procedure can be applied to systems of any size, whether individually controlled or in a spatial ensemble. PMID:22215081

  3. Innovative molecular-based fluorescent nanoparticles for multicolor single particle tracking in cells

    NASA Astrophysics Data System (ADS)

    Daniel, Jonathan; Godin, Antoine G.; Palayret, Matthieu; Lounis, Brahim; Cognet, Laurent; Blanchard-Desce, Mireille

    2016-03-01

    Based on an original molecular-based design, we present bright and photostable fluorescent organic nanoparticles (FONs) showing excellent colloidal stability in various aqueous environments. Complementary near-infrared emitting and green emitting FONs were prepared using a simple, fast and robust protocol. Both types of FONs could be simultaneously imaged at the single-particle level in solution as well as in biological environments using a monochromatic excitation and a dual-color fluorescence microscope. No evidence of acute cytotoxicity was found upon incubation of live cells with mixed solutions of FONs, and both types of nanoparticles were found internalized in the cells where their motion could be simultaneously tracked at video-rate up to minutes. These fluorescent organic nanoparticles open a novel non-toxic alternative to existing nanoparticles for imaging biological structures, compatible with live-cell experiments and specially fitted for multicolor single particle tracking.

  4. Forensic Identification of Gender from Fingerprints.

    PubMed

    Huynh, Crystal; Brunelle, Erica; Halámková, Lenka; Agudelo, Juliana; Halámek, Jan

    2015-11-17

    In the past century, forensic investigators have universally accepted fingerprinting as a reliable identification method, which relies mainly on pictorial comparisons. Despite developments to software systems in order to increase the probability and speed of identification, there has been limited success in the efforts that have been made to move away from the discipline's absolute dependence on the existence of a prerecorded matching fingerprint. Here, we have revealed that an information-rich latent fingerprint has not been used to its full potential. In our approach, the content present in the sweat left behind-namely the amino acids-can be used to determine physical such as gender of the originator. As a result, we were able to focus on the biochemical content in the fingerprint using a biocatalytic assay, coupled with a specially designed extraction protocol, for determining gender rather than focusing solely on the physical image.

  5. Robustness of composite pulse sequences to time-dependent noise

    NASA Astrophysics Data System (ADS)

    Kabytayev, Chingiz; Green, Todd J.; Khodjasteh, Kaveh; Viola, Lorenza; Biercuk, Michael J.; Brown, Kenneth R.

    2014-03-01

    Quantum control protocols can minimize the effect of noise sources that reduce the quality of quantum operations. Originally developed for NMR, composite pulse sequences correct for unknown static control errors . We study these compensating pulses in the general case of time-varying Gaussian control noise using a filter-function approach and detailed numerics. Three different noise models were considered in this work: amplitude noise, detuning noise and simultaneous presence of both noises. Pulse sequences are shown to be robust to noise up to frequencies as high as ~10% of the Rabi frequency. Robustness of pulses designed for amplitude noise is explained using a geometric picture that naturally follows from filter function. We also discuss future directions including new pulses correcting for noise of certain frequency. True J. Merrill and Kenneth R. Brown. arXiv:1203.6392v1. In press Adv. Chem. Phys. (2013)

  6. Designing a standardized oral health survey for the tri-services.

    PubMed

    Chisick, M; Arthur, J S; York, A; Poindexter, F

    1994-03-01

    To address a Congressional directive for a comprehensive study of the military medical care system (including dental care), the Tri-Service Dental Chiefs convened a panel of dental epidemiologists to develop a standardized protocol for assessing the oral health of soldiers, sailors, and airmen. This paper discusses previous military and civilian oral health surveys and outlines key design features of the common military protocol that evolved from this critical review of the literature.

  7. High Cycle Fatigue (HCF) Science and Technology Program 2002 Annual Report

    DTIC Science & Technology

    2003-08-01

    Turbine Engine Airfoils, Phase I 4.3 Probabilistic Design of Turbine Engine Airfoils, Phase II 4.4 Probabilistic Blade Design System 4.5...XTL17/SE2 7.4 Conclusion 8.0 TEST AND EVALUATION 8.1 Characterization Test Protocol 8.2 Demonstration Test Protocol 8.3 Development of Multi ...transparent and opaque overlays for processing. The objective of the SBIR Phase I program was to identify and evaluate promising methods for

  8. Design and implementation of a telemedicine system using Bluetooth protocol and GSM/GPRS network, for real time remote patient monitoring.

    PubMed

    Jasemian, Yousef; Nielsen, Lars Arendt

    2005-01-01

    This paper introduces the design and implementation of a generic wireless and Real-time Multi-purpose Health Care Telemedicine system applying Bluetooth protocol, Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS). The paper explores the factors that should be considered when evaluating different technologies for application in telemedicine system. The design and implementation of an embedded wireless communication platform utilising Bluetooth protocol is described, and the implementation problems and limitations are investigated. The system is tested and its telecommunication general aspects are verified. The results showed that the system has (97.9 +/- 1.3)% Up-time, 2.5 x 10(-5) Bit Error Rate, 1% Dropped Call Rate, 97.4% Call Success Rate, 5 second transmission delay in average, (3.42 +/- 0.11) kbps throughput, and the system may have application in electrocardiography.

  9. An evidence-based gamified mHealth intervention for overweight young adults with maladaptive eating habits: study protocol for a randomized controlled trial.

    PubMed

    Podina, Ioana R; Fodor, Liviu A; Cosmoiu, Ana; Boian, Rareș

    2017-12-12

    Cognitive behavior therapy (CBT) is the first-line of treatment for overweight and obesity patients whose problems originate in maladaptive eating habits (e.g., emotional eating). However, in-person CBT is currently difficult to access by large segments of the population. The proposed SIGMA intervention (i.e., the Self-help, Integrated, and Gamified Mobile-phone Application) is a mHealth intervention based on CBT principles. It specifically targets overweight young adults with underlying maladaptive behaviors and cognitions regarding food. The SIGMA app was designed as a serious game and intended to work as a standalone app for weight maintenance or alongside a calorie-restrictive diet for weight loss. It uses a complex and novel scoring system that allows points earned within the game to be supplemented by points earned during outdoor activities with the help of an embedded pedometer. The efficacy of the SIGMA mHealth intervention will be investigated within a randomized, placebo-controlled trial. The intervention will be set to last 2 months with a 3-month follow-up. Selected participants will be young overweight adults with non-clinical maladaptive eating habits embodied by food cravings, binge eating, and emotional eating. The primary outcomes will be represented by changes in (1) self-reported maladaptive thoughts related to eating and body weight, (2) self-reported maladaptive eating behaviors in the range of urgent food cravings, emotional eating or binge eating, (3) as well as biased attentional processing of food items as indexed by reaction times. Secondary outcomes will be represented by changes in weight, Body Mass Index, general mood, and physical activity as indexed by the number of steps per day. Through an evidence-based cognitive behavioral approach and a user-friendly game interface, the SIGMA intervention offers a significant contribution to the development of a cost-effective and preventive self-help tool for young overweight adults with maladaptive eating habits. ISRCTN, ID: 70907354 . Registered on 6 February 2017. The ISRCTN registration is in line with the World Health Organization Trial Registration Data Set. The present paper represents the original version of the protocol. Any changes to the protocol will be communicated to ISRCTN.

  10. The deployment of routing protocols in distributed control plane of SDN.

    PubMed

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  11. Isolation and culture of human multipotent stromal cells from the pancreas.

    PubMed

    Seeberger, Karen L; Eshpeter, Alana; Korbutt, Gregory S

    2011-01-01

    Mesenchymal stem cells, also termed multipotent mesenchymal stromal cells (MSCs), can be isolated from most adult tissues. Although the exact origin of MSCs expanded from the human pancreas has not been resolved, we have developed protocols to isolate and expand MSCs from human pancreatic tissue that remains after islet procurement. Similar to techniques used to isolate MSCs from bone marrow, pancreatic MSCs are isolated based on their cell adherence, expression of several cell surface antigens, and multilineage differentiation. The protocols for isolating, characterizing, and differentiating MSCs from the pancreas are presented in this chapter.

  12. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  13. Rational design of small-molecule stabilizers of spermine synthase dimer by virtual screening and free energy-based approach.

    PubMed

    Zhang, Zhe; Martiny, Virginie; Lagorce, David; Ikeguchi, Yoshihiko; Alexov, Emil; Miteva, Maria A

    2014-01-01

    Snyder-Robinson Syndrome (SRS) is a rare mental retardation disorder which is caused by the malfunctioning of an enzyme, the spermine synthase (SMS), which functions as a homo-dimer. The malfunctioning of SMS in SRS patients is associated with several identified missense mutations that occur away from the active site. This investigation deals with a particular SRS-causing mutation, the G56S mutation, which was shown computationally and experimentally to destabilize the SMS homo-dimer and thus to abolish SMS enzymatic activity. As a proof-of-concept, we explore the possibility to restore the enzymatic activity of the malfunctioning SMS mutant G56S by stabilizing the dimer through small molecule binding at the mutant homo-dimer interface. For this purpose, we designed an in silico protocol that couples virtual screening and a free binding energy-based approach to identify potential small-molecule binders on the destabilized G56S dimer, with the goal to stabilize it and thus to increase SMS G56S mutant activity. The protocol resulted in extensive list of plausible stabilizers, among which we selected and tested 51 compounds experimentally for their capability to increase SMS G56S mutant enzymatic activity. In silico analysis of the experimentally identified stabilizers suggested five distinctive chemical scaffolds. This investigation suggests that druggable pockets exist in the vicinity of the mutation sites at protein-protein interfaces which can be used to alter the disease-causing effects by small molecule binding. The identified chemical scaffolds are drug-like and can serve as original starting points for development of lead molecules to further rescue the disease-causing effects of the Snyder-Robinson syndrome for which no efficient treatment exists up to now.

  14. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  15. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  16. Bell nonlocality: a resource for device-independent quantum information protocols

    NASA Astrophysics Data System (ADS)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  17. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  18. Development of a real-time PCR protocol for the species origin confirmation of isolated animal particles detected by NIRM.

    PubMed

    Fumière, O; Marien, A; Fernández Pierna, J A; Baeten, V; Berben, G

    2010-08-01

    At present, European legislation prohibits totally the use of processed animal proteins in feed for all farmed animals (Commission Regulation (EC) No. 1234/2003-extended feed ban). A softening of the feed ban for non-ruminants would nevertheless be considered if alternative methods could be used to gain more information concerning the species origin of processed animal proteins than that which can be provided by classical optical microscopy. This would allow control provisions such as the ban of feeding animals with proteins from the same species or intra-species recycling (Regulation (EC) No. 1774/2002). Two promising alternative methods, near-infrared microscopy (NIRM) and real-time polymerase chain reaction (PCR), were combined to authenticate, at the species level, the presence of animal particles. The paper describes the improvements of the real-time PCR method made to the DNA extraction protocol, allowing five PCR analyses to be performed with the DNA extracted from a single particle.

  19. Does adopting a prenatal substance use protocol reduce racial disparities in CPS reporting related to maternal drug use? A California case study.

    PubMed

    Roberts, S C M; Zahnd, E; Sufrin, C; Armstrong, M A

    2015-02-01

    This study examined whether adopting a standardized prenatal substance use protocol (protocol) in a hospital labor and delivery unit reduced racial disparities in reporting to child protective services (CPS) related to maternal drug use during pregnancy. This study used an interrupted time series design with a non-equivalent control. One hospital adopted a protocol and another hospital group serving a similar geographic population did not change protocols. Data on CPS reporting disparities from these hospitals over 3.5 years were analyzed using segmented regression. In the hospital that adopted the protocol, almost five times more black than white newborns were reported during the study period. Adopting the protocol was not associated with reduced disparities. Adopting a protocol cannot be assumed to reduce CPS reporting disparities. Efforts to encourage hospitals to adopt protocols as a strategy to reduce disparities may be misguided. Other strategies to reduce disparities are needed.

  20. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  1. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  2. SPIRIT 2013 Statement: Defining Standard Protocol Items for Clinical Trials

    PubMed Central

    Chan, An-Wen; Tetzlaff, Jennifer M.; Altman, Douglas G.; Laupacis, Andreas; Gøtzsche, Peter C.; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A.; Doré, Caroline J.; Parulekar, Wendy R.; Summerskill, William S.M.; Groves, Trish; Schulz, Kenneth F.; Sox, Harold C.; Rockhold, Frank W.; Rennie, Drummond; Moher, David

    2016-01-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders. PMID:23295957

  3. SPIRIT 2013 statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Doré, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2013-02-05

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol.The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  4. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  5. Evaluation of peak force of a manually operated chiropractic adjusting instrument with an adapter for use in animals.

    PubMed

    Duarte, Felipe Coutinho Kullmann; Kolberg, Carolina; Barros, Rodrigo R; Silva, Vivian G A; Gehlen, Günter; Vassoler, Jakson M; Partata, Wania A

    2014-05-01

    This study was designed to assess the peak force of a manually operated chiropractic adjusting instrument, the Activator Adjusting Instrument 4 (AAI 4), with an adapter for use in animals, which has a 3- to 4-fold smaller contact surface area than the original rubber tip. Peak force was determined by thrusting the AAI 4 with the adapter or the original rubber tip onto a load cell. First, the AAI 4 was applied perpendicularly by a doctor of chiropractic onto the load cell. Then, the AAI 4 was fixed in a rigid framework and applied to the load cell. This procedure was done to prevent any load on the load cell before the thrust impulse. In 2 situations, trials were performed with the AAI 4 at all force settings (settings I, II, III, and IV, minimum to maximum, respectively). A total of 50000 samples per second over a period of 3 seconds were collected. In 2 experimental protocols, the use of the adapter in the AAI 4 increased the peak force only with setting I. The new value was around 80% of the maximum value found for the AAI 4. Nevertheless, the peak force values of the AAI 4 with the adapter and with the original rubber tip in setting IV were similar. The adapter effectively determines the maximum peak force value at force setting I of AAI 4. Copyright © 2014 National University of Health Sciences. Published by Mosby, Inc. All rights reserved.

  6. Effects of a peracetic acid disinfection protocol on the biocompatibility and biomechanical properties of human patellar tendon allografts.

    PubMed

    Lomas, R J; Jennings, L M; Fisher, J; Kearney, J N

    2004-01-01

    Patellar tendon allografts, retrieved from cadaveric human donors, are widely used for replacement of damaged cruciate ligaments. In common with other tissue allografts originating from cadaveric donors, there are concerns regarding the potential for disease transmission from the donor to the recipient. Additionally, retrieval and subsequent processing protocols expose the graft to the risk of environmental contamination. For these reasons, disinfection or sterilisation protocols are necessary for these grafts before they are used clinically. A high-level disinfection protocol, utilising peracetic acid (PAA), has been developed and investigated for its effects on the biocompatibility and biomechanics of the patellar tendon allografts. PAA disinfection did not render the grafts either cytotoxic or liable to provoke an inflammatory response as assessed in vitro . However, the protocol was shown to increase the size of gaps between the tendon fibres in the matrix and render the grafts more susceptible to digestion with collagenase. Biomechanical studies of the tendons showed that PAA treatment had no effect on the ultimate tensile stress or Young's modulus of the tendons, and that ultimate strain was significantly higher in PAA treated tendons.

  7. Open Source Cybersecurity for the 21st Century

    DTIC Science & Technology

    2013-03-01

    would eventually develop into Transmission Control Protocol/Internet Protocol ( TCP /IP) based on the following ground rules:12  Each distinct...The internet’s design permits any device conforming to modern day protocol standards ( TCP /IP being the most prevalent) to communicate across the... factors , coupled with the internet’s global reach and low cost of entry, are what make securing the cyber domain one of the most complex challenges we

  8. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O`Connell, L.J.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  9. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  10. Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems

    NASA Astrophysics Data System (ADS)

    Subhan, Fazli; Hasbullah, Halabi B.

    Bluetooth is an established standard for low cost, low power, wireless personal area network. Currently, Bluetooth does not support any roaming protocol in which handoff occurs dynamically when a Bluetooth device is moving out of the piconet. If a device is losing its connection to the master device, no provision is made to transfer it to another master. Handoff is not possible in a piconet, as in order to stay within the network, a slave would have to keep the same master. So, by definition intra-handoff is not possible within a piconet. This research mainly focuses on Bluetooth technology and designing a roaming protocol for Bluetooth equipped multi agent systems. A mathematical model is derived for an agent. The idea behind the mathematical model is to know when to initiate the roaming process for an agent. A desired trajectory for the agent is calculated using its x and y coordinates system, and is simulated in SIMULINK. Various roaming techniques are also studied and discussed. The advantage of designing a roaming protocol is to ensure the Bluetooth enabled roaming devices can freely move inside the network coverage without losing its connection or break of service in case of changing the base stations.

  11. Performance evaluation of complete data transfer of physical layer according to IEEE 802.15.4 standard

    NASA Astrophysics Data System (ADS)

    Raju, Kota Solomon; Merugu, Naresh Babu; Neetu, Babu, E. Ram

    2016-03-01

    ZigBee is well-accepted industrial standard for wireless sensor networks based on IEEE 802.15.4 standard. Wireless Sensor Networks is the major concern of communication these days. These Wireless Sensor Networks investigate the properties of networks of small battery-powered sensors with wireless communication. The communication between any two wireless nodes of wireless sensor networks is carried out through a protocol stack. This protocol stack has been designed by different vendors in various ways. Every custom vendor possesses his own protocol stack and algorithms especially at the MAC layer. But, many applications require modifications in their algorithms at various layers as per their requirements, especially energy efficient protocols at MAC layer that are simulated in Wireless sensor Network Simulators which are not being tested in real time systems because vendors do not allow the programmability of each layer in their protocol stack. This problem can be quoted as Vendor-Interoperability. The solution is to develop the programmable protocol stack where we can design our own application as required. As a part of the task first we tried implementing physical layer and transmission of data using physical layer. This paper describes about the transmission of the total number of bytes of Frame according to the IEEE 802.15.4 standard using Physical Layer.

  12. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  13. SABE Colombia: Survey on Health, Well-Being, and Aging in Colombia—Study Design and Protocol

    PubMed Central

    Corchuelo, Jairo; Curcio, Carmen-Lucia; Calzada, Maria-Teresa; Mendez, Fabian

    2016-01-01

    Objective. To describe the design of the SABE Colombia study. The major health study of the old people in Latin America and the Caribbean (LAC) is the Survey on Health, Well-Being, and Aging in LAC, SABE (from initials in Spanish: SAlud, Bienestar & Envejecimiento). Methods. The SABE Colombia is a population-based cross-sectional study on health, aging, and well-being of elderly individuals aged at least 60 years focusing attention on social determinants of health inequities. Methods and design were similar to original LAC SABE. The total sample size of the study at the urban and rural research sites (244 municipalities) was 23.694 elderly Colombians representative of the total population. The study had three components: (1) a questionnaire covering active aging determinants including anthropometry, blood pressure measurement, physical function, and biochemical and hematological measures; (2) a subsample survey among family caregivers; (3) a qualitative study with gender and cultural perspectives of quality of life to understand different dimensions of people meanings. Conclusions. The SABE Colombia is a comprehensive, multidisciplinary study of the elderly with respect to active aging determinants. The results of this study are intended to inform public policies aimed at tackling health inequalities for the aging society in Colombia. PMID:27956896

  14. Variation in Research Designs Used to Test the Effectiveness of Dissemination and Implementation Strategies: A Review.

    PubMed

    Mazzucca, Stephanie; Tabak, Rachel G; Pilar, Meagan; Ramsey, Alex T; Baumann, Ana A; Kryzer, Emily; Lewis, Ericka M; Padek, Margaret; Powell, Byron J; Brownson, Ross C

    2018-01-01

    The need for optimal study designs in dissemination and implementation (D&I) research is increasingly recognized. Despite the wide range of study designs available for D&I research, we lack understanding of the types of designs and methodologies that are routinely used in the field. This review assesses the designs and methodologies in recently proposed D&I studies and provides resources to guide design decisions. We reviewed 404 study protocols published in the journal Implementation Science from 2/2006 to 9/2017. Eligible studies tested the efficacy or effectiveness of D&I strategies (i.e., not effectiveness of the underlying clinical or public health intervention); had a comparison by group and/or time; and used ≥1 quantitative measure. Several design elements were extracted: design category (e.g., randomized); design type [e.g., cluster randomized controlled trial (RCT)]; data type (e.g., quantitative); D&I theoretical framework; levels of treatment assignment, intervention, and measurement; and country in which the research was conducted. Each protocol was double-coded, and discrepancies were resolved through discussion. Of the 404 protocols reviewed, 212 (52%) studies tested one or more implementation strategy across 208 manuscripts, therefore meeting inclusion criteria. Of the included studies, 77% utilized randomized designs, primarily cluster RCTs. The use of alternative designs (e.g., stepped wedge) increased over time. Fewer studies were quasi-experimental (17%) or observational (6%). Many study design categories (e.g., controlled pre-post, matched pair cluster design) were represented by only one or two studies. Most articles proposed quantitative and qualitative methods (61%), with the remaining 39% proposing only quantitative. Half of protocols (52%) reported using a theoretical framework to guide the study. The four most frequently reported frameworks were Consolidated Framework for Implementing Research and RE-AIM ( n  = 16 each), followed by Promoting Action on Research Implementation in Health Services and Theoretical Domains Framework ( n  = 12 each). While several novel designs for D&I research have been proposed (e.g., stepped wedge, adaptive designs), the majority of the studies in our sample employed RCT designs. Alternative study designs are increasing in use but may be underutilized for a variety of reasons, including preference of funders or lack of awareness of these designs. Promisingly, the prevalent use of quantitative and qualitative methods together reflects methodological innovation in newer D&I research.

  15. Systematic review of economic analyses in patient safety: a protocol designed to measure development in the scope and quality of evidence.

    PubMed

    Carter, Alexander W; Mandavia, Rishi; Mayer, Erik; Marti, Joachim; Mossialos, Elias; Darzi, Ara

    2017-08-18

    Recent avoidable failures in patient care highlight the ongoing need for evidence to support improvements in patient safety. According to the most recent reviews, there is a dearth of economic evidence related to patient safety. These reviews characterise an evidence gap in terms of the scope and quality of evidence available to support resource allocation decisions. This protocol is designed to update and improve on the reviews previously conducted to determine the extent of methodological progress in economic analyses in patient safety. A broad search strategy with two core themes for original research (excluding opinion pieces and systematic reviews) in 'patient safety' and 'economic analyses' has been developed. Medline, Econlit and National Health Service Economic Evaluation Database bibliographic databases will be searched from January 2007 using a combination of medical subject headings terms and research-derived search terms (see table 1). The method is informed by previous reviews on this topic, published in 2012. Screening, risk of bias assessment (using the Cochrane collaboration tool) and economic evaluation quality assessment (using the Drummond checklist) will be conducted by two independent reviewers, with arbitration by a third reviewer as needed. Studies with a low risk of bias will be assessed using the Drummond checklist. High-quality economic evaluations are those that score >20/35. A qualitative synthesis of evidence will be performed using a data collection tool to capture the study design(s) employed, population(s), setting(s), disease area(s), intervention(s) and outcome(s) studied. Methodological quality scores will be compared with previous reviews where possible. Effect size(s) and estimate uncertainty will be captured and used in a quantitative synthesis of high-quality evidence, where possible. Formal ethical approval is not required as primary data will not be collected. The results will be disseminated through a peer-reviewed publication, presentations and social media. CRD42017057853. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Tips on hybridizing, washing, and scanning affymetrix microarrays.

    PubMed

    Ares, Manuel

    2014-02-01

    Starting in the late 1990s, Affymetrix, Inc. produced a commercial system for hybridizing, washing, and scanning microarrays that was designed to be easy to operate and reproducible. The system used arrays packaged in a plastic cassette or chamber in which the prefabricated array was mounted and could be filled with fluid through resealable membrane ports either by hand or by an automated "fluidics station" specially designed to handle the arrays. A special rotating hybridization oven and a specially designed scanner were also required. Primarily because of automation and standardization the Affymetrix system was and still remains popular. Here, we provide a skeleton protocol with the potential pitfalls identified. It is designed to augment the protocols provided by Affymetrix.

  17. Hardware and Software Design of FPGA-based PCIe Gen3 interface for APEnet+ network interconnect system

    NASA Astrophysics Data System (ADS)

    Ammendola, R.; Biagioni, A.; Frezza, O.; Lo Cicero, F.; Lonardo, A.; Martinelli, M.; Paolucci, P. S.; Pastorelli, E.; Rossetti, D.; Simula, F.; Tosoratto, L.; Vicini, P.

    2015-12-01

    In the attempt to develop an interconnection architecture optimized for hybrid HPC systems dedicated to scientific computing, we designed APEnet+, a point-to-point, low-latency and high-performance network controller supporting 6 fully bidirectional off-board links over a 3D torus topology. The first release of APEnet+ (named V4) was a board based on a 40 nm Altera FPGA, integrating 6 channels at 34 Gbps of raw bandwidth per direction and a PCIe Gen2 x8 host interface. It has been the first-of-its-kind device to implement an RDMA protocol to directly read/write data from/to Fermi and Kepler NVIDIA GPUs using NVIDIA peer-to-peer and GPUDirect RDMA protocols, obtaining real zero-copy GPU-to-GPU transfers over the network. The latest generation of APEnet+ systems (now named V5) implements a PCIe Gen3 x8 host interface on a 28 nm Altera Stratix V FPGA, with multi-standard fast transceivers (up to 14.4 Gbps) and an increased amount of configurable internal resources and hardware IP cores to support main interconnection standard protocols. Herein we present the APEnet+ V5 architecture, the status of its hardware and its system software design. Both its Linux Device Driver and the low-level libraries have been redeveloped to support the PCIe Gen3 protocol, introducing optimizations and solutions based on hardware/software co-design.

  18. Two different PCR approaches for universal diagnosis of brown rot and identification of Monilinia spp. in stone fruit trees.

    PubMed

    Gell, I; Cubero, J; Melgarejo, P

    2007-12-01

    To design a protocol for the universal diagnosis of brown rot by polymerase chain reaction (PCR) in plant material and subsequently Monilinia spp. identification. Primers for discrimination of Monilinia spp. from other fungal genera by PCR were designed following a ribosomal DNA analysis. Discrimination among species of Monilinia was subsequently achieved by developing primers using SCAR (Sequence Characterised Amplified Region) markers obtained after a random amplified polymorphic DNA study. In addition, an internal control (IC) based on the utilization of a mimic plasmid was designed to be used in the diagnostic protocol of brown rot to recognize false negatives due to the inhibition of PCR. The four sets of primers designed allowed detection and discrimination of all Monilinia spp. causing brown rot in fruit trees. Addition of an IC in each PCR reaction performed increased the reliability of the diagnostic protocol. The detection protocol presented here, that combined a set of universal primers and the inclusion of the plasmid pGMON as an IC for diagnosis of all Monilinia spp., and three sets of primers to discriminate the most important species of Monilinia, could be an useful and valuable tool for epidemiological studies. The method developed could be used in programmes to avoid the spread and introduction of this serious disease in new areas.

  19. Qualified Fitness and Exercise as Professionals and Exercise Prescription: Evolution of the PAR-Q and Canadian Aerobic Fitness Test.

    PubMed

    Shephard, Roy J

    2015-04-01

    Traditional approaches to exercise prescription have included a preliminary medical screening followed by exercise tests of varying sophistication. To maximize population involvement, qualified fitness and exercise professionals (QFEPs) have used a self-administered screening questionnaire (the Physical Activity Readiness Questionnaire, PAR-Q) and a simple measure of aerobic performance (the Canadian Aerobic Fitness Test, CAFT). However, problems have arisen in applying the original protocol to those with chronic disease. Recent developments have addressed these issues. Evolution of the PAR-Q and CAFT protocol is reviewed from their origins in 1974 to the current electronic decision tree model of exercise screening and prescription. About a fifth of apparently healthy adults responded positively to the original PAR-Q instrument, thus requiring an often unwarranted referral to a physician. Minor changes of wording did not overcome this problem. However, a consensus process has now developed an electronic decision tree for stratification of exercise risk not only for healthy individuals, but also for those with various types of chronic disease. The new approach to clearance greatly reduces physician referrals and extends the role of QFEPs. The availability of effective screening and simple fitness testing should contribute to the goal of maximizing physical activity in the entire population.

  20. Evaluating anesthetic protocols for functional blood flow imaging in the rat eye

    NASA Astrophysics Data System (ADS)

    Moult, Eric M.; Choi, WooJhon; Boas, David A.; Baumann, Bernhard; Clermont, Allen C.; Feener, Edward P.; Fujimoto, James G.

    2017-01-01

    The purpose of this study is to evaluate the suitability of five different anesthetic protocols (isoflurane, isoflurane-xylazine, pentobarbital, ketamine-xylazine, and ketamine-xylazine-vecuronium) for functional blood flow imaging in the rat eye. Total retinal blood flow was measured at a series of time points using an ultrahigh-speed Doppler OCT system. Additionally, each anesthetic protocol was qualitatively evaluated according to the following criteria: (1) time-stability of blood flow, (2) overall rate of blood flow, (3) ocular immobilization, and (4) simplicity. We observed that different anesthetic protocols produced markedly different blood flows. Different anesthetic protocols also varied with respect to the four evaluated criteria. These findings suggest that the choice of anesthetic protocol should be carefully considered when designing and interpreting functional blood flow studies in the rat eye.

  1. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  2. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  3. CUSP9* treatment protocol for recurrent glioblastoma: aprepitant, artesunate, auranofin, captopril, celecoxib, disulfiram, itraconazole, ritonavir, sertraline augmenting continuous low dose temozolomide

    PubMed Central

    Kast, Richard E.; Karpel-Massler, Georg; Halatsch, Marc-Eric

    2014-01-01

    CUSP9 treatment protocol for recurrent glioblastoma was published one year ago. We now present a slight modification, designated CUSP9*. CUSP9* drugs- aprepitant, artesunate, auranofin, captopril, celecoxib, disulfiram, itraconazole, sertraline, ritonavir, are all widely approved by regulatory authorities, marketed for non-cancer indications. Each drug inhibits one or more important growth-enhancing pathways used by glioblastoma. By blocking survival paths, the aim is to render temozolomide, the current standard cytotoxic drug used in primary glioblastoma treatment, more effective. Although esthetically unpleasing to use so many drugs at once, the closely similar drugs of the original CUSP9 used together have been well-tolerated when given on a compassionate-use basis in the cases that have come to our attention so far. We expect similarly good tolerability for CUSP9*. The combined action of this suite of drugs blocks signaling at, or the activity of, AKT phosphorylation, aldehyde dehydrogenase, angiotensin converting enzyme, carbonic anhydrase -2,- 9, -12, cyclooxygenase-1 and -2, cathepsin B, Hedgehog, interleukin-6, 5-lipoxygenase, matrix metalloproteinase -2 and -9, mammalian target of rapamycin, neurokinin-1, p-gp efflux pump, thioredoxin reductase, tissue factor, 20 kDa translationally controlled tumor protein, and vascular endothelial growth factor. We believe that given the current prognosis after a glioblastoma has recurred, a trial of CUSP9* is warranted. PMID:25211298

  4. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  5. Clinical decision support systems in child and adolescent psychiatry: a systematic review.

    PubMed

    Koposov, Roman; Fossum, Sturla; Frodl, Thomas; Nytrø, Øystein; Leventhal, Bennett; Sourander, Andre; Quaglini, Silvana; Molteni, Massimo; de la Iglesia Vayá, María; Prokosch, Hans-Ulrich; Barbarini, Nicola; Milham, Michael Peter; Castellanos, Francisco Xavier; Skokauskas, Norbert

    2017-11-01

    Psychiatric disorders are amongst the most prevalent and impairing conditions in childhood and adolescence. Unfortunately, it is well known that general practitioners (GPs) and other frontline health providers (i.e., child protection workers, public health nurses, and pediatricians) are not adequately trained to address these ubiquitous problems (Braddick et al. Child and Adolescent mental health in Europe: infrastructures, policy and programmes, European Communities, 2009; Levav et al. Eur Child Adolesc Psychiatry 13:395-401, 2004). Advances in technology may offer a solution to this problem with clinical decision support systems (CDSS) that are designed to help professionals make sound clinical decisions in real time. This paper offers a systematic review of currently available CDSS for child and adolescent mental health disorders prepared according to the PRISMA-Protocols (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols). Applying strict eligibility criteria, the identified studies (n = 5048) were screened. Ten studies, describing eight original clinical decision support systems for child and adolescent psychiatric disorders, fulfilled inclusion criteria. Based on this systematic review, there appears to be a need for a new, readily available CDSS for child neuropsychiatric disorder which promotes evidence-based, best practices, while enabling consideration of national variation in practices by leveraging data-reuse to generate predictions regarding treatment outcome, addressing a broader cluster of clinical disorders, and targeting frontline practice environments.

  6. Regulatory Myeloid Cells in Transplantation

    PubMed Central

    Rosborough, Brian R.; Raïch-Regué, Dàlia; Turnquist, Heth R.; Thomson, Angus W.

    2013-01-01

    Regulatory myeloid cells (RMC) are emerging as novel targets for immunosuppressive (IS) agents and hold considerable promise as cellular therapeutic agents. Herein, we discuss the ability of regulatory macrophages (Mreg), regulatory dendritic cells (DCreg) and myeloid-derived suppressor cells (MDSC) to regulate alloimmunity, their potential as cellular therapeutic agents and the IS agents that target their function. We consider protocols for the generation of RMC and the selection of donor- or recipient-derived cells for adoptive cell therapy. Additionally, the issues of cell trafficking and antigen (Ag) specificity following RMC transfer are discussed. Improved understanding of the immunobiology of these cells has increased the possibility of moving RMC into the clinic to reduce the burden of current IS agents and promote Ag-specific tolerance. In the second half of this review, we discuss the influence of established and experimental IS agents on myeloid cell populations. IS agents believed historically to act primarily on T cell activation and proliferation are emerging as important regulators of RMC function. Better insights into the influence of IS agents on RMC will enhance our ability to develop cell therapy protocols to promote the function of these cells. Moreover, novel IS agents may be designed to target RMC in situ to promote Ag-specific immune regulation in transplantation and usher in a new era of immune modulation exploiting cells of myeloid origin. PMID:24092382

  7. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  8. Long Term Resource Monitoring Program procedures: fish monitoring

    USGS Publications Warehouse

    Ratcliff, Eric N.; Glittinger, Eric J.; O'Hara, T. Matt; Ickes, Brian S.

    2014-01-01

    This manual constitutes the second revision of the U.S. Army Corps of Engineers’ Upper Mississippi River Restoration-Environmental Management Program (UMRR-EMP) Long Term Resource Monitoring Program (LTRMP) element Fish Procedures Manual. The original (1988) manual merged and expanded on ideas and recommendations related to Upper Mississippi River fish sampling presented in several early documents. The first revision to the manual was made in 1995 reflecting important protocol changes, such as the adoption of a stratified random sampling design. The 1995 procedures manual has been an important document through the years and has been cited in many reports and scientific manuscripts. The resulting data collected by the LTRMP fish component represent the largest dataset on fish within the Upper Mississippi River System (UMRS) with more than 44,000 collections of approximately 5.7 million fish. The goal of this revision of the procedures manual is to document changes in LTRMP fish sampling procedures since 1995. Refinements to sampling methods become necessary as monitoring programs mature. Possible refinements are identified through field experiences (e.g., sampling techniques and safety protocols), data analysis (e.g., planned and studied gear efficiencies and reallocations of effort), and technological advances (e.g., electronic data entry). Other changes may be required because of financial necessity (i.e., unplanned effort reductions). This version of the LTRMP fish monitoring manual describes the most current (2014) procedures of the LTRMP fish component.

  9. CUSP9* treatment protocol for recurrent glioblastoma: aprepitant, artesunate, auranofin, captopril, celecoxib, disulfiram, itraconazole, ritonavir, sertraline augmenting continuous low dose temozolomide.

    PubMed

    Kast, Richard E; Karpel-Massler, Georg; Halatsch, Marc-Eric

    2014-09-30

    CUSP9 treatment protocol for recurrent glioblastoma was published one year ago. We now present a slight modification, designated CUSP9*. CUSP9* drugs--aprepitant, artesunate, auranofin, captopril, celecoxib, disulfiram, itraconazole, sertraline, ritonavir, are all widely approved by regulatory authorities, marketed for non-cancer indications. Each drug inhibits one or more important growth-enhancing pathways used by glioblastoma. By blocking survival paths, the aim is to render temozolomide, the current standard cytotoxic drug used in primary glioblastoma treatment, more effective. Although esthetically unpleasing to use so many drugs at once, the closely similar drugs of the original CUSP9 used together have been well-tolerated when given on a compassionate-use basis in the cases that have come to our attention so far. We expect similarly good tolerability for CUSP9*. The combined action of this suite of drugs blocks signaling at, or the activity of, AKT phosphorylation, aldehyde dehydrogenase, angiotensin converting enzyme, carbonic anhydrase -2,- 9, -12, cyclooxygenase-1 and -2, cathepsin B, Hedgehog, interleukin-6, 5-lipoxygenase, matrix metalloproteinase -2 and -9, mammalian target of rapamycin, neurokinin-1, p-gp efflux pump, thioredoxin reductase, tissue factor, 20 kDa translationally controlled tumor protein, and vascular endothelial growth factor. We believe that given the current prognosis after a glioblastoma has recurred, a trial of CUSP9* is warranted.

  10. Transport Protocols for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Eddie Law, K. L.

    Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.

  11. New protocol for construction of eyeglasses-supported provisional nasal prosthesis using CAD/CAM techniques.

    PubMed

    Ciocca, Leonardo; Fantini, Massimiliano; De Crescenzio, Francesca; Persiani, Franco; Scotti, Roberto

    2010-01-01

    A new protocol for making an immediate provisional eyeglasses-supported nasal prosthesis is presented that uses laser scanning, computer-aided design/computer-aided manufacturing procedures, and rapid prototyping techniques, reducing time and costs while increasing the quality of the final product. With this protocol, the eyeglasses were digitized, and the relative position of the nasal prosthesis was planned and evaluated in a virtual environment without any try-in appointment. This innovative method saves time, reduces costs, and restores the patient's aesthetic appearance after a disfiguration caused by ablation of the nasal pyramid better than conventional restoration methods. Moreover, the digital model of the designed nasal epithesis can be used to develop a definitive prosthesis anchored to osseointegrated craniofacial implants.

  12. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  13. Improving investigational drug service operations through development of an innovative computer system.

    PubMed

    Sweet, Burgunda V; Tamer, Helen R; Siden, Rivka; McCreadie, Scott R; McGregory, Michael E; Benner, Todd; Tankanow, Roberta M

    2008-05-15

    The development of a computerized system for protocol management, dispensing, inventory accountability, and billing by the investigational drug service (IDS) of a university health system is described. After an unsuccessful search for a commercial system that would accommodate the variation among investigational protocols and meet regulatory requirements, the IDS worked with the health-system pharmacy's information technology staff and informatics pharmacists to develop its own system. The informatics pharmacists observed work-flow and information capture in the IDS and identified opportunities for improved efficiency with an automated system. An iterative build-test-design process was used to provide the flexibility needed for individual protocols. The intent was to design a system that would support most IDS processes, using components that would allow automated backup and redundancies. A browser-based system was chosen to allow remote access. Servers, bar-code scanners, and printers were integrated into the final system design. Initial implementation involved 10 investigational protocols chosen on the basis of dispensing volume and complexity of study design. Other protocols were added over a two-year period; all studies whose drugs were dispensed from the IDS were added, followed by those for which the drugs were dispensed from decentralized pharmacy areas. The IDS briefly used temporary staff to free pharmacist and technician time for system implementation. Decentralized pharmacy areas that rarely dispense investigational drugs continue to use manual processes, with subsequent data transcription into the system. Through the university's technology transfer division, the system was licensed by an external company for sale to other IDSs. The WebIDS system has improved daily operations, enhanced safety and efficiency, and helped meet regulatory requirements for investigational drugs.

  14. Comparison of EPA Method 1615 RT-qPCR Assays in Standard and Kit Format

    EPA Science Inventory

    EPA Method 1615 contains protocols for measuring enterovirus and norovirus by reverse transcription quantitative polymerase chain reaction. A commercial kit based upon these protocols was designed and compared to the method's standard approach. Reagent grade, secondary effluent, ...

  15. Infrastructure Vulnerability Assessment and Defense

    DTIC Science & Technology

    2005-03-01

    companies or organizations. The connectivity and communications within and among networks are "glued" together by a set of protocols defined by the Internet ... research communities, which are modified and improved over decades of time. Those protocols are usually designed in the principle to achieve

  16. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  17. The implementation and adherence to evidence-based protocols for psychotherapy for depression: the perspective of therapists in Dutch specialized mental healthcare.

    PubMed

    Bruijniks, Sanne J E; Franx, Gerdien; Huibers, Marcus J H

    2018-06-14

    Although psychotherapy is an effective treatment for depression, a large number of patients still do not receive care according to the protocols that are used in clinical trials. Instead, patients often receive a modified version of the original intervention. It is not clear how and when treatment protocols are used or modified in the Dutch specialized mental health care and whether these changes lead to suboptimal adherence to treatment protocols. In the context of an ongoing multicenter trial that investigates whether twice-weekly sessions of protocolized interpersonal psychotherapy (IPT) and cognitive behavioral therapy (CBT) for depression lead to better treatment outcomes compared to once-weekly sessions, two focus groups using semi-structured interviews were organized. Aims were to increase insight in the adherence to and modifications of CBT and IPT protocols in the Dutch specialized mental health care for depression. Participants were fifteen therapists from seven mental health locations part of five mental health organizations. Verbatim transcripts were coded and analyzed using qualitative software. Three themes emerged: modification as the common practice, professional and patient factors influencing the adherence to protocols and organizational boundaries and flexibility. Treatment modification appeared to happen on a frequent basis, even in the context of a trial. Definitions of treatment modifications were multiple and varied from using intuition to flexible use of the same protocol. Therapist training and supervision, the years of work experience and individual characteristics of the therapist and the patient were mentioned to influence the adherence to protocols. Modifications of the therapists depended very much on the culture within the mental health locations, who differed in terms of the flexibility offered to therapists to choose and modify treatment protocols. Not all treatment modifications were in line with existing evidence or guidelines. Regular supervision, team meetings and a shared vision were identified as crucial factors to increase adherence to treatment protocols, whereas additional organizational factors, among which a change of mindset, may facilitate adequate implementation.

  18. First in vivo assessment of "Outwalk": a novel protocol for clinical gait analysis based on inertial and magnetic sensors.

    PubMed

    Ferrari, Alberto; Cutti, Andrea Giovanni; Garofalo, Pietro; Raggi, Michele; Heijboer, Monique; Cappello, Angelo; Davalli, Angelo

    2010-01-01

    A protocol named "Outwalk" was recently proposed to measure the thorax-pelvis and lower-limb kinematics during gait in free-living conditions, by means of an inertial and magnetic measurement system (IMMS). The aim of this study was to validate Outwalk on four healthy subjects when it is used in combination with a specific IMMS (Xsens Technologies, NL), against a reference protocol (CAST) and measurement system (optoelectronic system; Vicon, Oxford Metrics Group, UK). For this purpose, we developed an original approach based on three tests, which allowed to separately investigate: (1) the consequences on joint kinematics of the differences between protocols (Outwalk vs. CAST), (2) the accuracy of the hardware (Xsens vs. Vicon), and (3) the summation of protocols' differences and hardware accuracy (Outwalk + Xsens vs. CAST + Vicon). In order to assess joint-angles similarity, the coefficient of multiple correlation (CMC) was used. For test 3, the CMC showed that Outwalk + Xsens and CAST + Vicon kinematics can be interchanged, offset included, for hip, knee and ankle flexion-extension, and hip ab-adduction (CMC > 0.88). The other joint-angles can be interchanged offset excluded (CMC > 0.85). Tests 1 and 2 also showed that differences in offset between joint-angles were predominantly induced by differences in the protocols; differences in correlation by both hardware and protocols; differences in range of motion by the Xsens accuracy. Results thus support the commencement of a clinical trial of Outwalk on transtibial amputees.

  19. Assessing Design Activity in Complex CMOS Circuit Design.

    ERIC Educational Resources Information Center

    Biswas, Gautam; And Others

    This report characterizes human problem solving in digital circuit design. Protocols of 11 different designers with varying degrees of training were analyzed by identifying the designers' problem solving strategies and discussing activity patterns that differentiate the designers. These methods are proposed as a tentative basis for assessing…

  20. Anatomic Customization of Root-Analog Dental Implants With Cone-Beam CT and CAD/CAM Fabrication: A Cadaver-Based Pilot Evaluation.

    PubMed

    Evans, Zachary P; Renne, Walter G; Bacro, Thierry R; Mennito, Anthony S; Ludlow, Mark E; Lecholop, Michael K

    2018-02-01

    Existing root-analog dental implant systems have no standardized protocols regarding retentive design, surface manipulation, or prosthetic attachment design relative to the site's unique anatomy. Historically, existing systems made those design choices arbitrarily. For this report, strategies were developed that deliberately reference the adjacent anatomy, implant and restorable path of draw, and bone density for implant and retentive design. For proof of concept, dentate arches from human cadavers were scanned using cone-beam computed tomography and then digitally modeled. Teeth of interest were virtually extracted and manipulated via computer-aided design to generate root-analog implants from zirconium. We created a stepwise protocol for analyzing and developing the implant sites, implant design and retention, and prosthetic emergence and connection all from the pre-op cone-beam data. Root-analog implants were placed at the time of extraction and examined radiographically and mechanically concerning ideal fit and stability. This study provides proof of concept that retentive root-analog implants can be produced from cone-beam data while improving fit, retention, safety, esthetics, and restorability when compared to the existing protocols. These advancements may provide the critical steps necessary for clinical relevance and success of immediately placed root-analog implants. Additional studies are necessary to validate the model prior to clinical trial.

  1. An Analysis of Factors Affecting Successful Clinical Trial Enrollment in the Context of Three Prospective Randomized Control Trials

    PubMed Central

    Logan, Jennifer K; Tang, Chad; Liao, Zhongxing; Lee, J. Jack; Heymach, John V.; Swisher, Stephen G.; Welsh, James W.; Zhang, Jianjun; Lin, Steven H.; Gomez, Daniel R.

    2018-01-01

    Purpose Effective clinical trial enrollment can be difficult in a protocol designs that contain one treatment arm that is perceived as being more “aggressive” or “favorable.” There have been limited studies focusing on the barriers to enrollment and the efficacy of alternative study design to improve accrual. We analyzed barriers to enrollment, particularly the influence of timing, in context of three prospective randomized oncology trials where one arm was considered more aggressive. Methods and materials From June 2011 to March 2015, patients who were enrolled on three prospective institutional protocols (an oligometastatic non-small cell lung cancer (NSCLC) trial, and two proton vs. intensity-modulated radiation therapy (IMRT) trials in NSCLC and esophageal cancer) were screened for protocol eligibility. Eligible candidates were approached about trial participation, and patient characteristics (age, sex, T/N categorization) were recorded along with details surrounding trial presentation (appointment number). Fisher’s exact test, Student’s t tests, and multivariate analysis were performed to assess differences between enrolled and refusal patients. Results 309 eligible patients were approached about trial enrollment. The enrollment success rate (ESR) during this time span was 52% (n=160 patients). Enrolled patients were more likely to be presented trial information at an earlier appointment (oligomet protocol: 5 vs. 3 appointments (P<0.001), NSCLC protocol: 4 vs. 3 appointments (P = 0.0018), esophageal protocol: 3 vs. 2 appointments (P = 0.0086No other factors or patient characteristics significantly affected ESR. Conclusion Improvement in enrollment rates for randomized control trials is possible, even in difficult accrual settings. Earlier presentation of trial information to patients is the most influential factor for success, and may help overcome accrual barriers without compromising trial design. PMID:28244413

  2. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    PubMed

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at different stages of the study. Biases need to be considered by researchers implementing the standardized protocols as well as by users of observational epidemiological studies of ZIKV.

  3. Integrated AUTODIN System Architecture Report. Part 2.

    DTIC Science & Technology

    1979-03-01

    Link Modes Protocols and end-to- end host protocols Codes ASCII, ITA#2 ASCII, Others (Trans- parent to network) Speeds 45 thru 4800 bps 110 bps thru 56K ...service facilities such as AMPEs, subscriber access lines, modems , multiplexers, concentrators, interface development to include software design and...Protocol) CODES - ASCII and ITA#2 (others transparent) SPEEDS - 45.5bps - 56K bps FORMATS - AUTODIN II Segment Formats, JANAP 128, ACP 126/127, DOI 103

  4. The impact of the centrifuge characteristics and centrifugation protocols on the cells, growth factors, and fibrin architecture of a leukocyte- and platelet-rich fibrin (L-PRF) clot and membrane.

    PubMed

    Dohan Ehrenfest, David M; Pinto, Nelson R; Pereda, Andrea; Jiménez, Paula; Corso, Marco Del; Kang, Byung-Soo; Nally, Mauricio; Lanata, Nicole; Wang, Hom-Lay; Quirynen, Marc

    2018-03-01

    L-PRF (leukocyte- and platelet-rich fibrin) is one of the four families of platelet concentrates for surgical use and is widely used in oral and maxillofacial regenerative therapies. The first objective of this article was to evaluate the mechanical vibrations appearing during centrifugation in four models of commercially available table-top centrifuges used to produce L-PRF and the impact of the centrifuge characteristics on the cell and fibrin architecture of a L-PRF clot and membrane. The second objective of this article was to evaluate how changing some parameters of the L-PRF protocol may influence its biological signature, independently from the characteristics of the centrifuge. In the first part, four different commercially available centrifuges were used to produce L-PRF, following the original L-PRF production method (glass-coated plastic tubes, 400 g force, 12 minutes). The tested systems were the original L-PRF centrifuge (Intra-Spin, Intra-Lock, the only CE and FDA cleared system for the preparation of L-PRF) and three other laboratory centrifuges (not CE/FDA cleared for L-PRF): A-PRF 12 (Advanced PRF, Process), LW-UPD8 (LW Scientific) and Salvin 1310 (Salvin Dental). Each centrifuge was opened for inspection, two accelerometers were installed (one radial, one vertical), and data were collected with a spectrum analyzer in two configurations (full-load or half load). All clots and membranes were collected into a sterile surgical box (Xpression kit, Intra-Lock). The exact macroscopic (weights, sizes) and microscopic (photonic and scanning electron microscopy SEM) characteristics of the L-PRF produced with these four different machines were evaluated. In the second part, venous blood was taken in two groups, respectively, Intra-Spin 9 ml glass-coated plastic tubes (Intra-Lock) and A-PRF 10 ml glass tubes (Process). Tubes were immediately centrifuged at 2700 rpm (around 400 g) during 12 minutes to produce L-PRF or at 1500 rpm during 14 minutes to produce A-PRF. All centrifugations were done using the original L-PRF centrifuge (Intra-Spin), as recommended by the two manufacturers. Half of the membranes were placed individually in culture media and transferred in a new tube at seven experimental times (up to 7 days). The releases of transforming growth factor β-1 (TGFβ-1), platelet derived growth factor AB (PDGF-AB), vascular endothelial growth factor (VEGF) and bone morphogenetic protein 2 (BMP-2) were quantified using ELISA kits at these seven experimental times. The remaining membranes were used to evaluate the initial quantity of growth factors of the L-PRF and A-PRF membranes, through forcible extraction. Very significant differences in the level of vibrations at each rotational speed were observed between the four tested centrifuges. The original L-PRF centrifuge (Intra-Spin) was by far the most stable machine in all configurations and always remained under the threshold of resonance, unlike the three other tested machines. At the classical speed of production of L-PRF, the level of undesirable vibrations on the original centrifuge was between 4.5 and 6 times lower than with other centrifuges. Intra-Spin showed the lowest temperature of the tubes. A-PRF and Salvin were both associated with a significant increase in temperature in the tube. Intra-Spin produced the heaviest clot and quantity of exudate among the four techniques. A-PRF and LW produced much lighter, shorter and narrower clots and membranes than the two other centrifuges. Light microscopy analysis showed relatively similar features for all L-PRF types (concentration of cell bodies in the first half). However, SEM illustrated considerable differences between samples. The original Intra-Spin L-PRF showed a strongly polymerized thick fibrin matrix and all cells appeared alive with a normal shape, including the textured surface aspect of activated lymphocytes. The A-PRF, Salvin and LW PRF-like membranes presented a lightly polymerized slim fibrin gel and most of the visible cell bodies appeared destroyed (squashed or shrunk). In the second part of this study, the slow release of the three tested growth factors from original L-PRF membranes was significantly stronger (more than twice stronger, p<0.001) at all experimental times than the release from A-PRF membranes. No trace of BMP2 could be detected in the A-PRF. A slow release of BMP2 was detected during at least 7 days in the original L-PRF. Moreover, the original L-PRF clots and membranes (produced with 9 mL blood) were always significantly larger than the A-PRF (produced with 10 mL blood). The A-PRF membranes dissolved in vitro after less than 3 days, while the L-PRF membrane remained in good shape during at least 7 days. Each centrifuge has its clear own profile of vibrations depending on the rotational speed, and the centrifuge characteristics are directly impacting the architecture and cell content of a L-PRF clot. This result may reveal a considerable flaw in all the PRP/PRF literature, as this parameter was never considered. The original L-PRF clot (Intra-Spin) presented very specific characteristics, which appeared distorted when using centrifuges with a higher vibration level. A-PRF, LW and Salvin centrifuges produced PRF-like materials with a damaged and almost destroyed cell population through the standard protocol, and it is therefore impossible to classify these products in the L-PRF family. Moreover, when using the same centrifuge, the original L-PRF protocol allowed producing larger clots/membranes and a more intense release of growth factors (biological signature at least twice stronger) than the modified A-PRF protocol. Both protocols are therefore significantly different, and the clinical and experimental results from the original L-PRF shall not be extrapolated to the A-PRF. Finally, the comparison between the total released amounts and the initial content of the membrane (after forcible extraction) highlighted that the leukocytes living in the fibrin matrix are involved in the production of significant amounts of growth factors. The centrifuge characteristics and centrifugation protocols impact significantly and dramatically the cells, growth factors and fibrin architecture of L-PRF.

  5. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.

  6. Performance analysis of simultaneous dense coding protocol under decoherence

    NASA Astrophysics Data System (ADS)

    Huang, Zhiming; Zhang, Cai; Situ, Haozhen

    2017-09-01

    The simultaneous dense coding (SDC) protocol is useful in designing quantum protocols. We analyze the performance of the SDC protocol under the influence of noisy quantum channels. Six kinds of paradigmatic Markovian noise along with one kind of non-Markovian noise are considered. The joint success probability of both receivers and the success probabilities of one receiver are calculated for three different locking operators. Some interesting properties have been found, such as invariance and symmetry. Among the three locking operators we consider, the SWAP gate is most resistant to noise and results in the same success probabilities for both receivers.

  7. Distance bounded energy detecting ultra-wideband impulse radio secure protocol.

    PubMed

    Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J

    2014-01-01

    We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.

  8. Evaluation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Array

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Liddicoat, Albert; Ralston, Jesse; Pingree, Paula

    2006-01-01

    The current implementation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays (TRIGA) is equipped with CFDP protocol and CCSDS Telemetry and Telecommand framing schemes to replace the CPU intensive software counterpart implementation for reliable deep space communication. We present the hardware/software co-design methodology used to accomplish high data rate throughput. The hardware CFDP protocol stack implementation is then compared against the two recent flight implementations. The results from our experiments show that TRIGA offers more than 3 orders of magnitude throughput improvement with less than one-tenth of the power consumption.

  9. How do people of South Asian origin understand and experience depression? A protocol for a systematic review of qualitative literature

    PubMed Central

    Mooney, Roisin; Trivedi, Daksha; Sharma, Shivani

    2016-01-01

    Introduction Individuals from Black and Asian Minority Ethnic (BAME) groups are less likely to receive a diagnosis and to engage with treatment for depression. This review aims to draw on international literature to summarise what is known about how people specifically of South Asian origin, migrants and non-migrants, understand and experience depressive symptoms. The resulting evidence base will further inform practices aimed at encouraging help-seeking behaviour and treatment uptake. Methods and analysis A systematic review and thematic synthesis of qualitative literature conducted according to the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. Using predefined inclusion and exclusion criteria, electronic searches will be conducted across 16 databases. Study quality will be assessed using the Critical Appraisal Skills Programme (CASP). Data will be extracted independently by 2 reviewers. Ethics and dissemination Ethical approval is not required. A comprehensive evidence base of how people from South Asian backgrounds conceptualise and experience depression will better inform the design and delivery of mental health initiatives and advance directions for future research. Findings will be published in a peer-reviewed journal, and disseminated through existing networks for professionals, researchers, patients and the public. Trial registration number CRD42015026120. PMID:27577586

  10. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    DTIC Science & Technology

    2017-06-01

    transmit their information through the network based on the specific protocols that are implemented. Nodes may be designed to perform any combination of...band, and one channel in the 868-MHz band. The IEEE 802.15.4 standard is designed to provide Low-Rate Wireless Personal Area Network (LR-WPAN...MANETs and is currently a draft at the IETF Network Working Group [9]. It was derived from the Ad hoc On -Demand Distance Vector (AODV) routing

  11. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  12. Output Containment Control of Linear Heterogeneous Multi-Agent Systems Using Internal Model Principle.

    PubMed

    Zuo, Shan; Song, Yongduan; Lewis, Frank L; Davoudi, Ali

    2017-01-04

    This paper studies the output containment control of linear heterogeneous multi-agent systems, where the system dynamics and even the state dimensions can generally be different. Since the states can have different dimensions, standard results from state containment control do not apply. Therefore, the control objective is to guarantee the convergence of the output of each follower to the dynamic convex hull spanned by the outputs of leaders. This can be achieved by making certain output containment errors go to zero asymptotically. Based on this formulation, two different control protocols, namely, full-state feedback and static output-feedback, are designed based on internal model principles. Sufficient local conditions for the existence of the proposed control protocols are developed in terms of stabilizing the local followers' dynamics and satisfying a certain H∞ criterion. Unified design procedures to solve the proposed two control protocols are presented by formulation and solution of certain local state-feedback and static output-feedback problems, respectively. Numerical simulations are given to validate the proposed control protocols.

  13. Accelerating Pediatric Cancer Drug Development: Challenges and Opportunities for Pediatric Master Protocols.

    PubMed

    Khan, Tahira; Stewart, Mark; Blackman, Samuel; Rousseau, Raphaël; Donoghue, Martha; Cohen, Kenneth; Seibel, Nita; Fleury, Mark; Benettaib, Bouchra; Malik, Raleigh; Vassal, Gilles; Reaman, Gregory

    2018-01-01

    Although outcomes for children with cancer have significantly improved over the past 40 years, there has been little progress in the treatment of some pediatric cancers, particularly when advanced. Additionally, clinical trial options and availability are often insufficient. Improved genomic and immunologic understanding of pediatric cancers, combined with innovative clinical trial designs, may provide an enhanced opportunity to study childhood cancers. Master protocols, which incorporate the use of precision medicine approaches, coupled with the ability to quickly assess the safety and effectiveness of new therapies, have the potential to accelerate early-phase clinical testing of novel therapeutics and which may result in more rapid approval of new drugs for children with cancer. Designing and conducting master protocols for children requires addressing similar principles and requirements as traditional adult oncology trials, but there are also unique considerations for master protocols conducted in children with cancer. The purpose of this paper is to define the key challenges and opportunities associated with this approach in order to ensure that master protocols can be adapted to benefit children and adolescents and ensure that adequate data are captured to advance, in parallel, the clinical development of investigational agents for children with cancer.

  14. Decision Making and the IACUC: Part 1—Protocol Information Discussed at Full-Committee Reviews

    PubMed Central

    Silverman, Jerald; Lidz, Charles W; Clayfield, Jonathan C; Murray, Alexandra; Simon, Lorna J; Rondeau, Richard G

    2015-01-01

    IACUC protocols can be reviewed by either the full committee or designated members. Both review methods use the principles of the 3 Rs (reduce, refine, replace) as the overarching paradigm, with federal regulations and policies providing more detailed guidance. The primary goal of this study was to determine the frequency of topics discussed by IACUC during full-committee reviews and whether the topics included those required for consideration by IACUC (for example, pain and distress, number of animals used, availability of alternatives, skill and experience of researchers). We recorded and transcribed 87 protocol discussions undergoing full-committee review at 10 academic institutions. Each transcript was coded to capture the key concepts of the discussion and analyzed for the frequency of the codes mentioned. Pain and distress was the code mentioned most often, followed by the specific procedures performed, the study design, and the completeness of the protocol form. Infrequently mentioned topics were alternatives to animal use or painful or distressful procedures, the importance of the research, and preliminary data. Not all of the topics required to be considered by the IACUC were openly discussed for all protocols, and many of the discussions were limited in their depth. PMID:26224439

  15. PROTOCOL TO EVALUATE THE MOISTURE DURABILITY OF ENERGY-EFFICIENT WALLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudreaux, Philip R; Pallin, Simon B; Hun, Diana E

    Walls account for about 8% of the energy used in residential buildings. This energy penalty can be reduced with higher insulation levels and increased airtightness. However, these measures can compromise the moisture durability and long-term performance of wall assemblies because they can lead to lower moisture tolerance due to reduced drying potential. To avert these problems, a moisture durability protocol was developed to evaluate the probability that an energy-efficient wall design will experience mold growth. This protocol examines the effects of moisture sources in walls through a combination of simulations and lab experiments, uses the mold growth index as themore » moisture durability indicator, and is based on a probabilistic approach that utilizes stochastically varying input parameters. The simulation tools used include a new validated method for taking into account the effects of air leakage in wall assemblies This paper provides an overview of the developed protocol, discussion of the probabilistic simulation approach and describes results from the evaluation of two wall assemblies in Climate Zones 2, 4, and 6. The protocol will be used to supply builders with wall designs that are energy efficient, moisture durable and cost-effective.« less

  16. Toward fidelity between specification and implementation

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Morrison, Jeff; Wu, Yunqing

    1994-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  17. Electronic protocol of respiratory physical therapy in patients with idiopathic adolescent scoliosis.

    PubMed

    Cano, Danila Vieira Baldini; Malafaia, Osvaldo; Alves, Vera Lúcia dos Santos; Avanzi, Osmar; Pinto, José Simão de Paula

    2011-01-01

    To create a clinical database of respiratory function in patients with adolescent idiopathic scoliosis; computerize and store this clinical data through the use of a software; incorporate this electronic protocol to the SINPE© (Integrated Electronic Protocols System) and analyze a pilot project with interpretation of results. From the literature review a computerized data bank of clinical data of postural deviations was set up (master protocol). Upon completion of the master protocol a specific protocol of respiratory function in patients with adolescent idiopathic scoliosis was designed and a pilot project was conducted to collect and analyze data from ten patients. It was possible to create the master protocol of postural deviations and the specific protocol of respiratory function in patients with adolescent idiopathic scoliosis. The data collected in the pilot project was processed by the SINPE ANALYZER©, generating charts and statistics. The establishment of the clinical database of adolescent idiopathic scoliosis was possible. Computerization and storage of clinical data using the software were viable. The electronic protocol of adolescent idiopathic scoliosis could be incorporated into the SINPE© and its use in the pilot project was successful.

  18. Development and Operation of Dual-Mode Analyzers for Wireless Power Consortium/Power Matters Alliance Wireless Power Systems.

    PubMed

    Um, Keehong

    2016-05-01

    We have designed a protocol analyzer to be used in wireless power systems and analyzed the operation of wireless chargers defined by standards of Qi of Wireless Power Consortium (WPC) and Power Matters Alliance (PMA) protocols. The integrated circuit (IC, or microchip) developed so far for wireless power transmission is not easily adopted by chargers for specific purposes. A device for measuring the performance of test equipment currently available is required to transform and expand the types of protocol. Since a protocol analyzer with these functions is required, we have developed a device that can analyze the two protocols of WPC and PMA at the same time. As a result of our research, we present a dual-mode system that can analyze the protocols of both WPC and PMA.

  19. A comparative study of wireless sensor networks and their routing protocols.

    PubMed

    Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  20. The Deployment of Routing Protocols in Distributed Control Plane of SDN

    PubMed Central

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies. PMID:25250395

Top