Sample records for protocol service providers

  1. 78 FR 54201 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...

  2. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...

  3. 77 FR 63757 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final... Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband...

  4. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    NASA Astrophysics Data System (ADS)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  5. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.

  6. Security Services Discovery by ATM Endsystems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sholander, Peter; Tarman, Thomas

    This contribution proposes strawman techniques for Security Service Discovery by ATM endsystems in ATM networks. Candidate techniques include ILMI extensions, ANS extensions and new ATM anycast addresses. Another option is a new protocol based on an IETF service discovery protocol, such as Service Location Protocol (SLP). Finally, this contribution provides strawman requirements for Security-Based Routing in ATM networks.

  7. Enhanced service zone architecture for multiservices over IP

    NASA Astrophysics Data System (ADS)

    Michaely, Boaz; Mohan, Seshadri

    2001-07-01

    Recently, the field of IP Telephony has been experienced considerable evolution through the specification of new protocols and introduction of products implementing these protocols. We visualize IP Telephony evolving to soon offer multiservices encompassing not only voice, but also data, video and multimedia. While the progress has focused on refining protocols and architectures, very little attention has been given to business models for offering these services. This paper introduces the concept of a Service Zone, which from a service provider/network operator perspective fits within the operator's administrative domain, but is viewed as an independent zone with its own management and services, requiring minimal integration with the core network services. Besides its own management, the Enhanced Services Zone may also provide provisioning and maintenance features needed to provide the customer services and availability that subscribers expect from a telephony service providers. The platform must provide reliable service over time, be scalable to meet increased capacity demands, and be upgradeable to incorporate advanced services and features as they become available. Signaling flows are illustrated using SIP and H.323.

  8. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.

    PubMed

    Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-09-23

    SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs.

  9. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services

    PubMed Central

    Gessler, Damian DG; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-01-01

    Background SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. Results There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at , developer tools at , and a portal to third-party ontologies at (a "swap meet"). Conclusion SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the confounding of content, structure, and presentation. SSWAP is novel by establishing the concept of a canonical yet mutable OWL DL graph that allows data and service providers to describe their resources, to allow discovery servers to offer semantically rich search engines, to allow clients to discover and invoke those resources, and to allow providers to respond with semantically tagged data. SSWAP allows for a mix-and-match of terms from both new and legacy third-party ontologies in these graphs. PMID:19775460

  10. Performance Evaluation of a SLA Negotiation Control Protocol for Grid Networks

    NASA Astrophysics Data System (ADS)

    Cergol, Igor; Mirchandani, Vinod; Verchere, Dominique

    A framework for an autonomous negotiation control protocol for service delivery is crucial to enable the support of heterogeneous service level agreements (SLAs) that will exist in distributed environments. We have first given a gist of our augmented service negotiation protocol to support distinct service elements. The augmentations also encompass related composition of the services and negotiation with several service providers simultaneously. All the incorporated augmentations will enable to consolidate the service negotiation operations for telecom networks, which are evolving towards Grid networks. Furthermore, our autonomous negotiation protocol is based on a distributed multi-agent framework to create an open market for Grid services. Second, we have concisely presented key simulation results of our work in progress. The results exhibit the usefulness of our negotiation protocol for realistic scenarios that involves different background traffic loading, message sizes and traffic flow asymmetry between background and negotiation traffics.

  11. Motion Imagery and Robotics Application (MIRA)

    NASA Technical Reports Server (NTRS)

    Martinez, Lindolfo; Rich, Thomas

    2011-01-01

    Objectives include: I. Prototype a camera service leveraging the CCSDS Integrated protocol stack (MIRA/SM&C/AMS/DTN): a) CCSDS MIRA Service (New). b) Spacecraft Monitor and Control (SM&C). c) Asynchronous Messaging Service (AMS). d) Delay/Disruption Tolerant Networking (DTN). II. Additional MIRA Objectives: a) Demo of Camera Control through ISS using CCSDS protocol stack (Berlin, May 2011). b) Verify that the CCSDS standards stack can provide end-to-end space camera services across ground and space environments. c) Test interoperability of various CCSDS protocol standards. d) Identify overlaps in the design and implementations of the CCSDS protocol standards. e) Identify software incompatibilities in the CCSDS stack interfaces. f) Provide redlines to the SM&C, AMS, and DTN working groups. d) Enable the CCSDS MIRA service for potential use in ISS Kibo camera commanding. e) Assist in long-term evolution of this entire group of CCSDS standards to TRL 6 or greater.

  12. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  13. Anonymity-preserving Reputation Management System for health sector

    PubMed Central

    Hamid, Zara; Abdul, Wadood; Ghouzali, Sanaa; Khan, Abid; Malik, Saif Ur Rehman; Shaukat Khan, Mansoor; Nawaz, Sarfraz

    2018-01-01

    In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme. PMID:29649267

  14. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  15. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  16. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  17. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  18. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  19. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  20. A Secure Authenticated Key Exchange Protocol for Credential Services

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  1. Transitioning the Tactical Marine Corps to IPv6

    DTIC Science & Technology

    2011-09-01

    SUT System Under Test SYSCOM Systems Command (synonymous with MCSC) TCP Transmission Control Protocol TDS Tactical Data Systems TDN...capability to provide services to the Marine Corps Tactical Data Systems ( TDS ) and other DDS-M systems. The 2 DDS-M can function as the file server...Intelligence ( ATI ) program provides comprehensive application protocols and attacks, as well as feature updates and responsive service and support with

  2. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    PubMed

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  3. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  4. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  5. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  6. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  7. Transitions of care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): a study of protocols in Greater London.

    PubMed

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-06-23

    Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0-70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0-50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services.

  8. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): A study of protocols in Greater London

    PubMed Central

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-01-01

    Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services. PMID:18573214

  9. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  10. A reference model for space data system interconnection services

    NASA Astrophysics Data System (ADS)

    Pietras, John; Theis, Gerhard

    1993-03-01

    The widespread adoption of standard packet-based data communication protocols and services for spaceflight missions provides the foundation for other standard space data handling services. These space data handling services can be defined as increasingly sophisticated processing of data or information received from lower-level services, using a layering approach made famous in the International Organization for Standardization (ISO) Open System Interconnection Reference Model (OSI-RM). The Space Data System Interconnection Reference Model (SDSI-RM) incorporates the conventions of the OSIRM to provide a framework within which a complete set of space data handling services can be defined. The use of the SDSI-RM is illustrated through its application to data handling services and protocols that have been defined by, or are under consideration by, the Consultative Committee for Space Data Systems (CCSDS).

  11. A reference model for space data system interconnection services

    NASA Technical Reports Server (NTRS)

    Pietras, John; Theis, Gerhard

    1993-01-01

    The widespread adoption of standard packet-based data communication protocols and services for spaceflight missions provides the foundation for other standard space data handling services. These space data handling services can be defined as increasingly sophisticated processing of data or information received from lower-level services, using a layering approach made famous in the International Organization for Standardization (ISO) Open System Interconnection Reference Model (OSI-RM). The Space Data System Interconnection Reference Model (SDSI-RM) incorporates the conventions of the OSIRM to provide a framework within which a complete set of space data handling services can be defined. The use of the SDSI-RM is illustrated through its application to data handling services and protocols that have been defined by, or are under consideration by, the Consultative Committee for Space Data Systems (CCSDS).

  12. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases.  CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR), Office of Regulatory Affairs for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES - THIS POSITION IS CONTINGENT UPON FUNDING APPROVAL The Protocol Coordinator II: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers, maintains records of these approvals at the outside centers in the protocol files, and sends protocol amendments and other reports to the participating centers Maintains a schedule of all review committee submission deadline dates and meeting dates Assists clinical investigators in understanding and complying with the entire review process Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document management and tracking system for NCI protocols Converts protocols from Word format to PDF with bookmarks Maintains the PDF version of the most current approved version of each active clinical protocol on a central server    This position has the option to be located in Frederick or Rockville, Maryland.

  13. Fingerprinting Software Defined Networks and Controllers

    DTIC Science & Technology

    2015-03-01

    24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined

  14. 78 FR 55696 - Request for Comment on Petition Filed by Purple Communications, Inc. Regarding the Provision of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...

  15. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR) Protocol Support Office (PSO) for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator III: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials. Provides deployment of clinical support services for clinical research. Streamlines the protocol development timeline. Provides data and documents collection and compilation for regulatory filing with the U.S. Food and Drug Administration (FDA) and other regulatory authorities.. Provides technical review and report preparation. Provides administrative coordination and general logistical support for regulatory activities. Ensures the provision of training for investigators and associate staff to reinforce and enhance a Good Clinical Practices (GCP) culture. Oversees quality assurance and quality control, performs regulatory review of clinical protocols, informed consent and other clinical documents. Tracks and facilitates a portfolio of protocols through each process step (Institutional Review Board [IRB], Regulatory Affairs Compliance [RAC], Data Safety Monitoring Board [DSMB], Office of Protocol Services). Assists clinical investigators in preparing clinical research protocols, including writing and formatting consent forms. Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies. Collaborates with investigators to resolve any protocol/data issues. Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI IRB, and the clinical trial sponsor or the FDA. Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events. Attends and prepares minutes for the Branch Protocol Review Committees. Contacts coordinators at other centers for protocols that are performed there to obtain review committee approvals at those centers, maintains records of these approvals and sends protocol amendments and other reports to the participating centers. Maintains a schedule of all review committee submission deadline dates and meeting dates. Assists clinical investigators in understanding and complying with the entire review process. Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document and tracking system for NCI protocols. Converts protocols from Word format to .pdf with bookmarks. Maintains the .pdf version of the most current approved version of each active clinical protocol on a central server. This position is located in Rockville, Maryland.

  16. Open solutions to distributed control in ground tracking stations

    NASA Technical Reports Server (NTRS)

    Heuser, William Randy

    1994-01-01

    The advent of high speed local area networks has made it possible to interconnect small, powerful computers to function together as a single large computer. Today, distributed computer systems are the new paradigm for large scale computing systems. However, the communications provided by the local area network is only one part of the solution. The services and protocols used by the application programs to communicate across the network are as indispensable as the local area network. And the selection of services and protocols that do not match the system requirements will limit the capabilities, performance, and expansion of the system. Proprietary solutions are available but are usually limited to a select set of equipment. However, there are two solutions based on 'open' standards. The question that must be answered is 'which one is the best one for my job?' This paper examines a model for tracking stations and their requirements for interprocessor communications in the next century. The model and requirements are matched with the model and services provided by the five different software architectures and supporting protocol solutions. Several key services are examined in detail to determine which services and protocols most closely match the requirements for the tracking station environment. The study reveals that the protocols are tailored to the problem domains for which they were originally designed. Further, the study reveals that the process control model is the closest match to the tracking station model.

  17. Scalable parallel communications

    NASA Technical Reports Server (NTRS)

    Maly, K.; Khanna, S.; Overstreet, C. M.; Mukkamala, R.; Zubair, M.; Sekhar, Y. S.; Foudriat, E. C.

    1992-01-01

    Coarse-grain parallelism in networking (that is, the use of multiple protocol processors running replicated software sending over several physical channels) can be used to provide gigabit communications for a single application. Since parallel network performance is highly dependent on real issues such as hardware properties (e.g., memory speeds and cache hit rates), operating system overhead (e.g., interrupt handling), and protocol performance (e.g., effect of timeouts), we have performed detailed simulations studies of both a bus-based multiprocessor workstation node (based on the Sun Galaxy MP multiprocessor) and a distributed-memory parallel computer node (based on the Touchstone DELTA) to evaluate the behavior of coarse-grain parallelism. Our results indicate: (1) coarse-grain parallelism can deliver multiple 100 Mbps with currently available hardware platforms and existing networking protocols (such as Transmission Control Protocol/Internet Protocol (TCP/IP) and parallel Fiber Distributed Data Interface (FDDI) rings); (2) scale-up is near linear in n, the number of protocol processors, and channels (for small n and up to a few hundred Mbps); and (3) since these results are based on existing hardware without specialized devices (except perhaps for some simple modifications of the FDDI boards), this is a low cost solution to providing multiple 100 Mbps on current machines. In addition, from both the performance analysis and the properties of these architectures, we conclude: (1) multiple processors providing identical services and the use of space division multiplexing for the physical channels can provide better reliability than monolithic approaches (it also provides graceful degradation and low-cost load balancing); (2) coarse-grain parallelism supports running several transport protocols in parallel to provide different types of service (for example, one TCP handles small messages for many users, other TCP's running in parallel provide high bandwidth service to a single application); and (3) coarse grain parallelism will be able to incorporate many future improvements from related work (e.g., reduced data movement, fast TCP, fine-grain parallelism) also with near linear speed-ups.

  18. 77 FR 25088 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ... Commission's rules to interconnected Voice over Internet Protocol (VoIP) service providers and defers action... to outages resulting from complete loss of service and only to interconnected VoIP services... obligations of interconnected VoIP service providers. DATES: The rules in this document contain information...

  19. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  20. Outdoor Irrigation Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  1. Development of protocols to inventory or monitor wildlife, fish, or rare plants

    Treesearch

    David Vesely; Brenda C. McComb; Christina D. Vojta; Lowell H. Suring; Jurai Halaj; Richard S. Holthausen; Benjamin Zuckerberg; Patricia M. Manley

    2006-01-01

    The purpose of this technical guide (hereafter referred to as the Species Protocol Technical Guide) is to provide guidelines for developing inventory and monitoring (I&M) protocols for wildlife, fish, and rare plants (WFRP) using the U.S. Department of Agriculture (USDA) Forest Service technical guide format.

  2. Using the ACR/NEMA standard with TCP/IP and Ethernet

    NASA Astrophysics Data System (ADS)

    Chimiak, William J.; Williams, Rodney C.

    1991-07-01

    There is a need for a consolidated picture archival and communications system (PACS) in hospitals. At the Bowman Gray School of Medicine of Wake Forest University (BGSM), the authors are enhancing the ACR/NEMA Version 2 protocol using UNIX sockets and TCP/IP to greatly improve connectivity. Initially, nuclear medicine studies using gamma cameras are to be sent to PACS. The ACR/NEMA Version 2 protocol provides the functionality of the upper three layers of the open system interconnection (OSI) model in this implementation. The images, imaging equipment information, and patient information are then sent in ACR/NEMA format to a software socket. From there it is handed to the TCP/IP protocol, which provides the transport and network service. TCP/IP, in turn, uses the services of IEEE 802.3 (Ethernet) to complete the connectivity. The advantage of this implementation is threefold: (1) Only one I/O port is consumed by numerous nuclear medicine cameras, instead of a physical port for each camera. (2) Standard protocols are used which maximize interoperability with ACR/NEMA compliant PACSs. (3) The use of sockets allows a migration path to the transport and networking services of OSIs TP4 and connectionless network service as well as the high-performance protocol being considered by the American National Standards Institute (ANSI) and the International Standards Organization (ISO) -- the Xpress Transfer Protocol (XTP). The use of sockets also gives access to ANSI's Fiber Distributed Data Interface (FDDI) as well as other high-speed network standards.

  3. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  4. 47 CFR 6.1 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carrier; (d) Any provider of interconnected Voice over Internet Protocol (VoIP) service, as that... equipment that is specially designed to provide interconnected VoIP service and that is needed for the effective use of an interconnected VoIP service. [64 FR 63251, Nov. 19, 1999, as amended at 72 FR 43558, Aug...

  5. Pediatric Oncology Branch - Support Services | Center for Cancer Research

    Cancer.gov

    Support Services As part of the comprehensive care provided at the NCI Pediatric Oncology Branch, we provide a wide range of services to address the social, psychological, emotional, and practical facets of pediatric cancer and to support patients and families while they are enrolled in clinical research protocols.

  6. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    ERIC Educational Resources Information Center

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  7. If SWORD Is the Answer, What Is the Question?: Use of the Simple Web-Service Offering Repository Deposit Protocol

    ERIC Educational Resources Information Center

    Lewis, Stuart; Hayes, Leonie; Newton-Wade, Vanessa; Corfield, Antony; Davis, Richard; Donohue, Tim; Wilson, Scott

    2009-01-01

    Purpose: The purpose of this paper is to describe the repository deposit protocol, Simple Web-service Offering Repository Deposit (SWORD), its development iteration, and some of its potential use cases. In addition, seven case studies of institutional use of SWORD are provided. Design/methodology/approach: The paper describes the recent…

  8. Land-mobile satellite communication system

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)

    1993-01-01

    A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.

  9. Object Management Group object transaction service based on an X/Open and International Organization for Standardization open systems interconnection transaction processing kernel

    NASA Astrophysics Data System (ADS)

    Liang, J.; Sédillot, S.; Traverson, B.

    1997-09-01

    This paper addresses federation of a transactional object standard - Object Management Group (OMG) object transaction service (OTS) - with the X/Open distributed transaction processing (DTP) model and International Organization for Standardization (ISO) open systems interconnection (OSI) transaction processing (TP) communication protocol. The two-phase commit propagation rules within a distributed transaction tree are similar in the X/Open, ISO and OMG models. Building an OTS on an OSI TP protocol machine is possible because the two specifications are somewhat complementary. OTS defines a set of external interfaces without specific internal protocol machine, while OSI TP specifies an internal protocol machine without any application programming interface. Given these observations, and having already implemented an X/Open two-phase commit transaction toolkit based on an OSI TP protocol machine, we analyse the feasibility of using this implementation as a transaction service provider for OMG interfaces. Based on the favourable result of this feasibility study, we are implementing an OTS compliant system, which, by initiating the extensibility and openness strengths of OSI TP, is able to provide interoperability between X/Open DTP and OMG OTS models.

  10. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  11. Patient privacy protection using anonymous access control techniques.

    PubMed

    Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V

    2008-01-01

    The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.

  12. The multidriver: A reliable multicast service using the Xpress Transfer Protocol

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Fenton, John C.; Weaver, Alfred C.

    1990-01-01

    A reliable multicast facility extends traditional point-to-point virtual circuit reliability to one-to-many communication. Such services can provide more efficient use of network resources, a powerful distributed name binding capability, and reduced latency in multidestination message delivery. These benefits will be especially valuable in real-time environments where reliable multicast can enable new applications and increase the availability and the reliability of data and services. We present a unique multicast service that exploits features in the next-generation, real-time transfer layer protocol, the Xpress Transfer Protocol (XTP). In its reliable mode, the service offers error, flow, and rate-controlled multidestination delivery of arbitrary-sized messages, with provision for the coordination of reliable reverse channels. Performance measurements on a single-segment Proteon ProNET-4 4 Mbps 802.5 token ring with heterogeneous nodes are discussed.

  13. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... of 2010 (CVAA), which requires each provider of interconnected voice over Internet protocol (VoIP) service or non-interconnected VoIP service to begin participating in and contributing to the interstate... [[Page 65966

  14. Turf Conversion Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  15. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  16. Study on Quality of IUD Services Provided by Trained Professionals at Teaching Institutes.

    PubMed

    Prasad, Noopur; Jain, M L; Meena, B S

    2018-06-01

    Access the completeness in IUD services provided by trained professionals and find out the weak links. Study was conducted on 100 IUD trained professionals of tertiary care hospital and nursing teaching institute. All were given questionnaire that was duly filled by them. Data obtained were analysed. Protocols of case selection, pre-insertion counselling, insertion process and follow-up were assessed. All the four criteria were assessed on score of ten. Study group could not get ten points under any of the set criteria. Average of 53% case selection, 31.4% pre-insertion counselling, 42.5% insertion protocols and 46.1% follow-up counselling criteria were observed by study group. Highest compliance of protocols was seen among postgraduate students. Although IUD training is given to all medical professionals and IUD facility is available up to subcentres but the study shows that completeness in services is still lacking. Ensuring ideal place for IUD insertion, proper case selection, use of specific instruments for insertion and observance of insertion protocols are very vital for the success of IUD.

  17. Interlibrary Loan, the Key to Resource Sharing: A Manual of Procedures and Protocols.

    ERIC Educational Resources Information Center

    Alaska State Dept. of Education, Juneau. Div. of State Libraries.

    Intended for use by librarians in Alaska, this manual provides general guidelines for the maximum utilization of library resources through interlibrary loan service. The first of four major sections describes the Alaska Library Network (ALN), which provides protocols and procedures to libraries for resource sharing; points out that new protocols…

  18. Network time synchronization servers at the US Naval Observatory

    NASA Technical Reports Server (NTRS)

    Schmidt, Richard E.

    1995-01-01

    Responding to an increased demand for reliable, accurate time on the Internet and Milnet, the U.S. Naval Observatory Time Service has established the network time servers, tick.usno.navy.mil and tock.usno.navy.mil. The system clocks of these HP9000/747i industrial work stations are synchronized to within a few tens of microseconds of USNO Master Clock 2 using VMEbus IRIG-B interfaces. Redundant time code is available from a VMEbus GPS receiver. UTC(USNO) is provided over the network via a number of protocols, including the Network Time Protocol (NTP) (DARPA Network Working Group Report RFC-1305), the Daytime Protocol (RFC-867), and the Time protocol (RFC-868). Access to USNO network time services is presently open and unrestricted. An overview of USNO time services and results of LAN and WAN time synchronization tests will be presented.

  19. MSFC institutional area network and ATM technology

    NASA Technical Reports Server (NTRS)

    Amin, Ashok T.

    1994-01-01

    The New Institutional Area Network (NEWIAN) at Marshall supports over 5000 end users with access to 26 file servers providing work presentation services. It is comprised of some 150 Ethernet LAN's interconnected by bridges/routers which are in turn connected to servers over two dual FDDI rings. The network supports various higher level protocols such as IP, IPX, AppleTalk (AT), and DECNet. At present IPX and AT protocols packets are routed, and IP protocol packets are bridged; however, work is in progress to route all IP packets. The impact of routing IP packets on network operation is examined. Broadband Integrated Services Data Network (BISDN), presently at various stages of development, is intended to provide voice, video, and data transfer services over a single network. BISDN will use asynchronous transfer mode (ATM) as a data transfer technique which provides for transmission, multiplexing, switching, and relaying of small size data units called cells. Limited ATM Wide Area Network (WAN) services are offered by Wiltel, AT&T, Sprint, and others. NASA is testing a pilot ATM WAN with a view to provide Program Support Communication Network services using ATM. ATM supports wide range of data rates and quality of service requirements. It is expected that ATM switches will penetrate campus networks as well. However, presently products in these areas are at various stages of development and standards are not yet complete. We examine development of ATM to help assess its role in the evolution of NEWIAN.

  20. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  1. Preliminary Results from a Model-Driven Architecture Methodology for Development of an Event-Driven Space Communications Service Concept

    NASA Technical Reports Server (NTRS)

    Roberts, Christopher J.; Morgenstern, Robert M.; Israel, David J.; Borky, John M.; Bradley, Thomas H.

    2017-01-01

    NASA's next generation space communications network will involve dynamic and autonomous services analogous to services provided by current terrestrial wireless networks. This architecture concept, known as the Space Mobile Network (SMN), is enabled by several technologies now in development. A pillar of the SMN architecture is the establishment and utilization of a continuous bidirectional control plane space link channel and a new User Initiated Service (UIS) protocol to enable more dynamic and autonomous mission operations concepts, reduced user space communications planning burden, and more efficient and effective provider network resource utilization. This paper provides preliminary results from the application of model driven architecture methodology to develop UIS. Such an approach is necessary to ensure systematic investigation of several open questions concerning the efficiency, robustness, interoperability, scalability and security of the control plane space link and UIS protocol.

  2. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  3. Enhanced International Space Station Ku-Band Telemetry Service

    NASA Technical Reports Server (NTRS)

    Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason

    2014-01-01

    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.

  4. 47 CFR 9.5 - E911 Service.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false E911 Service. 9.5 Section 9.5 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.5 E911 Service. (a) Scope of Section. The following requirements are only applicable to providers of...

  5. 47 CFR 9.5 - E911 Service.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false E911 Service. 9.5 Section 9.5 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.5 E911 Service. (a) Scope of Section. The following requirements are only applicable to providers of...

  6. 47 CFR 9.5 - E911 Service.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false E911 Service. 9.5 Section 9.5 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.5 E911 Service. (a) Scope of Section. The following requirements are only applicable to providers of...

  7. Data-centric multiobjective QoS-aware routing protocol for body sensor networks.

    PubMed

    Razzaque, Md Abdur; Hong, Choong Seon; Lee, Sungwon

    2011-01-01

    In this paper, we address Quality-of-Service (QoS)-aware routing issue for Body Sensor Networks (BSNs) in delay and reliability domains. We propose a data-centric multiobjective QoS-Aware routing protocol, called DMQoS, which facilitates the system to achieve customized QoS services for each traffic category differentiated according to the generated data types. It uses modular design architecture wherein different units operate in coordination to provide multiple QoS services. Their operation exploits geographic locations and QoS performance of the neighbor nodes and implements a localized hop-by-hop routing. Moreover, the protocol ensures (almost) a homogeneous energy dissipation rate for all routing nodes in the network through a multiobjective Lexicographic Optimization-based geographic forwarding. We have performed extensive simulations of the proposed protocol, and the results show that DMQoS has significant performance improvements over several state-of-the-art approaches.

  8. Collaborating with community-based services to promote evidence-based practice: Process description of a national initiative to improve services for youth with mental health and substance use problems.

    PubMed

    Henderson, Joanna L; Chaim, Gloria; Brownlie, E B

    2017-08-01

    Many youth with significant mental health (MH) and/or substance use (SU) difficulties do not receive specialized services. Collaboration between service providers, researchers, and other stakeholders is essential to improve youth service system capacity to provide evidence-based services to meet the complex array of needs of youth. Facilitators and barriers of implementing evidence-based practice have been identified, but few studies provide examples of the processes of collaboration and implementation for youth MH services. This study explicates the design features and implementation processes of a project to improve screening activities in youth services. These processes supported the building of 16 collaborative networks of service providers from diverse youth-serving sectors (e.g., MH, youth justice, child welfare) in urban, rural, suburban, and remote Canadian communities. These cross-sectoral networks implemented an evidence-based practice (screening youth aged 12-24 years for MH and SU problems using the Global Assessment of Individual Needs-Short Screener [GAIN-SS]) across their services. Materials and resources were provided by a centralized research team. Core project components were standardized and adherence to these components was monitored. Over 800 service providers participated in cross-sectoral networks, capacity-building events, joint data analysis, or interpretation and recommendation sessions. Across the 89 participating agencies, service providers for 84% of participating youth implemented the evidence-based practice accurately in accordance with project protocols, with 98% of positive screens reviewed and addressed according to organizational protocols. Service provider feedback is reported. Facilitators, barriers, and implications of promoting implementation of evidence-based practices across sites and sectors are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    PubMed

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  10. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator II: Provides comprehensive clinical and administrative support to the Brain Tumor Trial Collaborative, Neuro-Oncology Branch, NCI, National Institutes of Health Serves as a liaison with Principal Investigators (PIs), the associated study teams and a variety of offices associated with protocol development and approvals Orchestrates meetings with investigators and other key medical staff to identify required support Coordinates the writing and regulatory review processes that occur in tandem, facilitates the bi-directional dialogue and feedback between various teams, and assists investigators and medical writers on the production/revision of clinical research protocols Assists research staff in coordinating/navigating requirements for special circumstances and facilitates access to necessary services Facilitates initiation of intramural research by providing assistance in obtaining required approvals Coordinates with investigators and medical writers to ensure Institutional Review Board (IRB) and Food and Drug Administration (FDA) stipulations are appropriately addressed in a timely manner Provides consultation and assistance for all aspects of the protocol lifecycle including initial Investigational New Drug (IND) submission, IRB submission, continuing review applications, protocol amendments, annual reports, and protocol inactivation with IRB and FDA Tracks a portfolio of protocols through each lifecycle step; processes and tracks appropriate approvals (e.g., IRB, Data and Safety Monitoring Board, Radiation Safety, Office of Protocol Services, etc.) Provides administrative support to Scientific Review Committees (SRC), reviews proposed protocol documents to ensure they are complete, distributes to reviewers, documents meeting minutes, enters data into the IRIS database, facilitates processes to obtain approval to initiate and continue clinical research Creates, maintains and queries an IRB database of approved amendment descriptions Maintains records of the current protocol(s) version, current Informed Consent document(s), FDA Safe to Proceed designation, etc. for each IND Provides expertise in data management including data collection and analysis Develops procedural manuals for clinical trials protocols Participates in quality improvement and assurance involving International Conference on Harmonization (ICH) Good Clinical Practice (GCP) guidelines This position is located at the National Institutes of Health (NIH) in Bethesda, Maryland.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  12. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  13. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    NASA Technical Reports Server (NTRS)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  14. The deployment of a large scale object store at the RAL Tier-1

    NASA Astrophysics Data System (ADS)

    Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.

    2017-10-01

    Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.

  15. Sampling protocol, estimation, and analysis procedures for the down woody materials indicator of the FIA program

    Treesearch

    Christopher W. Woodall; Vicente J. Monleon

    2008-01-01

    The USDA Forest Service's Forest Inventory and Analysis program conducts an inventory of forests of the United States including down woody materials (DWM). In this report we provide the rationale and context for a national inventory of DWM, describe the components sampled, discuss the sampling protocol used and corresponding estimation procedures, and provide...

  16. 78 FR 6216 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-30

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 4 [PS Docket No. 11-82; DA 12-1962] Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final...

  17. DNET: A communications facility for distributed heterogeneous computing

    NASA Technical Reports Server (NTRS)

    Tole, John; Nagappan, S.; Clayton, J.; Ruotolo, P.; Williamson, C.; Solow, H.

    1989-01-01

    This document describes DNET, a heterogeneous data communications networking facility. DNET allows programs operating on hosts on dissimilar networks to communicate with one another without concern for computer hardware, network protocol, or operating system differences. The overall DNET network is defined as the collection of host machines/networks on which the DNET software is operating. Each underlying network is considered a DNET 'domain'. Data communications service is provided between any two processes on any two hosts on any of the networks (domains) that may be reached via DNET. DNET provides protocol transparent, reliable, streaming data transmission between hosts (restricted, initially to DECnet and TCP/IP networks). DNET also provides variable length datagram service with optional return receipts.

  18. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

  19. Health surveillance under adverse ergonomics conditions--validity of a screening method adapted for the occupational health service.

    PubMed

    Jonker, Dirk; Gustafsson, Ewa; Rolander, Bo; Arvidsson, Inger; Nordander, Catarina

    2015-01-01

    A new health surveillance protocol for work-related upper-extremity musculoskeletal disorders has been validated by comparing the results with a reference protocol. The studied protocol, Health Surveillance in Adverse Ergonomics Conditions (HECO), is a new version of the reference protocol modified for application in the Occupational Health Service (OHS). The HECO protocol contains both a screening part and a diagnosing part. Sixty-three employees were examined. The screening in HECO did not miss any diagnosis found when using the reference protocol, but in comparison to the reference protocol considerable time savings could be achieved. Fair to good agreement between the protocols was obtained for one or more diagnoses in neck/shoulders (86%, k = 0.62) and elbow/hands (84%, k = 0.49). Therefore, the results obtained using the HECO protocol can be compared with a reference material collected with the reference protocol, and thus provide information of the magnitude of disorders in an examined work group. Practitioner Summary: The HECO protocol is a relatively simple physical examination protocol for identification of musculoskeletal disorders in the neck and upper extremities. The protocol is a reliable and cost-effective tool for the OHS to use for occupational health surveillance in order to detect workplaces at high risk for developing musculoskeletal disorders.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  1. A Telecommunications Industry Primer: A Systems Model.

    ERIC Educational Resources Information Center

    Obermier, Timothy R.; Tuttle, Ronald H.

    2003-01-01

    Describes the Telecommunications Systems Model to help technical educators and students understand the increasingly complex telecommunications infrastructure. Specifically looks at ownership and regulatory status, service providers, transport medium, network protocols, and end-user services. (JOW)

  2. Proposed DoD (Department of Defense) Internet Protocol Standard.

    DTIC Science & Technology

    1982-07-06

    parameters fall into two categories: service quality parameters and service options. Service quality parameters influence the transmission service provided...Corporation 6 July 1982 -7- TM-7172/481/OO o Service Quality Parameters - Precedence : attempts preferential treatment for high importance datagrams...select the transmission quality. IP passes the type of service (TOS) command set for service quality to the SNP where it is mapped into subnetwork

  3. NASA's Plan for SDLS Testing

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    The Space Data Link Security (SDLS) Protocol is a Consultative Committee for Space Data Systems (CCSDS) standard which extends the known Data Link protocols to secure data being sent over a space link by providing confidentiality and integrity services. This plan outlines the approach by National Aeronautics Space Administration (NASA) in performing testing of the SDLS protocol using a prototype based on an existing NASA missions simulator.

  4. A Multi-Center Space Data System Prototype Based on CCSDS Standards

    NASA Technical Reports Server (NTRS)

    Rich, Thomas M.

    2016-01-01

    Deep space missions beyond earth orbit will require new methods of data communications in order to compensate for increasing RF propagation delay. The Consultative Committee for Space Data Systems (CCSDS) standard protocols Spacecraft Monitor & Control (SM&C), Asynchronous Message Service (AMS), and Delay/Disruption Tolerant Networking (DTN) provide such a method. The maturity level of this protocol set is, however, insufficient for mission inclusion at this time. This prototype is intended to provide experience which will raise the Technical Readiness Level (TRL) of these protocols..

  5. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  6. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...

  7. Understanding Consistency Maintenance in Service Discovery Architectures in Response to Message Loss

    DTIC Science & Technology

    2002-07-01

    manager (SM), and (3) service cache manager ( SCM ). The SCM is an optional element not supported by all discovery protocols. These components participate...the SCM operates as an intermediary, matching advertised SDs of SMs to requirements provided by SUs. Table 1 shows how these general concepts map...Service DescriptionService ItemService Description (SD) Directory Service Agent (optional) not applicableLookup ServiceService Cache Manager ( SCM

  8. Adaptive Peer Sampling with Newscast

    NASA Astrophysics Data System (ADS)

    Tölgyesi, Norbert; Jelasity, Márk

    The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, data aggregation and overlay topology management. Lightweight gossip-based implementations of the peer sampling service have been shown to provide good quality random sampling while also being extremely robust to many failure scenarios, including node churn and catastrophic failure. We identify two problems with these approaches. The first problem is related to message drop failures: if a node experiences a higher-than-average message drop rate then the probability of sampling this node in the network will decrease. The second problem is that the application layer at different nodes might request random samples at very different rates which can result in very poor random sampling especially at nodes with high request rates. We propose solutions for both problems. We focus on Newscast, a robust implementation of the peer sampling service. Our solution is based on simple extensions of the protocol and an adaptive self-control mechanism for its parameters, namely—without involving failure detectors—nodes passively monitor local protocol events using them as feedback for a local control loop for self-tuning the protocol parameters. The proposed solution is evaluated by simulation experiments.

  9. 76 FR 36919 - Proof of Concept Demonstration for Electronic Reporting of Clean Water Act Compliance Monitoring...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    ... commercial products or services of any third-party software providers. Proof of Concept Demonstration for..., protocols, and specifications for the Exchange Network's data exchange services, the software provider shall... demonstration will focus the electronic transmission of NPDES DMRs from a third-party commercial software...

  10. Standards of care provided by early pregnancy assessment units (EPAU): a UK-wide survey.

    PubMed

    Poddar, A; Tyagi, J; Hawkins, E; Opemuyi, I

    2011-10-01

    Standards of services provided by the EPAUs across the UK vary from one unit to another. The aim of this purposive sampling self-administered survey was to assess these standards against a benchmark set by the Royal College of Obstetricians and Gynaecologists (RCOG). These standards were set out in a report by a RCOG working party (2008). Out of 181 units contacted in this survey, 140 units responded. We looked at the setup of the EPAU, services offered, accessibility and protocols for management of miscarriage and ectopic pregnancy. The survey shows that there is a considerable variation in the management protocols and the quality of services offered by the EPAUs in the UK. Many units do not meet the standards set by the RCOG.

  11. A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation

    NASA Astrophysics Data System (ADS)

    Watanabe, Toru; Koizumi, Hisao

    In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  13. Standardized methods for Grand Canyon fisheries research 2015

    USGS Publications Warehouse

    Persons, William R.; Ward, David L.; Avery, Luke A.

    2013-01-01

    This document presents protocols and guidelines to persons sampling fishes in the Grand Canyon, to help ensure consistency in fish handling, fish tagging, and data collection among different projects and organizations. Most such research and monitoring projects are conducted under the general umbrella of the Glen Canyon Dam Adaptive Management Program and include studies by the U.S. Geological Survey (USGS), U.S. Fish and Wildlife Service (FWS), National Park Service (NPS), the Arizona Game and Fish Department (AGFD), various universities, and private contractors. This document is intended to provide guidance to fieldworkers regarding protocols that may vary from year to year depending on specific projects and objectives. We also provide herein documentation of standard methods used in the Grand Canyon that can be cited in scientific publications, as well as a summary of changes in protocols since the document was first created in 2002.

  14. Health surveillance under adverse ergonomics conditions – validity of a screening method adapted for the occupational health service

    PubMed Central

    Jonker, Dirk; Gustafsson, Ewa; Rolander, Bo; Arvidsson, Inger; Nordander, Catarina

    2015-01-01

    A new health surveillance protocol for work-related upper-extremity musculoskeletal disorders has been validated by comparing the results with a reference protocol. The studied protocol, Health Surveillance in Adverse Ergonomics Conditions (HECO), is a new version of the reference protocol modified for application in the Occupational Health Service (OHS). The HECO protocol contains both a screening part and a diagnosing part. Sixty-three employees were examined. The screening in HECO did not miss any diagnosis found when using the reference protocol, but in comparison to the reference protocol considerable time savings could be achieved. Fair to good agreement between the protocols was obtained for one or more diagnoses in neck/shoulders (86%, k = 0.62) and elbow/hands (84%, k = 0.49). Therefore, the results obtained using the HECO protocol can be compared with a reference material collected with the reference protocol, and thus provide information of the magnitude of disorders in an examined work group. Practitioner Summary: The HECO protocol is a relatively simple physical examination protocol for identification of musculoskeletal disorders in the neck and upper extremities. The protocol is a reliable and cost-effective tool for the OHS to use for occupational health surveillance in order to detect workplaces at high risk for developing musculoskeletal disorders. PMID:25761380

  15. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael

    2016-03-11

    The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length.

  16. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael

    2016-01-01

    The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length. PMID:26978362

  17. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  18. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  19. 75 FR 43597 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ...-party connectivity providers, including a range of extranets and service bureaus. All of the communications protocols will be publicly available to allow Participants and services bureaus to develop their... agreements with PHLX (including the NASDAQ OMX U.S. Services Agreement \\8\\); maintain membership in, or...

  20. Achieving quality of service in IP networks

    NASA Astrophysics Data System (ADS)

    Hays, Tim

    2001-07-01

    The Internet Protocol (IP) has served global networks well, providing a standardized method to transmit data among many disparate systems. But IP is designed for simplicity, and only enables a `best effort' service that can be subject to delays and loss of data. For data networks, this is an acceptable trade-off. In the emerging world of convergence, driven by new applications such as video streaming and IP telephony, minimizing latency and packet loss as well as jitter can be critical. Simply increasing the size of the IP network `pipe' to meet those demands is not always sufficient. In this environment, vendors and standards bodies are endeavoring to create technologies and techniques to enable IP to improve the quality of service it can provide, while retaining the characteristics that has enabled it to become the dominant networking protocol.

  1. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  2. High-Performance CCSDS AOS Protocol Implementation in FPGA

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  3. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  4. Satellite communications for the next generation telecommunication services and networks

    NASA Technical Reports Server (NTRS)

    Chitre, D. M.

    1991-01-01

    Satellite communications can play an important role in provisioning the next-generation telecommunication services and networks, provided the protocols specifying these services and networks are satellite-compatible and the satellite subnetworks, consisting of earth stations interconnected by the processor and the switch on board the satellite, interwork effectively with the terrestrial networks. The specific parameters and procedures of frame relay and broadband integrated services digital network (B-ISDN) protocols which are impacted by a satellite delay. Congestion and resource management functions for frame relay and B-ISDN are discussed in detail, describing the division of these functions between earth stations and on board the satellite. Specific onboard and ground functions are identified as potential candidates for their implementation via neural network technology.

  5. A Framework for Building and Reasoning with Adaptive and Interoperable PMESII Models

    DTIC Science & Technology

    2007-11-01

    Description Logic SOA Service Oriented Architecture SPARQL Simple Protocol And RDF Query Language SQL Standard Query Language SROM Stability and...another by providing a more expressive ontological structure for one of the models, e.g., semantic networks can be mapped to first- order logical...Pellet is an open-source reasoner that works with OWL-DL. It accepts the SPARQL protocol and RDF query language ( SPARQL ) and provides a Java API to

  6. IVOA Credential Delegation Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  7. A DTN-Based Multiple Access Fast Forward Service for the NASA Space Network

    NASA Technical Reports Server (NTRS)

    Israel, David; Davis, Faith; Marquart. Jane

    2011-01-01

    The NASA Space Network provides a demand access return link service capable of providing users a space link "on demand". An equivalent service in the forward link direction is not possible due to Tracking and Data Relay Spacecraft (TDRS) constraints. A Disruption Tolerant Networking (DTN)-based Multiple Access Fast Forward (MAFF) service has been proposed to provide a forward link to a user as soon as possible. Previous concept studies have identified a basic architecture and implementation approach. This paper reviews the user scenarios and benefits of an MAFF service and proposes an implementation approach based on the use of DTN protocols.

  8. Four aspects of the scope and quality of family planning services in US publicly funded health centers: Results from a survey of health center administrators.

    PubMed

    Carter, Marion W; Gavin, Loretta; Zapata, Lauren B; Bornstein, Marta; Mautone-Smith, Nancy; Moskosky, Susan B

    2016-10-01

    This study aims to describe aspects of the scope and quality of family planning services provided by US publicly funded health centers before the release of relevant federal recommendations. Using nationally representative survey data (N=1615), we describe four aspects of service delivery: family planning services provided, contraceptive methods provided onsite, written contraceptive counseling protocols and youth-friendly services. We created a count index for each issue and used multivariable ordered logistic regression to identify health center characteristics associated with scoring higher on each. Half of the sample received Title X funding and about a third each were a community health center or health department clinic. The vast majority reported frequently providing contraceptive services (89%) and STD services (87%) for women in the past 3 months. Service provision to males was substantially lower except for STD screening. A total of 63% and 48% of health centers provided hormonal IUDs and implants onsite in the past 3 months, respectively. Forty percent of health centers included all five recommended contraceptive counseling practices in written protocols. Of youth-friendly services, active promotion of confidential services was among the most commonly reported (83%); offering weekend/evening hours was among the least (42%). In multivariable analyses, receiving Title X funding, having larger volumes of family planning clients and being a Planned Parenthood clinic were associated with higher scores on most indices. Many services were consistent with the recommendations for providing quality family planning services, but there was room for improvement across domains and health centers types. As assessed in this paper, the scope and quality of these family planning services was relatively high, particularly among Planned Parenthood clinics and Title X-funded centers. However, results point to important areas for improvement. Future studies should assess change as implementation of recent family planning service recommendations continues. Published by Elsevier Inc.

  9. Implementation of a SOA-Based Service Deployment Platform with Portal

    NASA Astrophysics Data System (ADS)

    Yang, Chao-Tung; Yu, Shih-Chi; Lai, Chung-Che; Liu, Jung-Chun; Chu, William C.

    In this paper we propose a Service Oriented Architecture to provide a flexible and serviceable environment. SOA comes up with commercial requirements; it integrates many techniques over ten years to find the solution in different platforms, programming languages and users. SOA provides the connection with a protocol between service providers and service users. After this, the performance and the reliability problems are reviewed. Finally we apply SOA into our Grid and Hadoop platform. Service acts as an interface in front of the Resource Broker in the Grid, and the Resource Broker is middleware that provides functions for developers. The Hadoop has a file replication feature to ensure file reliability. Services provided on the Grid and Hadoop are centralized. We design a portal, in which users can use services on it directly or register service through the service provider. The portal also offers a service workflow function so that users can customize services according to the need of their jobs.

  10. Standard formatted data units-control authority procedures

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The purpose of this document is to establish a set of minimum and optional requirements for the implementation of Control Authority (CA) organizations within and among the Agencies participating in the Consultative Committee for Space Data Systems (CCSDS). By satisfying these requirements, the resultant cooperating set of CA organizations will produce a global CA service supporting information transfer with digital data under the Standard Formatted Data Unit (SFDU) concept. This service is primarily accomplished through the registration, permanent archiving, and dissemination of metadata in the form of Metadata Objects (MDO) that assist in the interpretation of data objects received in SFDU form. This Recommendation addresses the responsibilities, services, and interface protocols for a hierarchy of CA organizations. The top level, consisting of the CCSDS Secretariat and its operational agent, is unique and primarily provides a global coordination function. The lower levels are Agency CA organizations that have primary responsibility for the registration, archiving, and dissemination of MDOs. As experience is gained and technology evolves, the CA Procedures will be extended to include enhanced services and their supporting protocols. In particular, it is anticipated that eventually CA organizations will be linked via networks on a global basis, and will provide requestors with online automated access to CA services. While this Recommendation does not preclude such operations, it also does not recommend the specific protocols to be used to ensure global compatibility of these services. These recommendations will be generated as experience is gained.

  11. Optical storage networking

    NASA Astrophysics Data System (ADS)

    Mohr, Ulrich

    2001-11-01

    For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.

  12. Comparison of H.323 and SIP for IP telephony signaling

    NASA Astrophysics Data System (ADS)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  13. Software Modules for the Proximity-1 Space Link Interleaved Time Synchronization (PITS) Protocol

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Veregge, John R.; Gao, Jay L.; Clare, Loren P.; Mills, David

    2012-01-01

    The Proximity-1 Space Link Interleaved Time Synchronization (PITS) protocol provides time distribution and synchronization services for space systems. A software prototype implementation of the PITS algorithm has been developed that also provides the test harness to evaluate the key functionalities of PITS with simulated data source and sink. PITS integrates time synchronization functionality into the link layer of the CCSDS Proximity-1 Space Link Protocol. The software prototype implements the network packet format, data structures, and transmit- and receive-timestamp function for a time server and a client. The software also simulates the transmit and receive-time stamp exchanges via UDP (User Datagram Protocol) socket between a time server and a time client, and produces relative time offsets and delay estimates.

  14. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  15. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  16. Variability in donation after cardiac death protocols: a national survey.

    PubMed

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  17. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  18. Metropolitian area network services comprised of virtual local area networks running over hybrid fiber-coax and asynchronous transfer mode technologies

    NASA Astrophysics Data System (ADS)

    Biedron, William S.

    1995-11-01

    Since 1990 there has been a rapid increase in the demand for communication services, especially local and wide area network (LAN/WAN) oriented services. With the introduction of the DFB laser transmitter, hybrid-fiber-coax (HFC) cable plant designs, ATM transport technologies and rf modems, new LAN/WAN services can now be defined and marketed to residential and business customers over existing cable TV systems. The term metropolitan area network (MAN) can be used to describe this overall network. This paper discusses the technical components needed to provision these services as well as provides some perspectives on integration issues. Architecture at the headend and in the backbone is discussed, as well as specific service definitions and the technology issues associated with each. The TCP/IP protocol is suggested as a primary protocol to be used throughout the MAN.

  19. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...

  20. Mobile technology intervention to improve care coordination between HIV and substance use treatment providers: development, training, and evaluation protocol.

    PubMed

    Claborn, Kasey; Becker, Sara; Ramsey, Susan; Rich, Josiah; Friedmann, Peter D

    2017-03-14

    People living with HIV (PLWH) with a substance use disorder (SUD) tend to receive inadequate medical care in part because of a siloed healthcare system in which HIV and substance use services are delivered separately. Ideal treatment requires an interdisciplinary, team-based coordinated care approach, but many structural and systemic barriers impede the integration of HIV and SUD services. The current protocol describes the development and preliminary evaluation of a care coordination intervention (CCI), consisting of a tablet-based mobile platform for HIV and SUD treatment providers, an interagency communication protocol, and a training protocol. We hypothesize that HIV and SUD treatment providers will find the CCI to be acceptable, and that after receipt of the CCI, providers will: exhibit higher retention in dual care among patients, report increased frequency and quality of communication, and report increased rates of relational coordination. A three phase approach is used to refine and evaluate the CCI. Phase 1 consists of in-depth qualitative interviews with 8 key stakeholders as well as clinical audits of participating HIV and SUD treatment agencies. Phase 2 contains functionality testing of the mobile platform with frontline HIV and SUD treatment providers, followed by refinement of the CCI. Phase 3 consists of a pre-, post-test trial with 30 SUD and 30 HIV treatment providers. Data will be collected at the provider, organization, and patient levels. Providers will complete assessments at baseline, immediately post-training, and at 1-, 3-, and 6-months post-training. Organizational data will be collected at baseline, 1-, 3-, and 6-months post training, while patient data will be collected at baseline and 6-months post training. This study will develop and evaluate a CCI consisting of a tablet-based mobile platform for treatment providers, an interagency communication protocol, and a training protocol as a means of improving the integration of care for PLWH who have a SUD. Results have the potential to advance the field by bridging gaps in a fragmented healthcare system, and improving treatment efficiency, work flow, and communication among interdisciplinary providers from different treatment settings. NCT02906215.

  1. The way in which a physiotherapy service is structured can improve patient outcome from a surgical intensive care: a controlled clinical trial

    PubMed Central

    2012-01-01

    Introduction The physiological basis of physiotherapeutic interventions used in intensive care has been established. We must determine the optimal service approach that will result in improved patient outcome. The aim of this article is to report on the estimated effect of providing a physiotherapy service consisting of an exclusively allocated physiotherapist providing evidence-based/protocol care, compared with usual care on patient outcomes. Methods An exploratory, controlled, pragmatic, sequential-time-block clinical trial was conducted in the surgical unit of a tertiary hospital in South Africa. Protocol care (3 weeks) and usual care (3 weeks) was provided consecutively for two 6-week intervention periods. Each intervention period was followed by a washout period. The physiotherapy care provided was based on the unit admission date. Data were analyzed with Statistica in consultation with a statistician. Where indicated, relative risks with 95% confidence intervals (CIs) are reported. Significant differences between groups or across time are reported at the alpha level of 0.05. All reported P values are two-sided. Results Data of 193 admissions were analyzed. No difference was noted between the two patient groups at baseline. Patients admitted to the unit during protocol care were less likely to be intubated after unit admission (RR, 0.16; 95% CI, 0.07 to 0.71; RRR, 0.84; NNT, 5.02; P = 0.005) or to fail an extubation (RR, 0.23; 95% CI, 0.05 to 0.98; RRR, 0.77; NNT, 6.95; P = 0.04). The mean difference in the cumulative daily unit TISS-28 score during the two intervention periods was 1.99 (95% CI, 0.65 to 3.35) TISS-28 units (P = 0.04). Protocol-care patients were discharged from the hospital 4 days earlier than usual-care patients (P = 0.05). A tendency noted for more patients to reach independence in the transfers (P = 0.07) and mobility (P = 0.09) categories of the Barthel Index. Conclusions A physiotherapy service approach that includes an exclusively allocated physiotherapist providing evidence-based/protocol care that addresses pulmonary dysfunction and promotes early mobility improves patient outcome. This could be a more cost-effective service approach to care than is usual care. This information can now be considered by administrators in the management of scarce physiotherapy resources and by researchers in the planning of a multicenter randomized controlled trial. Trial registration PACTR201206000389290 PMID:23232109

  2. Sampling and measurement protocols for long-term silvicultural studies on the Penobscot Experimental Forest

    Treesearch

    Justin D. Waskiewicz; Laura S. Kenefic; Nicole S. Rogers; Joshua J. Puhlick; John C. Brissette; Richard J. Dionne

    2015-01-01

    The U.S. Forest Service, Northern Research Station has been conducting research on the silviculture of northern conifers on the Penobscot Experimental Forest (PEF) in Maine since 1950. Formal study plans provide guidance and specifications for the experimental treatments, but documentation is also needed to ensure consistency in data collection and sampling protocols....

  3. A QoS-guaranteed coverage precedence routing algorithm for wireless sensor networks.

    PubMed

    Jiang, Joe-Air; Lin, Tzu-Shiang; Chuang, Cheng-Long; Chen, Chia-Pang; Sun, Chin-Hong; Juang, Jehn-Yih; Lin, Jiun-Chuan; Liang, Wei-Wen

    2011-01-01

    For mission-critical applications of wireless sensor networks (WSNs) involving extensive battlefield surveillance, medical healthcare, etc., it is crucial to have low-power, new protocols, methodologies and structures for transferring data and information in a network with full sensing coverage capability for an extended working period. The upmost mission is to ensure that the network is fully functional providing reliable transmission of the sensed data without the risk of data loss. WSNs have been applied to various types of mission-critical applications. Coverage preservation is one of the most essential functions to guarantee quality of service (QoS) in WSNs. However, a tradeoff exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this study, we propose a routing protocol to accommodate both energy-balance and coverage-preservation for sensor nodes in WSNs. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a packet. The simulation results demonstrate that the proposed protocol is able to increase the duration of the on-duty network and provide up to 98.3% and 85.7% of extra service time with 100% sensing coverage ratio comparing with LEACH and the LEACH-Coverage-U protocols, respectively.

  4. Interoperability Using Lightweight Metadata Standards: Service & Data Casting, OpenSearch, OPM Provenance, and Shared SciFlo Workflows

    NASA Astrophysics Data System (ADS)

    Wilson, B. D.; Manipon, G.; Hua, H.; Fetzer, E.

    2011-12-01

    Under several NASA grants, we are generating multi-sensor merged atmospheric datasets to enable the detection of instrument biases and studies of climate trends over decades of data. For example, under a NASA MEASURES grant we are producing a water vapor climatology from the A-Train instruments, stratified by the Cloudsat cloud classification for each geophysical scene. The generation and proper use of such multi-sensor climate data records (CDR's) requires a high level of openness, transparency, and traceability. To make the datasets self-documenting and provide access to full metadata and traceability, we have implemented a set of capabilities and services using known, interoperable protocols. These protocols include OpenSearch, OPeNDAP, Open Provenance Model, service & data casting technologies using Atom feeds, and REST-callable analysis workflows implemented as SciFlo (XML) documents. We advocate that our approach can serve as a blueprint for how to openly "document and serve" complex, multi-sensor CDR's with full traceability. The capabilities and services provided include: - Discovery of the collections by keyword search, exposed using OpenSearch protocol; - Space/time query across the CDR's granules and all of the input datasets via OpenSearch; - User-level configuration of the production workflows so that scientists can select additional physical variables from the A-Train to add to the next iteration of the merged datasets; - Efficient data merging using on-the-fly OPeNDAP variable slicing & spatial subsetting of data out of input netCDF and HDF files (without moving the entire files); - Self-documenting CDR's published in a highly usable netCDF4 format with groups used to organize the variables, CF-style attributes for each variable, numeric array compression, & links to OPM provenance; - Recording of processing provenance and data lineage into a query-able provenance trail in Open Provenance Model (OPM) format, auto-captured by the workflow engine; - Open Publishing of all of the workflows used to generate products as machine-callable REST web services, using the capabilities of the SciFlo workflow engine; - Advertising of the metadata (e.g. physical variables provided, space/time bounding box, etc.) for our prepared datasets as "datacasts" using the Atom feed format; - Publishing of all datasets via our "DataDrop" service, which exploits the WebDAV protocol to enable scientists to access remote data directories as local files on their laptops; - Rich "web browse" of the CDR's with full metadata and the provenance trail one click away; - Advertising of all services as Google-discoverable "service casts" using the Atom format. The presentation will describe our use of the interoperable protocols and demonstrate the capabilities and service GUI's.

  5. Methods for Monitoring Fish Communities of Buffalo National River and Ozark National Scenic Riverways in the Ozark Plateaus of Arkansas and Missouri: Version 1.0

    USGS Publications Warehouse

    Petersen, James C.; Justus, B.G.; Dodd, H.R.; Bowles, D.E.; Morrison, L.W.; Williams, M.H.; Rowell, G.A.

    2008-01-01

    Buffalo National River located in north-central Arkansas, and Ozark National Scenic Riverways, located in southeastern Missouri, are the two largest units of the National Park Service in the Ozark Plateaus physiographic province. The purpose of this report is to provide a protocol that will be used by the National Park Service to sample fish communities and collect related water-quality, habitat, and stream discharge data of Buffalo National River and Ozark National Scenic Riverways to meet inventory and long-term monitoring objectives. The protocol includes (1) a protocol narrative, (2) several standard operating procedures, and (3) supplemental information helpful for implementation of the protocol. The protocol narrative provides background information about the protocol such as the rationale of why a particular resource or resource issue was selected for monitoring, information concerning the resource or resource issue of interest, a description of how monitoring results will inform management decisions, and a discussion of the linkages between this and other monitoring projects. The standard operating procedures cover preparation, training, reach selection, water-quality sampling, fish community sampling, physical habitat collection, measuring stream discharge, equipment maintenance and storage, data management and analysis, reporting, and protocol revision procedures. Much of the information in the standard operating procedures was gathered from existing protocols of the U.S. Geological Survey National Water Quality Assessment program or other sources. Supplemental information that would be helpful for implementing the protocol is included. This information includes information on fish species known or suspected to occur in the parks, sample sites, sample design, fish species traits, index of biotic integrity metrics, sampling equipment, and field forms.

  6. Transition from Legacy to Connectivity Solution for Infrastructure Control of Smart Municipal Systems

    NASA Astrophysics Data System (ADS)

    Zabasta, A.; Kunicina, N.; Kondratjevs, K.

    2017-06-01

    Collaboration between heterogeneous systems and architectures is not an easy problem in the automation domain. By now, utilities and suppliers encounter real problems due to underestimated costs of technical solutions, frustration in selecting technical solutions relevant for local needs, and incompatibilities between a plenty of protocols and appropriate solutions. The paper presents research on creation of architecture of smart municipal systems in a local cloud of services that apply SOA and IoT approaches. The authors of the paper have developed a broker that applies orchestration services and resides on a gateway, which provides adapter and protocol translation functions, as well as applies a tool for wiring together hardware devices, APIs and online services.

  7. Autoconfiguration and Service Discovery

    NASA Astrophysics Data System (ADS)

    Manner, Jukka

    To be useful, IP networking requires various parameters to be set up. A network node needs at least an IP address, routing information, and name services. In a fixed network this configuration is typically done with a centralized scheme, where a server hosts the configuration information and clients query the server with the Dynamic Host Configuration Protocol (DHCP). Companies, university campuses and even home broadband use the DHCP system to configure hosts. This signaling happens in the background, and users seldom need to think about it; only when things are not working properly, manual intervention is needed. The same protocol can be used in mobile networks, where the client device communicates with the access network provider and his DHCP service. The core information provided by DHCP includes a unique IP address for the host, the IP address of the closest IP router for routing messages to other networks, and the location of domain name servers.

  8. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  9. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  10. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  11. Real-time distributed scheduling algorithm for supporting QoS over WDM networks

    NASA Astrophysics Data System (ADS)

    Kam, Anthony C.; Siu, Kai-Yeung

    1998-10-01

    Most existing or proposed WDM networks employ circuit switching, typically with one session having exclusive use of one entire wavelength. Consequently they are not suitable for data applications involving bursty traffic patterns. The MIT AON Consortium has developed an all-optical LAN/MAN testbed which provides time-slotted WDM service and employs fast-tunable transceivers in each optical terminal. In this paper, we explore extensions of this service to achieve fine-grained statistical multiplexing with different virtual circuits time-sharing the wavelengths in a fair manner. In particular, we develop a real-time distributed protocol for best-effort traffic over this time-slotted WDM service with near-optical fairness and throughput characteristics. As an additional design feature, our protocol supports the allocation of guaranteed bandwidths to selected connections. This feature acts as a first step towards supporting integrated services and quality-of-service guarantees over WDM networks. To achieve high throughput, our approach is based on scheduling transmissions, as opposed to collision- based schemes. Our distributed protocol involves one MAN scheduler and several LAN schedulers (one per LAN) in a master-slave arrangement. Because of propagation delays and limits on control channel capacities, all schedulers are designed to work with partial, delayed traffic information. Our distributed protocol is of the `greedy' type to ensure fast execution in real-time in response to dynamic traffic changes. It employs a hybrid form of rate and credit control for resource allocation. We have performed extensive simulations, which show that our protocol allocates resources (transmitters, receivers, wavelengths) fairly with high throughput, and supports bandwidth guarantees.

  12. From policy to practice: implementing frontline community health services for substance dependence--study protocol.

    PubMed

    Gill, Kathryn J; Campbell, Emily; Gauthier, Gail; Xenocostas, Spyridoula; Charney, Dara; Macaulay, Ann C

    2014-08-20

    Substance abuse is a worldwide public health concern. Extensive scientific research has shown that screening and brief interventions for substance use disorders administered in primary care provide substantial benefit at relatively low cost. Frontline health clinicians are well placed to detect and treat patients with substance use disorders. Despite effectiveness shown in research, there are many factors that impact the implementation of these practices in real-world clinical practice. Recently, the Ministry of Health and Social Services in Quebec, Canada, issued two policy documents aimed at introducing screening and early intervention for substance abuse into frontline healthcare clinics in Quebec. The current research protocol was developed in order to study the process of implementation of evidence-based addiction treatment practices at three primary care clinics in Montreal (Phase 1). In addition, the research protocol was designed to examine the efficacy of overall policy implementation, including barriers and facilitators to addictions program development throughout Quebec (Phase 2). Phase 1 will provide an in-depth case study of knowledge translation and implementation. The study protocol will utilize an integrated knowledge translation strategy to build collaborative mechanisms for knowledge exchange between researchers, addiction specialists, and frontline practitioners (guided by the principles of participatory-action research), and directly examine the process of knowledge uptake and barriers to transfer using both qualitative and quantitative methodologies. Evaluation will involve multiple measures, time points and domains; program uptake and effectiveness will be determined by changes in healthcare service delivery, sustainability and outcomes. In Phase 2, qualitative methods will be utilized to examine the contextual facilitators and barriers that frontline organizations face in implementing services for substance dependence. Phase 2 will provide the first study exploring the wide-scale implementation of frontline services for substance dependence in the province of Quebec and yield needed information about how to effectively implement mandated policies into clinical practice and impact public health. Findings from this research program will contribute to the understanding of factors associated with implementation of frontline services for substance dependence and help to inform future policy and organizational support for the implementation of evidence-based practices.

  13. BioServices: a common Python package to access biological Web Services programmatically.

    PubMed

    Cokelaer, Thomas; Pultz, Dennis; Harder, Lea M; Serra-Musach, Jordi; Saez-Rodriguez, Julio

    2013-12-15

    Web interfaces provide access to numerous biological databases. Many can be accessed to in a programmatic way thanks to Web Services. Building applications that combine several of them would benefit from a single framework. BioServices is a comprehensive Python framework that provides programmatic access to major bioinformatics Web Services (e.g. KEGG, UniProt, BioModels, ChEMBLdb). Wrapping additional Web Services based either on Representational State Transfer or Simple Object Access Protocol/Web Services Description Language technologies is eased by the usage of object-oriented programming. BioServices releases and documentation are available at http://pypi.python.org/pypi/bioservices under a GPL-v3 license.

  14. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  15. MsLDR-creator: a web service to design msLDR assays.

    PubMed

    Bormann, Felix; Dahl, Andreas; Sers, Christine

    2012-03-01

    MsLDR-creator is a free web service to design assays for the new DNA methylation detection method msLDR. The service provides the user with all necessary information about the oligonucleotides required for the measurement of a given CpG within a sequence of interest. The parameters are calculated by the nearest neighbour approach to achieve optimal behaviour during the experimental procedure. In addition, to guarantee a good start using msLDR, further information, like protocols and hints and tricks, are provided.

  16. Security Implications of OPC, OLE, DCOM, and RPC in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2006-01-01

    OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding],more » DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.« less

  17. Measuring outcomes in children's rehabilitation: a decision protocol.

    PubMed

    Law, M; King, G; Russell, D; MacKinnon, E; Hurley, P; Murphy, C

    1999-06-01

    To develop and test the feasibility and clinical utility of a computerized self-directed software program designed to enable service providers in children's rehabilitation to make decisions about the most appropriate outcome measures to use in client and program evaluation. A before-and-after design was used to test the feasibility and initial impact of the decision-making outcome software in improving knowledge and use of clinical outcome measures. A children's rehabilitation center in a city of 50,000. All service providers in the children's rehabilitation center. Disciplines represented included early childhood education, occupational therapy, physical therapy, speech and language pathology, audiology, social work, and psychology. Using a conceptual framework based on the International Classification of Impairment, Disability, and Handicap (ICIDH), an outcome measurement decision-making protocol was developed. The decision-making protocol was computerized in an educational software program with an attached database of critically appraised measures. Participants learned about outcome measures through the program and selected outcome measures that met their specifications. The computer software was tested for feasibility in the children's rehabilitation center for 6 months. Knowledge and use of clinical outcome measures were determined before and after the feasibility testing using a survey of all service providers currently at the centre and audits of 30 randomly selected rehabilitation records (at pretest, posttest, and follow-up). Service providers indicated that the outcomes software was easy to follow and believed that the use of the ICIDH framework helped them in making decisions about selecting outcome measures. Results of the survey indicated that there were significant changes in the service providers' level of comfort with selecting measures and knowing what measures were available. Use of outcome measures as identified through the audit did not change. The "All About Outcomes" software is clinically useful. Further research should evaluate whether using the software affects the use of outcome measures in clinical practice.

  18. Observation Data Model Core Components, its Implementation in the Table Access Protocol Version 1.1

    NASA Astrophysics Data System (ADS)

    Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel; Michel, Laurent; Bonnarel, Francos; Micol, Alberto; IVOA DataModel Working Group; Louys, Mireille; Tody, Doug; Dowler, Patrick; Durand, Daniel

    2017-05-01

    This document defines the core components of the Observation data model that are necessary to perform data discovery when querying data centers for astronomical observations of interest. It exposes use-cases to be carried out, explains the model and provides guidelines for its implementation as a data access service based on the Table Access Protocol (TAP). It aims at providing a simple model easy to understand and to implement by data providers that wish to publish their data into the Virtual Observatory. This interface integrates data modeling and data access aspects in a single service and is named ObsTAP. It will be referenced as such in the IVOA registries. In this document, the Observation Data Model Core Components (ObsCoreDM) defines the core components of queryable metadata required for global discovery of observational data. It is meant to allow a single query to be posed to TAP services at multiple sites to perform global data discovery without having to understand the details of the services present at each site. It defines a minimal set of basic metadata and thus allows for a reasonable cost of implementation by data providers. The combination of the ObsCoreDM with TAP is referred to as an ObsTAP service. As with most of the VO Data Models, ObsCoreDM makes use of STC, Utypes, Units and UCDs. The ObsCoreDM can be serialized as a VOTable. ObsCoreDM can make reference to more complete data models such as Characterisation DM, Spectrum DM or Simple Spectral Line Data Model (SSLDM). ObsCore shares a large set of common concepts with DataSet Metadata Data Model (Cresitello-Dittmar et al. 2016) which binds together most of the data model concepts from the above models in a comprehensive and more general frame work. This current specification on the contrary provides guidelines for implementing these concepts using the TAP protocol and answering ADQL queries. It is dedicated to global discovery.

  19. The implementation and evaluation of an evidence-based statewide prehospital pain management protocol developed using the national prehospital evidence-based guideline model process for emergency medical services.

    PubMed

    Brown, Kathleen M; Hirshon, Jon Mark; Alcorta, Richard; Weik, Tasmeen S; Lawner, Ben; Ho, Shiu; Wright, Joseph L

    2014-01-01

    In 2008, the National Highway Traffic Safety Administration funded the development of a model process for the development and implementation of evidence-based guidelines (EBGs) for emergency medical services (EMS). We report on the implementation and evaluation of an evidence-based prehospital pain management protocol developed using this model process. An evidence-based protocol for prehospital management of pain resulting from injuries and burns was reviewed by the Protocol Review Committee (PRC) of the Maryland Institute for Emergency Medical Services Systems (MIEMSS). The PRC recommended revisions to the Maryland protocol that reflected recommendations in the EBG: weight-based dosing and repeat dosing of morphine. A training curriculum was developed and implemented using Maryland's online Learning Management System and successfully accessed by 3,941 paramedics and 15,969 BLS providers. Field providers submitted electronic patient care reports to the MIEMSS statewide prehospital database. Inclusion criteria were injured or burned patients transported by Maryland ambulances to Maryland hospitals whose electronic patient care records included data for level of EMS provider training during a 12-month preimplementation period and a 12-month postimplementation period from September 2010 through March 2012. We compared the percentage of patients receiving pain scale assessments and morphine, as well as the dose of morphine administered and the use of naloxone as a rescue medication for opiate use, before and after the protocol change. No differences were seen in the percentage of patients who had a pain score documented or the percent of patients receiving morphine before and after the protocol change, but there was a significant increase in the total dose and dose in mg/kg administered per patient. During the postintervention phase, patients received an 18% higher total morphine dose and a 14.9% greater mg/kg dose. We demonstrated that the implementation of a revised statewide prehospital pain management protocol based on an EBG developed using the National Prehospital Evidence-based Guideline Model Process was associated with an increase in dosing of narcotic pain medication consistent with that recommended by the EBG. No differences were seen in the percentage of patients receiving opiate analgesia or in the documentation of pain scores.

  20. Forest bird monitoring protocol for strategic habitat conservation and endangered species management on O'ahu Forest National Wildlife Refuge, Island of O'ahu, Hawai'i

    USGS Publications Warehouse

    Camp, Richard J.; Gorresen, P. Marcos; Banko, Paul C.

    2011-01-01

    This report describes the results of a pilot forest bird survey and a consequent forest bird monitoring protocol that was developed for the O'ahu Forest National Wildlife Refuge, O'ahu Island, Hawai'i. The pilot survey was conducted to inform aspects of the monitoring protocol and to provide a baseline with which to compare future surveys on the Refuge. The protocol was developed in an adaptive management framework to track bird distribution and abundance and to meet the strategic habitat conservation requirements of the Refuge. Funding for this research was provided through a Science Support Partnership grant sponsored jointly by the U.S. Geological Survey (USGS) and the U.S. Fish and Wildlife Service (USFWS).

  1. Educational program for middle-level public health nurses to develop new health services regarding community health needs: protocol for a randomized controlled trial.

    PubMed

    Yoshioka-Maeda, Kyoko; Katayama, Takafumi; Shiomi, Misa; Hosoya, Noriko

    2018-01-01

    Developing health services is a key strategy for improving the community health provided by public health nurses. However, an effective educational program for improving their skills in planning such services has not been developed. To describe our program and its evaluation protocol for the education of middle-level public health nurses to improve their skills in developing new health services to fulfil community health needs in Japan. In this randomized control trial, eligible participants in Japan will be randomly allocated to an intervention group and a control wait-list group. We will provide 8 modules of web-based learning for public health nurses from July to October 2018. To ensure fairness of educational opportunity, the wait-list group will participate in the same program as the intervention group after collection of follow-up data of the intervention group. The primary outcomes will be evaluated using the scale of competency measurement of creativity for public health nurses at baseline, immediately after the intervention. Secondary outcomes will be knowledge and performance regarding program development of public health nurses. This study will enable the analysis of the effects of the educational program on public health nurses for improving their competency to develop new health services for fulfilling community health needs and enriching health care systems. We registered our study protocol to the University hospital Medical Information Network- Clinical Trials Registry approved by International Committee of Medical Journal Editors (No. UMIN000032176, April, 2018).

  2. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    ERIC Educational Resources Information Center

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  3. Modelling optimal location for pre-hospital helicopter emergency medical services.

    PubMed

    Schuurman, Nadine; Bell, Nathaniel J; L'Heureux, Randy; Hameed, Syed M

    2009-05-09

    Increasing the range and scope of early activation/auto launch helicopter emergency medical services (HEMS) may alleviate unnecessary injury mortality that disproportionately affects rural populations. To date, attempts to develop a quantitative framework for the optimal location of HEMS facilities have been absent. Our analysis used five years of critical care data from tertiary health care facilities, spatial data on origin of transport and accurate road travel time catchments for tertiary centres. A location optimization model was developed to identify where the expansion of HEMS would cover the greatest population among those currently underserved. The protocol was developed using geographic information systems (GIS) to measure populations, distances and accessibility to services. Our model determined Royal Inland Hospital (RIH) was the optimal site for an expanded HEMS - based on denominator population, distance to services and historical usage patterns. GIS based protocols for location of emergency medical resources can provide supportive evidence for allocation decisions - especially when resources are limited. In this study, we were able to demonstrate conclusively that a logical choice exists for location of additional HEMS. This protocol could be extended to location analysis for other emergency and health services.

  4. Quality of Service in Networks Supporting Cultural Multimedia Applications

    ERIC Educational Resources Information Center

    Kanellopoulos, Dimitris N.

    2011-01-01

    Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…

  5. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...

  6. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  7. Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.

    2014-01-01

    Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an operational data cube service to be delivered in mid-2014. An associated user-installable VO data service framework will provide the capabilities required to publish VO-compatible multi-dimensional images or data cubes.

  8. Performance analysis of CCSDS path service

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1989-01-01

    A communications service, called Path Service, is currently being developed by the Consultative Committee for Space Data Systems (CCSDS) to provide a mechanism for the efficient transmission of telemetry data from space to ground for complex space missions of the future. This is an important service, due to the large volumes of telemetry data that will be generated during these missions. A preliminary analysis of performance of Path Service is presented with respect to protocol-processing requirements and channel utilization.

  9. Accountability through Documentation: What Are Best Practices for School Counselors?

    ERIC Educational Resources Information Center

    Wehrman, Joseph D.; Williams, Rhonda; Field, Julaine; Schroeder, Shanna Dahl

    2010-01-01

    This article provides an analysis of important considerations for documentation for school counselors. Although the American School Counseling Association (ASCA) does not provide a national protocol for documentation of school counseling services, the ASCA Ethical guidelines provide insight into ethical record keeping which protects student…

  10. A SOAP Web Service for accessing MODIS land product subsets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    SanthanaVannan, Suresh K; Cook, Robert B; Pan, Jerry Yun

    2011-01-01

    Remote sensing data from satellites have provided valuable information on the state of the earth for several decades. Since March 2000, the Moderate Resolution Imaging Spectroradiometer (MODIS) sensor on board NASA s Terra and Aqua satellites have been providing estimates of several land parameters useful in understanding earth system processes at global, continental, and regional scales. However, the HDF-EOS file format, specialized software needed to process the HDF-EOS files, data volume, and the high spatial and temporal resolution of MODIS data make it difficult for users wanting to extract small but valuable amounts of information from the MODIS record. Tomore » overcome this usability issue, the NASA-funded Distributed Active Archive Center (DAAC) for Biogeochemical Dynamics at Oak Ridge National Laboratory (ORNL) developed a Web service that provides subsets of MODIS land products using Simple Object Access Protocol (SOAP). The ORNL DAAC MODIS subsetting Web service is a unique way of serving satellite data that exploits a fairly established and popular Internet protocol to allow users access to massive amounts of remote sensing data. The Web service provides MODIS land product subsets up to 201 x 201 km in a non-proprietary comma delimited text file format. Users can programmatically query the Web service to extract MODIS land parameters for real time data integration into models, decision support tools or connect to workflow software. Information regarding the MODIS SOAP subsetting Web service is available on the World Wide Web (WWW) at http://daac.ornl.gov/modiswebservice.« less

  11. Data Strategies to Support Automated Multi-Sensor Data Fusion in a Service Oriented Architecture

    DTIC Science & Technology

    2008-06-01

    and employ vast quantities of content. This dissertation provides two software architectural patterns and an auto-fusion process that guide the...UDDI), Simple Order Access Protocol (SOAP), Java, Maritime Domain Awareness (MDA), Business Process Execution Language for Web Service (BPEL4WS) 16...content. This dissertation provides two software architectural patterns and an auto-fusion process that guide the development of a distributed

  12. LEOPACK The integrated services communications system based on LEO satellites

    NASA Astrophysics Data System (ADS)

    Negoda, A.; Bunin, S.; Bushuev, E.; Dranovsky, V.

    LEOPACK is yet another LEO satellite project which provides global integrated services for 'business' communications. It utilizes packet rather then circuit switching in both terrestrial and satellite chains as well as cellular approach for frequencies use. Original multiple access protocols and decentralized network control make it possible to organize regionally or logically independent and world-wide networks. Relatively small number of satellites (28) provides virtually global network coverage.

  13. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services.

    PubMed

    Bhoi, Sourav Kumar; Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops.

  14. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services

    PubMed Central

    Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops. PMID:27433485

  15. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  16. Internet-Based Partner Services in US Sexually Transmitted Disease Prevention Programs: 2009-2013.

    PubMed

    Moody, Victoria; Hogben, Matthew; Kroeger, Karen; Johnson, James

    2015-01-01

    Social networking sites have become increasingly popular venues for meeting sex partners. Today, some sexually transmitted disease (STD) programs conduct Internet-based partner services (IPS). The purpose of the study was to explore how the Internet is being used by STD prevention programs to perform partner services. We assessed US STD prevention programs receiving funds through the 2008-2013 Comprehensive STD Prevention Systems cooperative agreement. We (1) reviewed 2009 IPS protocols in 57 funding applications against a benchmark of national guidelines and (2) surveyed persons who conducted IPS in jurisdictions conducting IPS in 2012. Of the 57 project areas receiving Comprehensive STD Prevention Systems funds, 74% provided an IPS protocol. States with IPS protocols had larger populations and more gonorrhea and syphilis cases (t = 2.2-2.6; all Ps < .05), although not higher rates of infection. Most protocols included staffing (92%) and IPS documentation (87%) requirements, but fewer had evaluation plans (29%) or social networking site engagement strategies (16%). Authority to perform a complete range of IPS activities (send e-mail, use social networking sites) was associated with contacting more partners via IPSs (P < .05). This study provides a snapshot of IPS activities in STD programs in the United States. Further research is needed to move from assessment to generating data that can assist training efforts and program action and, finally, to enable efficient IPS programs that are integrated into STD prevention and control efforts.

  17. Study protocol: A Montessori approach to dementia-related, non-residential respite services in Australia.

    PubMed

    Hanna, Andrew; Donnelly, James; Aggar, Christina

    2018-03-27

    Given the social burden and significant cost of dementia care in Australia, finding evidence-based approaches that improve outcomes, maintain independence, and reduce the impact on patients and families is essential. Finding effective ways to train and assist the healthcare staff who support these individuals is also critical, as they are considered to be at risk of workplace stress, burnout, and other psychological disturbances which negatively affects standards of care. The current paper describes a protocol for evaluating the effects of a Montessori-based approach to dementia care, in non-residential respite centres. An 18 month prospective observational, cohort controlled design is suggested that will compare participants from a community respite service that has undergone a Montessori-based workplace culture change and those from a service that provides a person-centred 'care as usual' approach. To achieve this, the protocol includes the assessment of participants across multiple variables on a monthly basis including the cognitive, behavioural, and emotional functioning of clients with dementia, levels of caregiver burden experienced by informal carers, and burnout, compassion satisfaction and workplace engagement among respite staff. The protocol also employs a qualitative evaluation of program fidelity. This approach will provide further insight into the potential benefits of early intervention with Montessori approaches for persons living with dementia in the community, their caregivers, and the staff and volunteers who assist them. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Evaluation of Patient Handoff Methods on an Inpatient Teaching Service

    PubMed Central

    Craig, Steven R.; Smith, Hayden L.; Downen, A. Matthew; Yost, W. John

    2012-01-01

    Background The patient handoff process can be a highly variable and unstructured period at risk for communication errors. The morning sign-in process used by resident physicians at teaching hospitals typically involves less rigorous handoff protocols than the resident evening sign-out process. Little research has been conducted on best practices for handoffs during morning sign-in exchanges between resident physicians. Research must evaluate optimal protocols for the resident morning sign-in process. Methods Three morning handoff protocols consisting of written, electronic, and face-to-face methods were implemented over 3 study phases during an academic year. Study participants included all interns covering the internal medicine inpatient teaching service at a tertiary hospital. Study measures entailed intern survey-based interviews analyzed for failures in handoff protocols with or without missed pertinent information. Descriptive and comparative analyses examined study phase differences. Results A scheduled face-to-face handoff process had the fewest protocol deviations and demonstrated best communication of essential patient care information between cross-covering teams compared to written and electronic sign-in protocols. Conclusion Intern patient handoffs were more reliable when the sign-in protocol included scheduled face-to-face meetings. This method provided the best communication of patient care information and allowed for open exchanges of information. PMID:23267259

  19. Investigating nurse practitioners in the private sector: a theoretically informed research protocol.

    PubMed

    Adams, Margaret; Gardner, Glenn; Yates, Patsy

    2017-06-01

    To report a study protocol and the theoretical framework normalisation process theory that informs this protocol for a case study investigation of private sector nurse practitioners. Most research evaluating nurse practitioner service is focused on public, mainly acute care environments where nurse practitioner service is well established with strong structures for governance and sustainability. Conversely, there is lack of clarity in governance for emerging models in the private sector. In a climate of healthcare reform, nurse practitioner service is extending beyond the familiar public health sector. Further research is required to inform knowledge of the practice, operational framework and governance of new nurse practitioner models. The proposed research will use a multiple exploratory case study design to examine private sector nurse practitioner service. Data collection includes interviews, surveys and audits. A sequential mixed method approach to analysis of each case will be conducted. Findings from within-case analysis will lead to a meta-synthesis across all four cases to gain a holistic understanding of the cases under study, private sector nurse practitioner service. Normalisation process theory will be used to guide the research process, specifically coding and analysis of data using theory constructs and the relevant components associated with those constructs. This article provides a blueprint for the research and describes a theoretical framework, normalisation process theory in terms of its flexibility as an analytical framework. Consistent with the goals of best research practice, this study protocol will inform the research community in the field of primary health care about emerging research in this field. Publishing a study protocol ensures researcher fidelity to the analysis plan and supports research collaboration across teams. © 2016 John Wiley & Sons Ltd.

  20. Implementing Ethernet Services on the Payload Executive Processor (PEP)

    NASA Technical Reports Server (NTRS)

    Pruett, David; Guyette, Greg

    2016-01-01

    The Ethernet interface is more common and easier interface to implement for payload developers already familiar with Ethernet protocol in their labs. The Ethernet interface allows for a more distributed payload architecture. Connections can be placed in locations not serviced by the PEP 1553 bus. The Ethernet interface provides a new access port into the PEP so as to use the already existing services. Initial capability will include a subset of services with a plan to expand services later.

  1. [Design and realization of the communication system for the mobile medical terminal].

    PubMed

    Ji, Lei; Guo, Xu; Shi, Huayu

    2013-01-01

    Realizing wireless communication based on handset devices for medical staff; providing an instant messaging method. Constructing a set of communication protocols and standards; developing software both on server and client. Building an instant messaging system which follows the customized specification; based on Android the client provides functions like address book, message, voice service etc. As an independent module of the mobile medical terminal, the system can provide convenient communication for medical service with other mobile business.

  2. Deconstructing the surrogate species concept:a life history approach to the protection of ecosystem services.

    USDA-ARS?s Scientific Manuscript database

    The use of the surrogate species concept is widespread in environmental risk assessment and in particular the protection of species that provide ecosystem services, yet there are no standard protocols in place for the choice of surrogates. Surrogates are often chosen on the basis of convenience or v...

  3. Deconstructing the surrogate species concept: a life history approach to the protection of ecosystem services

    USDA-ARS?s Scientific Manuscript database

    The use of the surrogate species concept is widespread in environmental risk assessment and in particular the protection of species that provide ecosystem services, yet there are no standard protocols in place for the choice of surrogates. Surrogates are often chosen on the basis of convenience or ...

  4. Implementation of a High-Performance Cardiopulmonary Resuscitation Protocol at a Collegiate Emergency Medical Services Program

    ERIC Educational Resources Information Center

    Stefos, Kathryn A.; Nable, Jose V.

    2016-01-01

    Out-of-hospital cardiac arrest (OHCA) is a significant public health issue. Although OHCA occurs relatively infrequently in the collegiate environment, educational institutions with on-campus emergency medical services (EMS) agencies are uniquely positioned to provide high-quality resuscitation care in an expedient fashion. Georgetown University's…

  5. A System for Governmental Virtual Institutions Based on Ontologies and Interaction Protocols

    ERIC Educational Resources Information Center

    de Araujo, Claudia J. Abrao; da Silva, Flavio S. Correa

    2012-01-01

    The authors believe that the adoption of virtual worlds is suitable for electronic government applications as it can increase the capillarity of public services, facilitate the access to government services and provide citizens with a natural and immersive experience. They present a Government Virtual Institution Model (GVI) for the provision of…

  6. Patient and professional user experiences of simple telehealth for hypertension, medication reminders and smoking cessation: a service evaluation

    PubMed Central

    Cottrell, Elizabeth; Cox, Tracey; O'Connell, Phil; Chambers, Ruth

    2015-01-01

    Objectives To establish patient and professional user satisfaction with the Advice & Interactive Messaging (AIM) for Health programme delivered using a mobile phone-based, simple telehealth intervention, ‘Florence’. Design A service evaluation using data extracted from Florence and from a professional user electronic survey. Setting 425 primary care practices across 31 Clinical Commissioning Groups in England. Participants 3381 patients registered on 1 of 10 AIM protocols between March 2013 and January 2014 and 77 professional users. Intervention The AIM programme offered 10 clinical protocols, in three broad groups: (1) hypertension diagnosis/monitoring, (2) medication reminders and (3) smoking cessation. Florence sent patients prompts to submit clinical information, educational messages and user satisfaction questions. Patient responses were reviewed by their primary healthcare providers. Primary outcome measures Patients and professional user experiences of using AIM, and within this, Florence. Results Patient activity using Florence was generally good at month 1 for the hypertension protocols (71–80%), but reduced over 2–3 months (31–60%). For the other protocols, patient activity was 0–39% at 3 months. Minimum target days of texting were met for half the hypertension protocols. 1707/2304 (74%) patients sent evaluative texts responded at least once. Among responders, agreement with the adapted friends and family statement generally exceeded preproject aspirations. Professional responders were generally positive or equivocal about the programme. Conclusions Satisfaction with AIM appeared optimal when patients were carefully selected for the protocol; professional users were familiar with the system, the programme addressed a problem with the previous service delivery that was identified by users and users took an active approach to achieve clinical goals. However, there was a significant decrease in patients’ use of Florence over time. Future applications may be optimised by identifying and addressing reasons for the waning use of the service and enhancing support during implementation of the service. PMID:25795698

  7. Cultural and Contextual Adaptation of an eHealth Intervention for Youth Receiving Services for First-Episode Psychosis: Adaptation Framework and Protocol for Horyzons-Canada Phase 1.

    PubMed

    Lal, Shalini; Gleeson, John; Malla, Ashok; Rivard, Lysanne; Joober, Ridha; Chandrasena, Ranjith; Alvarez-Jimenez, Mario

    2018-04-23

    eHealth interventions have the potential to address challenges related to access, service engagement, and continuity of care in the delivery of mental health services. However, the initial development and evaluation of such interventions can require substantive amounts of financial and human resource investments to bring them to scale. Therefore, it may be warranted to pay greater attention to policy, services, and research with respect to eHealth platforms that have the potential to be adapted for use across settings. Yet, limited attention has been placed on the methods and processes for adapting eHealth interventions to improve their applicability across cultural, geographical, and contextual boundaries. In this paper, we describe an adaptation framework and protocol to adapt an eHealth intervention designed to promote recovery and prevent relapses in youth receiving specialized services for first-episode psychosis. The Web-based platform, called Horyzons, was initially developed and tested in Australia and is now being prepared for evaluation in Canada. Service users and service providers from 2 specialized early intervention programs for first-episode psychosis located in different provinces will explore a beta-version of the eHealth intervention through focus group discussions and extended personal explorations to identify the need for, and content of contextual and cultural adaptations. An iterative consultation process will then take place with service providers and users to develop and assess platform adaptations in preparation for a pilot study with a live version of the platform. Data collection was completed in August 2017, and analysis and adaptation are in process. The first results of the study will be submitted for publication in 2018 and will provide preliminary insights into the acceptability of the Web-based platform (eg, perceived use and perceived usefulness) from service provider and service user perspectives. The project will also provide knowledge about the adaptations and process needed to prepare the platform for evaluation in Canada. This study contributes to an important gap in the literature pertaining to the specific principles, methods, and steps involved in adapting eHealth interventions for implementation and evaluation across a diverse range of cultural, geographical, and health care settings. ©Shalini Lal, John Gleeson, Ashok Malla, Lysanne Rivard, Ridha Joober, Ranjith Chandrasena, Mario Alvarez-Jimenez. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 23.04.2018.

  8. A proposed group management scheme for XTP multicast

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Weaver, Alfred C.

    1990-01-01

    The purpose of a group management scheme is to enable its associated transfer layer protocol to be responsive to user determined reliability requirements for multicasting. Group management (GM) must assist the client process in coordinating multicast group membership, allow the user to express the subset of the multicast group that a particular multicast distribution must reach in order to be successful (reliable), and provide the transfer layer protocol with the group membership information necessary to guarantee delivery to this subset. GM provides services and mechanisms that respond to the need of the client process or process level management protocols to coordinate, modify, and determine attributes of the multicast group, especially membership. XTP GM provides a link between process groups and their multicast groups by maintaining a group membership database that identifies members in a name space understood by the underlying transfer layer protocol. Other attributes of the multicast group useful to both the client process and the data transfer protocol may be stored in the database. Examples include the relative dispersion, most recent update, and default delivery parameters of a group.

  9. Using EMBL-EBI services via Web interface and programmatically via Web Services

    PubMed Central

    Lopez, Rodrigo; Cowley, Andrew; Li, Weizhong; McWilliam, Hamish

    2015-01-01

    The European Bioinformatics Institute (EMBL-EBI) provides access to a wide range of databases and analysis tools that are of key importance in bioinformatics. As well as providing Web interfaces to these resources, Web Services are available using SOAP and REST protocols that enable programmatic access to our resources and allow their integration into other applications and analytical workflows. This unit describes the various options available to a typical researcher or bioinformatician who wishes to use our resources via Web interface or programmatically via a range of programming languages. PMID:25501941

  10. Reducing the burden of diarrhea among children under five years old: lessons learned from oral rehydration therapy corner program implementation in Northern Nigeria.

    PubMed

    Charyeva, Zulfiya; Cannon, Molly; Oguntunde, Olugbenga; Garba, Aminu Magashi; Sambisa, William; Bassi, Amos Paul; Ibrahim, Mohammed Auwal; Danladi, Saba'atu Elizabeth; Lawal, Nurudeen

    2015-05-01

    In Nigeria, diarrhea remains one of the leading causes of death among children under five years old. Oral Rehydration Therapy (ORT) corners were introduced to health facilities in Bauchi and Sokoto states to serve as points of treatment for sick children and equip caregivers with necessary skills in case management of diarrhea and diarrhea prevention. The operations research study examined the effect of facility-based ORT corners on caregivers' knowledge and skills in management of simple and moderate diarrhea at home, as well as caregivers' and service providers' perceived facilitators and barriers to utilization and delivering of ORT corner services. It also examined whether ORT activities were conducted according to the established protocols. This quantitative study relied on multiple sources of information to provide a complete picture of the current status of ORT corner services, namely surveys with ORT corner providers (N = 21), health facility providers (N = 23) and caregivers (N = 229), as well as a review of service statistics and health facility observations. Frequency distribution and binary analysis were conducted. The study revealed that ORT corner users were more knowledgeable in diarrhea prevention and management and demonstrated better skills for managing diarrhea at home than ORT corner non-users. However, the percentage of knowledgeable ORT users is not optimal, and providers need to continue to work toward improving such knowledge. ORT corner providers identified a lack of supplies as the major barrier for providing services. Furthermore, the study revealed a lack of information, education and communication materials, supportive supervision, and protocols and guidelines for delivering ORT corner services, as well as inadequate documentation of services provided at ORT corners. Recommendations for ORT corners program planners and implementers include ensuring all ORT corners have oral rehydration salt (ORS) packages and salt, sugar, and zinc tablets in stock, a secured commodity supply chain to avoid stockouts, and adequate policies and procedures in place.

  11. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  12. How to Break the 9-1-1 Language Barrier. Services are available to help providers communicate with patients who don’t speak English.

    PubMed

    Kolb, Joseph J

    2015-09-01

    America's multiethnic composition can create havoc in answering emergency calls and translating patient information on scene. It is incumbent upon EMS services to have a translation strategy and protocol in place to mitigate delays in providing emergency care. While digital translation programs may be of assistance, exercise caution in ensuring information is accurately downloaded to obtain an accurate translation.

  13. Issues in providing a reliable multicast facility

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Strayer, W. Timothy; Weaver, Alfred C.

    1990-01-01

    Issues involved in point-to-multipoint communication are presented and the literature for proposed solutions and approaches surveyed. Particular attention is focused on the ideas and implementations that align with the requirements of the environment of interest. The attributes of multicast receiver groups that might lead to useful classifications, what the functionality of a management scheme should be, and how the group management module can be implemented are examined. The services that multicasting facilities can offer are presented, followed by mechanisms within the communications protocol that implements these services. The metrics of interest when evaluating a reliable multicast facility are identified and applied to four transport layer protocols that incorporate reliable multicast.

  14. Evaluation of a rape protocol: a five year follow-up with nurse managers.

    PubMed

    Lewis, Carol M; DiNitto, Diana; Nelson, Terri Spahr; Just, Mary Margaret; Campbell-Ruggaard, Julie

    2003-01-01

    To evaluate the use and effectiveness of a protocol developed for emergency nurses and other medical personnel to use with survivors of sexual assault. The Ohio Department of Health (ODH) Protocol for the Treatment of Adult Sexual Assault Survivors was developed by a multi-disciplinary team in 1991-92 as a written guide to provide comprehensive, standardized, non-judgmental, and equitable treatment for survivors. In 1993, this 118-page manual was sent to all Ohio hospitals. In 1994, a follow-up video and training guide were also delivered. In 1997, Victims Rights Advocacy, a non-profit agency in Ohio, and the Center for Social Work Research at The University of Texas at Austin collaboratively conducted an evaluation of the utilization and effectiveness of this protocol at Ohio hospitals. Emergency departments at Ohio hospitals were asked to complete a mailed survey regarding their policies and procedures for treating sexual assault patients. Telephone calls were made to the hospitals that did not return a survey, and site visits were conducted at 20 hospitals in diverse areas of Ohio. Overall, respondents concurred that hospitals can benefit from using a standardized protocol, such as the ODH Protocol, for treating victims of sexual assault. Survey participants also indicated that training is needed on several topics, especially testifying in court, cultural awareness, and the needs of special populations, such as male, gay, lesbian, and bisexual survivors. In addition, findings indicate that survivors need more follow-up services, and written information about these services should be provided to them. Nurse practitioners can improve the treatment of sexual assault survivors in their communities through a variety of actions, such as gathering information about available protocols and training opportunities for personnel, and becoming familiar with resources that can help victims.

  15. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    PubMed

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  16. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services †

    PubMed Central

    2018-01-01

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641

  17. A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

    NASA Technical Reports Server (NTRS)

    Cui, Zhenqian

    1999-01-01

    In this thesis, we analyze various factors that affect quality of service (QoS) communication in high-speed, packet-switching sub-networks. We hypothesize that sub-network-wide bandwidth reservation and guaranteed CPU processing power at endpoint systems for handling data traffic are indispensable to achieving hard end-to-end quality of service. Different bandwidth reservation strategies, traffic characterization schemes, and scheduling algorithms affect the network resources and CPU usage as well as the extent that QoS can be achieved. In order to analyze those factors, we design and implement a communication layer. Our experimental analysis supports our research hypothesis. The Resource ReSerVation Protocol (RSVP) is designed to realize resource reservation. Our analysis of RSVP shows that using RSVP solely is insufficient to provide hard end-to-end quality of service in a high-speed sub-network. Analysis of the IEEE 802.lp protocol also supports the research hypothesis.

  18. IMS: a new technology to develop a telemedicine system.

    PubMed

    Uceda, J D; Elena, M; Blasco, S; Tarrida, C L; Quero, J M

    2008-01-01

    The emergent IMS (Internet Protocol Multimedia Subsystem) technology appears to improve the current communication technologies. Its characteristics, such as Quality of Service (QoS), make it an advantageous system for innovative applications. Providing integrated services to users is one of the main reasons for the existence of IMS. Operators provide the technology as an open source, to be able to use services developed by researchers. Combining and integrating them, users will receive completely new services. Our proposal of use for IMS is the development of a telemedicine platform, designed to support not only remote biological signal monitoring, but value-added services for diagnosis and medical care, both of these working in real time.

  19. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  20. VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

    PubMed Central

    Watzlaf, Valerie R.; Ondich, Briana

    2012-01-01

    Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194

  1. Personalised Hip Therapy: development of a non-operative protocol to treat femoroacetabular impingement syndrome in the FASHIoN randomised controlled trial.

    PubMed

    Wall, Peter Dh; Dickenson, Edward J; Robinson, David; Hughes, Ivor; Realpe, Alba; Hobson, Rachel; Griffin, Damian R; Foster, Nadine E

    2016-10-01

    Femoroacetabular impingement (FAI) syndrome is increasingly recognised as a cause of hip pain. As part of the design of a randomised controlled trial (RCT) of arthroscopic surgery for FAI syndrome, we developed a protocol for non-operative care and evaluated its feasibility. In phase one, we developed a protocol for non-operative care for FAI in the UK National Health Service (NHS), through a process of systematic review and consensus gathering. In phase two, the protocol was tested in an internal pilot RCT for protocol adherence and adverse events. The final protocol, called Personalised Hip Therapy (PHT), consists of four core components led by physiotherapists: detailed patient assessment, education and advice, help with pain relief and an exercise-based programme that is individualised, supervised and progressed over time. PHT is delivered over 12-26 weeks in 6-10 physiotherapist-patient contacts, supplemented by a home exercise programme. In the pilot RCT, 42 patients were recruited and 21 randomised to PHT. Review of treatment case report forms, completed by physiotherapists, showed that 13 patients (62%) received treatment that had closely followed the PHT protocol. 13 patients reported some muscle soreness at 6 weeks, but there were no serious adverse events. PHT provides a structure for the non-operative care of FAI and offers guidance to clinicians and researchers in an evolving area with limited evidence. PHT was deliverable within the National Health Service, is safe, and now forms the comparator to arthroscopic surgery in the UK FASHIoN trial (ISRCTN64081839). ISRCTN 09754699. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  3. Connecting Students to Mental Health Care: Pilot Findings from an Engagement Program for School Nurses

    ERIC Educational Resources Information Center

    Kim, Rachel E.; Becker, Kimberly D.; Stephan, Sharon H.; Hakimian, Serop; Apocada, Dee; Escudero, Pia V.; Chorpita, Bruce F.

    2015-01-01

    Schools function as the major provider of mental health services (MHS) for youth, but can struggle with engaging them in services. School nurses are well-positioned to facilitate referrals for MHS. This pilot study examined the feasibility, acceptability, and preliminary efficacy of an engagement protocol (EP) designed to enhance school nurses'…

  4. 76 FR 40729 - Sunshine Act Meeting; Open Commission Meeting; Tuesday, July 12, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-11

    ... Requirements (PS Docket Bureau. No. 07-114); E911 Requirements for IP-Enabled Service Providers (WC Docket No. 05-196); and Amending the Definition of Interconnected VoIP Service in Section 9.3 of the Commission..., including Voice over Internet Protocol (VoIP). Reforms to certain of the Commission's procedural rules took...

  5. 78 FR 53684 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ... eligibility in order to get a free IP CTS device should be made under penalty of perjury; whether to prohibit the free or significantly subsidized distribution of end user equipment by IP CTS providers; whether... and restrictions on rewards and free equipment. 4. Legal Authority. Section 225(b) of the Act directs...

  6. Business Model Evaluation for an Advanced Multimedia Service Portfolio

    NASA Astrophysics Data System (ADS)

    Pisciella, Paolo; Zoric, Josip; Gaivoronski, Alexei A.

    In this paper we analyze quantitatively a business model for the collaborative provision of an advanced mobile data service portfolio composed of three multimedia services: Video on Demand, Internet Protocol Television and User Generated Content. We provide a description of the provision system considering the relation occurring between tecnical aspects and business aspects for each agent providing the basic multimedia service. Such a techno-business analysis is then projected into a mathematical model dealing with the problem of the definition of incentives between the different agents involved in a collaborative service provision. Through the implementation of this model we aim at shaping the behaviour of each of the contributing agents modifying the level of profitability that the Service Portfolio yields to each of them.

  7. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

    PubMed Central

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951

  8. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    PubMed

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  9. Privacy-preserving public auditing for data integrity in cloud

    NASA Astrophysics Data System (ADS)

    Shaik Saleem, M.; Murali, M.

    2018-04-01

    Cloud computing which has collected extent concentration from communities of research and with industry research development, a large pool of computing resources using virtualized sharing method like storage, processing power, applications and services. The users of cloud are vend with on demand resources as they want in the cloud computing. Outsourced file of the cloud user can easily tampered as it is stored at the third party service providers databases, so there is no integrity of cloud users data as it has no control on their data, therefore providing security assurance to the users data has become one of the primary concern for the cloud service providers. Cloud servers are not responsible for any data loss as it doesn’t provide the security assurance to the cloud user data. Remote data integrity checking (RDIC) licenses an information to data storage server, to determine that it is really storing an owners data truthfully. RDIC is composed of security model and ID-based RDIC where it is responsible for the security of every server and make sure the data privacy of cloud user against the third party verifier. Generally, by running a two-party Remote data integrity checking (RDIC) protocol the clients would themselves be able to check the information trustworthiness of their cloud. Within the two party scenario the verifying result is given either from the information holder or the cloud server may be considered as one-sided. Public verifiability feature of RDIC gives the privilege to all its users to verify whether the original data is modified or not. To ensure the transparency of the publicly verifiable RDIC protocols, Let’s figure out there exists a TPA who is having knowledge and efficiency to verify the work to provide the condition clearly by publicly verifiable RDIC protocols.

  10. Practices Regarding Rape-related Pregnancy in U.S. Abortion Care Settings.

    PubMed

    Perry, Rachel; Murphy, Molly; Rankin, Kristin M; Cowett, Allison; Harwood, Bryna

    2016-01-01

    We aimed to explore current practices regarding screening for rape and response to disclosure of rape-related pregnancy in the abortion care setting. We performed a cross-sectional, nonprobability survey of U.S. abortion providers. Individuals were recruited in person and via emailed invitations to professional organization member lists. Questions in this web-based survey pertained to providers' practice setting, how they identify rape-related pregnancy, the availability of support services, and their experiences with law enforcement. Providers were asked their perceptions of barriers to care for women who report rape-related pregnancy. Surveys were completed by 279 providers (21% response rate). Most respondents were female (93.1%), and the majority were physicians in a clinical role (69.4%). One-half (49.8%) reported their practice screens for pregnancy resulting from rape, although fewer (34.8%) reported that screening is the method through which most patients with this history are identified. Most (80.6%) refer women with rape-related pregnancy to support services such as rape crisis centers. Relatively few (19.7%) have a specific protocol for care of women who report rape-related pregnancy. Clinics that screen were 79% more likely to have a protocol for care than centers that do not screen. Although the majority (67.4%) reported barriers to identification of women with rape-related pregnancy, fewer (33.3%) reported barriers to connecting them to support services. Practices for identifying and providing care to women with rape-related pregnancy in the abortion care setting are variable. Further research should address barriers to care provision, as well as identifying protocols for care. Copyright © 2016 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  11. NSI customer service representatives and user support office: NASA Science Internet

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  12. Smart Objects, Dumb Archives: A User-Centric, Layered Digital Library Framework

    NASA Technical Reports Server (NTRS)

    Maly, Kurt; Nelson, Michael L.; Zubair, Mohammad

    1999-01-01

    Currently, there exist a large number of superb digital libraries, all of which are, unfortunately, vertically integrated and all presenting a monolithic interface to their users. Ideally, a user would want to locate resources from a variety of digital libraries dealing only with one interface. A number of approaches exist to this interoperability issue exist including: defining a universal protocol for all libraries to adhere to; or developing mechanisms to translate between protocols. The approach we illustrate in this paper is to push down the level of universal protocols to one for digital object communication and for communication for simple archives. This approach creates the opportunity for digital library service providers to create digital libraries tailored to the needs of user communities drawing from available archives and individual publishers who adhere to this standard. We have created a reference implementation based on the hyper text transfer protocol (http) with the protocols being derived from the Dienst protocol. We have created a special class of digital objects called buckets and a number of archives based on a NASA collection and NSF funded projects. Starting from NCSTRL we have developed a set of digital library services called NCSTRL+ and have created digital libraries for researchers, educators and students that can each draw on all the archives and individually created buckets.

  13. Using Virtual Observatory Services in Sky View

    NASA Technical Reports Server (NTRS)

    McGlynn, Thomas A.

    2007-01-01

    For over a decade Skyview has provided astronomers and the public with easy access to survey and imaging data from all wavelength regimes. SkyView has pioneered many of the concepts that underlie the Virtual Observatory. Recently SkyView has been released as a distributable package which uses VO protocols to access image and catalog services. This chapter describes how to use the Skyview as a local service and how to customize it to access additional VO services and local data.

  14. Cool Apps: Building Cryospheric Data Applications with Standards-Based Service Oriented Architecture

    NASA Astrophysics Data System (ADS)

    Oldenburg, J.; Truslove, I.; Collins, J. A.; Liu, M.; Lewis, S.; Brodzik, M.

    2012-12-01

    The National Snow and Ice Data Center (NSIDC) holds a large collection of cryospheric data, and is involved in a number of informatics research and development projects aimed at improving the discoverability and accessibility of these data. To develop high- quality software in a timely manner, we have adopted a Service- Oriented Architecture (SOA) approach for our core technical infrastructure development. Data services at NSIDC are internally exposed to other tools and applications through standards-based service interfaces. These standards include OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting), various OGC (Open Geospatial Consortium) standards including WMS (Web Map Service) and WFS (Web Feature Service), ESIP (Federation of Earth Sciences Information Partners) OpenSearch, and NSIDC-defined service endpoints which follow a RESTful architecture. By taking a standards-based approach, we are able to use off-the-shelf tools and libraries to consume, translate and broker these data services, and thus develop applications faster. Additionally, by exposing public interfaces to these services we provide valuable data services to technical collaborators; for example, NASA Reverb (http://reverb.echo.nasa.gov) uses NSIDC's WMS services. Our latest generation of web applications consume these data services directly. The most complete example of this is the Operation IceBridge Data Portal (http://nsidc.org/icebridge/ portal) which depends on many of the aforementioned services, retrieving data in several ways. The maps it displays are obtained through the use of WMS and WFS protocols from a MapServer instance hosted at NSIDC. Links to the scientific data collected on Operation IceBridge campaigns are obtained through ESIP OpenSearch requests service providers that encapsulate our metadata databases. These standards-based web services are also developed at NSIDC and are designed to be used independently of the Portal. This poster provides a visual representation of the relationships described above, with additional details and examples, and more generally outlines the benefits and challenges of this SOA approach.

  15. Comparison of two MAC protocols based on LEO satellite networks

    NASA Astrophysics Data System (ADS)

    Guan, Mingxiang; Wang, Ruichun

    2009-12-01

    With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.

  16. Finalizing the CCSDS Space-Data Link Layer Security Protocol: Setup and Execution of the Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Fischer, Daniel; Aguilar-Sanchez, Ignacio; Saba, Bruno; Moury, Gilles; Biggerstaff, Craig; Bailey, Brandon; Weiss, Howard; Pilgram, Martin; Richter, Dorothea

    2015-01-01

    The protection of data transmitted over the space-link is an issue of growing importance also for civilian space missions. Through the Consultative Committee for Space Data Systems (CCSDS), space agencies have reacted to this need by specifying the Space Data-Link Layer Security (SDLS) protocol which provides confidentiality and integrity services for the CCSDS Telemetry (TM), Telecommand (TC) and Advanced Orbiting Services (AOS) space data-link protocols. This paper describes the approach of the CCSDS SDLS working group to specify and execute the necessary interoperability tests. It first details the individual SDLS implementations that have been produced by ESA, NASA, and CNES and then the overall architecture that allows the interoperability tests between them. The paper reports on the results of the interoperability tests and identifies relevant aspects for the evolution of the test environment.

  17. Towards Dynamic Service Level Agreement Negotiation:An Approach Based on WS-Agreement

    NASA Astrophysics Data System (ADS)

    Pichot, Antoine; Wäldrich, Oliver; Ziegler, Wolfgang; Wieder, Philipp

    In Grid, e-Science and e-Business environments, Service Level Agreements are often used to establish frameworks for the delivery of services between service providers and the organisations hosting the researchers. While this high level SLAs define the overall quality of the services, it is desirable for the end-user to have dedicated service quality also for individual services like the orchestration of resources necessary for composed services. Grid level scheduling services typically are responsible for the orchestration and co-ordination of resources in the Grid. Co-allocation e.g. requires the Grid level scheduler to co-ordinate resource management systems located in different domains. As the site autonomy has to be respected negotiation is the only way to achieve the intended co-ordination. SLAs emerged as a new way to negotiate and manage usage of resources in the Grid and are already adopted by a number of management systems. Therefore, it is natural to look for ways to adopt SLAs for Grid level scheduling. In order to do this, efficient and flexible protocols are needed, which support dynamic negotiation and creation of SLAs. In this paper we propose and discuss extensions to the WS-Agreement protocol addressing these issues.

  18. Design of a SIP device cooperation system on OSGi service platforms

    NASA Astrophysics Data System (ADS)

    Takayama, Youji; Koita, Takahiro; Sato, Kenya

    2007-12-01

    Home networks feature such various technologies as protocols, specifications, and middleware, including HTTP, UPnP, and Jini. A service platform is required to handle such technologies to enable them to cooperate with different devices. The OSGi service platform, which meets the requirements based on service-oriented architecture, is designed and standardized by OSGi Alliance and consists of two parts: one OSGi Framework and bundles. On the OSGi service platform, APIs are defined as services that can handle these technologies and are implemented in the bundle. By using the OSGi Framework with bundles, various technologies can cooperate with each other. On the other hand, in IP networks, Session Initiation Protocol (SIP) is often used in device cooperation services to resolve an IP address, control a session between two or more devices, and easily exchange the statuses of devices. However, since many existing devices do not correspond to SIP, it cannot be used for device cooperation services. A device that does not correspond to SIP is called an unSIP device. This paper proposes and implements a prototype system that enables unSIP devices to correspond to SIP. For unSIP devices, the proposed system provides device cooperation services with SIP.

  19. System services and architecture of the TMI satellite mobile data system

    NASA Technical Reports Server (NTRS)

    Gokhale, D.; Agarwal, A.; Guibord, A.

    1993-01-01

    The North American Mobile Satellite Service (MSS) system being developed by AMSC/TMI and scheduled to go into service in early 1995 will include the provision for real time packet switched services (mobile data service - MDS) and circuit switched services (mobile telephony service - MTS). These services will utilize geostationary satellites which provide access to mobile terminals (MT's) through L-band beams. The MDS system utilizes a star topology with a centralized data hub (DH) and will support a large number of mobile terminals. The DH, which accesses the satellite via a single Ku band beam, is responsible for satellite resource management, for providing mobile users with access to public and private data networks, and for comprehensive network management of the system. This paper describes the various MDS services available for the users, the ground segment elements involved in the provisioning of these services, and a summary description of the channel types, protocol architecture, and network management capabilities provided within the system.

  20. Transforming War Fighting through the Use of Service Based Architecture (SBA) Technology

    DTIC Science & Technology

    2006-05-04

    near-real-time video & telemetry to users on network using standard web-based protocols – Provides web-based access to archived video files MTI...Target Tracks Service Capabilities – Disseminates near-real-time MTI and Target Tracks to users on network based on consumer specified geographic...filter IBS SIGINT Service Capabilities – Disseminates near-real-time IBS SIGINT data to users on network based on consumer specified geographic filter

  1. Protocol and the post-human performativity of security techniques.

    PubMed

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  2. Protocol and the post-human performativity of security techniques

    PubMed Central

    O’Grady, Nathaniel

    2015-01-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the ‘aesthetic forces’, by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad’s notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency. PMID:29708110

  3. The Roles of Pharmacy Schools in Bridging the Gap Between Law and Practice.

    PubMed

    Adams, Alex J; Dering-Anderson, Allison; Klepser, Michael E; Klepser, Donald

    2018-05-01

    Progressive pharmacy laws do not always lead to progressive pharmacy practice. Progressive laws are necessary, but not sufficient for pharmacy services to take off in practice. Pharmacy schools can play critical roles by working collaboratively with community pharmacies to close the gap between law and practice. Our experiences launching pharmacy-based point-of-care testing services in community pharmacy settings illustrate some of the roles schools can play, including: developing and providing standardized training, developing template protocols, providing workflow support, sparking collaboration across pharmacies, providing policy support, and conducting research.

  4. A Study of "Career Pathways" Policy with Implications for School Leaders

    ERIC Educational Resources Information Center

    Ormsmith, Michael I.; Mansfield, Katherine Cumings

    2014-01-01

    This explanatory mixed-methods study began with a quantitative survey to investigate counselor beliefs and implementation behaviors related to providing college and career planning services to high school students. Survey results informed the development and implementation of interview protocol designed to provide deeper insight into counselors'…

  5. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  6. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  7. Using EMBL-EBI Services via Web Interface and Programmatically via Web Services.

    PubMed

    Lopez, Rodrigo; Cowley, Andrew; Li, Weizhong; McWilliam, Hamish

    2014-12-12

    The European Bioinformatics Institute (EMBL-EBI) provides access to a wide range of databases and analysis tools that are of key importance in bioinformatics. As well as providing Web interfaces to these resources, Web Services are available using SOAP and REST protocols that enable programmatic access to our resources and allow their integration into other applications and analytical workflows. This unit describes the various options available to a typical researcher or bioinformatician who wishes to use our resources via Web interface or programmatically via a range of programming languages. Copyright © 2014 John Wiley & Sons, Inc.

  8. Optimisation of pharmacy content in clinical cancer research protocols: Experience of the United Kingdom Chemotherapy and Pharmacy Advisory Service.

    PubMed

    Debruyne, Philip R; Johnson, Philip J; Pottel, Lies; Daniels, Susanna; Greer, Rachel; Hodgkinson, Elizabeth; Kelly, Stephen; Lycke, Michelle; Samol, Jens; Mason, Julie; Kimber, Donna; Loucaides, Eileen; Parmar, Mahesh Kb; Harvey, Sally

    2015-06-01

    Clarity and accuracy of the pharmacy aspects of cancer clinical trial protocols is essential. Inconsistencies and ambiguities in such protocols have the potential to delay research and jeopardise both patient safety and collection of credible data. The Chemotherapy and Pharmacy Advisory Service was established by the UK National Cancer Research Network, currently known as National Institute for Health Research Clinical Research Network, to improve the quality of pharmacy-related content in cancer clinical research protocols. This article reports the scope of Chemotherapy and Pharmacy Advisory Service, its methodology of mandated protocol review and pharmacy-related guidance initiatives and its current impact. Over a 6-year period (2008-2013) since the inception of Chemotherapy and Pharmacy Advisory Service, cancer clinical trial protocols were reviewed by the service, prior to implementation at clinical trial sites. A customised Review Checklist was developed and used by a panel of experts to standardise the review process and report back queries and inconsistencies to chief investigators. Based on common queries, a Standard Protocol Template comprising specific guidance on drug-related content and a Pharmacy Manual Template were developed. In addition, a guidance framework was established to address 'ad hoc' pharmacy-related queries. The most common remarks made at protocol review have been summarised and categorised through retrospective analysis. In order to evaluate the impact of the service, chief investigators were asked to respond to queries made at protocol review and make appropriate changes to their protocols. Responses from chief investigators have been collated and acceptance rates determined. A total of 176 protocols were reviewed. The median number of remarks per protocol was 26, of which 20 were deemed clinically relevant and mainly concerned the drug regimen, support medication, frequency and type of monitoring and drug supply aspects. Further analysis revealed that 62% of chief investigators responded to the review. All responses were positive with an overall acceptance rate of 89% of the proposed protocol changes. Review of pharmacy content of cancer clinical trial protocols is feasible and exposes many undetected clinically relevant issues that could hinder efficient trial conduct. Our service audit revealed that the majority of suggestions were effectively incorporated in the final protocols. The refinement of existing and development of new pharmacy-related guidance documents by Chemotherapy and Pharmacy Advisory Service might aid in better and safer clinical research. © The Author(s) 2015.

  9. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    PubMed Central

    2012-01-01

    Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©). Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a) establishing an advisory knowledge user team in each of three targeted settings; (b) assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c) adapting protocols for local use, ensuring fidelity of the content; (d) selecting intervention strategies to overcome known barriers and implementing the protocols; (e) conducting think-aloud usability testing; (f) evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g) assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing with comparisons across settings. Discussion Given the importance of patient safety, patient-centered care, and delivery of quality services, learning how to effectively implement evidence-informed symptom protocols in oncology healthcare services is essential for ensuring safe, consistent, and effective care for individuals with cancer. This study is likely to have a significant contribution to the delivery of remote oncology services, as well as influence symptom management by patients at home. PMID:23164244

  10. Naloxone Administration for Suspected Opioid Overdose: An Expanded Scope of Practice by a Basic Life Support Collegiate-Based Emergency Medical Services Agency

    ERIC Educational Resources Information Center

    Jeffery, Ryan M.; Dickinson, Laura; Ng, Nicholas D.; DeGeorge, Lindsey M.; Nable, Jose V.

    2017-01-01

    Opioid abuse is a growing and significant public health concern in the United States. Naloxone is an opioid antagonist that can rapidly reverse the respiratory depression associated with opioid toxicity. Georgetown University's collegiate-based emergency medical services (EMS) agency recently adopted a protocol, allowing providers to administer…

  11. Stackable middleware services for advanced multimedia applications. Final report for period July 14, 1999 - July 14, 2001

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feng, Wu-chi; Crawfis, Roger, Weide, Bruce

    2002-02-01

    In this project, the authors propose the research, development, and distribution of a stackable component-based multimedia streaming protocol middleware service. The goals of this stackable middleware interface include: (1) The middleware service will provide application writers and scientists easy to use interfaces that support their visualization needs. (2) The middleware service will support a variety of image compression modes. Currently, many of the network adaptation protocols for video have been developed with DCT-based compression algorithms like H.261, MPEG-1, or MPEG-2 in mind. It is expected that with advanced scientific computing applications that the lossy compression of the image data willmore » be unacceptable in certain instances. The middleware service will support several in-line lossless compression modes for error-sensitive scientific visualization data. (3) The middleware service will support two different types of streaming video modes: one for interactive collaboration of scientists and a stored video streaming mode for viewing prerecorded animations. The use of two different streaming types will allow the quality of the video delivered to the user to be maximized. Most importantly, this service will happen transparently to the user (with some basic controls exported to the user for domain specific tweaking). In the spirit of layered network protocols (like ISO and TCP/IP), application writers should not have to know a large amount about lower level network details. Currently, many example video streaming players have their congestion management techniques tightly integrated into the video player itself and are, for the most part, ''one-off'' applications. As more networked multimedia and video applications are written in the future, a larger percentage of these programmers and scientist will most likely know little about the underlying networking layer. By providing a simple, powerful, and semi-transparent middleware layer, the successful completion of this project will help serve as a catalyst to support future video-based applications, particularly those of advanced scientific computing applications.« less

  12. Developing the Planetary Science Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Erard, Stéphane; Cecconi, Baptiste; Le Sidaner, Pierre; Henry, Florence; Chauvin, Cyril; Berthier, Jérôme; André, Nicolas; Génot, Vincent; Schmitt, Bernard; Capria, Teresa; Chanteur, Gérard

    2015-08-01

    In the frame of the Europlanet-RI program, a prototype Virtual Observatory dedicated to Planetary Science has been set up. Most of the activity was dedicated to the definition of standards to handle data in this field. The aim was to facilitate searches in big archives as well as sparse databases, to make on-line data access and visualization possible, and to allow small data providers to make their data available in an interoperable environment with minimum effort. This system makes intensive use of studies and developments led in Astronomy (IVOA), Solar Science (HELIO), and space archive services (IPDA).The current architecture connects existing data services with IVOA or IPDA protocols whenever relevant. However, a more general standard has been devised to handle the specific complexity of Planetary Science, e.g. in terms of measurement types and coordinate frames. This protocol, named EPN-TAP, is based on TAP and includes precise requirements to describe the contents of a data service (Erard et al Astron & Comp 2014). A light framework (DaCHS/GAVO) and a procedure have been identified to install small data services, and several hands-on sessions have been organized already. The data services are declared in standard IVOA registries. Support to new data services in Europe will be provided during the proposed Europlanet H2020 program, with a focus on planetary mission support (Rosetta, Cassini…).A specific client (VESPA) has been developed at VO-Paris (http://vespa.obspm.fr). It is able to use all the mandatory parameters in EPN-TAP, plus extra parameters from individual services. A resolver for target names is also available. Selected data can be sent to VO visualization tools such as TOPCAT or Aladin though the SAMP protocol.Future steps will include the development of a connection between the VO world and GIS tools, and integration of heliophysics, planetary plasma and reference spectroscopic data.The EuroPlaNet-RI project was funded by the European Commission under the 7th Framework Program, grant 228319 "Capacities Specific Programme".

  13. Short and long-term effectiveness of couple counselling: a study protocol

    PubMed Central

    2012-01-01

    Background Healthy couple relationships are fundamental to a healthy society, whereas relationship breakdown and discord are linked to a wide range of negative health and wellbeing outcomes. Two types of relationship services (couple counselling and relationship education) have demonstrated efficacy in many controlled studies but evidence of the effectiveness of community-based relationship services has lagged behind. This study protocol describes an effectiveness evaluation of the two types of community-based relationship services. The aims of the Evaluation of Couple Counselling study are to: map the profiles of clients seeking agency-based couple counselling and relationship enhancement programs in terms of socio-demographic, relationship, health, and health service use indicators; to determine 3 and 12-month outcomes for relationship satisfaction, commitment, and depression; and determine relative contributions of client and therapy factors to outcomes. Methods/Design A quasi-experimental pre-post-post evaluation design is used to assess outcomes for couples presenting for the two types of community-based relationship services. The longitudinal design involves a pre-treatment survey and two follow-up surveys at 3- and 12-months post-intervention. The study is set in eight Relationships Australia Victoria centres, across metropolitan, outer suburbs, and regional/rural sites. Relationships Australia, a non-government organisation, is the largest provider of couple counselling and relationship services in Australia. The key outcomes are couple satisfaction, relationship commitment, and depression measured by the CESD-10. Multi-level modelling will be used to account for the dyadic nature of couple data. Discussion The study protocol describes the first large scale investigation of the effectiveness of two types of relationship services to be conducted in Australia. Its significance lies in providing more detailed profiles of couples who seek relationship services, in evaluating both 3 and 12-month relationship and health outcomes, and in determining factors that best predict improvements. It builds on prior research by using a naturalistic sample, an effectiveness research design, a more robust measure of relationship satisfaction, robust health indicators, a 12-month follow-up period, and a more rigorous statistical procedure suitable for dyadic data. Findings will provide a more precise description of those seeking relationship services and factors associated with improved relationship and health outcomes. PMID:22943742

  14. Distributed Multiple Access Control for the Wireless Mesh Personal Area Networks

    NASA Astrophysics Data System (ADS)

    Park, Moo Sung; Lee, Byungjoo; Rhee, Seung Hyong

    Mesh networking technologies for both high-rate and low-rate wireless personal area networks (WPANs) are under development by several standardization bodies. They are considering to adopt distributed TDMA MAC protocols to provide seamless user mobility as well as a good peer-to-peer QoS in WPAN mesh. It has been, however, pointed out that the absence of a central controller in the wireless TDMA MAC may cause a severe performance degradation: e. g., fair allocation, service differentiation, and admission control may be hard to achieve or can not be provided. In this paper, we suggest a new framework of resource allocation for the distributed MAC protocols in WPANs. Simulation results show that our algorithm achieves both a fair resource allocation and flexible service differentiations in a fully distributed way for mesh WPANs where the devices have high mobility and various requirements. We also provide an analytical modeling to discuss about its unique equilibrium and to compute the lengths of reserved time slots at the stable point.

  15. Using Ontologies to Formalize Services Specifications in Multi-Agent Systems

    NASA Technical Reports Server (NTRS)

    Breitman, Karin Koogan; Filho, Aluizio Haendchen; Haeusler, Edward Hermann

    2004-01-01

    One key issue in multi-agent systems (MAS) is their ability to interact and exchange information autonomously across applications. To secure agent interoperability, designers must rely on a communication protocol that allows software agents to exchange meaningful information. In this paper we propose using ontologies as such communication protocol. Ontologies capture the semantics of the operations and services provided by agents, allowing interoperability and information exchange in a MAS. Ontologies are a formal, machine processable, representation that allows to capture the semantics of a domain and, to derive meaningful information by way of logical inference. In our proposal we use a formal knowledge representation language (OWL) that translates into Description Logics (a subset of first order logic), thus eliminating ambiguities and providing a solid base for machine based inference. The main contribution of this approach is to make the requirements explicit, centralize the specification in a single document (the ontology itself), at the same that it provides a formal, unambiguous representation that can be processed by automated inference machines.

  16. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    PubMed

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  17. Delay and Disruption Tolerant Networking MACHETE Model

    NASA Technical Reports Server (NTRS)

    Segui, John S.; Jennings, Esther H.; Gao, Jay L.

    2011-01-01

    To verify satisfaction of communication requirements imposed by unique missions, as early as 2000, the Communications Networking Group at the Jet Propulsion Laboratory (JPL) saw the need for an environment to support interplanetary communication protocol design, validation, and characterization. JPL's Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in Simulator of Space Communication Networks (NPO-41373) NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various commercial, non-commercial, and in-house custom tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. As NASA is expanding its Space Communications and Navigation (SCaN) capabilities to support planned and future missions, building infrastructure to maintain services and developing enabling technologies, an important and broader role is seen for MACHETE in design-phase evaluation of future SCaN architectures. To support evaluation of the developing Delay Tolerant Networking (DTN) field and its applicability for space networks, JPL developed MACHETE models for DTN Bundle Protocol (BP) and Licklider/Long-haul Transmission Protocol (LTP). DTN is an Internet Research Task Force (IRTF) architecture providing communication in and/or through highly stressed networking environments such as space exploration and battlefield networks. Stressed networking environments include those with intermittent (predictable and unknown) connectivity, large and/or variable delays, and high bit error rates. To provide its services over existing domain specific protocols, the DTN protocols reside at the application layer of the TCP/IP stack, forming a store-and-forward overlay network. The key capabilities of the Bundle Protocol include custody-based reliability, the ability to cope with intermittent connectivity, the ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses.

  18. A test protocol for assessing the hearing status of students with special needs.

    PubMed

    Chen, Hsiao-Chuan; Wang, Nan-Mai; Chiu, Wen-Chen; Liu, Shu-Yu; Chang, Yi-Ping; Lin, Pei-Yu; Chung, King

    2014-10-01

    Individuals with disabilities are often reported to have a high prevalence of undetected hearing disorders/loss, but there is no standardized hearing test protocol for this population. The purposes of this study were (1) to examine the hearing status of students with special needs in Taiwan, and (2) to investigate the use of an on-site hearing test protocol that would adequately detect hearing problems in this population and reduce unnecessary referrals for off-site follow-up services. A total of 238 students enrolled in two schools for special education and one habilitation center participated in the study. Most students had intellectual disabilities and some also had additional syndromes or disorders. A hearing screening protocol including otoscopy, tympanometry, and distortion product otoacoustic emissions was administered to examine students' outer, middle, and inner ear functions, respectively. Pure tone tests were then administered as an on-site follow-up for those who failed or could not be tested using the screening protocol. Only 32.4% of students passed. When administered alone, the referral rate of otoscopy, tympanometry, and otoacoustic emissions were 38.7%, 46.0%, and 48.5%, respectively. The integration of these subtests revealed 52.1% of students needed follow-up services, 11.8% could not be tested, 2.5% had documented hearing loss, and 1.3% needed to be monitored because of negative middle ear pressure. The inclusion of pure tone audiometry increased the passing rate by 9.9% and provided information on hearing sensitivity for an additional 8.6% of students. Hearing assessments and regular hearing screening should be provided as an integral part of health care services for individuals with special needs because of high occurrences of excessive cerumen, middle ear dysfunction, and sensorineural hearing loss. The training of care-givers and teachers of students with special needs is encouraged so that they can help identify hearing problems and reduce the negative impact of hearing disorders and hearing loss. The screening protocol needs to include subtests that examine the status of different parts of their auditory system. The addition of pure tone audiometry as an on-site follow-up tool reduced the rate of off-site referrals and provided more information on hearing sensitivity. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  19. The CCSDS Next Generation Space Data Link Protocol (NGSLP)

    NASA Technical Reports Server (NTRS)

    Kazz, Greg J.; Greenberg, Edward

    2014-01-01

    The CCSDS space link protocols i.e., Telemetry (TM), Telecommand (TC), Advanced Orbiting Systems (AOS) were developed in the early growth period of the space program. They were designed to meet the needs of the early missions, be compatible with the available technology and focused on the specific link environments. Digital technology was in its infancy and spacecraft power and mass issues enforced severe constraints on flight implementations. Therefore the Telecommand protocol was designed around a simple Bose, Hocquenghem, Chaudhuri (BCH) code that provided little coding gain and limited error detection but was relatively simple to decode on board. The infusion of the concatenated Convolutional and Reed-Solomon codes5 for telemetry was a major milestone and transformed telemetry applications by providing them the ability to more efficiently utilize the telemetry link and its ability to deliver user data. The ability to significantly lower the error rates on the telemetry links enabled the use of packet telemetry and data compression. The infusion of the high performance codes for telemetry was enabled by the advent of digital processing, but it was limited to earth based systems supporting telemetry. The latest CCSDS space link protocol, Proximity-1 was developed in early 2000 to meet the needs of short-range, bi-directional, fixed or mobile radio links characterized by short time delays, moderate but not weak signals, and short independent sessions. Proximity-1 has been successfully deployed on both NASA and ESA missions at Mars and is planned to be utilized by all Mars missions in development. A new age has arisen, one that now provides the means to perform advanced digital processing in spacecraft systems enabling the use of improved transponders, digital correlators, and high performance forward error correcting codes for all communications links. Flight transponders utilizing digital technology have emerged and can efficiently provide the means to make the next leap in performance for space link communications. Field Programmable Gate Arrays (FPGAs) provide the capability to incorporate high performance forward error correcting codes implemented within software transponders providing improved performance in data transfer, ranging, link security, and time correlation. Given these synergistic technological breakthroughs, the time has come to take advantage of them in applying them to both on going (e.g., command, telemetry) and emerging (e.g., space link security, optical communication) space link applications. However one of the constraining factors within the Data Link Layer in realizing these performance gains is the lack of a generic transfer frame format and common supporting services amongst the existing CCSDS link layer protocols. Currently each of the four CCSDS link layer protocols (TM, TC, AOS, and Proximity-1) have unique formats and services which prohibits their reuse across the totality of all space link applications of CCSDS member space agencies. For example, Mars missions. These missions implement their proximity data link layer using the Proximity-1 frame format and the services it supports but is still required to support the direct from Earth (TC) protocols and the Direct To Earth (AOS/TM) protocols. The prime purpose of this paper, is to describe a new general purpose CCSDS Data Link layer protocol, the NGSLP that will provide the required services along with a common transfer frame format for all the CCSDS space links (ground to/from space and space to space links) targeted for emerging missions after a CCSDS agency-wide coordinated date. This paper will also describe related options that can be included for the Coding and Synchronization sub-layer of the Data Link layer to extend the capacities of the link and additionally provide an independence of the transfer frame sub-layer from the coding sublayer. This feature will provide missions the option of running either the currently performed synchronous coding and transfer frame data link or an asynchronous coding/frame data link, in which the transfer frame length is independent of the block size of the code. The benefits from the elimination of this constraint (frame synchronized to the code block) will simplify the interface between the transponder and the data handling equipment and reduce implementation costs and complexities. The benefits include: inclusion of encoders/decoders into transmitters and receivers without regard to data link protocols, providing the ability to insert latency sensitive messages into the link to support launch, landing/docking, telerobotics. and Variable Coded Modulation (VCM). In addition the ability to transfer different sized frames can provide a backup for delivering stored anomaly engineering data simultaneously with real time data, or relaying of frames from various sources onto a trunk line for delivery to Earth.

  20. Design Issues for Traffic Management for the ATM UBR + Service for TCP Over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Jain, Raj

    1999-01-01

    This project was a comprehensive research program for developing techniques for improving the performance of Internet protocols over Asynchronous Transfer Mode (ATM) based satellite networks. Among the service categories provided by ATM networks, the most commonly used category for data traffic is the unspecified bit rate (UBR) service. UBR allows sources to send data into the network without any feedback control. The project resulted in the numerous ATM Forum contributions and papers.

  1. High-Performance CCSDS Encapsulation Service Implementation in FPGA

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Encapsulation Service is a convergence layer between lower-layer space data link framing protocols, such as CCSDS Advanced Orbiting System (AOS), and higher-layer networking protocols, such as CFDP (CCSDS File Delivery Protocol) and Internet Protocol Extension (IPE). CCSDS Encapsulation Service is considered part of the data link layer. The CCSDS AOS implementation is described in the preceding article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS Encapsulation Service needs to be optimized to both reduce energy consumption and operate at a high rate. CCSDS Encapsulation Service has been implemented as an intellectual property core so that the aforementioned problems are solved by way of operating the CCSDS Encapsulation Service inside an FPGA. The CCSDS En capsula tion Service in FPGA implementation consists of both packetizing and de-packetizing features

  2. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  3. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.

  4. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  5. Assessing Information on the Internet: Toward Providing Library Services for Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Dillon, Martin; And Others

    1992-01-01

    Describes a project that examined textual information available on the Internet and potential means of providing access to this information. Highlights include an overview of Internet resources, a profile of a document sample, description of FTP (File Transfer Protocol) sites, and an automated method of categorizing files. (MES)

  6. Marshall Space Flight Center Telescience Resource Kit

    NASA Technical Reports Server (NTRS)

    Wade, Gina

    2016-01-01

    Telescience Resource Kit (TReK) is a suite of software applications that can be used to monitor and control assets in space or on the ground. The Telescience Resource Kit was originally developed for the International Space Station program. Since then it has been used to support a variety of NASA programs and projects including the WB-57 Ascent Vehicle Experiment (WAVE) project, the Fast Affordable Science and Technology Satellite (FASTSAT) project, and the Constellation Program. The Payloads Operations Center (POC), also known as the Payload Operations Integration Center (POIC), provides the capability for payload users to operate their payloads at their home sites. In this environment, TReK provides local ground support system services and an interface to utilize remote services provided by the POC. TReK provides ground system services for local and remote payload user sites including International Partner sites, Telescience Support Centers, and U.S. Investigator sites in over 40 locations worldwide. General Capabilities: Support for various data interfaces such as User Datagram Protocol, Transmission Control Protocol, and Serial interfaces. Data Services - retrieve, process, record, playback, forward, and display data (ground based data or telemetry data). Command - create, modify, send, and track commands. Command Management - Configure one TReK system to serve as a command server/filter for other TReK systems. Database - databases are used to store telemetry and command definition information. Application Programming Interface (API) - ANSI C interface compatible with commercial products such as Visual C++, Visual Basic, LabVIEW, Borland C++, etc. The TReK API provides a bridge for users to develop software to access and extend TReK services. Environments - development, test, simulations, training, and flight. Includes standalone training simulators.

  7. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    PubMed Central

    Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad

    2017-01-01

    Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495

  8. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    PubMed

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  9. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  10. A Multi-Center Space Data System Prototype Based on CCSDS Standards

    NASA Technical Reports Server (NTRS)

    Rich, Thomas M.

    2016-01-01

    Deep space missions beyond earth orbit will require new methods of data communications in order to compensate for increasing Radio Frequency (RF) propagation delay. The Consultative Committee for Space Data Systems (CCSDS) standard protocols Spacecraft Monitor & Control (SM&C), Asynchronous Message Service (AMS), and Delay/Disruption Tolerant Networking (DTN) provide such a method. However, the maturity level of this protocol stack is insufficient for mission inclusion at this time. This Space Data System prototype is intended to provide experience which will raise the Technical Readiness Level (TRL) of this protocol set. In order to reduce costs, future missions can take advantage of these standard protocols, which will result in increased interoperability between control centers. This prototype demonstrates these capabilities by implementing a realistic space data system in which telemetry is published to control center applications at the Jet Propulsion Lab (JPL), the Marshall Space Flight Center (MSFC), and the Johnson Space Center (JSC). Reverse publishing paths for commanding from each control center are also implemented. The target vehicle consists of realistic flight computer hardware running Core Flight Software (CFS) in the integrated Power, Avionics, and Power (iPAS) Pathfinder Lab at JSC. This prototype demonstrates a potential upgrade path for future Deep Space Network (DSN) modification, in which the automatic error recovery and communication gap compensation capabilities of DTN would be exploited. In addition, SM&C provides architectural flexibility by allowing new service providers and consumers to be added efficiently anywhere in the network using the common interface provided by SM&C's Message Abstraction Layer (MAL). In FY 2015, this space data system was enhanced by adding telerobotic operations capability provided by the Robot API Delegate (RAPID) family of protocols developed at NASA. RAPID is one of several candidates for consideration and inclusion in a new international standard being developed by the CCSDS Telerobotic Operations Working Group. Software gateways for the purpose of interfacing RAPID messages with the existing SM&C based infrastructure were developed. Telerobotic monitor, control, and bridge applications were written in the RAPID framework, which were then tailored to the NAO telerobotic test article hardware, a product of Aldebaran Robotics.

  11. Simulation Modeling and Performance Evaluation of Space Networks

    NASA Technical Reports Server (NTRS)

    Jennings, Esther H.; Segui, John

    2006-01-01

    In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions

  12. UPM: unified policy-based network management

    NASA Astrophysics Data System (ADS)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  13. Breastfeeding Counseling, Barriers and Facilitators of Lactation in the Military Community

    DTIC Science & Technology

    1998-05-01

    of Defense This work was supported by the Uniformed Services University of the Health Sciences Protocol No. THE06139-01. The opinions or assertions...Organization (1989). Protecting, promoting, and supporting breastfeeding : The special role of maternity services Switzerland: WHO/UNICEF. 64 APPENDICES...method. However, the literature shows that many health care providers do not actively endorse and support breastfeeding in their practices. This

  14. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...

  15. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  16. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  17. Government Information Locator Service (GILS). Draft report to the Information Infrastructure Task Force

    NASA Technical Reports Server (NTRS)

    1994-01-01

    This is a draft report on the Government Information Locator Service (GILS) to the National Information Infrastructure (NII) task force. GILS is designed to take advantage of internetworking technology known as client-server architecture which allows information to be distributed among multiple independent information servers. Two appendices are provided -- (1) A glossary of related terminology and (2) extracts from a draft GILS profile for the use of the American National Standard Information Retrieval Application Service Definition and Protocol Specification for Library Applications.

  18. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  19. A protocol for eliciting nonmaterial values through a cultural ecosystem services frame.

    PubMed

    Gould, Rachelle K; Klain, Sarah C; Ardoin, Nicole M; Satterfield, Terre; Woodside, Ulalia; Hannahs, Neil; Daily, Gretchen C; Chan, Kai M

    2015-04-01

    Stakeholders' nonmaterial desires, needs, and values often critically influence the success of conservation projects. These considerations are challenging to articulate and characterize, resulting in their limited uptake in management and policy. We devised an interview protocol designed to enhance understanding of cultural ecosystem services (CES). The protocol begins with discussion of ecosystem-related activities (e.g., recreation, hunting) and management and then addresses CES, prompting for values encompassing concepts identified in the Millennium Ecosystem Assessment (2005) and explored in other CES research. We piloted the protocol in Hawaii and British Columbia. In each location, we interviewed 30 individuals from diverse backgrounds. We analyzed results from the 2 locations to determine the effectiveness of the interview protocol in elucidating nonmaterial values. The qualitative and spatial components of the protocol helped characterize cultural, social, and ethical values associated with ecosystems in multiple ways. Maps and situational, or vignette-like, questions helped respondents articulate difficult-to-discuss values. Open-ended prompts allowed respondents to express a diversity of ecosystem-related values and proved sufficiently flexible for interviewees to communicate values for which the protocol did not explicitly probe. Finally, the results suggest that certain values, those mentioned frequently throughout the interview, are particularly salient for particular populations. The protocol can provide efficient, contextual, and place-based data on the importance of particular ecosystem attributes for human well-being. Qualitative data are complementary to quantitative and spatial assessments in the comprehensive representation of people's values pertaining to ecosystems, and this protocol may assist in incorporating values frequently overlooked in decision making processes. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  20. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...

  1. Enhancing End-to-End Performance of Information Services Over Ka-Band Global Satellite Networks

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.; Glover, Daniel R.; Ivancic, William D.; vonDeak, Thomas C.

    1997-01-01

    The Internet has been growing at a rapid rate as the key medium to provide information services such as e-mail, WWW and multimedia etc., however its global reach is limited. Ka-band communication satellite networks are being developed to increase the accessibility of information services via the Internet at global scale. There is need to assess satellite networks in their ability to provide these services and interconnect seamlessly with existing and proposed terrestrial telecommunication networks. In this paper the significant issues and requirements in providing end-to-end high performance for the delivery of information services over satellite networks based on various layers in the OSI reference model are identified. Key experiments have been performed to evaluate the performance of digital video and Internet over satellite-like testbeds. The results of the early developments in ATM and TCP protocols over satellite networks are summarized.

  2. Generic, Extensible, Configurable Push-Pull Framework for Large-Scale Science Missions

    NASA Technical Reports Server (NTRS)

    Foster, Brian M.; Chang, Albert Y.; Freeborn, Dana J.; Crichton, Daniel J.; Woollard, David M.; Mattmann, Chris A.

    2011-01-01

    The push-pull framework was developed in hopes that an infrastructure would be created that could literally connect to any given remote site, and (given a set of restrictions) download files from that remote site based on those restrictions. The Cataloging and Archiving Service (CAS) has recently been re-architected and re-factored in its canonical services, including file management, workflow management, and resource management. Additionally, a generic CAS Crawling Framework was built based on motivation from Apache s open-source search engine project called Nutch. Nutch is an Apache effort to provide search engine services (akin to Google), including crawling, parsing, content analysis, and indexing. It has produced several stable software releases, and is currently used in production services at companies such as Yahoo, and at NASA's Planetary Data System. The CAS Crawling Framework supports many of the Nutch Crawler's generic services, including metadata extraction, crawling, and ingestion. However, one service that was not ported over from Nutch is a generic protocol layer service that allows the Nutch crawler to obtain content using protocol plug-ins that download content using implementations of remote protocols, such as HTTP, FTP, WinNT file system, HTTPS, etc. Such a generic protocol layer would greatly aid in the CAS Crawling Framework, as the layer would allow the framework to generically obtain content (i.e., data products) from remote sites using protocols such as FTP and others. Augmented with this capability, the Orbiting Carbon Observatory (OCO) and NPP (NPOESS Preparatory Project) Sounder PEATE (Product Evaluation and Analysis Tools Elements) would be provided with an infrastructure to support generic FTP-based pull access to remote data products, obviating the need for any specialized software outside of the context of their existing process control systems. This extensible configurable framework was created in Java, and allows the use of different underlying communication middleware (at present, both XMLRPC, and RMI). In addition, the framework is entirely suitable in a multi-mission environment and is supporting both NPP Sounder PEATE and the OCO Mission. Both systems involve tasks such as high-throughput job processing, terabyte-scale data management, and science computing facilities. NPP Sounder PEATE is already using the push-pull framework to accept hundreds of gigabytes of IASI (infrared atmospheric sounding interferometer) data, and is in preparation to accept CRIMS (Cross-track Infrared Microwave Sounding Suite) data. OCO will leverage the framework to download MODIS, CloudSat, and other ancillary data products for use in the high-performance Level 2 Science Algorithm. The National Cancer Institute is also evaluating the framework for use in sharing and disseminating cancer research data through its Early Detection Research Network (EDRN).

  3. Peer-to-Peer Science Data Environment

    NASA Astrophysics Data System (ADS)

    Byrnes, J. B.; Holland, M. P.

    2004-12-01

    The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.

  4. Evaluation of the appropriate use of a CIWA-Ar alcohol withdrawal protocol in the general hospital setting.

    PubMed

    Eloma, Amanda S; Tucciarone, Jason M; Hayes, Edmund M; Bronson, Brian D

    2018-01-01

    The Clinical Institute Withdrawal Assessment-Alcohol, Revised (CIWA-Ar) is an assessment tool used to quantify alcohol withdrawal syndrome (AWS) severity and inform benzodiazepine treatment for alcohol withdrawal. To evaluate the prescribing patterns and appropriate use of the CIWA-Ar protocol in a general hospital setting, as determined by the presence or absence of documented AWS risk factors, patients' ability to communicate, and provider awareness of the CIWA-Ar order. This retrospective chart review included 118 encounters of hospitalized patients placed on a CIWA-Ar protocol during one year. The following data were collected for each encounter: patient demographics, admitting diagnosis, ability to communicate, and admission blood alcohol level; and medical specialty of the clinician ordering CIWA-Ar, documentation of the presence or absence of established AWS risk factors, specific parameters of the protocol ordered, service admitted to, provider documentation of awareness of the active protocol within 48 h of initial order, total benzodiazepine dose equivalents administered and associated adverse events. 57% of patients who started on a CIWA-Ar protocol had either zero or one documented risk factor for AWS (19% and 38% respectively). 20% had no documentation of recent alcohol use. 14% were unable to communicate. 19% of medical records lacked documentation of provider awareness of the ordered protocol. Benzodiazepine associated adverse events were documented in 15% of encounters. The judicious use of CIWA-Ar protocols in general hospitals requires mechanisms to ensure assessment of validated alcohol withdrawal risk factors, exclusion of patients who cannot communicate, and continuity of care during transitions.

  5. 47 CFR 10.10 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMERCIAL MOBILE ALERT SYSTEM General Information § 10... Participating Commercial Mobile Service Provider under this part. (b) Common Alerting Protocol. The Common...), or any subsequent version of CAP adopted by OASIS and implemented by the CMAS. (c) Commercial Mobile...

  6. OSI-compatible protocols for mobile-satellite communications: The AMSS experience

    NASA Technical Reports Server (NTRS)

    Moher, Michael

    1990-01-01

    The protocol structure of the international aeronautical mobile satellite service (AMSS) is reviewed with emphasis on those aspects of protocol performance, validation, and conformance which are peculiar to mobile services. This is in part an analysis of what can be learned from the AMSS experience with protocols which is relevant to the design of other mobile satellite data networks, e.g., land mobile.

  7. An efficient protocol for providing integrated voice/data services to mobiles over power-limited satellite channels

    NASA Astrophysics Data System (ADS)

    Bose, Sanjay K.

    1991-02-01

    Various mobile satellite communication systems are being developed for providing integrated voice/data services over a shared satellite transponder which is power-limited in nature. A common strategy is to use slotted ALOHA request channels to request channel assignments for voice/data calls from a network management station. To maximize efficiency in a system with a power-limited satellite transponder, it is proposed that the bursty nature of voice sources be exploited by the NMS to 'over-assign' channels. This may cause problems of inefficiency and potential instability, as well as a degradation in the quality of service. Augmenting this with the introduction of simple state-dependent control procedures provides systems which exhibit more desirable operational features.

  8. SSWAP: A Simple Semantic Web Architecture and Protocol for Semantic Web Services

    USDA-ARS?s Scientific Manuscript database

    SSWAP (Simple Semantic Web Architecture and Protocol) is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP is the driving technology behind the Virtual Plant Information Network, an NSF-funded semantic w...

  9. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  10. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  11. Effectiveness of AODV Protocol under Hidden Node Environment

    NASA Astrophysics Data System (ADS)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  12. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

    NASA Astrophysics Data System (ADS)

    Graham, Michelle; Gray, David

    As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.

  13. SPOT: Optimization Tool for Network Adaptable Security

    NASA Astrophysics Data System (ADS)

    Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew

    Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.

  14. Experience in running relational databases on clustered storage

    NASA Astrophysics Data System (ADS)

    Gaspar Aparicio, Ruben; Potocky, Miroslav

    2015-12-01

    For past eight years, CERN IT Database group has based its backend storage on NAS (Network-Attached Storage) architecture, providing database access via NFS (Network File System) protocol. In last two and half years, our storage has evolved from a scale-up architecture to a scale-out one. This paper describes our setup and a set of functionalities providing key features to other services like Database on Demand [1] or CERN Oracle backup and recovery service. It also outlines possible trend of evolution that, storage for databases could follow.

  15. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  16. Common MD-IS infrastructure for wireless data technologies

    NASA Astrophysics Data System (ADS)

    White, Malcolm E.

    1995-12-01

    The expansion of global networks, caused by growth and acquisition within the commercial sector, is forcing users to move away from proprietary systems in favor of standards-based, open systems architectures. The same is true in the wireless data communications arena, where operators of proprietary wireless data networks have endeavored to convince users that their particular implementation provides the best service. However, most of the vendors touting these solutions have failed to gain the critical mass that might have lead to their technologies' adoption as a defacto standard, and have been held back by a lack of applications and the high cost of mobile devices. The advent of the cellular digital packet data (CDPD) specification and its support by much of the public cellular service industry has set the stage for the ubiquitous coverage of wireless packet data services across the Unites States. Although CDPD was developed for operation over the advanced mobile phone system (AMPS) cellular network, many of the defined protocols are industry standards that can be applied to the construction of a common infrastructure supporting multiple airlink standards. This approach offers overall cost savings and operation efficiency for service providers, hardware, and software developers and end-users alike, and could be equally advantageous for those service operators using proprietary end system protocols, should they wish to migrate towards an open standard.

  17. Dynamic quality of service model for improving performance of multimedia real-time transmission in industrial networks.

    PubMed

    Gopalakrishnan, Ravichandran C; Karunakaran, Manivannan

    2014-01-01

    Nowadays, quality of service (QoS) is very popular in various research areas like distributed systems, multimedia real-time applications and networking. The requirements of these systems are to satisfy reliability, uptime, security constraints and throughput as well as application specific requirements. The real-time multimedia applications are commonly distributed over the network and meet various time constraints across networks without creating any intervention over control flows. In particular, video compressors make variable bit-rate streams that mismatch the constant-bit-rate channels typically provided by classical real-time protocols, severely reducing the efficiency of network utilization. Thus, it is necessary to enlarge the communication bandwidth to transfer the compressed multimedia streams using Flexible Time Triggered- Enhanced Switched Ethernet (FTT-ESE) protocol. FTT-ESE provides automation to calculate the compression level and change the bandwidth of the stream. This paper focuses on low-latency multimedia transmission over Ethernet with dynamic quality-of-service (QoS) management. This proposed framework deals with a dynamic QoS for multimedia transmission over Ethernet with FTT-ESE protocol. This paper also presents distinct QoS metrics based both on the image quality and network features. Some experiments with recorded and live video streams show the advantages of the proposed framework. To validate the solution we have designed and implemented a simulator based on the Matlab/Simulink, which is a tool to evaluate different network architecture using Simulink blocks.

  18. A Multilateral Negotiation Model for Cloud Service Market

    NASA Astrophysics Data System (ADS)

    Yoo, Dongjin; Sim, Kwang Mong

    Trading cloud services between consumers and providers is a complicated issue of cloud computing. Since a consumer can negotiate with multiple providers to acquire the same service and each provider can receive many requests from multiple consumers, to facilitate the trading of cloud services among multiple consumers and providers, a multilateral negotiation model for cloud market is necessary. The contribution of this work is the proposal of a business model supporting a multilateral price negotiation for trading cloud services. The design of proposed systems for cloud service market includes considering a many-to-many negotiation protocol, and price determining factor from service level feature. Two negotiation strategies are implemented: 1) MDA (Market Driven Agent); and 2) adaptive concession making responding to changes of bargaining position are proposed for cloud service market. Empirical results shows that MDA achieved better performance in some cases that the adaptive concession making strategy, it is noted that unlike the MDA, the adaptive concession making strategy does not assume that an agent has information of the number of competitors (e.g., a consumer agent adopting the adaptive concession making strategy need not know the number of consumer agents competing for the same service).

  19. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    NASA Astrophysics Data System (ADS)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google Earth layers using KML; generation of maps via WMS or ArcIMS protocols; and data manipulation with Unix utilities.

  20. Support and assessment for fall emergency referrals (SAFER 2) research protocol: cluster randomised trial of the clinical and cost effectiveness of new protocols for emergency ambulance paramedics to assess and refer to appropriate community-based care

    PubMed Central

    Snooks, Helen; Anthony, Rebecca; Chatters, Robin; Cheung, Wai-Yee; Dale, Jeremy; Donohoe, Rachael; Gaze, Sarah; Halter, Mary; Koniotou, Marina; Logan, Phillippa; Lyons, Ronan; Mason, Suzanne; Nicholl, Jon; Phillips, Ceri; Phillips, Judith; Russell, Ian; Siriwardena, A Niroshan; Wani, Mushtaq; Watkins, Alan; Whitfield, Richard; Wilson, Lynsey

    2012-01-01

    Introduction Emergency calls to ambulance services are frequent for older people who have fallen, but ambulance crews often leave patients at the scene without ongoing care. Evidence shows that when left at home with no further support older people often experience subsequent falls which result in injury and emergency-department attendances. SAFER 2 is an evaluation of a new clinical protocol which allows paramedics to assess and refer older people who have fallen, and do not need hospital care, to community-based falls services. In this protocol paper, we report methods and progress during trial implementation. SAFER 2 is recruiting patients through three ambulance services. A successful trial will provide robust evidence about the value of this new model of care, and enable ambulance services to use resources efficiently. Design Pragmatic cluster randomised trial. Methods and analysis We randomly allocated 25 participating ambulance stations (clusters) in three services to intervention or control group. Intervention paramedics received training and clinical protocols for assessing and referring older people who have fallen to community-based falls services when appropriate, while control paramedics deliver care as usual. Patients are eligible for the trial if they are aged 65 or over; resident in a participating falls service catchment area; and attended by a trial paramedic following an emergency call coded as a fall without priority symptoms. The principal outcome is the rate of further emergency contacts (or death), for any cause and for falls. Secondary outcomes include further falls, health-related quality of life, ‘fear of falling’, patient satisfaction reported by participants through postal questionnaires at 1 and 6 months, and quality and pathways of care at the index incident. We shall compare National Health Service (NHS) and patient/carer costs between intervention and control groups and estimate quality-adjusted life years (QALYs) gained from the intervention and thus incremental cost per QALY. We shall estimate wider system effects on key-performance indicators. We shall interview 60 intervention patients, and conduct focus groups with contributing NHS staff to explore their experiences of the assessment and referral service. We shall analyse quantitative trial data by ‘treatment allocated’; and qualitative data using content analysis. Ethics and dissemination The Research Ethics Committee for Wales gave ethical approval and each participating centre gave NHS Research and Development approval. We shall disseminate study findings through peer-reviewed publications and conference presentations. Trial Registration: ISRCTN 60481756 PMID:23148348

  1. Glossary of Internet Terms.

    ERIC Educational Resources Information Center

    Microcomputers for Information Management, 1995

    1995-01-01

    Provides definitions for 71 terms related to the Internet, including Archie, bulletin board system, cyberspace, e-mail (electronic mail), file transfer protocol, gopher, hypertext, integrated services digital network, local area network, listserv, modem, packet switching, server, telnet, UNIX, WAIS (wide area information servers), and World Wide…

  2. A Beginner's Guide to the Internet.

    ERIC Educational Resources Information Center

    McAdams, Charles A.; Nelson, Mark A.

    1995-01-01

    Maintains that the Internet offers services and opportunities for music teachers and students. Provides an overview of topics such as electronic mail, File Transfer Protocol (FTP), Gopher, and the World Wide Web (WWW). Includes two lists of music resources available on the Internet. (CFR)

  3. A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS

    NASA Astrophysics Data System (ADS)

    Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.

    2011-12-01

    Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.

  4. Client-centered counseling improves client satisfaction with family planning visits: evidence from Irbid, Jordan

    PubMed Central

    Kamhawi, Sarah; Underwood, Carol; Murad, Huda; Jabre, Bushra

    2013-01-01

    ABSTRACT Background: High levels of unmet need for family planning and high contraceptive discontinuation rates persist in Jordan, prompting the Jordan Health Communication Partnership (JHCP) to initiate a client-centered family planning service program called “Consult and Choose” (CC), together with community-based activities to encourage women with unmet need to visit health centers. Methods: We held exit interviews with 461 family planning clients between November–December 2011 to assess, from the clients' perspective, whether trained providers followed the CC protocol and used the CC tools, as well as to measure client satisfaction. We also tracked referral card information from community-based activities to health centers and examined service statistics to explore trends in family planning use. Results: On average, clients reported that providers performed 5.6 of the 7 steps outlined in the CC protocol. Nearly 83% of respondents were very satisfied with their clinic visits. Logistic regression analysis found that the odds of being “very satisfied” increases by 20% with each additional counseling protocol step performed and by 70% with each increase in the number of CC materials used. Between June 2011 and August 2012, 14,490 referral cards from community-based activities were collected in health centers, 59% of which were for family planning services. Service statistic trends indicate an increase in the number of new family planning users and in couple-years of protection after starting the CC program. Conclusions: Implementation of the CC program at health centers nationally, in tandem with community-based interventions, could play a key role in attaining Jordan's goal of reducing its total fertility rate to 2.1 by 2030. Although this initiative would likely be replicated most readily in other middle-income countries, lower-resource countries could also adapt the tested CC approach. PMID:25276531

  5. The Significance of Privacy and Trust in Providing Health-Related Services to Behaviorally Bisexual Men in the United States

    PubMed Central

    Dodge, Brian; Schnarrs, Phillip W.; Goncalves, Gabriel; Malebranche, David; Martinez, Omar; Reece, Michael; Rhodes, Scott D.; Van Der Pol, Barbara; Nix, Ryan; Fortenberry, J. Dennis

    2012-01-01

    Previous research suggests that bisexual men face unique health concerns in comparison to their exclusively homosexual and heterosexual counterparts. However, little is known about behaviorally bisexual men’s experiences with health services, including ways of providing services that would be most appropriate to meet the health needs of this population. This study sought to understand preferences for health-related services among behaviorally bisexual men in the Midwestern United States. Using a community-based research approach, a diverse sample of 75 behaviorally bisexual men was recruited for in-depth interviews. Qualitative data were analyzed utilizing inductive coding through established team-based protocols to ensure reliability. Themes emerged involving the importance of privacy and trust when reaching, recruiting, and engaging behaviorally bisexual men in health services. Findings suggest that multifaceted approaches are needed, including those that provide relevant and confidential services while allowing for the development and ongoing maintenance of trust. PMID:22676463

  6. Fault discovery protocol for passive optical networks

    NASA Astrophysics Data System (ADS)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  7. rasdaman Array Database: current status

    NASA Astrophysics Data System (ADS)

    Merticariu, George; Toader, Alexandru

    2015-04-01

    rasdaman (Raster Data Manager) is a Free Open Source Array Database Management System which provides functionality for storing and processing massive amounts of raster data in the form of multidimensional arrays. The user can access, process and delete the data using SQL. The key features of rasdaman are: flexibility (datasets of any dimensionality can be processed with the help of SQL queries), scalability (rasdaman's distributed architecture enables it to seamlessly run on cloud infrastructures while offering an increase in performance with the increase of computation resources), performance (real-time access, processing, mixing and filtering of arrays of any dimensionality) and reliability (legacy communication protocol replaced with a new one based on cutting edge technology - Google Protocol Buffers and ZeroMQ). Among the data with which the system works, we can count 1D time series, 2D remote sensing imagery, 3D image time series, 3D geophysical data, and 4D atmospheric and climate data. Most of these representations cannot be stored only in the form of raw arrays, as the location information of the contents is also important for having a correct geoposition on Earth. This is defined by ISO 19123 as coverage data. rasdaman provides coverage data support through the Petascope service. Extensions were added on top of rasdaman in order to provide support for the Geoscience community. The following OGC standards are currently supported: Web Map Service (WMS), Web Coverage Service (WCS), and Web Coverage Processing Service (WCPS). The Web Map Service is an extension which provides zoom and pan navigation over images provided by a map server. Starting with version 9.1, rasdaman supports WMS version 1.3. The Web Coverage Service provides capabilities for downloading multi-dimensional coverage data. Support is also provided for several extensions of this service: Subsetting Extension, Scaling Extension, and, starting with version 9.1, Transaction Extension, which defines request types for inserting, updating and deleting coverages. A web client, designed for both novice and experienced users, is also available for the service and its extensions. The client offers an intuitive interface that allows users to work with multi-dimensional coverages by abstracting the specifics of the standard definitions of the requests. The Web Coverage Processing Service defines a language for on-the-fly processing and filtering multi-dimensional raster coverages. rasdaman exposes this service through the WCS processing extension. Demonstrations are provided online via the Earthlook website (earthlook.org) which presents use-cases from a wide variety of application domains, using the rasdaman system as processing engine.

  8. Development of a Behavior Change Intervention to Improve Sexual Health Service Use Among University Undergraduate Students: Mixed Methods Study Protocol.

    PubMed

    Cassidy, Christine; Steenbeek, Audrey; Langille, Donald; Martin-Misener, Ruth; Curran, Janet

    2017-11-02

    University students are at risk for acquiring sexually transmitted infections and suffering other negative health outcomes. Sexual health services offer preventive and treatment interventions that aim to reduce these infections and associated health consequences. However, university students often delay or avoid seeking sexual health services. An in-depth understanding of the factors that influence student use of sexual health services is needed to underpin effective sexual health interventions. In this study, we aim to design a behavior change intervention to address university undergraduate students' use of sexual health services at two universities in Nova Scotia, Canada. This mixed methods study consists of three phases that follow a systematic approach to intervention design outlined in the Behaviour Change Wheel. In Phase 1, we examine patterns of sexual health service use among university students in Nova Scotia, Canada, using an existing dataset. In Phase 2, we identify the perceived barriers and enablers to students' use of sexual health services. This will include focus groups with university undergraduate students, health care providers, and university administrators using a semistructured guide, informed by the Capability, Opportunity, Motivation-Behaviour Model and Theoretical Domains Framework. In Phase 3, we identify behavior change techniques and intervention components to develop a theory-based intervention to improve students' use of sexual health services. This study will be completed in March 2018. Results from each phase and the finalized intervention design will be reported in 2018. Previous intervention research to improve university students' use of sexual health services lacks a theoretical assessment of barriers. This study will employ a mixed methods research design to examine university students' use of sexual health service and apply behavior change theory to design a theory- and evidence-based sexual health service intervention. Our approach will provide a comprehensive foundation to co-design a theory-based intervention with service users, health care providers, and administrators to improve sexual health service use among university students and ultimately improve their overall health and well-being. ©Christine Cassidy, Audrey Steenbeek, Donald Langille, Ruth Martin-Misener, Janet Curran. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 02.11.2017.

  9. Interoperable Data Access Services for NOAA IOOS

    NASA Astrophysics Data System (ADS)

    de La Beaujardiere, J.

    2008-12-01

    The Integrated Ocean Observing System (IOOS) is intended to enhance our ability to collect, deliver, and use ocean information. The goal is to support research and decision-making by providing data on our open oceans, coastal waters, and Great Lakes in the formats, rates, and scales required by scientists, managers, businesses, governments, and the public. The US National Oceanic and Atmospheric Administration (NOAA) is the lead agency for IOOS. NOAA's IOOS office supports the development of regional coastal observing capability and promotes data management efforts to increase data accessibility. Geospatial web services have been established at NOAA data providers including the National Data Buoy Center (NDBC), the Center for Operational Oceanographic Products and Services (CO-OPS), and CoastWatch, and at regional data provider sites. Services established include Open-source Project for a Network Data Access Protocol (OpenDAP), Open Geospatial Consortium (OGC) Sensor Observation Service (SOS), and OGC Web Coverage Service (WCS). These services provide integrated access to data holdings that have been aggregated at each center from multiple sources. We wish to collaborate with other groups to improve our service offerings to maximize interoperability and enhance cross-provider data integration, and to share common service components such as registries, catalogs, data conversion, and gateways. This paper will discuss the current status of NOAA's IOOS efforts and possible next steps.

  10. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    NASA Astrophysics Data System (ADS)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  11. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  12. Service models and realization of differentiated services networks

    NASA Astrophysics Data System (ADS)

    Elizondo, Antonio J.; Garcia Osma, Maria L.; Einsiedler, Hans J.; Roth, Rudolf; Smirnov, Michael I.; Bartoli, Maurizio; Castelli, Paolo; Varga, Balazs; Krampell, Magnus

    2001-07-01

    Internet Service Providers need to offer Quality of Service (QoS) to fulfil the requirements of applications of their customers. Moreover, in a competitive market environment costs must be low. The selected service model must be effective and low in complexity, but it should still provide high quality and service differentiation, that the current Internet is not yet capable to support. The Differentiated Services (DiffServ) Architecture has been proposed for enabling a range of different Classes of Service (CoS). In the EURESCOM project P1006 several European service providers co-operated to examine various aspects involved in the introduction of service differentiation using the DiffServ approach. The project explored a set of service models for Expedited Forwarding (EF) and Assured Forwarding (AF) and identified requirements for network nodes. Besides, we addressed also measurement issues, charging and accounting issues. Special attention has been devoted to requirements of elastic traffic that adapts its sending rate to congestion state and available bandwidth. QoS mechanisms must prove Transmission Control Protocol (TCP) friendliness. TCP performance degrades under multiple losses. Since RED based queue management may still cause multiple discards, a modified marking scheme called Capped Leaky Bucket is proposed to improve the performance of elastic applications.

  13. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  14. Compression-based aggregation model for medical web services.

    PubMed

    Al-Shammary, Dhiah; Khalil, Ibrahim

    2010-01-01

    Many organizations such as hospitals have adopted Cloud Web services in applying their network services to avoid investing heavily computing infrastructure. SOAP (Simple Object Access Protocol) is the basic communication protocol of Cloud Web services that is XML based protocol. Generally,Web services often suffer congestions and bottlenecks as a result of the high network traffic that is caused by the large XML overhead size. At the same time, the massive load on Cloud Web services in terms of the large demand of client requests has resulted in the same problem. In this paper, two XML-aware aggregation techniques that are based on exploiting the compression concepts are proposed in order to aggregate the medical Web messages and achieve higher message size reduction.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christy, J. E.; Nickless, W. K.; Thiede, D. R.

    The Transport version 3 (T3) system uses the Network News Transfer Protocol (NNTP) to move data from sources to a Data Reporisoty (DR). Interested recipients subscribe to newsgroups to retrieve data. Data in transport is protected by AES-256 and RSA cryptographic services provided by the external OpenSSL cryptographic libraries.

  16. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    PubMed

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  17. An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks

    PubMed Central

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-01-01

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722

  18. Fault recovery in the reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  19. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  20. Alternatives in Aural Rehabilitation: Provider Training of Nonaudiologists in the Delivery of Hearing-Aid Supportive Services to Older Persons with Hearing Loss.

    ERIC Educational Resources Information Center

    Patterson, Karen; Dancer, Jess

    1987-01-01

    Describes program in which American Speech-Language-Hearing Association certified audiologists train protocol providers to assist older hearing-aid users in adjusting to using hearing aids on a daily basis. Training emphasizes empathy, effective communication skills, knowledge of the interaction of aging and hearing loss, phases outlined in…

  1. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  2. A service protocol for post-processing of medical images on the mobile device

    NASA Astrophysics Data System (ADS)

    He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian

    2014-03-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.

  3. What CFOs should know before venturing into the cloud.

    PubMed

    Rajendran, Janakan

    2013-05-01

    There are three major trends in the use of cloud-based services for healthcare IT: Cloud computing involves the hosting of health IT applications in a service provider cloud. Cloud storage is a data storage service that can involve, for example, long-term storage and archival of information such as clinical data, medical images, and scanned documents. Data center colocation involves rental of secure space in the cloud from a vendor, an approach that allows a hospital to share power capacity and proven security protocols, reducing costs.

  4. ECHO Services: Foundational Middleware for a Science Cyberinfrastructure

    NASA Technical Reports Server (NTRS)

    Burnett, Michael

    2005-01-01

    This viewgraph presentation describes ECHO, an interoperability middleware solution. It uses open, XML-based APIs, and supports net-centric architectures and solutions. ECHO has a set of interoperable registries for both data (metadata) and services, and provides user accounts and a common infrastructure for the registries. It is built upon a layered architecture with extensible infrastructure for supporting community unique protocols. It has been operational since November, 2002 and it available as open source.

  5. Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services

    DTIC Science & Technology

    2007-03-01

    potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global

  6. Issues in designing transport layer multicast facilities

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Weaver, Alfred C.

    1990-01-01

    Multicasting denotes a facility in a communications system for providing efficient delivery from a message's source to some well-defined set of locations using a single logical address. While modem network hardware supports multidestination delivery, first generation Transport Layer protocols (e.g., the DoD Transmission Control Protocol (TCP) (15) and ISO TP-4 (41)) did not anticipate the changes over the past decade in underlying network hardware, transmission speeds, and communication patterns that have enabled and driven the interest in reliable multicast. Much recent research has focused on integrating the underlying hardware multicast capability with the reliable services of Transport Layer protocols. Here, we explore the communication issues surrounding the design of such a reliable multicast mechanism. Approaches and solutions from the literature are discussed, and four experimental Transport Layer protocols that incorporate reliable multicast are examined.

  7. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  8. Structured Transition Protocol for Children with Cystinosis

    PubMed Central

    Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod

    2017-01-01

    The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE). This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives. PMID:28913329

  9. HIV treatment and care services for adolescents: a situational analysis of 218 facilities in 23 sub-Saharan African countries.

    PubMed

    Mark, Daniella; Armstrong, Alice; Andrade, Catarina; Penazzato, Martina; Hatane, Luann; Taing, Lina; Runciman, Toby; Ferguson, Jane

    2017-05-16

    In 2013, an estimated 2.1 million adolescents (age 10-19 years) were living with HIV globally. The extent to which health facilities provide appropriate treatment and care was unknown. To support understanding of service availability in 2014, Paediatric-Adolescent Treatment Africa (PATA), a non-governmental organisation (NGO) supporting a network of health facilities across sub-Saharan Africa, undertook a facility-level situational analysis of adolescent HIV treatment and care services in 23 countries. Two hundred and eighteen facilities, responsible for an estimated 80,072 HIV-infected adolescents in care, were surveyed. Sixty per cent of the sample were from PATA's network, with the remaining gathered via local NGO partners and snowball sampling. Data were analysed using descriptive statistics and coding to describe central tendencies and identify themes. Respondents represented three subregions: West and Central Africa ( n  = 59; 27%), East Africa ( n  = 77, 35%) and southern Africa ( n  = 82, 38%). Half (50%) of the facilities were in urban areas, 17% peri-urban and 33% rural settings. Insufficient data disaggregation and outcomes monitoring were critical issues. A quarter of facilities did not have a working definition of adolescence. Facilities reported non-adherence as their key challenge in adolescent service provision, but had insufficient protocols for determining and managing poor adherence and loss to follow-up. Adherence counselling focused on implications of non-adherence rather than its drivers. Facilities recommended peer support as an effective adherence and retention intervention, yet not all offered these services. Almost two-thirds reported attending to adolescents with adults and/or children, and half had no transitioning protocols. Of those with transitioning protocols, 21% moved pregnant adolescents into adult services earlier than their peers. There was limited sexual and reproductive health integration, with 63% of facilities offering these services within their HIV programmes and 46% catering to the special needs of HIV-infected pregnant adolescents. Results indicate that providers are challenged by adolescent adherence and reflect an insufficiently targeted approach for adolescents. Guidance on standard definitions for adherence, retention and counselling approaches is needed. Peer support may create an enabling environment and sensitize personnel. Service delivery gaps should be addressed, with standardized transition and quality counselling. Integrated, comprehensive sexual reproductive health services are needed, with support for pregnant adolescents.

  10. Leaving machismo behind.

    PubMed

    Eschen, A; Castano, F

    1999-01-01

    A study, which was conducted in Colombia's five largest cities, determined men's, women's, and health care provider's knowledge, attitudes, and needs regarding sexual and reproductive health services for men. Data were collected through 60 focus groups, 720 surveys of service users and nonusers, 45 interviews with health care staff, and 5 couple's life histories. The study found that, due to the inadequate service facilities offered to men, it was difficult for men to achieve the goal of being responsible about their own and their partner's sexual and reproductive health. Only 9 of the 14 health care facilities surveyed rendered services such as vasectomy, health care promotion or prevention, and educational programs aimed at men. According to providers, one reason for lack of services is the low utilization rate even if such services are available. In addition, existing services focus on disease management rather than preventive protocols. The AVSC will work with health care facilities, the Ministry of Health, and health insurance companies in establishing sexual and reproductive health services for men in Bogota, Cali, and Medellin.

  11. The anti-human trafficking collaboration model and serving victims: Providers' perspectives on the impact and experience.

    PubMed

    Kim, Hea-Won; Park, Taekyung; Quiring, Stephanie; Barrett, Diana

    2018-01-01

    A coalition model is often used to serve victims of human trafficking but little is known about whether the model is adequately meeting the needs of the victims. The purpose of this study was to examine anti-human trafficking collaboration model in terms of its impact and the collaborative experience, including challenges and lessons learned from the service providers' perspective. Mixed methods study was conducted to evaluate the impact of a citywide anti-trafficking coalition model from the providers' perspectives. Web-based survey was administered with service providers (n = 32) and focus groups were conducted with Core Group members (n = 10). Providers reported the coalition model has made important impacts in the community by increasing coordination among the key agencies, law enforcement, and service providers and improving quality of service provision. Providers identified the improved and expanded partnerships among coalition members as the key contributing factor to the success of the coalition model. Several key strategies were suggested to improve the coalition model: improved referral tracking, key partner and protocol development, and information sharing.

  12. 78 FR 76097 - Request for Comment on Petition Filed by Sprint Corporation for Reconsideration of Certain Rules...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...

  13. 47 CFR 54.500 - Terms and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and state agencies that provides free or reduced price lunches to economically disadvantaged children... Management and Budget is eligible for a free lunch. (j) Pre-discount price. The “pre-discount price” means... service such as cellular, interconnected voice over Internet protocol (VoIP), and the circuit capacity...

  14. How To: Be VoIP-Savvy

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2005-01-01

    Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…

  15. Katimavik Out-Trip Protocol.

    ERIC Educational Resources Information Center

    OPCAN, Montreal (Quebec).

    A supplement to the active leisure learning student manual for Katimavik (the 9-month volunteer community service and experiential learning program for 17-21 year old Canadians) provides in greater detail the procedure for preparing and implementing the Outdoor Wilderness Trip. Sections presented are definition of terms, national training,…

  16. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  17. A data-rich recruitment core to support translational clinical research.

    PubMed

    Kost, Rhonda G; Corregano, Lauren M; Rainer, Tyler-Lauren; Melendez, Caroline; Coller, Barry S

    2015-04-01

    Underenrollment of clinical studies wastes resources and delays assessment of research discoveries. We describe the organization and impact of a centralized recruitment core delivering comprehensive recruitment support to investigators. The Rockefeller University Center for Clinical and Translational Science supports a centralized recruitment core, call center, Research Volunteer Repository, data infrastructure, and staff who provide expert recruitment services to investigators. During protocol development, consultations aim to optimize enrollment feasibility, develop recruitment strategy, budget, and advertising. Services during study conduct include advertising placement, repository queries, call management, prescreening, referral, and visit scheduling. Utilization and recruitment outcomes are tracked using dedicated software. For protocols receiving recruitment services during 2009-2013: median time from initiation of recruitment to the first enrolled participant was 10 days; of 4,047 first-time callers to the call center, 92% (n = 3,722) enrolled in the Research Volunteer Repository, with 99% retention; 23% of Repository enrollees subsequently enrolled in ≥1 research studies, with 89% retention. Of volunteers referred by repository queries, 49% (280/537) enrolled into the study, with 92% retained. Provision of robust recruitment infrastructure including expertise, a volunteer repository, data capture and real-time analysis accelerates protocol accrual. Application of recruitment science improves the quality of clinical investigation. © 2014 Wiley Periodicals, Inc.

  18. A Data‐Rich Recruitment Core to Support Translational Clinical Research

    PubMed Central

    Corregano, Lauren M.; Rainer, Tyler‐Lauren; Melendez, Caroline; Coller, Barry S.

    2014-01-01

    Abstract Background Underenrollment of clinical studies wastes resources and delays assessment of research discoveries. We describe the organization and impact of a centralized recruitment core delivering comprehensive recruitment support to investigators. Methods The Rockefeller University Center for Clinical and Translational Science supports a centralized recruitment core, call center, Research Volunteer Repository, data infrastructure, and staff who provide expert recruitment services to investigators. During protocol development, consultations aim to optimize enrollment feasibility, develop recruitment strategy, budget, and advertising. Services during study conduct include advertising placement, repository queries, call management, prescreening, referral, and visit scheduling. Utilization and recruitment outcomes are tracked using dedicated software. Results For protocols receiving recruitment services during 2009–2013: median time from initiation of recruitment to the first enrolled participant was 10 days; of 4,047 first‐time callers to the call center, 92% (n = 3,722) enrolled in the Research Volunteer Repository, with 99% retention; 23% of Repository enrollees subsequently enrolled in ≥1 research studies, with 89% retention. Of volunteers referred by repository queries, 49% (280/537) enrolled into the study, with 92% retained. Conclusions Provision of robust recruitment infrastructure including expertise, a volunteer repository, data capture and real‐time analysis accelerates protocol accrual. Application of recruitment science improves the quality of clinical investigation. PMID:25381717

  19. Distributed Multi-interface Catalogue for Geospatial Data

    NASA Astrophysics Data System (ADS)

    Nativi, S.; Bigagli, L.; Mazzetti, P.; Mattia, U.; Boldrini, E.

    2007-12-01

    Several geosciences communities (e.g. atmospheric science, oceanography, hydrology) have developed tailored data and metadata models and service protocol specifications for enabling online data discovery, inventory, evaluation, access and download. These specifications are conceived either profiling geospatial information standards or extending the well-accepted geosciences data models and protocols in order to capture more semantics. These artifacts have generated a set of related catalog -and inventory services- characterizing different communities, initiatives and projects. In fact, these geospatial data catalogs are discovery and access systems that use metadata as the target for query on geospatial information. The indexed and searchable metadata provide a disciplined vocabulary against which intelligent geospatial search can be performed within or among communities. There exists a clear need to conceive and achieve solutions to implement interoperability among geosciences communities, in the context of the more general geospatial information interoperability framework. Such solutions should provide search and access capabilities across catalogs, inventory lists and their registered resources. Thus, the development of catalog clearinghouse solutions is a near-term challenge in support of fully functional and useful infrastructures for spatial data (e.g. INSPIRE, GMES, NSDI, GEOSS). This implies the implementation of components for query distribution and virtual resource aggregation. These solutions must implement distributed discovery functionalities in an heterogeneous environment, requiring metadata profiles harmonization as well as protocol adaptation and mediation. We present a catalog clearinghouse solution for the interoperability of several well-known cataloguing systems (e.g. OGC CSW, THREDDS catalog and data services). The solution implements consistent resource discovery and evaluation over a dynamic federation of several well-known cataloguing and inventory systems. Prominent features include: 1)Support to distributed queries over a hierarchical data model, supporting incremental queries (i.e. query over collections, to be subsequently refined) and opaque/translucent chaining; 2)Support to several client protocols, through a compound front-end interface module. This allows to accommodate a (growing) number of cataloguing standards, or profiles thereof, including the OGC CSW interface, ebRIM Application Profile (for Core ISO Metadata and other data models), and the ISO Application Profile. The presented catalog clearinghouse supports both the opaque and translucent pattern for service chaining. In fact, the clearinghouse catalog may be configured either to completely hide the underlying federated services or to provide clients with services information. In both cases, the clearinghouse solution presents a higher level interface (i.e. OGC CSW) which harmonizes multiple lower level services (e.g. OGC CSW, WMS and WCS, THREDDS, etc.), and handles all control and interaction with them. In the translucent case, client has the option to directly access the lower level services (e.g. to improve performances). In the GEOSS context, the solution has been experimented both as a stand-alone user application and as a service framework. The first scenario allows a user to download a multi-platform client software and query a federation of cataloguing systems, that he can customize at will. The second scenario support server-side deployment and can be flexibly adapted to several use-cases, such as intranet proxy, catalog broker, etc.

  20. Personalised Hip Therapy: development of a non-operative protocol to treat femoroacetabular impingement syndrome in the FASHIoN randomised controlled trial

    PubMed Central

    Wall, Peter DH; Dickenson, Edward J; Robinson, David; Hughes, Ivor; Realpe, Alba; Hobson, Rachel; Griffin, Damian R; Foster, Nadine E

    2016-01-01

    Introduction Femoroacetabular impingement (FAI) syndrome is increasingly recognised as a cause of hip pain. As part of the design of a randomised controlled trial (RCT) of arthroscopic surgery for FAI syndrome, we developed a protocol for non-operative care and evaluated its feasibility. Methods In phase one, we developed a protocol for non-operative care for FAI in the UK National Health Service (NHS), through a process of systematic review and consensus gathering. In phase two, the protocol was tested in an internal pilot RCT for protocol adherence and adverse events. Results The final protocol, called Personalised Hip Therapy (PHT), consists of four core components led by physiotherapists: detailed patient assessment, education and advice, help with pain relief and an exercise-based programme that is individualised, supervised and progressed over time. PHT is delivered over 12–26 weeks in 6–10 physiotherapist-patient contacts, supplemented by a home exercise programme. In the pilot RCT, 42 patients were recruited and 21 randomised to PHT. Review of treatment case report forms, completed by physiotherapists, showed that 13 patients (62%) received treatment that had closely followed the PHT protocol. 13 patients reported some muscle soreness at 6 weeks, but there were no serious adverse events. Conclusion PHT provides a structure for the non-operative care of FAI and offers guidance to clinicians and researchers in an evolving area with limited evidence. PHT was deliverable within the National Health Service, is safe, and now forms the comparator to arthroscopic surgery in the UK FASHIoN trial (ISRCTN64081839). Trial registration number ISRCTN 09754699. PMID:27629405

  1. The NIST Internet time service

    NASA Astrophysics Data System (ADS)

    Levine, Judah

    1994-05-01

    We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.

  2. The NIST Internet time service

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1994-01-01

    We will describe the NIST Network Time Service which provides time and frequency information over the Internet. Our first time server is located in Boulder, Colorado, a second backup server is under construction there, and we plan to install a third server on the East Coast later this year. The servers are synchronized to UTC(NIST) with an uncertainty of about 0.8 ms RMS and they will respond to time requests from any client on the Internet in several different formats including the DAYTIME, TIME and NTP protocols. The DAYTIME and TIME protocols are the easiest to use and are suitable for providing time to PC's and other small computers. In addition to UTC(NIST), the DAYTIME message provides advance notice of leap seconds and of the transitions to and from Daylight Saving Time. The Daylight Saving Time notice is based on the US transition dates of the first Sunday in April and the last one in October. The NTP is a more complex protocol that is suitable for larger machines; it is normally run as a 'daemon' process in the background and can keep the time of the client to within a few milliseconds of UTC(NIST). We will describe the operating principles of various kinds of client software ranging from a simple program that queries the server once and sets the local clock to more complex 'daemon' processes (such as NTP) that continuously correct the time of the local clock based on periodic calibrations.

  3. An Advanced Orbiting Systems Approach to Quality of Service in Space-Based Intelligent Communication Networks

    NASA Technical Reports Server (NTRS)

    Riha, Andrew P.

    2005-01-01

    As humans and robotic technologies are deployed in future constellation systems, differing traffic services will arise, e.g., realtime and non-realtime. In order to provide a quality of service framework that would allow humans and robotic technologies to interoperate over a wide and dynamic range of interactions, a method of classifying data as realtime or non-realtime is needed. In our paper, we present an approach that leverages the Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) data link protocol. Specifically, we redefine the AOS Transfer Frame Replay Flag in order to provide an automated store-and-forward approach on a per-service basis for use in the next-generation Interplanetary Network. In addition to addressing the problem of intermittent connectivity and associated services, we propose a follow-on methodology for prioritizing data through further modification of the AOS Transfer Frame.

  4. SOAP based web services and their future role in VO projects

    NASA Astrophysics Data System (ADS)

    Topf, F.; Jacquey, C.; Génot, V.; Cecconi, B.; André, N.; Zhang, T. L.; Kallio, E.; Lammer, H.; Facsko, G.; Stöckler, R.; Khodachenko, M.

    2011-10-01

    Modern state-of-the-art web services are from crucial importance for the interoperability of different VO tools existing in the planetary community. SOAP based web services assure the interconnectability between different data sources and tools by providing a common protocol for communication. This paper will point out a best practice approach with the Automated Multi-Dataset Analysis Tool (AMDA) developed by CDPP, Toulouse and the provision of VEX/MAG data from a remote database located at IWF, Graz. Furthermore a new FP7 project IMPEx will be introduced with a potential usage example of AMDA web services in conjunction with simulation models.

  5. Transport Protocols for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Eddie Law, K. L.

    Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.

  6. Probabilistic direct counterfactual quantum communication

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng

    2017-02-01

    It is striking that the quantum Zeno effect can be used to launch a direct counterfactual communication between two spatially separated parties, Alice and Bob. So far, existing protocols of this type only provide a deterministic counterfactual communication service. However, this counterfactuality should be payed at a price. Firstly, the transmission time is much longer than a classical transmission costs. Secondly, the chained-cycle structure makes them more sensitive to channel noises. Here, we extend the idea of counterfactual communication, and present a probabilistic-counterfactual quantum communication protocol, which is proved to have advantages over the deterministic ones. Moreover, the presented protocol could evolve to a deterministic one solely by adjusting the parameters of the beam splitters. Project supported by the National Natural Science Foundation of China (Grant No. 61300203).

  7. A developmental, biopsychosocial model for the treatment of children with gender identity disorder.

    PubMed

    Zucker, Kenneth J; Wood, Hayley; Singh, Devita; Bradley, Susan J

    2012-01-01

    This article provides a summary of the therapeutic model and approach used in the Gender Identity Service at the Centre for Addiction and Mental Health in Toronto. The authors describe their assessment protocol, describe their current multifactorial case formulation model, including a strong emphasis on developmental factors, and provide clinical examples of how the model is used in the treatment.

  8. The Defense Message System and the U.S. Coast Guard

    DTIC Science & Technology

    1992-06-01

    these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN

  9. Internet Resources on Aging: Parts of the Internet.

    ERIC Educational Resources Information Center

    Post, Joyce A.

    1996-01-01

    Provides a brief history of the Internet and a listing of various resources on aging that can be obtained through the Internet. Components of the Internet discussed are electronic-mail applications (listservs, USENET Newsgroups, Bulletin Board Systems, Freenets, and Commercial Services); File Transfer Protocol; Telnet/Remote Login; Gophers; Wide…

  10. Evaluating an extended rehabilitation service for stroke patients (EXTRAS): study protocol for a randomised controlled trial.

    PubMed

    Rodgers, Helen; Shaw, Lisa; Cant, Robin; Drummond, Avril; Ford, Gary A; Forster, Anne; Hills, Katie; Howel, Denise; Laverty, Anne-Marie; McKevitt, Christopher; McMeekin, Peter; Price, Christopher

    2015-05-05

    Development of longer term stroke rehabilitation services is limited by lack of evidence of effectiveness for specific interventions and service models. We describe the protocol for a multicentre randomised controlled trial which is evaluating an extended stroke rehabilitation service. The extended service commences when routine 'organised stroke care' (stroke unit and early supported discharge (ESD)) ends. This study is a multicentre randomised controlled trial with health economic and process evaluations. It is set within NHS stroke services which provide ESD. Participants are adults who have experienced a new stroke (and carer if appropriate), discharged from hospital under the care of an ESD team. The intervention group receives an extended stroke rehabilitation service provided for 18 months following completion of ESD. The extended rehabilitation service involves regular contact with a senior ESD team member who leads and coordinates further rehabilitation. Contact is usually by telephone. The control group receives usual stroke care post-ESD. Usual care may involve referral of patients to a range of rehabilitation services upon completion of ESD in accordance with local clinical practice. Randomisation is via a central independent web-based service. The primary outcome is extended activities of daily living (Nottingham Extended Activities of Daily Living Scale) at 24 months post-randomisation. Secondary outcomes (at 12 and 24 months post-randomisation) are health status, quality of life, mood and experience of services for patients, and quality of life, experience of services and carer stress for carers. Resource use and adverse events are also collected. Outcomes are undertaken by a blinded assessor. Implementation and delivery of the extended stroke rehabilitation service will also be described. Semi-structured interviews will be conducted with a subsample of participants and staff to gain insight into perceptions and experiences of rehabilitation services delivered or received. Allowing for 25% attrition, 510 participants are needed to provide 90% power to detect a difference in mean Nottingham Extended Activities of Daily Living Scale score of 6 with a 5% significance level. The provision of longer term support for stroke survivors is currently limited. The results from this trial will inform future stroke service planning and configuration. This trial was registered with ISRCTN (identifier: ISRCTN45203373 ) on 9 August 2012.

  11. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  12. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  13. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks.

    PubMed

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-11-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.

  14. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

    PubMed Central

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-01-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285

  15. Development of a cloud-based application for the Fracture Liaison Service model of care.

    PubMed

    Holzmueller, C G; Karp, S; Zeldow, D; Lee, D B; Thompson, D A

    2016-02-01

    The aims of this study are to develop a cloud-based application of the Fracture Liaison Service for practitioners to coordinate the care of osteoporotic patients after suffering primary fractures and provide a performance feedback portal for practitioners to determine quality of care. The application provides continuity of care, improved patient outcomes, and reduced medical costs. The purpose of this study is to describe the content development and functionality of a cloud-based application to broadly deploy the Fracture Liaison Service (FLS) to coordinate post-fracture care for osteoporotic patients. The Bone Health Collaborative developed the FLS application in 2013 to support practitioners' access to information and management of patients and provide a feedback portal for practitioners to track their performance in providing quality care. A five-step protocol (identify, inform, initiate, investigate, and iterate) organized osteoporotic post-fracture care-related tasks and timelines for the application. A range of descriptive data about the patient, their medical condition, therapies and care, and current providers can be collected. Seven quality of care measures from the National Quality Forum, The Joint Commission, and the Centers for Medicare and Medicaid Services can be tracked through the application. There are five functional areas including home, tasks, measures, improvement, and data. The home, tasks, and data pages are used to enter patient information and coordinate care using the five-step protocol. Measures and improvement pages are used to enter quality measures and provide practitioners with continuous performance feedback. The application resides within a portal, running on a multitenant, private cloud-based Avedis enterprise registry platform. All data are encrypted in transit and users access the application using a password from any common web browser. The application could spread the FLS model of care across the US health care system, provide continuity of care, effectively manage osteoporotic patients, improve outcomes, and reduce medical costs.

  16. The Intersystem - Internetworking for space systems

    NASA Astrophysics Data System (ADS)

    Landauer, C.

    This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.

  17. j5 DNA assembly design automation.

    PubMed

    Hillson, Nathan J

    2014-01-01

    Modern standardized methodologies, described in detail in the previous chapters of this book, have enabled the software-automated design of optimized DNA construction protocols. This chapter describes how to design (combinatorial) scar-less DNA assembly protocols using the web-based software j5. j5 assists biomedical and biotechnological researchers construct DNA by automating the design of optimized protocols for flanking homology sequence as well as type IIS endonuclease-mediated DNA assembly methodologies. Unlike any other software tool available today, j5 designs scar-less combinatorial DNA assembly protocols, performs a cost-benefit analysis to identify which portions of an assembly process would be less expensive to outsource to a DNA synthesis service provider, and designs hierarchical DNA assembly strategies to mitigate anticipated poor assembly junction sequence performance. Software integrated with j5 add significant value to the j5 design process through graphical user-interface enhancement and downstream liquid-handling robotic laboratory automation.

  18. SSPI - Space Service Provider Infrastructure: Image Information Mining and Management Prototype for a Distributed Environment

    NASA Astrophysics Data System (ADS)

    Candela, L.; Ruggieri, G.; Giancaspro, A.

    2004-09-01

    In the sphere of "Multi-Mission Ground Segment" Italian Space Agency project, some innovative technologies such as CORBA[1], Z39.50[2], XML[3], Java[4], Java server Pages[4] and C++ has been experimented. The SSPI system (Space Service Provider Infrastructure) is the prototype of a distributed environment aimed to facilitate the access to Earth Observation (EO) data. SSPI allows to ingests, archive, consolidate, visualize and evaluate these data. Hence, SSPI is not just a database of or a data repository, but an application that by means of a set of protocols, standards and specifications provides a unified access to multi-mission EO data.

  19. Data Integration Support for Data Served in the OPeNDAP and OGC Environments

    NASA Technical Reports Server (NTRS)

    McDonald, Kenneth R.; Wharton, Stephen W. (Technical Monitor)

    2006-01-01

    NASA is coordinating a technology development project to construct a gateway between system components built upon the Open-source Project for a Network Data AcceSs Protocol (OPeNDAP) and those made available made available via interfaces specified by the Open Geospatial Consortium (OGC). This project is funded though the Advanced Collaborative Connections for Earth-Sun System Science (ACCESS) Program and is a NASA contribution to the Committee on Earth Satellites (CEOS) Working Group on Information Systems and Services (WGISS). The motivation for the project is the set of data integration needs that have been expressed by the Coordinated Enhanced Observing Period (CEOP), an international program that is addressing the study of the global water cycle. CEOP is assembling a large collection in situ and satellite data and mode1 results from a wide variety of sources covering 35 sites around the globe. The data are provided by systems based on either the OPeNDAP or OGC protocols but the research community desires access to the full range of data and associated services from a single client. This presentation will discuss the current status of the OPeNDAP/OGC Gateway Project. The project is building upon an early prototype that illustrated the feasibility of such a gateway and which was demonstrated to the CEOP science community. In its first year as an ACCESS project, the effort has been has focused on the design of the catalog and data services that will be provided by the gateway and the mappings between the metadata and services provided in the two environments.

  20. J-Plus Web Portal

    NASA Astrophysics Data System (ADS)

    Civera Lorenzo, Tamara

    2017-10-01

    Brief presentation about the J-PLUS EDR data access web portal (http://archive.cefca.es/catalogues/jplus-edr) where the different services available to retrieve images and catalogues data have been presented.J-PLUS Early Data Release (EDR) archive includes two types of data: images and dual and single catalogue data which include parameters measured from images. J-PLUS web portal offers catalogue data and images through several different online data access tools or services each suited to a particular need. The different services offered are: Coverage map Sky navigator Object visualization Image search Cone search Object list search Virtual observatory services: Simple Cone Search Simple Image Access Protocol Simple Spectral Access Protocol Table Access Protocol

  1. BioSWR – Semantic Web Services Registry for Bioinformatics

    PubMed Central

    Repchevsky, Dmitry; Gelpi, Josep Ll.

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license. PMID:25233118

  2. BioSWR--semantic web services registry for bioinformatics.

    PubMed

    Repchevsky, Dmitry; Gelpi, Josep Ll

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  3. National protocol framework for the inventory and monitoring of bees

    USGS Publications Warehouse

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative describes the history and need for the protocol framework and summarizes the basic elements of objectives, sampling design, field methods, training, data management, analysis, and reporting. The SOPs provide more detail and specific instructions for implementing the protocol framework. A central database, for managing all the resulting data is under development. We welcome use of this protocol framework by our partners, as appropriate for their bee inventory and monitoring objectives.

  4. Cool Apps: Building Cryospheric Data Applications With Standards-Based Service Oriented Architecture

    NASA Astrophysics Data System (ADS)

    Collins, J. A.; Truslove, I.; Billingsley, B. W.; Oldenburg, J.; Brodzik, M.; Lewis, S.; Liu, M.

    2012-12-01

    The National Snow and Ice Data Center (NSIDC) holds a large collection of cryospheric data, and is involved in a number of informatics research and development projects aimed at improving the discoverability and accessibility of these data. To develop high-quality software in a timely manner, we have adopted a Service-Oriented Architecture (SOA) approach for our core technical infrastructure development. Data services at NSIDC are internally exposed to other tools and applications through standards-based service interfaces. These standards include OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting), various OGC (Open Geospatial Consortium) standards including WMS (Web Map Service) and WFS (Web Feature Service), ESIP (Federation of Earth Sciences Information Partners) OpenSearch, and NSIDC-specific RESTful services. By taking a standards-based approach, we are able to use off-the-shelf tools and libraries to consume, translate and broker these data services, and thus develop applications faster. Additionally, by exposing public interfaces to these services we provide valuable data services to technical collaborators; for example, NASA Reverb (http://reverb.echo.nasa.gov) uses NSIDC's WMS services. Our latest generation of web applications consume these data services directly. The most complete example of this is the Operation IceBridge Data Portal (http://nsidc.org/icebridge/portal) which depends on many of the aforementioned services, and clearly exhibits many of the advantages of building applications atop a service-oriented architecture. This presentation outlines the architectural approach and components and open standards and protocols adopted at NSIDC, demonstrates the interactions and uses of public and internal service interfaces currently powering applications including the IceBridge Data Portal, and outlines the benefits and challenges of this approach.

  5. Virtual observatory tools and amateur radio observations supporting scientific analysis of Jupiter radio emissions

    NASA Astrophysics Data System (ADS)

    Cecconi, Baptiste; Hess, Sebastien; Le Sidaner, Pierre; Savalle, Renaud; Stéphane, Erard; Coffre, Andrée; Thétas, Emmanuel; André, Nicolas; Génot, Vincent; Thieman, Jim; Typinski, Dave; Sky, Jim; Higgins, Chuck; Imai, Masafumi

    2016-04-01

    In the frame of the preparation of the NASA/JUNO and ESA/JUICE (Jupiter Icy Moon Explorer) missions, and the development of a planetary sciences virtual observatory (VO), we are proposing a new set of tools directed to data providers as well as users, in order to ease data sharing and discovery. We will focus on ground based planetary radio observations (thus mainly Jupiter radio emissions), trying for instance to enhance the temporal coverage of jovian decametric emission. The data service we will be using is EPN-TAP, a planetary science data access protocol developed by Europlanet-VESPA (Virtual European Solar and Planetary Access). This protocol is derived from IVOA (International Virtual Observatory Alliance) standards. The Jupiter Routine Observations from the Nancay Decameter Array are already shared on the planetary science VO using this protocol, as well as data from the Iitate Low Frquency Radio Antenna, in Japan. Amateur radio data from the RadioJOVE project is also available. The attached figure shows data from those three providers. We will first introduce the VO tools and concepts of interest for the planetary radioastronomy community. We will then present the various data formats now used for such data services, as well as their associated metadata. We will finally show various prototypical tools that make use of this shared datasets.

  6. The Osseus platform: a prototype for advanced web-based distributed simulation

    NASA Astrophysics Data System (ADS)

    Franceschini, Derrick; Riecken, Mark

    2016-05-01

    Recent technological advances in web-based distributed computing and database technology have made possible a deeper and more transparent integration of some modeling and simulation applications. Despite these advances towards true integration of capabilities, disparate systems, architectures, and protocols will remain in the inventory for some time to come. These disparities present interoperability challenges for distributed modeling and simulation whether the application is training, experimentation, or analysis. Traditional approaches call for building gateways to bridge between disparate protocols and retaining interoperability specialists. Challenges in reconciling data models also persist. These challenges and their traditional mitigation approaches directly contribute to higher costs, schedule delays, and frustration for the end users. Osseus is a prototype software platform originally funded as a research project by the Defense Modeling & Simulation Coordination Office (DMSCO) to examine interoperability alternatives using modern, web-based technology and taking inspiration from the commercial sector. Osseus provides tools and services for nonexpert users to connect simulations, targeting the time and skillset needed to successfully connect disparate systems. The Osseus platform presents a web services interface to allow simulation applications to exchange data using modern techniques efficiently over Local or Wide Area Networks. Further, it provides Service Oriented Architecture capabilities such that finer granularity components such as individual models can contribute to simulation with minimal effort.

  7. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  8. A multi-service data management platform for scientific oceanographic products

    NASA Astrophysics Data System (ADS)

    D'Anca, Alessandro; Conte, Laura; Nassisi, Paola; Palazzo, Cosimo; Lecci, Rita; Cretì, Sergio; Mancini, Marco; Nuzzo, Alessandra; Mirto, Maria; Mannarini, Gianandrea; Coppini, Giovanni; Fiore, Sandro; Aloisio, Giovanni

    2017-02-01

    An efficient, secure and interoperable data platform solution has been developed in the TESSA project to provide fast navigation and access to the data stored in the data archive, as well as a standard-based metadata management support. The platform mainly targets scientific users and the situational sea awareness high-level services such as the decision support systems (DSS). These datasets are accessible through the following three main components: the Data Access Service (DAS), the Metadata Service and the Complex Data Analysis Module (CDAM). The DAS allows access to data stored in the archive by providing interfaces for different protocols and services for downloading, variables selection, data subsetting or map generation. Metadata Service is the heart of the information system of the TESSA products and completes the overall infrastructure for data and metadata management. This component enables data search and discovery and addresses interoperability by exploiting widely adopted standards for geospatial data. Finally, the CDAM represents the back-end of the TESSA DSS by performing on-demand complex data analysis tasks.

  9. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  10. Proceedings of the Fifth International Mobile Satellite Conference 1997

    NASA Technical Reports Server (NTRS)

    Jedrey, T. (Compiler); Rigley, J. (Compiler); Anderson, Louise (Editor)

    1997-01-01

    Satellite-based mobile communications systems provide voice and data communications to users over a vast geographic area. The users may communicate via mobile or hand-held terminals, which may also provide access to terrestrial communications services. While previous International Mobile Satellite Conferences have concentrated on technical advances and the increasing worldwide commercial activities, this conference focuses on the next generation of mobile satellite services. The approximately 80 papers included here cover sessions in the following areas: networking and protocols; code division multiple access technologies; demand, economics and technology issues; current and planned systems; propagation; terminal technology; modulation and coding advances; spacecraft technology; advanced systems; and applications and experiments.

  11. Advanced radiology information system.

    PubMed

    Kolovou, L; Vatousi, M; Lymperopoulos, D; Koukias, M

    2005-01-01

    The innovative features of an advanced Radiology Information System (RIS) are presented in this paper. The interoperability of RIS with the other Intra-hospital Information Systems that interacts with, dealing with the compatibility and open architecture issues, are accomplished by two novel mechanisms [1]. The first one is the particular message handling system that is applied for the exchange of information, according to the Health Level Seven (HL7) protocol's specifications and serves the transfer of medical and administrative data among the RIS applications and data store unit. The same mechanism allows the secure and HL7-compatible interactions with the Hospital Information System (HIS) too. The second one implements the translation of information between the formats that HL7 and Digital Imaging and Communication in Medicine (DICOM) protocols specify, providing the communication between RIS and Picture and Archive Communication System (PACS). The whole structure ensures the automation of the every-day procedures that the ;medical protocol' specifies and provides its services through a friendly and easy to manage graphical user interface.

  12. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks

    PubMed Central

    2017-01-01

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633

  13. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    PubMed

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  14. Northern goshawk inventory and monitoring technical guide

    Treesearch

    B. Woodbridge; C.D. Hargis

    2006-01-01

    This technical guide provides information on all aspects of inventory and monitoring related to the northern goshawk (Accipiter gentilis) and is to be used by the U.S. Department of Agriculture (USDA) Forest Service consistent with national direction, local priorities, and available funding, and also by interested partners and collaborators. When the protocols...

  15. National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-01-01

    execution of that budget. The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  16. 75 FR 39017 - Pilot Corporation, Propeller Corp., and Flying J Inc.; Analysis of Proposed Agreement Containing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... restaurants, shower facilities, internet access, and financial services for drivers. Four travel center... for assuring that the firewall protocols are met. B. Continued Operation of Restaurants The Order also provides for the continuity of operation at Wendy's restaurants affiliated with the sites acquired by Love...

  17. Why You Should Establish a Connection to the Internet.

    ERIC Educational Resources Information Center

    Hill, Judy A.; Misic, Mark M.

    1996-01-01

    Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…

  18. Raising the Degree of Service-Orientation of a SOA-based Software System: A Case Study

    DTIC Science & Technology

    2009-12-01

    protocols, as well as executable processes that can be compiled into runtime scripts” [2] The Business Process Modeling Notation ( BPMN ) provides a...Notation ( BPMN ) 1.2. Jan. 2009. URL: http://www.omg.org/spec/ BPMN /1.2/ [25] .NET Framework Developer Center. .NET Remoting Overview. 2003. URL: http

  19. By-Laws | Center for Cancer Research

    Cancer.gov

    The NIH Fellows Editorial Board (FEB) offers a free and confidential editorial service for NIH fellows. The Board members edit manuscripts, abstracts, book chapters, clinical protocols, and grant submissions and offer suggestions for grammar, structure, and style, but not for scientific content. The Board provides valuable training and editorial experience to its members for

  20. A protocol for a pragmatic randomized controlled trial evaluating outcomes of emergency nurse practitioner service.

    PubMed

    Jennings, Natasha; Gardner, Glenn; O'Reilly, Gerard

    2014-09-01

    To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Pragmatic randomized controlled trial at one site with 260 participants. This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce. Trial registration details: Australian and New Zealand Clinical Trials Registry dated 18th August 2013, ACTRN12613000933752. © 2014 John Wiley & Sons Ltd.

  1. Enterprise Considerations for Ports and Protocols

    DTIC Science & Technology

    2016-10-21

    selected communications. These protocols are restricted to specific ports or addresses in the receiving web service. HTTPS is familiarly restricted...in use by the web services and applications that are connected to the network are required for interoperability and security. Policies specify the...network or reside at the end-points (i.e., web services or clients). ____________________________ Manuscript received June 1, 2016; revised July

  2. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  3. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  4. Sensor Alerting Capability

    NASA Astrophysics Data System (ADS)

    Henriksson, Jakob; Bermudez, Luis; Satapathy, Goutam

    2013-04-01

    There is a large amount of sensor data generated today by various sensors, from in-situ buoys to mobile underwater gliders. Providing sensor data to the users through standardized services, language and data model is the promise of OGC's Sensor Web Enablement (SWE) initiative. As the amount of data grows it is becoming difficult for data providers, planners and managers to ensure reliability of data and services and to monitor critical data changes. Intelligent Automation Inc. (IAI) is developing a net-centric alerting capability to address these issues. The capability is built on Sensor Observation Services (SOSs), which is used to collect and monitor sensor data. The alerts can be configured at the service level and at the sensor data level. For example it can alert for irregular data delivery events or a geo-temporal statistic of sensor data crossing a preset threshold. The capability provides multiple delivery mechanisms and protocols, including traditional techniques such as email and RSS. With this capability decision makers can monitor their assets and data streams, correct failures or be alerted about a coming phenomena.

  5. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    NASA Astrophysics Data System (ADS)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  6. Physician Assistant/Sr. Nurse Practitioner | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides quality Physician Assistant and/or Nurse Practitioner clinical research services in support of the Urologic Oncology Branch (UOB), National Cancer Institute’s (NCI’s), Center for Cancer Research (CCR). KEY ROLES/RESPONSIBILITIES - THIS POSITION IS CONTINGENT UPON FUNDING APPROVAL The Physician Extender: Provides clinical care in collaboration with physicians and health care professionals. Performs a comprehensive physical assessment and documents findings in the appropriate format following institutional and protocol standards. Assesses the patient's general health status through observation and the use of appropriate screening procedures. Acquires patient data through health history taking that includes family history and significant social information. Explains the care management/discharge plan to all members of the covering team (inpatient NPs, attendings) at sign-out. Provides teaching and guidance related to the patient's current state of health and understanding of his/her disease to promote optimal performance. Coordinates study enrollment, collaborates with nursing staff to provide protocol treatment, and provides follow-up care for patients participating in clinical trials. Assists the Principal Investigator (PI) in assuring informed consent forms have been signed, obtaining written consent for treatment, pharmacokinetics, and assessing patients on the study for complications. Calculates the dose of and prescribes chemotherapy, investigational agents, medications, intravenous fluids and blood products according to established protocol, institutional, and practice guidelines. Provides guidance in the management of specific problems for the patient resulting from chemotherapy, immunotherapy or other treatments. Manages appropriate referrals to other specialists as indicated. Screens new patient calls and provides phone triage for active patients. Orders radiological studies, following protocols and patient care guidelines. Orders and interprets lab studies. Attends new patient consultations with the patient and family for the purpose of explaining the diagnosis, protocol, and treatment program, and establishing a rapport. Completes initial and follow-up assessment(s), progress notes and written correspondence to multidisciplinary personnel. Serves as a clinical liaison to area hospices and/or home care agencies as needed or as appropriate. Acts as a clinical liaison between inpatient and outpatient nurses in order to provide continuity of care to the hospitalized patient. Maintains documented evidence of weekly case review with the collaborating physician. Attends and participates in multidisciplinary meetings. Practices within boundaries established by the Nurse Practice Act, State of Maryland and Medical Board of the Clinical Center. Liaises with Leidos Biomed and various NCI staff to initiate and complete tasks relating to medicine and clinical protocols, and all activities related to nursing. Performs clinical data recording and medical chart entries. Dictates admission and discharge summaries. This position is located in Bethesda, Maryland.

  7. A qualitative description of service providers' experiences of ethical issues in HIV care.

    PubMed

    Sabone, Motshedisi B; Mogobe, Keitshokile Dintle; Matshediso, Ellah; Shaibu, Sheila; Ntsayagae, Esther I; Corless, Inge B; Cuca, Yvette P; Holzemer, William L; Dawson-Rose, Carol; Baez, Solymar S Soliz; Rivero-Mendz, Marta; Webel, Allison R; Eller, Lucille Sanzero; Reid, Paula; Johnson, Mallory O; Kemppainen, Jeanne; Reyes, Darcel; Nokes, Kathleen; Wantland, Dean; Nicholas, Patrice K; Lingren, Teri; Portillo, Carmen J; Sefcik, Elizabeth; Long-Middleton, Ellen

    2018-01-01

    Managing HIV treatment is a complex multi-dimensional task because of a combination of factors such as stigma and discrimination of some populations who frequently get infected with HIV. In addition, patient-provider encounters have become increasingly multicultural, making effective communication and provision of ethically sound care a challenge. This article explores ethical issues that health service providers in the United States and Botswana encountered in their interaction with patients in HIV care. A descriptive qualitative design was used to collect data from health service providers and patients using focused group discussions. This article is based on responses from health service providers only. Participants and context: This article is based on 11 focused group discussions with a total sample of 71 service providers in seven US sites and one Botswana site. Ethical considerations: Ethical review boards at all the study sites reviewed the study protocol and approved it. Ethical review boards of the study's coordinating centers, Rutgers University and the University of California at San Francisco, also approved it. The study participants provided a written informed consent to participate. HIV service providers encountered ethical challenges in all the four Beauchamp and Childress' biomedical ethics of respect for patients' autonomy, beneficence, justice, and nonmaleficence. The finding that HIV service providers encounter ethical challenges in their interaction with patients is supported by prior studies. The ethical challenges are particularly prominent in multicultural care and resource-constrained care environments. Provision of HIV care is fraught with ethical challenges that tend to pose different issues depending on a given care environment. It is important that strong partnerships are developed among key stakeholders in HIV care. In addition, health service providers need to be provided with resources so they can provide quality and ethically sound care.

  8. Enhanced Multi-Modal Access to Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Lamarra, Norm; Doyle, Richard; Wyatt, Jay

    2003-01-01

    Tomorrow's Interplanetary Network (IPN) will evolve from JPL's Deep-Space Network (DSN) and provide key capabilities to future investigators, such as simplified acquisition of higher-quality science at remote sites and enriched access to these sites. These capabilities could also be used to foster public interest, e.g., by making it possible for students to explore these environments personally, eventually perhaps interacting with a virtual world whose models could be populated by data obtained continuously from the IPN. Our paper looks at JPL's approach to making this evolution happen, starting from improved communications. Evolving space protocols (e.g., today's CCSDS proximity and file-transfer protocols) will provide the underpinning of such communications in the next decades, just as today's rich web was enabled by progress in Internet Protocols starting from the early 1970's (ARPAnet research). A key architectural thrust of this effort is to deploy persistent infrastructure incrementally, using a layered service model, where later higher-layer capabilities (such as adaptive science planning) are enabled by earlier lower-layer services (such as automated routing of object-based messages). In practice, there is also a mind shift needed from an engineering culture raised on point-to-point single-function communications (command uplink, telemetry downlink), to one in which assets are only indirectly accessed, via well-defined interfaces. We are aiming to foster a 'community of access' both among space assets and the humans who control them. This enables appropriate (perhaps eventually optimized) sharing of services and resources to the greater benefit of all participants. We envision such usage to be as automated in the future as using a cell phone is today - with all the steps in creating the real-time link being automated.

  9. Smart radio: spectrum access for first responders

    NASA Astrophysics Data System (ADS)

    Silvius, Mark D.; Ge, Feng; Young, Alex; MacKenzie, Allen B.; Bostian, Charles W.

    2008-04-01

    This paper details the Wireless at Virginia Tech Center for Wireless Telecommunications' (CWT) design and implementation of its Smart Radio (SR) communication platform. The CWT SR can identify available spectrum within a pre-defined band, rendezvous with an intended receiver, and transmit voice and data using a selected quality of service (QoS). This system builds upon previous cognitive technologies developed by CWT for the public safety community, with the goal of providing a prototype mobile communications package for military and public safety First Responders. A master control (MC) enables spectrum awareness by characterizing the radio environment with a power spectrum sensor and an innovative signal detection and classification module. The MC also enables spectrum and signal memory by storing sensor results in a knowledge database. By utilizing a family radio service (FRS) waveform database, the CWT SR can create a new communication link on any designated FRS channel frequency using FM, BPSK, QPSK, or 8PSK modulations. With FM, it supports analog voice communications with legacy hand-held FRS radios. With digital modulations, it supports IP data services, including a CWT developed CVSD-based VoIP protocol. The CWT SR coordinates spectrum sharing between analog primary users and digital secondary users by applying a simple but effective channel-change protocol. It also demonstrates a novel rendezvous protocol to facilitate the detection and initialization of communications links with neighboring SR nodes through the transmission of frequency-hopped rendezvous beacons. By leveraging the GNU Radio toolkit, writing key modules entirely in Python, and utilizing the USRP hardware front-end, the CWT SR provides a dynamic spectrum test bed for future smart and cognitive radio research.

  10. Impact of live medication therapy management on cholesterol values in patients with cardiovascular disease.

    PubMed

    Thumar, Ricky; Zaiken, Kathy

    2014-01-01

    To compare the impact of clinical pharmacist (CP) recommendations through a live, primary care-based, medication therapy management (MTM) protocol on low-density-lipoprotein (LDL) cholesterol in patients who have cardiovascular disease (CVD) with standard, chart-review MTM. Patients with established CVD who were not at their LDL goal were identified and analyzed by either a chart-review MTM service or a live, one-on-one pharmacist-physician MTM service over a 6-month timeframe. For the chart-review MTM service, recommendations were communicated through an electronic medical record (EMR) that the physician and pharmacist had access to. Primary outcomes included mean LDL reduction from baseline, number of patients achieving their LDL goal, and percent of implemented CP recommendations. Mean LDL reduction from baseline in the chart-review MTM group and the live MTM group was 36 mg/dL ± 23.2 mg/dL (P = 0.001) and 62 mg/dL ± 28.3 mg/dL (P = 0.001), respectively. The difference between these two groups was statistically significant (P = 0.001). The chart-review MTM group had 30% of patients reach their LDL goal with 66.3% of CP recommendations implemented compared to 51.3% and 86.3% for the same parameters in the live MTM group (P = 0.006 and P = 0.003, respectively). Although both MTM services provide a significant LDL reduction from baseline in patients with CVD, live MTM provides significantly greater LDL reductions, implemented CP recommendations, and goal attainment than chart-review MTM. Thus, live MTM services are more effective than chart-review MTM services, at least within the clinics that these protocols were assessed for the purposes of this study.

  11. Interoperability through standardization: Electronic mail, and X Window systems

    NASA Technical Reports Server (NTRS)

    Amin, Ashok T.

    1993-01-01

    Since the introduction of computing machines, there has been continual advances in computer and communication technologies and approaching limits. The user interface has evolved from a row of switches, character based interface using teletype terminals and then video terminals, to present day graphical user interface. It is expected that next significant advances will come in the availability of services, such as electronic mail and directory services, as the standards for applications are developed and in the 'easy to use' interfaces, such as Graphical User Interface for example Window and X Window, which are being standardized. Various proprietary electronic mail (email) systems are in use within organizations at each center of NASA. Each system provides email services to users within an organization, however the support for email services across organizations and across centers exists at centers to a varying degree and is often easy to use. A recent NASA email initiative is intended 'to provide a simple way to send email across organizational boundaries without disruption of installed base.' The initiative calls for integration of existing organizational email systems through gateways connected by a message switch, supporting X.400 and SMTP protocols, to create a NASA wide email system and for implementation of NASA wide email directory services based on OSI standard X.500. A brief overview of MSFC efforts as a part of this initiative are described. Window based graphical user interfaces make computers easy to use. X window protocol has been developed at Massachusetts Institute of Technology in 1984/1985 to provide uniform window based interface in a distributed computing environment with heterogenous computers. It has since become a standard supported by a number of major manufacturers. Z Windows systems, terminals and workstations, and X Window applications are becoming available. However impact of its use in the Local Area Network environment on the network traffic are not well understood. It is expected that the use of X Windows systems will increase at MSFC especially for Unix based systems. An overview of X Window protocol is presented and its impact on the network traffic is examined. It is proposed that an analytical model of X Window systems in the network environment be developed and validated through the use of measurements to generate application and user profiles.

  12. An ICT-Based Platform to Monitor Protocols in the Healthcare Environment.

    PubMed

    Rorís, Víctor M Alonso; Gago, Juan M Santos; Sabucedo, Luis Álvarez; Merino, Mateo Ramos; Valero, Javier Sanz

    2016-10-01

    Procedures from the healthcare domain involve highly critical actions as they may pose a risk for patients' life. Therefore, a large effort is devoted to the standardization in clinical praxis and to the control of quality for these protocols in order to minimize hazards. In this line, this work is compelled to provide an ICT-based support to carry out these controls in a simple and effective manner. Using a methodology based on HACCP and taking advantage of Semantic tools, a holistic platform of services for traceability and control of processes has been designed and implemented. The applied paradigm is based on the use of Control Points as singular points to generate traces using observations and measures relevant for the processes considered. Based on those, it is possible to offer services for advanced querying and knowledge inference. The local deployment just requires regular mobile phones or tablets making this solution cost-effective and easily replicable.

  13. cadcVOFS: A FUSE Based File System Layer for VOSpace

    NASA Astrophysics Data System (ADS)

    Kavelaars, J.; Dowler, P.; Jenkins, D.; Hill, N.; Damian, A.

    2012-09-01

    The CADC is now making extensive use of the VOSpace protocol for user managed storage. The VOSpace standard allows a diverse set of rich data services to be delivered to users via a simple protocol. We have recently developed the cadcVOFS, a FUSE based file-system layer for VOSpace. cadcVOFS provides a filesystem layer on-top of VOSpace so that standard Unix tools (such as ‘find’, ‘emacs’, ‘awk’ etc) can be used directly on the data objects stored in VOSpace. Once mounted the VOSpace appears as a network storage volume inside the operating system. Within the CADC Cloud Computing project (CANFAR) we have used VOSpace as the method for retrieving and storing processing inputs and products. The abstraction of storage is an important component of Cloud Computing and the high use level of our VOSpace service reflects this.

  14. The INDIGO-Datacloud Authentication and Authorization Infrastructure

    NASA Astrophysics Data System (ADS)

    Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.

    2017-10-01

    Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.

  15. Achieving QoS for TCP Traffic in Satellite Networks with Differentiated Services

    NASA Technical Reports Server (NTRS)

    Durresi, Arjan; Kota, Sastri; Goyal, Mukul; Jain, Raj; Bharani, Venkata

    2001-01-01

    Satellite networks play an indispensable role in providing global Internet access and electronic connectivity. To achieve such a global communications, provisioning of quality of service (QoS) within the advanced satellite systems is the main requirement. One of the key mechanisms of implementing the quality of service is traffic management. Traffic management becomes a crucial factor in the case of satellite network because of the limited availability of their resources. Currently, Internet Protocol (IP) only has minimal traffic management capabilities and provides best effort services. In this paper, we presented a broadband satellite network QoS model and simulated performance results. In particular, we discussed the TCP flow aggregates performance for their good behavior in the presence of competing UDP flow aggregates in the same assured forwarding. We identified several factors that affect the performance in the mixed environments and quantified their effects using a full factorial design of experiment methodology.

  16. Therapeutic emails

    PubMed Central

    Alemi, Farrokh; Haack, Mary R; Nemes, Susanna; Aughburns, Renita; Sinkule, Jennifer; Neuhauser, Duncan

    2007-01-01

    Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments), participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper. PMID:17302991

  17. Caries risk assessment tool and prevention protocol for public health nurses in mother and child health centers, Israel.

    PubMed

    Natapov, Lena; Dekel-Markovich, Dan; Granit-Palmon, Hadas; Aflalo, Efrat; Zusman, Shlomo Paul

    2018-01-01

    Dental caries is the most prevalent chronic disease in children. Caries risk assessment tools enable the dentists, physicians, and nondental health care providers to assess the individual's risk. Intervention by nurses in primary care settings can contribute to the establishment of oral health habits and prevention of dental disease. In Israel, Mother and Child Health Centers provide free preventive services for pregnant women and children by public health nurses. A caries prevention program in health centers started in 2015. Nurses underwent special training regarding caries prevention. A customized Caries Risk Assessment tool and Prevention Protocol for nurses, based on the AAPD tool, was introduced. A two-step evaluation was conducted which included a questionnaire and in-depth phone interviews. Twenty-eight (out of 46) health centers returned a completed questionnaire. Most nurses believed that oral health preventive services should be incorporated into their daily work. In the in-depth phone interviews, nurses stated that the integration of the program into their busy daily schedule was realistic and appropriate. The lack of specific dental module for computer program was mentioned as an implementation difficulty. The wide use of our tool by nurses supports its simplicity and feasibility which enables quick calculation and informed decision making. The nurses readily embraced the tool and it became an integral part of their toolkit. We provide public health nurses with a caries risk assessment tool and prevention protocol thus integrating oral health into general health of infants and toddlers. © 2017 Wiley Periodicals, Inc.

  18. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. NASA Reverb: Standards-Driven Earth Science Data and Service Discovery

    NASA Astrophysics Data System (ADS)

    Cechini, M. F.; Mitchell, A.; Pilone, D.

    2011-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) is a core capability in NASA's Earth Science Data Systems Program. NASA's EOS ClearingHOuse (ECHO) is a metadata catalog for the EOSDIS, providing a centralized catalog of data products and registry of related data services. Working closely with the EOSDIS community, the ECHO team identified a need to develop the next generation EOS data and service discovery tool. This development effort relied on the following principles: + Metadata Driven User Interface - Users should be presented with data and service discovery capabilities based on dynamic processing of metadata describing the targeted data. + Integrated Data & Service Discovery - Users should be able to discovery data and associated data services that facilitate their research objectives. + Leverage Common Standards - Users should be able to discover and invoke services that utilize common interface standards. Metadata plays a vital role facilitating data discovery and access. As data providers enhance their metadata, more advanced search capabilities become available enriching a user's search experience. Maturing metadata formats such as ISO 19115 provide the necessary depth of metadata that facilitates advanced data discovery capabilities. Data discovery and access is not limited to simply the retrieval of data granules, but is growing into the more complex discovery of data services. These services include, but are not limited to, services facilitating additional data discovery, subsetting, reformatting, and re-projecting. The discovery and invocation of these data services is made significantly simpler through the use of consistent and interoperable standards. By utilizing an adopted standard, developing standard-specific adapters can be utilized to communicate with multiple services implementing a specific protocol. The emergence of metadata standards such as ISO 19119 plays a similarly important role in discovery as the 19115 standard. After a yearlong design, development, and testing process, the ECHO team successfully released "Reverb - The Next Generation Earth Science Discovery Tool." Reverb relies heavily on the information contained in dataset and granule metadata, such as ISO 19115, to provide a dynamic experience to users based on identified search facet values extracted from science metadata. Such an approach allows users to perform cross-dataset correlation and searches, discovering additional data that they may not previously have been aware of. In addition to data discovery, Reverb users may discover services associated with their data of interest. When services utilize supported standards and/or protocols, Reverb can facilitate the invocation of both synchronous and asynchronous data processing services. This greatly enhances a users ability to discover data of interest and accomplish their research goals. Extrapolating on the current movement towards interoperable standards and an increase in available services, data service invocation and chaining will become a natural part of data discovery. Reverb is one example of a discovery tool that provides a mechanism for transforming the earth science data discovery paradigm.

  20. A Natural Language Processing-based Model to Automate MRI Brain Protocol Selection and Prioritization.

    PubMed

    Brown, Andrew D; Marotta, Thomas R

    2017-02-01

    Incorrect imaging protocol selection can contribute to increased healthcare cost and waste. To help healthcare providers improve the quality and safety of medical imaging services, we developed and evaluated three natural language processing (NLP) models to determine whether NLP techniques could be employed to aid in clinical decision support for protocoling and prioritization of magnetic resonance imaging (MRI) brain examinations. To test the feasibility of using an NLP model to support clinical decision making for MRI brain examinations, we designed three different medical imaging prediction tasks, each with a unique outcome: selecting an examination protocol, evaluating the need for contrast administration, and determining priority. We created three models for each prediction task, each using a different classification algorithm-random forest, support vector machine, or k-nearest neighbor-to predict outcomes based on the narrative clinical indications and demographic data associated with 13,982 MRI brain examinations performed from January 1, 2013 to June 30, 2015. Test datasets were used to calculate the accuracy, sensitivity and specificity, predictive values, and the area under the curve. Our optimal results show an accuracy of 82.9%, 83.0%, and 88.2% for the protocol selection, contrast administration, and prioritization tasks, respectively, demonstrating that predictive algorithms can be used to aid in clinical decision support for examination protocoling. NLP models developed from the narrative clinical information provided by referring clinicians and demographic data are feasible methods to predict the protocol and priority of MRI brain examinations. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  1. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study

    PubMed Central

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-01-01

    Introduction The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. Methods and analysis This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support–experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). Ethics and dissemination The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. PMID:28647721

  2. The Influence of Collaborative Reflection and Think-Aloud Protocols on Pre-Service Teachers' Reflection: A Mixed Methods Approach

    ERIC Educational Resources Information Center

    Epler, Cory M.; Drape, Tiffany A.; Broyles, Thomas W.; Rudd, Rick D.

    2013-01-01

    The purpose of this mixed methods study was to determine if there are differences in pre-service teachers' depth of reflection when using a written self-reflection form, a written self-reflection form and a think-aloud protocol, and collaborative reflection. Twenty-six pre-service teachers were randomly assigned to fourteen teaching teams. The…

  3. Achieving QoS for Aeronautical Telecommunication Networks Over Differentiated Services

    NASA Technical Reports Server (NTRS)

    Bai, Haowei; Atiquzzaman, Mohammed; Ivanic, William

    2001-01-01

    Aeronautical Telecommunication Network (ATN) has been developed by the International Civil Aviation Organization to integrate Air-Ground and Ground-Ground data communication for aeronautical applications into a single network serving Air Traffic Control and Aeronautical Operational Communications. To carry time critical information required for aeronautical applications, ATN provides different Quality of Services (QoS) to applications. ATN has therefore, been designed as a stand alone network which implies building an expensive separate network for ATN However, the cost of operating ATN can be reduced if it can be run over a public network such as the Internet. Although the current Internet does not provide QoS the next generation Internet is expected to provide QoS to applications. The objective of this paper is to investigate the possibility of providing QoS to ATN applications when it is run over the next generation Internet. Differentiated Services (DiffServ), one of the protocols proposed for the next generation Internet, will allow network service providers to offer different QoS to customers. Our results show that it is possible to provide QoS to ATN applications when they run over a DiffServ backbone.

  4. Achieving QoS for Aeronautical Telecommunication Networks over Differentiated Services

    NASA Technical Reports Server (NTRS)

    Bai, Haowei; Atiquzzaman, Mohammed; Ivancic, William

    2001-01-01

    Aeronautical Telecommunication Network (ATN) has been developed by the International Civil Aviation Organization to integrate Air-Ground and Ground-Ground data communication for aeronautical applications into a single network serving Air Traffic Control and Aeronautical Operational Communications. To carry time critical information required for aeronautical applications, ATN provides different Quality of Services (QoS) to applications. ATN has therefore, been designed as a standalone network which implies building an expensive separate network for ATN. However, the cost of operating ATN can be reduced if it can be run over a public network such as the Internet. Although the current Internet does not provide QoS, the next generation Internet is expected to provide QoS to applications. The objective of this paper is to investigate the possibility of providing QoS to ATN applications when it is run over the next generation Internet. Differentiated Services (DiffServ), one of the protocols proposed for the next generation Internet, will allow network service providers to offer different QoS to customers. Our results show that it is possible to provide QoS to ATN applications when they run over a DiffServ backbone.

  5. Futures of elderly care in Iran: A protocol with scenario approach.

    PubMed

    Goharinezhad, Salime; Maleki, Mohammadreza; Baradaran, Hamid Reza; Ravaghi, Hamid

    2016-01-01

    Background: The number of people aged 60 and older is increasing faster than other age groups worldwide. Iran will experience a sharp aging population increase in the next decades, and this will pose new challenges to the healthcare system. Since providing high quality aged-care services would be the major concern of the policymakers, this question arises that what types of aged care services should be organized in the coming 10 years? This protocol has been designed to develop a set of scenarios for the future of elderly care in Iran. Methods: In this study, intuitive logics approach and Global Business Network (GBN) model were used to develop scenarios for elderly care in Iran. In terms of perspective, the scenarios in this approach are normative, qualitative with respect to methodology and deductive in constructing the process of scenarios. The three phases of GBN model are as follows: 1) Orientation: Identifying strategic levels, stakeholders, participants and time horizon; 2) Exploration: Identifying the driving forces and key uncertainties; 3) Synthesis: Defining the scenario logics and constructing scenario storyline. Results: Presently, two phases are completed and the results will be published in mid-2016. Conclusion: This study delivers a comprehensive framework for taking appropriate actions in providing care for the elderly in the future. Moreover, policy makers should specify and provide the full range of services for the elderly, and in doing so, the scenarios and key findings of this study could be of valuable help.

  6. NIH Mouse Metabolic Phenotyping Centers: the power of centralized phenotyping.

    PubMed

    Laughlin, Maren R; Lloyd, K C Kent; Cline, Gary W; Wasserman, David H

    2012-10-01

    The Mouse Metabolic Phenotyping Centers (MMPCs) were founded in 2001 by the National Institutes of Health (NIH) to advance biomedical research by providing the scientific community with standardized, high-quality phenotyping services for mouse models of diabetes, obesity, and their complications. The intent is to allow researchers to take optimum advantage of the many new mouse models produced in labs and in high-throughput public efforts. The six MMPCs are located at universities around the country and perform complex metabolic tests in intact mice and hormone and analyte assays in tissues on a fee-for-service basis. Testing is subsidized by the NIH in order to reduce the barriers for mouse researchers. Although data derived from these tests belong to the researcher submitting mice or tissues, these data are archived after publication in a public database run by the MMPC Coordinating and Bioinformatics Unit. It is hoped that data from experiments performed in many mouse models of metabolic diseases, using standard protocols, will be useful in understanding the nature of these complex disorders. The current areas of expertise include energy balance and body composition, insulin action and secretion, whole-body and tissue carbohydrate and lipid metabolism, cardiovascular and renal function, and metabolic pathway kinetics. In addition to providing services, the MMPC staff provides expertise and advice to researchers, and works to develop and refine test protocols to best meet the community's needs in light of current scientific developments. Test technology is disseminated by publications and through annual courses.

  7. Building Capacity for a Long-Term, in-Situ, National-Scale Phenology Monitoring Network: Successes, Challenges and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Weltzin, J. F.; Browning, D. M.

    2014-12-01

    The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability. Network participants can leverage: (1) Standardized monitoring protocols that have been broadly vetted, tested and published; (2) A centralized National Phenology Database (NPDb) for maintaining, archiving and replicating data, with standard metadata, terms-of-use, web-services, and documentation of QA/QC, plus tools for discovery, visualization and download of raw data and derived data products; and/or (3) A national in-situ, multi-taxa phenological monitoring system, Nature's Notebook, which enables participants to observe and record phenology of plants and animals - based on the protocols and information management system (IMS) described above - via either web or mobile applications. The protocols, NPDb and IMS, and Nature's Notebook represent a hierarchy of opportunities for involvement by a broad range of interested stakeholders, from individuals to agencies. For example, some organizations have adopted (e.g., the National Ecological Observatory Network or NEON) -- or are considering adopting (e.g., the Long-Term Agroecosystems Network or LTAR) -- the USA-NPN standardized protocols, but will develop their own database and IMS with web services to promote sharing of data with the NPDb. Other organizations (e.g., the Inventory and Monitoring Programs of the National Wildlife Refuge System and the National Park Service) have elected to use Nature's Notebook to support their phenological monitoring programs. We highlight the challenges and benefits of integrating phenology monitoring within existing and emerging national monitoring networks, and showcase opportunities that exist when standardized protocols are adopted and implemented to promote data interoperability and sharing.

  8. Acute Pain Service and multimodal therapy for postsurgical pain control: evaluation of protocol efficacy.

    PubMed

    Moizo, E; Berti, M; Marchetti, C; Deni, F; Albertin, A; Muzzolon, F; Antonino, A

    2004-11-01

    The institution of a postoperative Acute Pain Control Service is mandatory to improve the control of pain induced by surgical injury. Treatment of postoperative pain may be achieved using a combination of analgesic agents and techniques, reducing the incidence of side effects owing to the lower doses of the individual drugs. In 1997 we established an Acute Pain Service (APS) at the San Raffaele Hospital in Milan. The aim of this study was to assess the efficacy and safety of our APS both in terms of treatment protocols and organisational issues. In this prospective observational study we included 592 patients undergoing abdominal, gynecological, or orthopedic surgery with severe expected pain. According to general guidelines on pain treatment, the patients were assigned to different treatment protocols based on the kind of operation. All protocols were based on the multimodal therapy, with the association of nonsteroidal anti-inflammatory drugs (NSAIDS), opioids and regional anesthesia techniques. During the first 48 h of the postoperative period we recorded vital signs, level of pain and occurrence of any side effect. Our analgesic protocols proved to be effective and safe (low incidence of side effects) for every surgery. The incidence of postoperative nausea and vomiting was higher in patients receiving patient-controlled morphine than that with continuous epidural or nerve block. After lower abdominal surgery, pain at movement at 24 h was significantly lower in the epidural group than in the Patient Control Analgesia group. Nausea and vomiting, numbness and paresthesias at the lower limbs were higher in gynecological patients. A larger percentage of orthopedic patients in the epidural group reported numbness and paresthesias at the lower limbs in comparison with patients receiving continuous peripheral nerve block. In agreement with previous literature, this study confirmed that a multimodal approach to pain treatment provides an adequate control of postoperative pain, minimizing side effects.

  9. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  10. Virtual Observatory Interfaces to the Chandra Data Archive

    NASA Astrophysics Data System (ADS)

    Tibbetts, M.; Harbo, P.; Van Stone, D.; Zografou, P.

    2014-05-01

    The Chandra Data Archive (CDA) plays a central role in the operation of the Chandra X-ray Center (CXC) by providing access to Chandra data. Proprietary interfaces have been the backbone of the CDA throughout the Chandra mission. While these interfaces continue to provide the depth and breadth of mission specific access Chandra users expect, the CXC has been adding Virtual Observatory (VO) interfaces to the Chandra proposal catalog and observation catalog. VO interfaces provide standards-based access to Chandra data through simple positional queries or more complex queries using the Astronomical Data Query Language. Recent development at the CDA has generalized our existing VO services to create a suite of services that can be configured to provide VO interfaces to any dataset. This approach uses a thin web service layer for the individual VO interfaces, a middle-tier query component which is shared among the VO interfaces for parsing, scheduling, and executing queries, and existing web services for file and data access. The CXC VO services provide Simple Cone Search (SCS), Simple Image Access (SIA), and Table Access Protocol (TAP) implementations for both the Chandra proposal and observation catalogs within the existing archive architecture. Our work with the Chandra proposal and observation catalogs, as well as additional datasets beyond the CDA, illustrates how we can provide configurable VO services to extend core archive functionality.

  11. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  12. Dental data of the Athens 2004 Olympic and Paralympic Games.

    PubMed

    Vougiouklakis, G; Tzoutzas, J; Farmakis, E-T; Farmakis, E-E; Antoniadou, M; Mitsea, A

    2008-11-01

    The Athens University, School of Dentistry, accepted the challenge to organize the Dental Health Services in the Athens 2004 Olympic and Paralympic Games in order to provide the best quality of oral health services to the athletes, coaches, escort members and Olympic Village personnel. Data from the whole activity protocol of the Athens 2004 Games Dental Health Services - the reception, admission and treatment protocols, the facilities and the infrastructure, the number of cases treated per specialty and the experience gained - were recorded. During the Olympic Games, there were more than 1400 dental cases in more than 650 patients, elite athletes, escort members, coaches and staff of the Olympic Village. Among them 313 fillings, 100 root canal therapies, 57 mouthguards and 9 dental trauma cases were treated. During the Paralympic Games, there were more than 240 dental cases in more than 220 patients. Among them 73 fillings, 12 root canal therapies, 21 extractions and 3 dental trauma cases were treated. In such events, highly trained dentists are needed and if possible, specialized in operative dentistry or endodontics. The role of team dentist seems to be of great importance.

  13. Transferring Files Between the Deep Impact Spacecrafts and the Ground Data System Using the CCSDS File Delivery Protocol (CFDP): A Case Study

    NASA Technical Reports Server (NTRS)

    Sanders, Felicia A.; Jones, Grailing, Jr.; Levesque, Michael

    2006-01-01

    The CCSDS File Delivery Protocol (CFDP) Standard could reshape ground support architectures by enabling applications to communicate over the space link using reliable-symmetric transport services. JPL utilized the CFDP standard to support the Deep Impact Mission. The architecture was based on layering the CFDP applications on top of the CCSDS Space Link Extension Services for data transport from the mission control centers to the ground stations. On July 4, 2005 at 1:52 A.M. EDT, the Deep Impact impactor successfully collided with comet Tempel 1. During the final 48 hours prior to impact, over 300 files were uplinked to the spacecraft, while over 6 thousand files were downlinked from the spacecraft using the CFDP. This paper uses the Deep Impact Mission as a case study in a discussion of the CFDP architecture, Deep Impact Mission requirements, and design for integrating the CFDP into the JPL deep space support services. Issues and recommendations for future missions using CFDP are also provided.

  14. A Multistate Asian-Language Tobacco Quitline: Addressing a Disparity in Access to Care.

    PubMed

    Cummins, Sharon E; Wong, Shiushing; Bonnevie, Erika; Lee, Hye-Ryeon; Goto, Cynthia J; McCree Carrington, Judy; Kirby, Carrie; Zhu, Shu-Hong

    2015-10-01

    We conducted a dissemination and implementation study to translate an intervention protocol for Asian-language smokers from an efficacy trial into an effective and sustainable multistate service. Three state tobacco programs (in California, Colorado, and Hawaii) promoted a multistate cessation quitline to 3 Asian-language-speaking communities: Chinese, Korean, and Vietnamese. The California quitline provided counseling centrally to facilitate implementation. Three more states joined the program during the study period (January 2010-July 2012). We assessed the provision of counseling, quitting outcomes, and dissemination of the program. A total of 2004 smokers called for the service, with 88.3% opting for counseling. Among those opting for counseling, the 6-month abstinence rate (18.8%) was similar to results of the earlier efficacy trial (16.4%). The intervention protocol, based on an efficacy trial, was successfully translated into a multistate service and further disseminated. This project paved the way for the establishment of a national quitline for Asian-language speakers, which serves as an important strategy to address disparities in access to care.

  15. Costs of providing tuberculosis diagnosis and treatment services in Viet Nam.

    PubMed

    Minh, H V; Mai, V Q; Nhung, N V; Hoi, L V; Giang, K B; Chung, L H; Kien, V D; Duyen, N T; Ngoc, N B; Anh, T T; Phuong, T B; Ngan, T T; Khanh, P H

    2017-09-01

    To estimate the cost of providing tuberculosis (TB) diagnosis and treatment packages at different levels of health facilities in Viet Nam. This was a retrospective costing study from the providers' perspective using a standard costing approach. We included typical services for TB diagnosis and treatment based on standard protocols. The least expensive TB service was the 6-month isoniazid preventive therapy regimen for latent tuberculous infection provided by district health centres (US$7.20-14.30, accounting for 0.3-0.7% of Viet Nam's per capita gross domestic product [GDP] of US$2052.30 in 2014). The cost of diagnosing and treating a patient with drug-susceptible TB (the most common type of TB) ranged between US$51.20 and US$180.70, and represented 2.5-8.8% of Viet Nam's per capita GDP in 2014. The most expensive TB service was the diagnosis and treatment of a multidrug-resistant TB case (US$1568.20-2391.20), accounting for 76.4-116.5% of Viet Nam's per capita GDP in 2014). The cost of TB diagnosis and treatment services in Viet Nam varied according to level of health facility, type of TB, different costing options, and different staff cost scenarios.

  16. Incorporating Brokers within Collaboration Environments

    NASA Astrophysics Data System (ADS)

    Rajasekar, A.; Moore, R.; de Torcy, A.

    2013-12-01

    A collaboration environment, such as the integrated Rule Oriented Data System (iRODS - http://irods.diceresearch.org), provides interoperability mechanisms for accessing storage systems, authentication systems, messaging systems, information catalogs, networks, and policy engines from a wide variety of clients. The interoperability mechanisms function as brokers, translating actions requested by clients to the protocol required by a specific technology. The iRODS data grid is used to enable collaborative research within hydrology, seismology, earth science, climate, oceanography, plant biology, astronomy, physics, and genomics disciplines. Although each domain has unique resources, data formats, semantics, and protocols, the iRODS system provides a generic framework that is capable of managing collaborative research initiatives that span multiple disciplines. Each interoperability mechanism (broker) is linked to a name space that enables unified access across the heterogeneous systems. The collaboration environment provides not only support for brokers, but also support for virtualization of name spaces for users, files, collections, storage systems, metadata, and policies. The broker enables access to data or information in a remote system using the appropriate protocol, while the collaboration environment provides a uniform naming convention for accessing and manipulating each object. Within the NSF DataNet Federation Consortium project (http://www.datafed.org), three basic types of interoperability mechanisms have been identified and applied: 1) drivers for managing manipulation at the remote resource (such as data subsetting), 2) micro-services that execute the protocol required by the remote resource, and 3) policies for controlling the execution. For example, drivers have been written for manipulating NetCDF and HDF formatted files within THREDDS servers. Micro-services have been written that manage interactions with the CUAHSI data repository, the DataONE information catalog, and the GeoBrain broker. Policies have been written that manage transfer of messages between an iRODS message queue and the Advanced Message Queuing Protocol. Examples of these brokering mechanisms will be presented. The DFC collaboration environment serves as the intermediary between community resources and compute grids, enabling reproducible data-driven research. It is possible to create an analysis workflow that retrieves data subsets from a remote server, assemble the required input files, automate the execution of the workflow, automatically track the provenance of the workflow, and share the input files, workflow, and output files. A collaborator can re-execute a shared workflow, compare results, change input files, and re-execute an analysis.

  17. Global polar geospatial information service retrieval based on search engine and ontology reasoning

    USGS Publications Warehouse

    Chen, Nengcheng; E, Dongcheng; Di, Liping; Gong, Jianya; Chen, Zeqiang

    2007-01-01

    In order to improve the access precision of polar geospatial information service on web, a new methodology for retrieving global spatial information services based on geospatial service search and ontology reasoning is proposed, the geospatial service search is implemented to find the coarse service from web, the ontology reasoning is designed to find the refined service from the coarse service. The proposed framework includes standardized distributed geospatial web services, a geospatial service search engine, an extended UDDI registry, and a multi-protocol geospatial information service client. Some key technologies addressed include service discovery based on search engine and service ontology modeling and reasoning in the Antarctic geospatial context. Finally, an Antarctica multi protocol OWS portal prototype based on the proposed methodology is introduced.

  18. Pilot study of six Colorado dental hygiene independent practices.

    PubMed

    Astroth, D B; Cross-Poline, G N

    1998-01-01

    The purpose of this pilot study was to gather demographic data about six Colorado dental hygienists who were practicing independently and their practices as well as assess productivity and service mix, evaluate structure and process, and compare the findings in these practices to those of a study of California Health Manpower Pilot Project #139. A convenience sample of six dental hygiene independent practices was studied. A 21-item survey was distributed by mail to obtain demographic and practice information. Weekly surveys tracking patient visits and services provided were completed for three months. A general office audit to evaluate structure and a record audit of 22 patient records to evaluate process were conducted during visits at each practice site. The overall responses for each phase of this study were tabulated and frequencies were calculated using the SPSS/PC+ statistical package. The dental hygienists had practiced for an average of 13 years prior to establishing their practices. Four of the six practices were office-based, one was institution-based, and one was office- and institution-based. Health history, extraoral/intraoral examination, periodontal probing, adult prophylaxis, and oral hygiene instruction were provided during a majority of patient visits. The general office audit revealed compliance with infection control, office protocols for emergency situations, and practice management protocols. The patient record audit indicated a high standard for process of care for the practice sites. The six practices revealed a variety of backgrounds among the dental hygienists and diverse practice characteristics regarding both the populations served and practice settings. The services provided were consistent with allowable services for unsupervised practice. Compliance with specific guidelines was verified during the general office and patient record audits. Consistent with the findings of California Health Manpower Pilot Project #139, the care provided by the Colorado dental hygiene independent practitioners in this study and the environment in which the care was provided do not exhibit any undue risk to the health and safety of the public.

  19. Study on Network Error Analysis and Locating based on Integrated Information Decision System

    NASA Astrophysics Data System (ADS)

    Yang, F.; Dong, Z. H.

    2017-10-01

    Integrated information decision system (IIDS) integrates multiple sub-system developed by many facilities, including almost hundred kinds of software, which provides with various services, such as email, short messages, drawing and sharing. Because the under-layer protocols are different, user standards are not unified, many errors are occurred during the stages of setup, configuration, and operation, which seriously affect the usage. Because the errors are various, which may be happened in different operation phases, stages, TCP/IP communication protocol layers, sub-system software, it is necessary to design a network error analysis and locating tool for IIDS to solve the above problems. This paper studies on network error analysis and locating based on IIDS, which provides strong theory and technology supports for the running and communicating of IIDS.

  20. Experiences with http/WebDAV protocols for data access in high throughput computing

    NASA Astrophysics Data System (ADS)

    Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier

    2011-12-01

    In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.

  1. Improving the quality of perinatal mental health: a health visitor-led protocol.

    PubMed

    Lewis, Anne; Ilot, Irene; Lekka, Chrysanthi; Oluboyede, Yemi

    2011-02-01

    The mental health of mothers is of significant concern to community practitioners. This paper reports on a case study exploring the success factors of a well established, health visitor-led protocol to identify and treat women with mild to moderate depression. Data were collected through interviews with a purposive sample of 12 community practitioners, a focus group of four health visitors and observation of a multidisciplinary steering group meeting. The protocol was described as an evidence-based tool and safety net that could be used flexibly to support clinical judgments and tailored to individual needs. Success factors included frontline clinician engagement and ownership, continuity of leadership to drive development and maintain momentum, comprehensive and on-going staff training, and strategic support for the protocol as a quality indicator at a time of organisational change. Quality and clinical leadership are continuing policy priorities. The protocol enabled frontline staff to lead a service innovation, providing a standardised multiprofessional approach to women's mental health needs through effective support, advice and treatment that can be measured and quality assured.

  2. Impact of Sleep Telemedicine Protocol in Management of Sleep Apnea: A 5-Year VA Experience.

    PubMed

    Baig, Mirza M; Antonescu-Turcu, Andrea; Ratarasarn, Kavita

    2016-05-01

    There is growing evidence that demonstrates an important role for telemedicine technologies in enhancing healthcare delivery. A comprehensive sleep telemedicine protocol was implemented at the Veterans Administration Medical Center (VAMC), Milwaukee, WI, in 2008 in an effort to improve access to sleep specialty care. The telemedicine protocol relied heavily on sleep specialist interventions based on chart review (electronic consult [e-consult]). This was done in response to long wait time for sleep clinic visits as well as delayed sleep study appointments. Since 2008 all consults are screened by sleep service to determine the next step in intervention. Based on chart review, the following steps are undertaken: (1) eligibility for portable versus in-lab sleep study is determined, and a sleep study order is placed accordingly, (2) positive airway pressure (PAP) therapy is prescribed for confirmed sleep apnea, and (3) need for in-person evaluation in the sleep clinic is determined, and the visit is scheduled. This study summarizes the 5-year trend in various aspects of access to sleep care after implementation of sleep telemedicine protocol at the Milwaukee VAMC. This is a retrospective system efficiency study. The electronic medical record was interrogated 5 years after starting the sleep telemedicine protocol to study annual trends in the following outcomes: (1) interval between sleep consult and prescription of PAP equipment, (2) total sleep consults, and (3) sleep clinic wait time. Two part-time sleep physicians provided sleep-related care at the Milwaukee VAMC between 2008 and 2012. During this period, the interval between sleep consult and PAP prescription decreased from ≥60 days to ≤7 days. This occurred in spite of an increase in total sleep consults and sleep studies. There was also a significant increase in data downloads, indicating overall improved follow-up. There was no change in clinic wait time of ≥60 days. Implementation of a sleep telemedicine protocol at the Milwaukee VAMC was associated with increased efficiency of sleep services. Timeliness of sleep management interventions for sleep apnea improved in spite of the increased volume of service.

  3. Facilitating Secure Sharing of Personal Health Data in the Cloud.

    PubMed

    Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick

    2016-05-27

    Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.

  4. Emergency Medical Services Perspectives on Identifying and Reporting Victims of Elder Abuse, Neglect, and Self-Neglect.

    PubMed

    Rosen, Tony; Lien, Cynthia; Stern, Michael E; Bloemen, Elizabeth M; Mysliwiec, Regina; McCarthy, Thomas J; Clark, Sunday; Mulcare, Mary R; Ribaudo, Daniel S; Lachs, Mark S; Pillemer, Karl; Flomenbaum, Neal E

    2017-10-01

    Emergency Medical Services (EMS) providers, who perform initial assessments of ill and injured patients, often in a patient's home, are uniquely positioned to identify potential victims of elder abuse, neglect, or self-neglect. Despite this, few organized programs exist to ensure that EMS concerns are communicated to or further investigated by other health care providers, social workers, or the authorities. To explore attitudes and self-reported practices of EMS providers surrounding identification and reporting of elder mistreatment. Five semi-structured focus groups with 27 EMS providers. Participants reported believing they frequently encountered and were able to identify potential elder mistreatment victims. Many reported infrequently discussing their concerns with other health care providers or social workers and not reporting them to the authorities due to barriers: 1) lack of EMS protocols or training specific to vulnerable elders; 2) challenges in communication with emergency department providers, including social workers, who are often unavailable or not receptive; 3) time limitations; and 4) lack of follow-up when EMS providers do report concerns. Many participants reported interest in adopting protocols to assist in elder protection. Additional strategies included photographically documenting the home environment, additional training, improved direct communication with social workers, a dedicated location on existing forms or new form to document concerns, a reporting hotline, a system to provide feedback to EMS, and community paramedicine. EMS providers frequently identify potential victims of elder abuse, neglect, and self-neglect, but significant barriers to reporting exist. Strategies to empower EMS providers and improve reporting were identified. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. WebGLORE: a web service for Grid LOgistic REgression.

    PubMed

    Jiang, Wenchao; Li, Pinghao; Wang, Shuang; Wu, Yuan; Xue, Meng; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2013-12-15

    WebGLORE is a free web service that enables privacy-preserving construction of a global logistic regression model from distributed datasets that are sensitive. It only transfers aggregated local statistics (from participants) through Hypertext Transfer Protocol Secure to a trusted server, where the global model is synthesized. WebGLORE seamlessly integrates AJAX, JAVA Applet/Servlet and PHP technologies to provide an easy-to-use web service for biomedical researchers to break down policy barriers during information exchange. http://dbmi-engine.ucsd.edu/webglore3/. WebGLORE can be used under the terms of GNU general public license as published by the Free Software Foundation.

  6. Integrating sequence and structural biology with DAS

    PubMed Central

    Prlić, Andreas; Down, Thomas A; Kulesha, Eugene; Finn, Robert D; Kähäri, Andreas; Hubbard, Tim JP

    2007-01-01

    Background The Distributed Annotation System (DAS) is a network protocol for exchanging biological data. It is frequently used to share annotations of genomes and protein sequence. Results Here we present several extensions to the current DAS 1.5 protocol. These provide new commands to share alignments, three dimensional molecular structure data, add the possibility for registration and discovery of DAS servers, and provide a convention how to provide different types of data plots. We present examples of web sites and applications that use the new extensions. We operate a public registry of DAS sources, which now includes entries for more than 250 distinct sources. Conclusion Our DAS extensions are essential for the management of the growing number of services and exchange of diverse biological data sets. In addition the extensions allow new types of applications to be developed and scientific questions to be addressed. The registry of DAS sources is available at PMID:17850653

  7. Providing web-based mental health services to at-risk women

    PubMed Central

    2011-01-01

    Background We examined the feasibility of providing web-based mental health services, including synchronous internet video conferencing of an evidence-based support/education group, to at-risk women, specifically poor lone mothers. The objectives of this study were to: (i) adapt a face-to-face support/education group intervention to a web-based format for lone mothers, and (ii) evaluate lone mothers' response to web-based services, including an online video conferencing group intervention program. Methods Participating mothers were recruited through advertisements. To adapt the face-to-face intervention to a web-based format, we evaluated participant motivation through focus group/key informant interviews (n = 7), adapted the intervention training manual for a web-based environment and provided a computer training manual. To evaluate response to web-based services, we provided the intervention to two groups of lone mothers (n = 15). Pre-post quantitative evaluation of mood, self-esteem, social support and parenting was done. Post intervention follow up interviews explored responses to the group and to using technology to access a health service. Participants received $20 per occasion of data collection. Interviews were taped, transcribed and content analysis was used to code and interpret the data. Adherence to the intervention protocol was evaluated. Results Mothers participating in this project experienced multiple difficulties, including financial and mood problems. We adapted the intervention training manual for use in a web-based group environment and ensured adherence to the intervention protocol based on viewing videoconferencing group sessions and discussion with the leaders. Participant responses to the group intervention included decreased isolation, and increased knowledge and confidence in themselves and their parenting; the responses closely matched those of mothers who obtained same service in face-to-face groups. Pre-and post-group quantitative evaluations did not show significant improvements on measures, although the study was not powered to detect these. Conclusions We demonstrated that an evidence-based group intervention program for lone mothers developed and evaluated in face-to-face context transferred well to an online video conferencing format both in terms of group process and outcomes. PMID:21854563

  8. Providing web-based mental health services to at-risk women.

    PubMed

    Lipman, Ellen L; Kenny, Meghan; Marziali, Elsa

    2011-08-19

    We examined the feasibility of providing web-based mental health services, including synchronous internet video conferencing of an evidence-based support/education group, to at-risk women, specifically poor lone mothers. The objectives of this study were to: (i) adapt a face-to-face support/education group intervention to a web-based format for lone mothers, and (ii) evaluate lone mothers' response to web-based services, including an online video conferencing group intervention program. Participating mothers were recruited through advertisements. To adapt the face-to-face intervention to a web-based format, we evaluated participant motivation through focus group/key informant interviews (n = 7), adapted the intervention training manual for a web-based environment and provided a computer training manual. To evaluate response to web-based services, we provided the intervention to two groups of lone mothers (n = 15). Pre-post quantitative evaluation of mood, self-esteem, social support and parenting was done. Post intervention follow up interviews explored responses to the group and to using technology to access a health service. Participants received $20 per occasion of data collection. Interviews were taped, transcribed and content analysis was used to code and interpret the data. Adherence to the intervention protocol was evaluated. Mothers participating in this project experienced multiple difficulties, including financial and mood problems. We adapted the intervention training manual for use in a web-based group environment and ensured adherence to the intervention protocol based on viewing videoconferencing group sessions and discussion with the leaders. Participant responses to the group intervention included decreased isolation, and increased knowledge and confidence in themselves and their parenting; the responses closely matched those of mothers who obtained same service in face-to-face groups. Pre-and post-group quantitative evaluations did not show significant improvements on measures, although the study was not powered to detect these. We demonstrated that an evidence-based group intervention program for lone mothers developed and evaluated in face-to-face context transferred well to an online video conferencing format both in terms of group process and outcomes.

  9. Recommended features of protocols for long-term ecological monitoring

    USGS Publications Warehouse

    Oakley, Karen L.; Boudreau, Susan L.; Humphrey, Sioux-Z

    2001-01-01

    In 1991, the National Park Service (NPS) selected seven parks to serve as prototypes for development of a long-term ecological monitoring program. Denali National Park and Preserve was one of the prototype parks selected. The principal focus of this national program was to detect and document resource changes and to understand the forces driving those changes. One of the major tasks of each prototype park was to develop monitoring protocols. In this paper, we discuss some lessons learned and what we believe to be the most important features of protocols.One of the many lessons we have learned is that monitoring protocols vary greatly in content and format. This variation leads to confusion about what information protocols should contain and how they should be formatted. Problems we have observed in existing protocols include (1) not providing enough detail, (2) omitting critical topics (such as data management), and (3) mixing explanation with instructions. Once written, protocols often sit on the shelf to collect dust, allowing methods changes to occur without being adequately considered, tested, or documented. Because a lengthy and costly research effort is often needed to develop protocols, a vision of what the final product should look like is helpful. Based on our involvement with the prototype monitoring program for Denali (Oakley and Boudreau 2000), we recommend key features of protocols, including a scheme for linking protocols to data in the data management system and for tracking protocol revisions. A protocol system is crucial for producing long-term data sets of known quality that meet program objectives.

  10. Lifestyle change in the cancer setting using 'the teachable moment': protocol for a proof-of-concept pilot in a urology service.

    PubMed

    Lee, Alyssa Sara; Ozakinci, Gozde; Leung, Steve; Humphris, Gerry; Dale, Hannah; Hamlet, Neil

    2016-01-01

    Previous research has shown diagnosis or screening for cancer may be a 'teachable moment' for prevention through lifestyle change. Previous trials have been successful but have been delivered via national programmes targeting patients being screened for colorectal cancer. This manuscript reports the protocol for a proof-of-concept study to assess the feasibility and acceptability of a lifestyle change service targeting men suspected or diagnosed with cancer of the prostate in a secondary care cancer service within the UK. Lifestyle change will be promoted through integration of a lifestyle change service in a urology department in one NHS Board. The service is delivered by a Health Psychologist and uses motivational interviewing and behavioural change techniques to motivate and support patients to consider and address topics such as increasing physical activity and a healthy diet, smoking cessation, alcohol reduction and weight loss. A service evaluation will assess feasibility and acceptability via a patient experience survey, a survey exploring staff knowledge, attitudes and practice, pre- and post-intervention lifestyle behaviour survey and an audit of routine patient database. This pilot will assess the viability of using cancer testing and diagnosis as a teachable moment for lifestyle change in a unique population (i.e. men with suspected cancer of the prostate). If successful, this approach offers potential for preventative services to enhance routine and person-centred clinical cancer care provided within secondary care settings.

  11. By-Laws | Center for Cancer Research

    Cancer.gov

    The NIH Fellows Editorial Board (FEB) offers a free and confidential editorial service for NIH fellows. The Board members edit manuscripts, abstracts, book chapters, clinical protocols, and grant submissions and offer suggestions for grammar, structure, and style, but not for scientific content. The Board provides valuable training and editorial experience to its members for academic as well as nonacademic scientific careers.

  12. 2009 National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-04-01

    Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  13. A Systematic Review of State Vocational Rehabilitation Agency-Based Literature

    ERIC Educational Resources Information Center

    Boeltzig-Brown, Heike; Fleming, Allison R.; Heyman, Miriam; Gauthier, Martha; Cully, Julisa; Foley, Susan M.

    2017-01-01

    Purpose: To conduct a systematic review (SR) of 550 studies produced between 1970 and 2008 that focus on programs and/or services provided by state vocational rehabilitation (VR) agencies believed to impact client and/or program outcomes. Method: Authors used a 5-step SR protocol to evaluate and summarize study content and outcomes, study design,…

  14. A Logically Centralized Approach for Control and Management of Large Computer Networks

    ERIC Educational Resources Information Center

    Iqbal, Hammad A.

    2012-01-01

    Management of large enterprise and Internet service provider networks is a complex, error-prone, and costly challenge. It is widely accepted that the key contributors to this complexity are the bundling of control and data forwarding in traditional routers and the use of fully distributed protocols for network control. To address these…

  15. Effects of reduced-impact logging and forest physiognomy on bat populations of lowland Amazonian forest.

    Treesearch

    Steven J. Presley; Michael R. Willig; Wunderle Jr. Joseph M.; Luis Nélio Saldanha

    2008-01-01

    1.As human population size increases, demand for natural resources will increase. Logging pressure related to increasing demands continues to threaten remote areas of Amazonian forest. A harvest protocol is required to provide renewable timber resources that meet consumer needs while minimizing negative effects on biodiversity and ecosystem services. Reduced-impact...

  16. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-'Tabac Info Service': ee-TIS trial.

    PubMed

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-02-24

    A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  17. From QASC to QASCIP: successful Australian translational scale-up and spread of a proven intervention in acute stroke using a prospective pre-test/post-test study design

    PubMed Central

    Lydtin, Anna; Comerford, Daniel; Cadilhac, Dominique A; McElduff, Patrick; Dale, Simeon; Hill, Kelvin; Longworth, Mark; Ward, Jeanette; Cheung, N Wah; D'Este, Cate

    2016-01-01

    Objectives To embed an evidence-based intervention to manage FEver, hyperglycaemia (Sugar) and Swallowing (the FeSS protocols) in stroke, previously demonstrated in the Quality in Acute Stroke Care (QASC) trial to decrease 90-day death and dependency, into all stroke services in New South Wales (NSW), Australia's most populous state. Design Pre-test/post-test prospective study. Setting 36 NSW stroke services. Methods Our clinical translational initiative, the QASC Implementation Project (QASCIP), targeted stroke services to embed 3 nurse-led clinical protocols (the FeSS protocols) into routine practice. Clinical champions attended a 1-day multidisciplinary training workshop and received standardised educational resources and ongoing support. Using the National Stroke Foundation audit collection tool and processes, patient data from retrospective medical record self-reported audits for 40 consecutive patients with stroke per site pre-QASCIP (1 July 2012 to 31 December 2012) were compared with prospective self-reported data from 40 consecutive patients with stroke per site post-QASCIP (1 November 2013 to 28 February 2014). Inter-rater reliability was substantial for 10 of 12 variables. Primary outcome measures Proportion of patients receiving care according to the FeSS protocols pre-QASCIP to post-QASCIP. Results All 36 (100%) NSW stroke services participated, nominating 100 site champions who attended our educational workshops. The time from start of intervention to completion of post-QASCIP data collection was 8 months. All (n=36, 100%) sites provided medical record audit data for 2144 patients (n=1062 pre-QASCIP; n=1082 post-QASCIP). Pre-QASCIP to post-QASCIP, proportions of patients receiving the 3 targeted clinical behaviours increased significantly: management of fever (pre: 69%; post: 78%; p=0.003), hyperglycaemia (pre: 23%; post: 34%; p=0.0085) and swallowing (pre: 42%; post: 51%; p=0.033). Conclusions We obtained unprecedented statewide scale-up and spread to all NSW stroke services of a nurse-led intervention previously proven to improve long-term patient outcomes. As clinical leaders search for strategies to improve quality of care, our initiative is replicable and feasible in other acute care settings. PMID:27154485

  18. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  19. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  20. Testing warning messages on smokers' cigarette packages: a standardised protocol.

    PubMed

    Brewer, Noel T; Hall, Marissa G; Lee, Joseph G L; Peebles, Kathryn; Noar, Seth M; Ribisl, Kurt M

    2016-03-01

    Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers' own packs. We tested a cigarette pack labelling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers' cigarette packs. Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<0.05). Our findings suggest a feasible pack labelling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers' cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomised controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labelling policy. NCT02247908. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Pediatric Renal Transplantation: Focus on Current Transition Care and Proposal of the "RISE to Transition" Protocol.

    PubMed

    Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod; Ferris, Maria

    2018-01-16

    The transition from pediatric to adult medical services is an important time in the life of an adolescent or young adult with a renal transplant. Failure of proper transition can lead to medical non-adherence and subsequent loss of graft and/or return to dialysis. The aim of this study was to conduct a systematic review and survey to assess the challenges and existing practices in transition of renal transplant recipient children to adult services, and to develop a transition protocol. We conducted a literature review and performed a survey of pediatric nephrologists across the United States to examine the current state of transition care. A structured transition protocol was developed based on these results. Our literature review revealed that a transition program has a positive impact on decline in renal function and acute rejection episodes, and may improve long-term graft outcomes in pediatric kidney transplant patients. With a response rate of 40% (60/150) from nephrologists in 56% (49/87) of centers, our survey shows inconsistent use of validated tools despite their availability, inefficient communication between teams, and lack of use of dedicated clinics. To address these issues, we developed the "RISE to Transition" protocol, which relies on 4 competency areas: Recognition, Insight, Self-reliance, and Establishment of healthy habits. The transition program decreases acute graft rejection episodes, and the main challenges in transition care are the communication gap between health care providers and inconsistent use of transition tools. Our RISE to transition protocol incorporates transition tools, defines personnel, and aims to improve communication between teams.

  2. A novel virtual hub approach for multisource downstream service integration

    NASA Astrophysics Data System (ADS)

    Previtali, Mattia; Cuca, Branka; Barazzetti, Luigi

    2016-08-01

    A large development of downstream services is expected to be stimulated starting from earth observations (EO) datasets acquired by Copernicus satellites. An important challenge connected with the availability of downstream services is the possibility for their integration in order to create innovative applications with added values for users of different categories level. At the moment, the world of geo-information (GI) is extremely heterogeneous in terms of standards and formats used, thus preventing a facilitated access and integration of downstream services. Indeed, different users and data providers have also different requirements in terms of communication protocols and technology advancement. In recent years, many important programs and initiatives have tried to address this issue even on trans-regional and international level (e.g. INSPIRE Directive, GEOSS, Eye on Earth and SEIS). However, a lack of interoperability between systems and services still exists. In order to facilitate the interaction between different downstream services, a new architectural approach (developed within the European project ENERGIC OD) is proposed in this paper. The brokering-oriented architecture introduces a new mediation layer (the Virtual Hub) which works as an intermediary to bridge the gaps linked to interoperability issues. This intermediation layer de-couples the server and the client allowing a facilitated access to multiple downstream services and also Open Data provided by national and local SDIs. In particular, in this paper an application is presented integrating four services on the topic of agriculture: (i) the service given by Space4Agri (providing services based on MODIS and Landsat data); (ii) Gicarus Lab (providing sample services based on Landsat datasets) and (iii) FRESHMON (providing sample services for water quality) and services from a several regional SDIs.

  3. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    PubMed

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  4. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    PubMed Central

    Vara, M. Isabel; Campo, Celeste

    2015-01-01

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272

  5. Functional and nonfunctional testing of ATM networks

    NASA Astrophysics Data System (ADS)

    Ricardo, Manuel; Ferreira, M. E. P.; Guimaraes, Francisco E.; Mamede, J.; Henriques, M.; da Silva, Jorge A.; Carrapatoso, E.

    1995-02-01

    ATM network will support new multimedia services that will require new protocols, those services and protocols will need different test strategies and tools. In this paper, the concepts of functional and non-functional testers of ATM networks are discussed, a multimedia service and its requirements are presented and finally, a summary description of an ATM network and of the test tool that will be used to validate it are presented.

  6. Migrating an Online Service to WAP - A Case Study.

    ERIC Educational Resources Information Center

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  7. Improving mental health service responses to domestic violence and abuse.

    PubMed

    Trevillion, Kylee; Corker, Elizabeth; Capron, Lauren E; Oram, Siân

    2016-10-01

    Domestic violence and abuse is a considerable international public health problem, which is associated with mental disorders in both women and men. Nevertheless, victimization and perpetration remain undetected by mental health services. This paper reviews the evidence on mental health service responses to domestic violence, including identifying, referring, and providing care for people experiencing or perpetrating violence. The review highlights the need for mental health services to improve rates of identification and responses to domestic violence and abuse, through the provision of specific training on domestic violence and abuse, the implementation of clear information sharing protocols and evidence-based interventions, and the establishment of care referral pathways. This review also highlights the need for further research into mental health service users who perpetrate domestic violence and abuse.

  8. Comparing policies for children of parents attending hospital emergency departments after intimate partner violence, substance abuse or suicide attempt.

    PubMed

    Hoytema van Konijnenburg, Eva M M; Diderich, Hester M; Teeuw, Arianne H; Klein Velderman, Mariska; Oudesluys-Murphy, Anne Marie; van der Lee, Johanna H

    2016-03-01

    To improve identification of child maltreatment, a new policy ('Hague protocol') was implemented in hospitals in The Netherlands, stating that adults attending the hospital emergency department after intimate partner violence, substance abuse or a suicide attempt should be asked whether they care for children. If so, these children are referred to the Reporting Center for Child Abuse and Neglect (RCCAN), for assessment and referrals to support services. An adapted, hospital-based version of this protocol ('Amsterdam protocol') was implemented in another region. Children are identified in the same manner, but, instead of a RCCAN referral, they are referred to the pediatric outpatient department for an assessment, including a physical examination, and referrals to services. We compared results of both protocols to assess how differences between the protocols affect the outcomes on implementation, detection of child maltreatment and referrals to services. Furthermore, we assessed social validity and results of a screening physical examination. We included 212 families from the Amsterdam protocol (cohort study with reports by pediatric staff and parents) and 565 families from the Hague protocol (study of RCCAN records and telephone interviews with parents). We found that the RCCAN identified more maltreatment than pediatric staff (98% versus at least 51%), but referrals to services were similar (82% versus 80% of the total sample) and parents were positive about both interventions. Physical examination revealed signs of maltreatment in 5%. We conclude that, despite the differences, both procedures can serve as suitable methods to identify and refer children at risk for maltreatment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Strategies that reduce 90-day readmissions and inpatient costs after liver transplantation.

    PubMed

    Zeidan, Joseph H; Levi, David M; Pierce, Ruth; Russo, Mark W

    2018-04-25

    Liver transplantation is hospital-resource intensive and associated with high rates of readmission. We have previously shown a reduction in 30-day readmission rates by implementing a specifically designed protocol to increase access to outpatient care. To determine if strategies that reduce 30-day readmission after liver transplant were effective in also reducing 90-day readmission rates and costs. A protocol was developed to reduce inpatient readmissions after liver transplant that expanded outpatient services and provided alternatives to readmission. The 90-day readmission rates and costs were compared before and implementing strategies outlined in the protocol. Multivariable analysis was used to control for potential confounding factors. Over the study period 304 adult primary liver transplants were performed on patients with a median biologic MELD of 22. 112 (37%) patients were readmitted within 90 days of transplant. The readmission rates before and after implementation of the protocol were 53% and 26% respectively, p<0.001. The most common reason for readmission was elevated liver tests/rejection (24%). In multivariable analysis, the protocol remained associated with avoiding readmission, OR=0.33, [95% CI 0.20,0.55], p<0.001. The median length of stay after transplant preprotocol and postprotocol was 8 and 7 days, respectively. A greater proportion of patients were discharged to hospital lodging post protocol, 10% versus 19%, p=0.03. 90-day readmissions costs were reduced by 55% but total 90 day costs by only 2.7% due to higher outpatient costs and index admission costs. 90-day readmission rates and readmission costs can be reduced by improving access to outpatient services and hospital local lodging. Total 90-day costs were similar between the two groups because of higher outpatient costs after the protocol was introduced. This article is protected by copyright. All rights reserved. © 2018 by the American Association for the Study of Liver Diseases.

  10. Providing Family Planning Services at Primary Care Organizations after the Exclusion of Planned Parenthood from Publicly Funded Programs in Texas: Early Qualitative Evidence.

    PubMed

    White, Kari; Hopkins, Kristine; Grossman, Daniel; Potter, Joseph E

    2017-10-20

    To explore organizations' experiences providing family planning during the first year of an expanded primary care program in Texas. Between November 2014 and February 2015, in-depth interviews were conducted with program administrators at 30 organizations: 7 women's health organizations, 13 established primary care contractors (e.g., community health centers, public health departments), and 10 new primary care contractors. Interviews addressed organizational capacities to expand family planning and integrate services with primary care. Interview transcripts were analyzed using a theme-based approach. Themes were compared across the three types of organizations. Established and new primary care contractors identified several challenges expanding family planning services, which were uncommon among women's health organizations. Clinicians often lacked training to provide intrauterine devices and contraceptive implants. Organizations often recruited existing clients into family planning services, rather than expanding their patient base, and new contractors found family planning difficult to integrate because of clients' other health needs. Primary care contractors frequently described contraceptive provision protocols that were not evidence-based. Many primary care organizations in Texas initially lacked the capacity to provide evidence-based family planning services that women's health organizations already provided. © Health Research and Educational Trust.

  11. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the...

  12. Implementation of an EPN-TAP Service to Improve Accessibility to the Planetary Science Archive

    NASA Astrophysics Data System (ADS)

    Macfarlane, A.; Barabarisi, I.; Docasal, R.; Rios, C.; Saiz, J.; Vallejo, F.; Martinez, S.; Arviset, C.; Besse, S.; Vallat, C.

    2017-09-01

    The re-engineered PSA has a focus on improved access and search-ability to ESA's planetary science data. In addition to the new web interface released in January 2017, the new PSA supports several common planetary protocols in order to increase the visibility and ways in which the data may be queried and retrieved. Work is on-going to provide an EPN-TAP service covering as wide a range of parameters as possible to facilitate the discovery of scientific data and interoperability of the archive.

  13. Interoperability In The New Planetary Science Archive (PSA)

    NASA Astrophysics Data System (ADS)

    Rios, C.; Barbarisi, I.; Docasal, R.; Macfarlane, A. J.; Gonzalez, J.; Arviset, C.; Grotheer, E.; Besse, S.; Martinez, S.; Heather, D.; De Marchi, G.; Lim, T.; Fraga, D.; Barthelemy, M.

    2015-12-01

    As the world becomes increasingly interconnected, there is a greater need to provide interoperability with software and applications that are commonly being used globally. For this purpose, the development of the new Planetary Science Archive (PSA), by the European Space Astronomy Centre (ESAC) Science Data Centre (ESDC), is focused on building a modern science archive that takes into account internationally recognised standards in order to provide access to the archive through tools from third parties, for example by the NASA Planetary Data System (PDS), the VESPA project from the Virtual Observatory of Paris as well as other international institutions. The protocols and standards currently being supported by the new Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet-Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. The architecture of the PSA consists of a Geoserver (an open-source map server), the goal of which is to support use cases such as the distribution of search results, sharing and processing data through a OGC Web Feature Service (WFS) and a Web Map Service (WMS). This server also allows the retrieval of requested information in several standard output formats like Keyhole Markup Language (KML), Geography Markup Language (GML), shapefile, JavaScript Object Notation (JSON) and Comma Separated Values (CSV), among others. The provision of these various output formats enables end-users to be able to transfer retrieved data into popular applications such as Google Mars and NASA World Wind.

  14. A routing protocol based on energy and link quality for Internet of Things applications.

    PubMed

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  15. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    PubMed Central

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  16. Development of the Commonwealth of Puerto Rico National Protocol for the Management of Victims of Sexual Violence: Adults/Adolescents.

    PubMed

    Méndez, Rose Marie; Kulbok, Pamela; Lawson, Sarah; Matos, Abigail

    2013-01-01

    Sexual violence is a public health problem in Puerto Rico (PR), with an incidence of 7.4 cases for every 10,000 people during 2005-2006 (Departamento de Salud Secretaría Auxiliar de Salud Familiar y Servicios Integrados, 2007). Findings from the literature review indicated that the traditional model of care provided to the victims of sexual violence in the Emergency Department is incomplete; furthermore, it may cause revictimization because of the attitudes, behaviors, and practices of the community service providers, resulting in additional trauma. Emerging evidence demonstrates that Sexual Assault Nurse Examiner (SANE) programs are providing effective quality care. In PR, SANEs do not intervene in sexual assault cases; nevertheless, the Department of Health of PR has recognized the importance of SANE intervention. Consequently, there is a need for current evidence-based protocols and standards of care to describe the procedures, roles, and responsibilities for the provision of quality care to victims. This project involves the implementation of the Stufflebeam's Context-Input-Process-Product Model in the creation of the Commonwealth of Puerto Rico National Protocol for the Management of Victims of Sexual Violence: Adults/Adolescents.

  17. Screening for Child Sexual Exploitation in Online Sexual Health Services: An Exploratory Study of Expert Views.

    PubMed

    Spencer-Hughes, Victoria; Syred, Jonathan; Allison, Alison; Holdsworth, Gillian; Baraitser, Paula

    2017-02-14

    Sexual health services routinely screen for child sexual exploitation (CSE). Although sexual health services are increasingly provided online, there has been no research on the translation of the safeguarding function to online services. We studied expert practitioner views on safeguarding in this context. The aim was to document expert practitioner views on safeguarding in the context of an online sexual health service. We conducted semistructured interviews with lead professionals purposively sampled from local, regional, or national organizations with a direct influence over CSE protocols, child protection policies, and sexual health services. Interviews were analyzed by three researchers using a matrix-based analytic method. Our respondents described two different approaches to safeguarding. The "information-providing" approach considers that young people experiencing CSE will ask for help when they are ready from someone they trust. The primary function of the service is to provide information, provoke reflection, generate trust, and respond reliably to disclosure. The approach values online services as an anonymous space to test out disclosure without commitment. The "information-gathering" approach considers that young people may withhold information about exploitation. Therefore, services should seek out information to assess risk and initiate disclosure. This approach values face-to-face opportunities for individualized questioning and immediate referral. The information-providing approach is associated with confidential telephone support lines and the information-gathering approach with clinical services. The approach adopted online will depend on ethos and the range of services provided. Effective transition from online to clinic services after disclosure is an essential element of this process and further research is needed to understand and support this transition. ©Victoria Spencer-Hughes, Jonathan Syred, Alison Allison, Gillian Holdsworth, Paula Baraitser. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 14.02.2017.

  18. Research and development of a NYNEX switched multi-megabit data service prototype system

    NASA Astrophysics Data System (ADS)

    Maman, K. H.; Haines, Robert; Chatterjee, Samir

    1991-02-01

    Switched Multi-megabit Data Service (SMDS) is a proposed high-speed packet-switched service which will support broadband applications such as Local Area Network (LAN) interconnections across a metropolitan area and beyond. This service is designed to take advantage of evolving Metropolitan Area Network (MAN) standards and technology which will provide customers with 45-mbps and 1 . 5-mbps access to high-speed public data communications networks. This paper will briefly discuss SMDS and review its architecture including the Subscriber Network Interface (SNI) and the SMDS Interface Protocol (SIP). It will review the fundamental features of SMDS such as address screening addressing scheme and access classes. Then it will describe the SMDS prototype system developed in-house by NYNEX Science Technology.

  19. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  20. Opening a door to safe abortion: international perspectives on medical abortifacient use.

    PubMed

    Pollack, A E; Pine, R N

    2000-01-01

    International experience compels us to revisit how we define and assess the safety and efficacy of medical abortifacients such as misoprostol. In some countries where safe abortion is neither accessible nor legal, even unsupervised, off-protocol use of misoprostol can provide women with a means to safely terminate pregnancy. This is due primarily to misoprostol-induced uterine contractions that cause bleeding, which in turn provides access to existing reasonable quality health services that would otherwise be unavailable. Several studies have suggested that an increase in the underground use of misoprostol in Brazil has already reduced serious complications from unsafe abortion. Thus, the availability of medical abortifacients combined with strengthened postabortion care services can legitimately be considered a public health success in countries in which safe abortion services do not exist and law reform is unlikely.

  1. [Development of second-line occupational health services: toward an integrated network of insurers and care providers].

    PubMed

    Plomp, H N

    2000-06-10

    To describe the development of the second-line Occupational Health Services and the role of private insurance companies in it over the period 1994-1999. Descriptive cross-sectional study. Data were collected in 1999 from written documents and supplementary interviews with the five largest private providers of disability insurance, the National Insurance Institute, nine Occupational Health Services of different natures and 24 institutions for second-line occupational health service. After the privatization of the Health Law in 1996 and parts of the Law on disability Insurance, most employers covered the risk of continued payment of wages in case of disability with private insurers. These attempted to keep claims down by active engagement in arbitration, treatment and diagnostics of disabled employees so as to counteract avoidable absenteeism. Under the influence of the insurance companies, a trend developed toward integrated nation-wide chains in which the services provided by insurers, by occupational health services and by implementing institutions are geared for one another. Commercial provision of Occupational Health Service is a new, demand-active form of care provision in which the financier plays a key part. This provision of services supplied important innovating impulses for health care in its entirety because of its large scale, strong protocolling of processes and management on the basis of continuous cost-benefit analyses. A lucid and socially acceptable regulation of commercial providers of occupational health services was lacking.

  2. Compulsory Use of the Backboard is Associated with Increased Frequency of Thoracolumbar Imaging.

    PubMed

    Clemency, Brian M; Tanski, Christopher T; Gibson Chambers, Jennifer; O'Brien, Michael; Knapp, Andrew S; Clark, Alexander J; McGoff, Patrick; Innes, Johanna; Lindstrom, Heather A; Hostler, David

    2018-02-15

    Backboards have been shown to cause pain in uninjured patients. This may alter physical exam findings, leading emergency department (ED) providers to suspect a spinal injury when none exists resulting in additional imaging of the thoracolumbar spine. New York had previously employed a "Spinal Immobilization" protocol that included compulsory backboard application for all patients with suspected spinal injuries. In 2015, New York instituted a new "Spinal Motion Restriction" protocol that made backboard use optional for these patients. The objective of this study was to determine if this protocol change was associated with decreased backboard utilization and ED thoracolumbar spine imaging. This was a retrospective before-and-after chart review of subjects transported by a single emergency medical services (EMS) agency to one of four EDs for emergency calls dispatched as motor vehicle collisions (MVC). EMS and ED data were included for all calls within a 6-month interval before and after the protocol change. The protocol change was implemented in the second half of 2015. Subject demographics, backboard use, and spine imaging were reviewed for the intervals January-June 2015 and January-June 2016. There were 818 subjects in the before period and 796 subjects in the after period. Subjects were similar in terms of gender, age and type of MVC in both periods. A backboard was utilized for 440 (54%) subjects in the before period and 92 (12%) subjects in the after period (p < 0.001). ED thoracic spine imaging was performed on 285 (35%) subjects in the before period, and 235 (30%) subjects in the after period (p = 0.02). ED lumbar spine imaging was performed for 335 (41%) subjects in the before period, and 281 (35%) subjects in the after period (p = 0.02). A shift from a spinal immobilization protocol to a spinal motion restriction protocol was associated with a decrease in backboard utilization by EMS providers and a decrease in thoracolumbar spine imaging by ED providers.

  3. Development of an Open Building Automation System Specification Based on ANSI/ASHRAE 135-2004 (BACnet(R) Communications Protocol: A Technical Assessment

    DTIC Science & Technology

    2007-02-01

    on/off control), trending and trend reports, load shedding/load manage- ment, remote setpoint adjustment, initial diagnosis of a service call and...building-specific operational data such as on/off scheduling com- mands, setpoints , and outside air temperature. With help from several other agencies and...interface for monitoring 3. Provide one interface for device/system management/configuration 4. ( Optimally ) provide one interface for device

  4. Development of an Open Building Automation System Specification Based on ANSI/ASHRAE 135-2004 (BACnet(Registered) Communications Protocol): A Technical Assessment

    DTIC Science & Technology

    2007-02-01

    on/off control), trending and trend reports, load shedding/load manage- ment, remote setpoint adjustment, initial diagnosis of a service call and...building-specific operational data such as on/off scheduling com- mands, setpoints , and outside air temperature. With help from several other agencies and...interface for monitoring 3. Provide one interface for device/system management/configuration 4. ( Optimally ) provide one interface for device

  5. From QASC to QASCIP: successful Australian translational scale-up and spread of a proven intervention in acute stroke using a prospective pre-test/post-test study design.

    PubMed

    Middleton, Sandy; Lydtin, Anna; Comerford, Daniel; Cadilhac, Dominique A; McElduff, Patrick; Dale, Simeon; Hill, Kelvin; Longworth, Mark; Ward, Jeanette; Cheung, N Wah; D'Este, Cate

    2016-05-06

    To embed an evidence-based intervention to manage FEver, hyperglycaemia (Sugar) and Swallowing (the FeSS protocols) in stroke, previously demonstrated in the Quality in Acute Stroke Care (QASC) trial to decrease 90-day death and dependency, into all stroke services in New South Wales (NSW), Australia's most populous state. Pre-test/post-test prospective study. 36 NSW stroke services. Our clinical translational initiative, the QASC Implementation Project (QASCIP), targeted stroke services to embed 3 nurse-led clinical protocols (the FeSS protocols) into routine practice. Clinical champions attended a 1-day multidisciplinary training workshop and received standardised educational resources and ongoing support. Using the National Stroke Foundation audit collection tool and processes, patient data from retrospective medical record self-reported audits for 40 consecutive patients with stroke per site pre-QASCIP (1 July 2012 to 31 December 2012) were compared with prospective self-reported data from 40 consecutive patients with stroke per site post-QASCIP (1 November 2013 to 28 February 2014). Inter-rater reliability was substantial for 10 of 12 variables. Proportion of patients receiving care according to the FeSS protocols pre-QASCIP to post-QASCIP. All 36 (100%) NSW stroke services participated, nominating 100 site champions who attended our educational workshops. The time from start of intervention to completion of post-QASCIP data collection was 8 months. All (n=36, 100%) sites provided medical record audit data for 2144 patients (n=1062 pre-QASCIP; n=1082 post-QASCIP). Pre-QASCIP to post-QASCIP, proportions of patients receiving the 3 targeted clinical behaviours increased significantly: management of fever (pre: 69%; post: 78%; p=0.003), hyperglycaemia (pre: 23%; post: 34%; p=0.0085) and swallowing (pre: 42%; post: 51%; p=0.033). We obtained unprecedented statewide scale-up and spread to all NSW stroke services of a nurse-led intervention previously proven to improve long-term patient outcomes. As clinical leaders search for strategies to improve quality of care, our initiative is replicable and feasible in other acute care settings. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  6. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  7. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  8. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  9. Evaluation of a suicide prevention training curriculum for substance abuse treatment providers based on Treatment Improvement Protocol Number 50 (TIP 50)

    PubMed Central

    Conner, Kenneth R.; Wood, Jane; Pisani, Anthony R.; Kemp, Janet

    2013-01-01

    Substance use disorders (SUD) confer risk for suicide yet there are no empirically supported suicide prevention training curricula tailored to SUD treatment providers. We assessed the efficacy of a 2-hour training that featured a suicide prevention training video produced by the Department of Veterans Affairs (VA). The video was based on Treatment Improvement Protocol Number 50, TIP 50, a practical manual to manage suicide risk produced by the Substance Abuse and Mental Health Services Administration (SAMHSA). The training was provided in small groups to 273 SUD treatment providers in 18 states. Results were evaluated using self-report assessments obtained at pre-test, post-test, and 2-month follow-up. Statistically significant changes (p<.001) within subjects were obtained on self-efficacy, knowledge, and frequency of suicide prevention practice behaviors. The positive results together with the brevity of the training and its ease of implementation indicate high potential for widespread adoption and the importance of further study. PMID:22417671

  10. Population-centered Risk- and Evidence-based Dental Interprofessional Care Team (PREDICT): study protocol for a randomized controlled trial.

    PubMed

    Cunha-Cruz, Joana; Milgrom, Peter; Shirtcliff, R Michael; Bailit, Howard L; Huebner, Colleen E; Conrad, Douglas; Ludwig, Sharity; Mitchell, Melissa; Dysert, Jeanne; Allen, Gary; Scott, JoAnna; Mancl, Lloyd

    2015-06-20

    To improve the oral health of low-income children, innovations in dental delivery systems are needed, including community-based care, the use of expanded duty auxiliary dental personnel, capitation payments, and global budgets. This paper describes the protocol for PREDICT (Population-centered Risk- and Evidence-based Dental Interprofessional Care Team), an evaluation project to test the effectiveness of new delivery and payment systems for improving dental care and oral health. This is a parallel-group cluster randomized controlled trial. Fourteen rural Oregon counties with a publicly insured (Medicaid) population of 82,000 children (0 to 21 years old) and pregnant women served by a managed dental care organization are randomized into test and control counties. In the test intervention (PREDICT), allied dental personnel provide screening and preventive services in community settings and case managers serve as patient navigators to arrange referrals of children who need dentist services. The delivery system intervention is paired with a compensation system for high performance (pay-for-performance) with efficient performance monitoring. PREDICT focuses on the following: 1) identifying eligible children and gaining caregiver consent for services in community settings (for example, schools); 2) providing risk-based preventive and caries stabilization services efficiently at these settings; 3) providing curative care in dental clinics; and 4) incentivizing local delivery teams to meet performance benchmarks. In the control intervention, care is delivered in dental offices without performance incentives. The primary outcome is the prevalence of untreated dental caries. Other outcomes are related to process, structure and cost. Data are collected through patient and staff surveys, clinical examinations, and the review of health and administrative records. If effective, PREDICT is expected to substantially reduce disparities in dental care and oral health. PREDICT can be disseminated to other care organizations as publicly insured clients are increasingly served by large practice organizations. ClinicalTrials.gov NCT02312921 6 December 2014. The Robert Wood Johnson Foundation and Advantage Dental Services, LLC, are supporting the evaluation.

  11. A monitoring protocol for the ecohydrological effects of land use changes in tropical mountain ecosystems

    NASA Astrophysics Data System (ADS)

    Flórez, C. P.; León, J. D.; Villegas, J. C.; Betancur, T.; Suescún, D.; García-Leoz, V.; Cardona, A. I.; Martin, Á. M.

    2014-12-01

    In tropical mountain regions, the societal demands for ecosystem services has led to pressure over ecosystems that, in ocassions, may threaten the capacity of ecosystems to provide services. More specifically, global-change processes such as land use change and climate dynamics may lead to uncertainties about the stability of ecosystem functions on which services rely on. Of particular interest are the effects of land cover changes on the hydrological dynamics of the soil, that support multiple regulation and provision services, critical for a large portion of the population settled in mountain regions of the world. In this work, we present a protocol for the combined monitoring of ecohydrological, biogeochemical and sediment dynamics in a group of instrumented plots representing a typical gradient of human intervention in a tropical mountain ecosystem. Land cover categories include: a mature forest, secondary forest, early successional stage, recently abandoned agricultural field, a cattle pasture, permanent cropland, a high rotation cropland. On each plot, water fluxes from the top of the canopy to 1.5 m below soil surface are measured using a diverse array of instruments, along with measurements of sediment load in runoff waters and nutrient loads for all hydrologic compartments (measurements include Ca, Mg, K, P, NH4, NO3, Mn, Fe). Our preliminary results indicate that although rainfall does not vary significantly among plots, runoff generation does, with higher values ocurring in the pasture. Conversely, infiltration rates are highest in both types of forests, particularly for shallower layers of the soil. Chemical analysis indicate higher nutrient loads in runoff generating from croplands, highlighting the potential loss of soil fertility and potentially leading to eutrophication in water bodies downstream. After completion, our results will provide land managers tools to assess larger-scale effects of land use changes on the capacity of ecosystems to provide services to society.

  12. Reflective Dialog Journals: A Tool for Developing Professional Competence in Novice Teachers

    ERIC Educational Resources Information Center

    Gut, Dianne M.; Wan, Guofang; Beam, Pamela C.; Burgess, Lawrence

    2016-01-01

    This study focuses on the use of a mentoring protocol, the reflective dialogue journal, to develop professional competencies for pre-service teachers within a school-university partnership. To examine the effectiveness of the reflective dialogue journal protocol and the processes employed by mentor teachers to assist pre-service teachers with…

  13. Development of bull trout sampling protocols

    Treesearch

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  14. Time Synchronization and Distribution Mechanisms for Space Networks

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Clare, Loren P.; Mills, David L.

    2011-01-01

    This work discusses research on the problems of synchronizing and distributing time information between spacecraft based on the Network Time Protocol (NTP), where NTP is a standard time synchronization protocol widely used in the terrestrial network. The Proximity-1 Space Link Interleaved Time Synchronization (PITS) Protocol was designed and developed for synchronizing spacecraft that are in proximity where proximity is less than 100,000 km distant. A particular application is synchronization between a Mars orbiter and rover. Lunar scenarios as well as outer-planet deep space mother-ship-probe missions may also apply. Spacecraft with more accurate time information functions as a time-server, and the other spacecraft functions as a time-client. PITS can be easily integrated and adaptable to the CCSDS Proximity-1 Space Link Protocol with minor modifications. In particular, PITS can take advantage of the timestamping strategy that underlying link layer functionality provides for accurate time offset calculation. The PITS algorithm achieves time synchronization with eight consecutive space network time packet exchanges between two spacecraft. PITS can detect and avoid possible errors from receiving duplicate and out-of-order packets by comparing with the current state variables and timestamps. Further, PITS is able to detect error events and autonomously recover from unexpected events that can possibly occur during the time synchronization and distribution process. This capability achieves an additional level of protocol protection on top of CRC or Error Correction Codes. PITS is a lightweight and efficient protocol, eliminating the needs for explicit frame sequence number and long buffer storage. The PITS protocol is capable of providing time synchronization and distribution services for a more general domain where multiple entities need to achieve time synchronization using a single point-to-point link.

  15. Bringing the medical library to the office desktop.

    PubMed

    Brown, S R; Decker, G; Pletzke, C J

    1991-01-01

    This demonstration illustrates LRC Remote Computer Services- a dual operating system, multi-protocol system for delivering medical library services to the medical professional's desktop. A working model draws resources from CD-ROM and magnetic media file services, Novell and AppleTalk network protocol suites and gating, LAN and asynchronous (dial-in) access strategies, commercial applications for MS-DOS and Macintosh workstations and custom user interfaces. The demonstration includes a discussion of issues relevant to the delivery of said services, particularly with respect to maintenance, security, training/support, staffing, software licensing and costs.

  16. Ethical challenges in Emergency Medical Services: controversies and recommendations.

    PubMed

    Becker, Torben K; Gausche-Hill, Marianne; Aswegan, Andrew L; Baker, Eileen F; Bookman, Kelly J; Bradley, Richard N; De Lorenzo, Robert A; Schoenwetter, David J

    2013-10-01

    Emergency Medical Services (EMS) providers face many ethical issues while providing prehospital care to children and adults. Although provider judgment plays a large role in the resolution of conflicts at the scene, it is important to establish protocols and policies, when possible, to address these high-risk and complex situations. This article describes some of the common situations with ethical underpinnings encountered by EMS personnel and managers including denying or delaying transport of patients with non-emergency conditions, use of lights and sirens for patient transport, determination of medical futility in the field, termination of resuscitation, restriction of EMS provider duty hours to prevent fatigue, substance abuse by EMS providers, disaster triage and difficulty in switching from individual care to mass-casualty care, and the challenges of child maltreatment recognition and reporting. A series of ethical questions are proposed, followed by a review of the literature and, when possible, recommendations for management.

  17. Interoperability at ESA Heliophysics Science Archives: IVOA, HAPI and other implementations

    NASA Astrophysics Data System (ADS)

    Martinez-Garcia, B.; Cook, J. P.; Perez, H.; Fernandez, M.; De Teodoro, P.; Osuna, P.; Arnaud, M.; Arviset, C.

    2017-12-01

    The data of ESA heliophysics science missions are preserved at the ESAC Science Data Centre (ESDC). The ESDC aims for the long term preservation of those data, which includes missions such as Ulysses, Soho, Proba-2, Cluster, Double Star, and in the future, Solar Orbiter. Scientists have access to these data through web services, command line and graphical user interfaces for each of the corresponding science mission archives. The International Virtual Observatory Alliance (IVOA) provides technical standards that allow interoperability among different systems that implement them. By adopting some IVOA standards, the ESA heliophysics archives are able to share their data with those tools and services that are VO-compatible. Implementation of those standards can be found in the existing archives: Ulysses Final Archive (UFA) and Soho Science Archive (SSA). They already make use of VOTable format definition and Simple Application Messaging Protocol (SAMP). For re-engineered or new archives, the implementation of services through Table Access Protocol (TAP) or Universal Worker Service (UWS) will leverage this interoperability. This will be the case for the Proba-2 Science Archive (P2SA) and the Solar Orbiter Archive (SOAR). We present here which IVOA standards were already used by the ESA Heliophysics archives in the past and the work on-going.

  18. A study protocol of a randomised controlled trial incorporating a health economic analysis to investigate if additional allied health services for rehabilitation reduce length of stay without compromising patient outcomes.

    PubMed

    Taylor, Nicholas F; Brusco, Natasha K; Watts, Jennifer J; Shields, Nora; Peiris, Casey; Sullivan, Natalie; Kennedy, Genevieve; Teo, Cheng Kwong; Farley, Allison; Lockwood, Kylee; Radia-George, Camilla

    2010-11-12

    Reducing patient length of stay is a high priority for health service providers. Preliminary information suggests additional Saturday rehabilitation services could reduce the time a patient stays in hospital by three days. This large trial will examine if providing additional physiotherapy and occupational therapy services on a Saturday reduces health care costs, and improves the health of hospital inpatients receiving rehabilitation compared to the usual Monday to Friday service. We will also investigate the cost effectiveness and patient outcomes of such a service. A randomised controlled trial will evaluate the effect of providing additional physiotherapy and occupational therapy for rehabilitation. Seven hundred and twelve patients receiving inpatient rehabilitation at two metropolitan sites will be randomly allocated to the intervention group or control group. The control group will receive usual care physiotherapy and occupational therapy from Monday to Friday while the intervention group will receive the same amount of rehabilitation as the control group Monday to Friday plus a full physiotherapy and occupational therapy service on Saturday. The primary outcomes will be patient length of stay, quality of life (EuroQol questionnaire), the Functional Independence Measure (FIM), and health utilization and cost data. Secondary outcomes will assess clinical outcomes relevant to the goals of therapy: the 10 metre walk test, the timed up and go test, the Personal Care Participation Assessment and Resource Tool (PC PART), and the modified motor assessment scale. Blinded assessors will assess outcomes at admission and discharge, and follow up data on quality of life, function and health care costs will be collected at 6 and 12 months after discharge. Between group differences will be analysed with analysis of covariance using baseline measures as the covariate. A health economic analysis will be carried out alongside the randomised controlled trial. This paper outlines the study protocol for the first fully powered randomised controlled trial incorporating a health economic analysis to establish if additional Saturday allied health services for rehabilitation inpatients reduces length of stay without compromising discharge outcomes. If successful, this trial will have substantial health benefits for the patients and for organizations delivering rehabilitation services. Australian and New Zealand Clinical Trials Registry ACTRN12609000973213.

  19. A study protocol of a randomised controlled trial incorporating a health economic analysis to investigate if additional allied health services for rehabilitation reduce length of stay without compromising patient outcomes

    PubMed Central

    2010-01-01

    Background Reducing patient length of stay is a high priority for health service providers. Preliminary information suggests additional Saturday rehabilitation services could reduce the time a patient stays in hospital by three days. This large trial will examine if providing additional physiotherapy and occupational therapy services on a Saturday reduces health care costs, and improves the health of hospital inpatients receiving rehabilitation compared to the usual Monday to Friday service. We will also investigate the cost effectiveness and patient outcomes of such a service. Methods/Design A randomised controlled trial will evaluate the effect of providing additional physiotherapy and occupational therapy for rehabilitation. Seven hundred and twelve patients receiving inpatient rehabilitation at two metropolitan sites will be randomly allocated to the intervention group or control group. The control group will receive usual care physiotherapy and occupational therapy from Monday to Friday while the intervention group will receive the same amount of rehabilitation as the control group Monday to Friday plus a full physiotherapy and occupational therapy service on Saturday. The primary outcomes will be patient length of stay, quality of life (EuroQol questionnaire), the Functional Independence Measure (FIM), and health utilization and cost data. Secondary outcomes will assess clinical outcomes relevant to the goals of therapy: the 10 metre walk test, the timed up and go test, the Personal Care Participation Assessment and Resource Tool (PC PART), and the modified motor assessment scale. Blinded assessors will assess outcomes at admission and discharge, and follow up data on quality of life, function and health care costs will be collected at 6 and 12 months after discharge. Between group differences will be analysed with analysis of covariance using baseline measures as the covariate. A health economic analysis will be carried out alongside the randomised controlled trial. Discussion This paper outlines the study protocol for the first fully powered randomised controlled trial incorporating a health economic analysis to establish if additional Saturday allied health services for rehabilitation inpatients reduces length of stay without compromising discharge outcomes. If successful, this trial will have substantial health benefits for the patients and for organizations delivering rehabilitation services. Clinical trial registration number Australian and New Zealand Clinical Trials Registry ACTRN12609000973213 PMID:21073703

  20. A design of wireless sensor networks for a power quality monitoring system.

    PubMed

    Lim, Yujin; Kim, Hak-Man; Kang, Sanggil

    2010-01-01

    Power grids deal with the business of generation, transmission, and distribution of electric power. Recently, interest in power quality in electrical distribution systems has increased rapidly. In Korea, the communication network to deliver voltage, current, and temperature measurements gathered from pole transformers to remote monitoring centers employs cellular mobile technology. Due to high cost of the cellular mobile technology, power quality monitoring measurements are limited and data gathering intervals are large. This causes difficulties in providing the power quality monitoring service. To alleviate the problems, in this paper we present a communication infrastructure to provide low cost, reliable data delivery. The communication infrastructure consists of wired connections between substations and monitoring centers, and wireless connections between pole transformers and substations. For the wireless connection, we employ a wireless sensor network and design its corresponding data forwarding protocol to improve the quality of data delivery. For the design, we adopt a tree-based data forwarding protocol in order to customize the distribution pattern of the power quality information. We verify the performance of the proposed data forwarding protocol quantitatively using the NS-2 network simulator.

  1. Practical and secure telemedicine systems for user mobility.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2018-02-01

    The application of wireless devices has led to a significant improvement in the quality delivery of care in telemedicine systems. Patients who live in a remote area are able to communicate with the healthcare provider and benefit from the doctor consultations. However, it has been a challenge to provide a secure telemedicine system, which captures users (patients and doctors) mobility and patient privacy. In this work, we present several secure protocols for telemedicine systems, which ensure the secure communication between patients and doctors who are located in different geographical locations. Our protocols are the first of this kind featured with confidentiality of patient information, mutual authentication, patient anonymity, data integrity, freshness of communication, and mobility. Our protocols are based on symmetric-key schemes and capture all desirable security requirements in order to better serve our objectives of research for secure telemedicine services; therefore, they are very efficient in implementation. A comparison with related works shows that our work contributes first comprehensive solution to capture user mobility and patient privacy for telemedicine systems. Copyright © 2018 Elsevier Inc. All rights reserved.

  2. Professional Development Needs of Directors Leading in a Mixed Service Delivery Preschool System

    ERIC Educational Resources Information Center

    Ryan, Sharon; Whitebook, Marcy; Kipnis, Fran; Sakai, Laura

    2011-01-01

    This paper reports on an interview study with directors of Head Start and child care programs who are collaborating with local education authorities to provide publicly funded preschool in New Jersey, USA. A standardized interview protocol was utilized with 98 directors chosen to represent a range of center types from across the three main regions…

  3. What Would You Ideally Do if There Were No Targets? An Ethnographic Study of the Unintended Consequences of Top-Down Governance in Two Clinical Settings

    ERIC Educational Resources Information Center

    Allard, Jon; Bleakley, Alan

    2016-01-01

    Top-down policy directives, such as targets and their associated protocols, may be driven politically rather than clinically and can be described as macro-political texts. While targets supposedly provide incentives for healthcare services, they may unintentionally shape practices of accommodation rather than implementation, deflecting…

  4. Location Management in a Transport Layer Mobility Architecture

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Ishac, Joseph

    2005-01-01

    Mobility architectures that place complexity in end nodes rather than in the network interior have many advantageous properties and are becoming popular research topics. Such architectures typically push mobility support into higher layers of the protocol stack than network layer approaches like Mobile IP. The literature is ripe with proposals to provide mobility services in the transport, session, and application layers. In this paper, we focus on a mobility architecture that makes the most significant changes to the transport layer. A common problem amongst all mobility protocols at various layers is location management, which entails translating some form of static identifier into a mobile node's dynamic location. Location management is required for mobile nodes to be able to provide globally-reachable services on-demand to other hosts. In this paper, we describe the challenges of location management in a transport layer mobility architecture, and discuss the advantages and disadvantages of various solutions proposed in the literature. Our conclusion is that, in principle, secure dynamic DNS is most desirable, although it may have current operational limitations. We note that this topic has room for further exploration, and we present this paper largely as a starting point for comparing possible solutions.

  5. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  6. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    PubMed Central

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  7. Emergency medical service provider decision-making in out of hospital cardiac arrest: an exploratory study.

    PubMed

    Brandling, J; Kirby, K; Black, S; Voss, S; Benger, J

    2017-07-25

    There are approximately 60,000 out-of-hospital cardiac arrests (OHCA) in the United Kingdom (UK) each year. Within the UK there are well-established clinical practice guidelines that define when resuscitation should be commenced in OHCA, and when resuscitation should cease. Background literature indicates that decision-making in the commencement and cessation of resuscitation efforts in OHCA is complex, and not comprehensively understood. No relevant research from the UK has been published to date and this research study seeks to explore the influences on UK Emergency Medical Service (EMS) provider decision-making when commencing and ceasing resuscitation attempts in OHCA. The aim of this research to explore the influences on UK Emergency Medical Services provider decision-making when commencing and ceasing resuscitation attempts in OHCA. Four focus groups were convened with 16 clinically active EMS providers. Four case vignettes were discussed to explore decision-making within the focus groups. Thematic analysis was used to analyse transcripts. This research found that there are three stages in the decision-making process when EMS providers consider whether to commence or cease resuscitation attempts in OHCA. These stages are: the call; arrival on scene; the protocol. Influential factors present at each of the three stages can lead to different decisions and variability in practice. These influences are: factual information available to the EMS provider; structural factors such as protocol, guidance and research; cultural beliefs and values; interpersonal factors; risk factors; personal values and beliefs. An improved understanding of the circumstantial, individual and interpersonal factors that mediate the decision-making process in clinical practice could inform the development of more effective clinical guidelines, education and clinical decision support in OHCA. These changes have the potential to lead to greater consistency. and EMS provider confidence, with the potential for improved patient outcome from OHCA.

  8. RCR audit of compliance with UK guidelines for the prevention and detection of acute kidney injury in adult patients undergoing iodinated contrast media injections for CT.

    PubMed

    Cope, L H; Drinkwater, K J; Howlett, D C

    2017-12-01

    To determine radiology departmental compliance with current UK guidance on contrast-induced acute kidney injury (CI-AKI) and to provide data on the incidence of clinically significant post-contrast AKI (PC-AKI) in computed tomography (CT) practice. A questionnaire was sent to all UK acute National Health Service (NHS) providers (NHS boards in Scotland, local health boards in Wales, NHS trusts in England and health and social care trusts in Northern Ireland) to assess compliance of provider protocols with current UK guidelines for the prevention, recognition, and management of CI-AKI. Audit data were collected for 40 consecutive fit outpatients and 40 consecutive acutely unwell patients/inpatients from hospitals within each participating provider to assess clinical compliance. Eighty-nine of 172 (52%) health service providers responded, and data on 7,159 contrast-enhanced CT examinations were provided. Compliance with guidelines was poor with wide variation in clinical practice. The observed incidence of clinically significant (requiring treatment or resulting in death) PC-AKI was zero in 3,590 outpatients, although two patients developed AKI due to other causes (sepsis and progressive malignancy). Fourteen out of 3,569 (0.4%) patients in the inpatient group developed clinically significant PC-AKI, and a further 17 patients were identified who met the Kidney Disease Improving Global Outcomes (KDIGO) definition of AKI (Electronic Supplementary Material Appendix S1), but did not require active treatment, giving an overall incidence of AKI of 0.9%. In patients at high risk due to impaired renal function prior to the scan, there was no difference in the median serum creatinine (SCr) before and after contrast medium administration in either group. Health service provider protocols and clinical practice demonstrate poor compliance with current UK guidance on CI-AKI. A very low incidence of PC- AKI was demonstrated. Copyright © 2017 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  9. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study.

    PubMed

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-06-24

    The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. Running a distributed virtual observatory: U.S. Virtual Astronomical Observatory operations

    NASA Astrophysics Data System (ADS)

    McGlynn, Thomas A.; Hanisch, Robert J.; Berriman, G. Bruce; Thakar, Aniruddha R.

    2012-09-01

    Operation of the US Virtual Astronomical Observatory shares some issues with modern physical observatories, e.g., intimidating data volumes and rapid technological change, and must also address unique concerns like the lack of direct control of the underlying and scattered data resources, and the distributed nature of the observatory itself. In this paper we discuss how the VAO has addressed these challenges to provide the astronomical community with a coherent set of science-enabling tools and services. The distributed nature of our virtual observatory-with data and personnel spanning geographic, institutional and regime boundaries-is simultaneously a major operational headache and the primary science motivation for the VAO. Most astronomy today uses data from many resources. Facilitation of matching heterogeneous datasets is a fundamental reason for the virtual observatory. Key aspects of our approach include continuous monitoring and validation of VAO and VO services and the datasets provided by the community, monitoring of user requests to optimize access, caching for large datasets, and providing distributed storage services that allow user to collect results near large data repositories. Some elements are now fully implemented, while others are planned for subsequent years. The distributed nature of the VAO requires careful attention to what can be a straightforward operation at a conventional observatory, e.g., the organization of the web site or the collection and combined analysis of logs. Many of these strategies use and extend protocols developed by the international virtual observatory community. Our long-term challenge is working with the underlying data providers to ensure high quality implementation of VO data access protocols (new and better 'telescopes'), assisting astronomical developers to build robust integrating tools (new 'instruments'), and coordinating with the research community to maximize the science enabled.

  11. Exploring experiences in peer mentoring as a strategy for capacity building in sexual reproductive health and HIV service integration in Kenya.

    PubMed

    Ndwiga, Charity; Abuya, Timothy; Mutemwa, Richard; Kimani, James Kelly; Colombini, Manuela; Mayhew, Susannah; Baird, Averie; Muia, Ruth Wayua; Kivunaga, Jackline; Warren, Charlotte E

    2014-03-01

    The Integra Initiative designed, tested, and adapted protocols for peer mentorship in order to improve service providers' skills, knowledge, and capacity to provide quality integrated HIV and sexual and reproductive health (SRH) services. This paper describes providers' experiences in mentoring as a method of capacity building. Service providers who were skilled in the provision of FP or PNC services were selected to undergo a mentorship training program and to subsequently build the capacity of their peers in SRH-HIV integration. A qualitative assessment was conducted to assess provider experiences and perceptions about peer mentoring. In-depth interviews were conducted with twelve mentors and twenty-three mentees who were trained in SRH and HIV integration. Interviews were recorded, transcribed, and imported to NVivo 9 for analysis. Thematic analysis methods were used to develop a coding framework from the research questions and other emerging themes. Mentorship was perceived as a feasible and acceptable method of training among mentors and mentees. Both mentors and mentees agreed that the success of peer mentoring largely depended on cordial relationship and consensus to work together to achieve a specific set of skills. Mentees reported improved knowledge, skills, self-confidence, and team work in delivering integrated SRH and HIV services as benefits associated with mentoring. They also associated mentoring with an increase in the range of services available and the number of clients seeking those services. Successful mentorship was conditional upon facility management support, sufficient supplies and commodities, a positive work environment, and mentors selection. Mentoring was perceived by both mentors and mentees as a sustainable method for capacity building, which increased providers' ability to offer a wide range of and improved access to integrated SRH and HIV services.

  12. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  13. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-01-01

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040

  14. IPv6 testing and deployment at Prague Tier 2

    NASA Astrophysics Data System (ADS)

    Kouba, Tomáŝ; Chudoba, Jiří; Eliáŝ, Marek; Fiala, Lukáŝ

    2012-12-01

    Computing Center of the Institute of Physics in Prague provides computing and storage resources for various HEP experiments (D0, Atlas, Alice, Auger) and currently operates more than 300 worker nodes with more than 2500 cores and provides more than 2PB of disk space. Our site is limited to one C-sized block of IPv4 addresses, and hence we had to move most of our worker nodes behind the NAT. However this solution demands more difficult routing setup. We see the IPv6 deployment as a solution that provides less routing, more switching and therefore promises higher network throughput. The administrators of the Computing Center strive to configure and install all provided services automatically. For installation tasks we use PXE and kickstart, for network configuration we use DHCP and for software configuration we use CFEngine. Many hardware boxes are configured via specific web pages or telnet/ssh protocol provided by the box itself. All our services are monitored with several tools e.g. Nagios, Munin, Ganglia. We rely heavily on the SNMP protocol for hardware health monitoring. All these installation, configuration and monitoring tools must be tested before we can switch completely to IPv6 network stack. In this contribution we present the tests we have made, limitations we have faced and configuration decisions that we have made during IPv6 testing. We also present testbed built on virtual machines that was used for all the testing and evaluation.

  15. An analysis of the health service efficiency and patient experience with two different intravenous iron preparations in a UK anaemia clinic.

    PubMed

    Wilson, Paul D; Hutchings, Adam; Jeans, Aruna; Macdougall, Iain C

    2013-01-01

    Historically, the Renal Unit at King's College Hospital used intravenous (IV) iron sucrose (IS) to treat iron deficiency anaemia in patients with chronic kidney disease who were not on dialysis (CKD-ND). As part of a service initiative to improve patient experience, new products were considered as alternatives. This study investigated the potential impact on patient experience and service costs by switching from IS to ferric carboxymaltose (FCM). A decision analytical model was used to calculate the impact of switching from IS to FCM for a cohort of CKD-ND patients. Service provision data were collected for 365 patients who received 600 mg IS within a 12 month period, creating the IS data set. The service provision data, along with a clinically relevant FCM administration protocol (stipulating total doses of 500 mg FCM), were used to calculate a corresponding theoretical data set for FCM for the same cohort of patients. The FCM protocol saved each patient two hospital visits and 2.66 hours of time (equating to approximately a saving of £36.21 in loss of earnings) and £19 in travel costs. Direct attributable costs for iron administration (which included drug, disposables, nursing staff, and hospital-provided patient transport costs) were £58,646 for IS vs £46,473 for FCM. Direct overhead costs (which included nursing preparation time, administration staff, clinic space, and consultant time costs) were £40,172 for the IS service vs £15,174 for the FCM service. Based on clinical experience with the products, this analysis assumes that 500 mg FCM is therapeutically equivalent to 600 mg IS. Consultant time costs are assumed to be the same between the two treatment groups. IV iron administration protocols and data are specific to King's College Hospital. The design is retrospective and changes to the management of the clinic, including service delivery optimization, may also affect real costs. FCM was associated with fewer hospital visits and reduced transport costs for CKD-ND patients receiving IV iron and has the potential to save 19-37% in service costs. Owing to increased administration efficiency, FCM can improve the overall patient experience while reducing the total cost of the King's College Hospital IV iron service for CKD-ND patients, compared with treatment with IS.

  16. Providers' perceptions of the implementation of a performance measurement system for substance abuse treatment: A process evaluation of the Service Quality Measures initiative.

    PubMed

    Myers, Bronwyn; Williams, Petal Petersen; Johnson, Kim; Govender, Rajen; Manderscheid, Ron; Koch, J Randy

    2016-02-22

    In South Africa, concerns exist about the quality of substance abuse treatment. We developed a performance measurement system, known as the Service Quality Measures (SQM) initiative, to monitor the quality of treatment and assess efforts to improve quality of care. In 2014, the SQM system was implemented at six treatment sites to evaluate how implementation protocols could be improved in preparation for wider roll-out. To describe providers' perceptions of the feasibility and acceptability of implementing the SQM system, including barriers to and facilitators of implementation. We conducted 15 in-depth interviews (IDIs) with treatment providers from six treatment sites (two sites in KwaZulu-Natal and four in the Western Cape). Providers were asked about their experiences in implementing the system, the perceived feasibility of the system, and barriers to implementation. All IDIs were audio-recorded and transcribed verbatim. A framework approach was used to analyse the data. Providers reported that the SQM system was feasible to implement and acceptable to patients and providers. Issues identified through the IDIs included a perceived lack of clarity about sequencing of key elements in the implementation of the SQM system, questions on integration of the system into clinical care pathways, difficulties in tracking patients through the system, and concerns about maximising patient participation in the process. Findings suggest that the SQM system is feasible to implement and acceptable to providers, but that some refinements to the implementation protocols are needed to maximise patient participation and the likelihood of sustained implementation.

  17. Protocol: A grounded theory of ‘recovery’—perspectives of adolescent users of mental health services

    PubMed Central

    Palmquist, Lucianne; Patterson, Sue; O'Donovan, Analise; Bradley, Graham

    2017-01-01

    Introduction Policies internationally endorse the recovery paradigm as the appropriate foundation for youth mental health services. However, given that this paradigm is grounded in the views of adults with severe mental illness, applicability to youth services and relevance to young people is uncertain, particularly as little is known about young people’s views. A comprehensive understanding of the experiences and expectations of young people is critical to developing youth mental health services that are acceptable, accessible, effective and relevant. Aim To inform development of policy and youth services, the study described in this protocol aims to develop a comprehensive account of the experiences and expectations of 12–17 year olds as they encounter mental disorders and transition through specialist mental health services. Data will be analysed to model recovery from the adolescents’ perspective. Method and analysis This grounded theory study will use quantitative and qualitative data collected in interviews with 12–17 year olds engaged with specialist Child/Youth Mental Health Service in Queensland, Australia. Interviews will explore adolescents’ expectations and experiences of mental disorder, and of services, as they transition through specialist mental health services, including the meaning of their experiences and ideas of ‘recovery’ and how their experiences and expectations are shaped. Data collection and analysis will use grounded theory methods. Ethics and dissemination Adolescents’ experiences will be presented as a mid-range theory. The research will provide tangible recommendations for youth-focused mental health policy and practice. Findings will be disseminated within academic literature and beyond to participants, health professionals, mental health advocacy groups and policy and decision makers via publications, research summaries, conferences and workshops targeting different audiences. Ethical and research governance approvals have been obtained from relevant Human Research Ethics committees and all sites involved. PMID:28729312

  18. A Case Study in Web 2.0 Application Development

    NASA Astrophysics Data System (ADS)

    Marganian, P.; Clark, M.; Shelton, A.; McCarty, M.; Sessoms, E.

    2010-12-01

    Recent web technologies focusing on languages, frameworks, and tools are discussed, using the Robert C. Byrd Green Bank Telescopes (GBT) new Dynamic Scheduling System as the primary example. Within that example, we use a popular Python web framework, Django, to build the extensive web services for our users. We also use a second complimentary server, written in Haskell, to incorporate the core scheduling algorithms. We provide a desktop-quality experience across all the popular browsers for our users with the Google Web Toolkit and judicious use of JQuery in Django templates. Single sign-on and authentication throughout all NRAO web services is accomplished via the Central Authentication Service protocol, or CAS.

  19. WebGLORE: a Web service for Grid LOgistic REgression

    PubMed Central

    Jiang, Wenchao; Li, Pinghao; Wang, Shuang; Wu, Yuan; Xue, Meng; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2013-01-01

    WebGLORE is a free web service that enables privacy-preserving construction of a global logistic regression model from distributed datasets that are sensitive. It only transfers aggregated local statistics (from participants) through Hypertext Transfer Protocol Secure to a trusted server, where the global model is synthesized. WebGLORE seamlessly integrates AJAX, JAVA Applet/Servlet and PHP technologies to provide an easy-to-use web service for biomedical researchers to break down policy barriers during information exchange. Availability and implementation: http://dbmi-engine.ucsd.edu/webglore3/. WebGLORE can be used under the terms of GNU general public license as published by the Free Software Foundation. Contact: x1jiang@ucsd.edu PMID:24072732

  20. Design and implementation considerations of a MSAT packet data network

    NASA Technical Reports Server (NTRS)

    Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.

    1993-01-01

    The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.

  1. Are You Ready for Emergency Medical Services in Your Oral and Maxillofacial Surgery Office?

    PubMed

    Rayner, Clive; Ragan, Michael R

    2018-05-01

    Efficient responses to emergencies in the oral and maxillofacial surgery office require preparation, communication, and thorough documentation of the event and response. The concept of team anesthesia is showcased with these efforts. Emergency medical services training and response times vary greatly. The oral and maxillofacial surgery office should be prepared to manage the patient for at least 15 minutes after making the call to 911. Patient outcomes are optimized when providers work together to manage and transport the patient. Oral and maxillofacial surgery offices should develop and rehearse emergency plans and coordinate these protocols with local Emergency medical services teams. Copyright © 2018 Elsevier Inc. All rights reserved.

  2. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.

  3. Serving Satellite Remote Sensing Data to User Community through the OGC Interoperability Protocols

    NASA Astrophysics Data System (ADS)

    di, L.; Yang, W.; Bai, Y.

    2005-12-01

    Remote sensing is one of the major methods for collecting geospatial data. Hugh amount of remote sensing data has been collected by space agencies and private companies around the world. For example, NASA's Earth Observing System (EOS) is generating more than 3 Tb of remote sensing data per day. The data collected by EOS are processed, distributed, archived, and managed by the EOS Data and Information System (EOSDIS). Currently, EOSDIS is managing several petabytes of data. All of those data are not only valuable for global change research, but also useful for local and regional application and decision makings. How to make the data easily accessible to and usable by the user community is one of key issues for realizing the full potential of these valuable datasets. In the past several years, the Open Geospatial Consortium (OGC) has developed several interoperability protocols aiming at making geospatial data easily accessible to and usable by the user community through Internet. The protocols particularly relevant to the discovery, access, and integration of multi-source satellite remote sensing data are the Catalog Service for Web (CS/W) and Web Coverage Services (WCS) Specifications. The OGC CS/W specifies the interfaces, HTTP protocol bindings, and a framework for defining application profiles required to publish and access digital catalogues of metadata for geographic data, services, and related resource information. The OGC WCS specification defines the interfaces between web-based clients and servers for accessing on-line multi-dimensional, multi-temporal geospatial coverage in an interoperable way. Based on definitions by OGC and ISO 19123, coverage data include all remote sensing images as well as gridded model outputs. The Laboratory for Advanced Information Technology and Standards (LAITS), George Mason University, has been working on developing and implementing OGC specifications for better serving NASA Earth science data to the user community for many years. We have developed the NWGISS software package that implements multiple OGC specifications, including OGC WMS, WCS, CS/W, and WFS. As a part of NASA REASON GeoBrain project, the NWGISS WCS and CS/W servers have been extended to provide operational access to NASA EOS data at data pools through OGC protocols and to make both services chainable in the web-service chaining. The extensions in the WCS server include the implementation of WCS 1.0.0 and WCS 1.0.2, and the development of WSDL description of the WCS services. In order to find the on-line EOS data resources, the CS/W server is extended at the backend to search metadata in NASA ECHO. This presentation reports those extensions and discuss lessons-learned on the implementation. It also discusses the advantage, disadvantages, and future improvement of OGC specifications, particularly the WCS.

  4. Modern Technologies aspects for Oceanographic Data Management and Dissemination : The HNODC Implementation

    NASA Astrophysics Data System (ADS)

    Lykiardopoulos, A.; Iona, A.; Lakes, V.; Batis, A.; Balopoulos, E.

    2009-04-01

    The development of new technologies for the aim of enhancing Web Applications with Dynamically data access was the starting point for Geospatial Web Applications to developed at the same time as well. By the means of these technologies the Web Applications embed the capability of presenting Geographical representations of the Geo Information. The induction in nowadays, of the state of the art technologies known as Web Services, enforce the Web Applications to have interoperability among them i.e. to be able to process requests from each other via a network. In particular throughout the Oceanographic Community, modern Geographical Information systems based on Geospatial Web Services are now developed or will be developed shortly in the near future, with capabilities of managing the information itself fully through Web Based Geographical Interfaces. The exploitation of HNODC Data Base, through a Web Based Application enhanced with Web Services by the use of open source tolls may be consider as an ideal case of such implementation. Hellenic National Oceanographic Data Center (HNODC) as a National Public Oceanographic Data provider and at the same time a member of the International Net of Oceanographic Data Centers( IOC/IODE), owns a very big volume of Data and Relevant information about the Marine Ecosystem. For the efficient management and exploitation of these Data, a relational Data Base has been constructed with a storage of over 300.000 station data concerning, physical, chemical and biological Oceanographic information. The development of a modern Web Application for the End User worldwide to be able to explore and navigate throughout HNODC data via the use of an interface with the capability of presenting Geographical representations of the Geo Information, is today a fact. The application is constituted with State of the art software components and tools such as: • Geospatial and no Spatial Web Services mechanisms • Geospatial open source tools for the creation of Dynamic Geographical Representations. • Communication protocols (messaging mechanisms) in all Layers such as XML and GML together with SOAP protocol via Apache/Axis. At the same time the application may interact with any other SOA application either in sending or receiving Geospatial Data through Geographical Layers, since it inherits the big advantage of interoperability between Web Services systems. Roughly the Architecture can denoted as follows: • At the back End Open source PostgreSQL DBMS stands as the data storage mechanism with more than one Data Base Schemas cause of the separation of the Geospatial Data and the non Geospatial Data. • UMN Map Server and Geoserver are the mechanisms for: Represent Geospatial Data via Web Map Service (WMS) Querying and Navigating in Geospatial and Meta Data Information via Web Feature Service (WFS) oAnd in the near future Transacting and processing new or existing Geospatial Data via Web Processing Service (WPS) • Map Bender, a geospatial portal site management software for OGC and OWS architectures acts as the integration module between the Geospatial Mechanisms. Mapbender comes with an embedded data model capable to manage interfaces for displaying, navigating and querying OGC compliant web map and feature services (WMS and transactional WFS). • Apache and Tomcat stand again as the Web Service middle Layers • Apache Axis with it's embedded implementation of the SOAP protocol ("Simple Object Access Protocol") acts as the No spatial data Mechanism of Web Services. These modules of the platform are still under development but their implementation will be fulfilled in the near future. • And a new Web user Interface for the end user based on enhanced and customized version of a MapBender GUI, a powerful Web Services client. For HNODC the interoperability of Web Services is the big advantage of the developed platform since it is capable to act in the future as provider and consumer of Web Services in both ways: • Either as data products provider for external SOA platforms. • Or as consumer of data products from external SOA platforms for new applications to be developed or for existing applications to be enhanced. A great paradigm of Data Managenet integration and dissemination via the use of such technologies is the European's Union Research Project Seadatanet, with the main objective to develop a standardized distributed system for managing and disseminating the large and diverse data sets and to enhance the currently existing infrastructures with Web Services Further more and when the technology of Web Processing Service (WPS), will be mature enough and applicable for development, the derived data products will be able to have any kind of GIS functionality for consumers across the network. From this point of view HNODC, joins the global scientific community by providing and consuming application Independent data products.

  5. Substance Abuse Treatment for Persons with Co-Occurring Disorders. Treatment Improvement Protocol (TIP) Series 42

    ERIC Educational Resources Information Center

    Substance Abuse and Mental Health Services Administration, 2005

    2005-01-01

    Treatment Improvement Protocols (TIPs), developed by the Center for Substance Abuse Treatment (CSAT), part of the Substance Abuse and Mental Health Services Administration (SAMHSA) within the U.S. Department of Health and Human Services (DHHS), are best-practice guidelines for the treatment of substance use disorders. CSAT draws on the experience…

  6. Research protocols in National Park Service wilderness

    Treesearch

    Jim Walters

    2000-01-01

    While the National Park Service encourages the use of its wilderness resource for research, management policies require that all research apply “minimum requirement” protocols to determine: 1) if the research is needed to support the purposes of wilderness and, 2) if it is appropriate, determine the minimum tool needed to accomplish the work.

  7. Addressing Viral Hepatitis in People with Substance Use Disorders. Treatment Improvement Protocol (TIP) Series 53

    ERIC Educational Resources Information Center

    Substance Abuse and Mental Health Services Administration, 2011

    2011-01-01

    Treatment Improvement Protocols (TIPs) are developed by the Center for Substance Abuse Treatment (CSAT), part of the Substance Abuse and Mental Health Services Administration (SAMHSA) within the U.S. Department of Health and Human Services (HHS). Each TIP involves the development of topic-specific best-practice guidelines for the prevention and…

  8. Services, architectures, and protocols for space data systems

    NASA Technical Reports Server (NTRS)

    Helgert, Hermann J.

    1991-01-01

    The author presents a comprehensive discussion of three major aspects of the work of the Consultative Committee for Space Data Systems (CCSDS), a worldwide cooperative effort of national space agencies. The author examines the CCSDS space data communications network concept on which the data communications facilities of future advanced orbiting systems will be based. He derives the specifications of an open communications architecture as a reference model for the development of services and protocols that support the transfer of information over space data communications networks. Detailed specifications of the communication services and information transfer protocols that have reached a high degree of maturity and stability are offered. The author also includes a complete list of currently available CCSDS standards and supporting documentation.

  9. [Complex chronic care situations and socio-health coordination].

    PubMed

    Morilla Herrera, Juan Carlos; Morales Asencio, José Miguel; Kaknani, Shakira; García Mayor, Silvia

    2016-01-01

    Patient-centered healthcare is currently one of the most pursued goals in health services. It is necessary to ensure a sufficient level of cooperative and coordinated work between different providers and settings, including family and social and community resources. Clinical integration occurs when the care provided by health professionals and providers is integrated into a single coherent process through different professions using shared guidelines and protocols. Such coordination can be developed at three levels: macro, which involves the integration of one or more of the three basic elements that support health care (the health plan, primary care and specialty care), with the aim of reducing fragmentation of care; meso, where health and social services are coordinated to provide comprehensive care to elderly and chronic patients; and micro, aimed to improve coordination in individual patients and caregivers. The implementation of new roles, such as Advanced Practice Nursing, along with improvements in family physicians' problem-solving capacity in certain processes, or modifying the place of provision of certain services are key to ensure services adapted to the requirements of chronic patients. Copyright © 2015 Elsevier España, S.L.U. All rights reserved.

  10. The Aerospace Energy Systems Laboratory: A BITBUS networking application

    NASA Technical Reports Server (NTRS)

    Glover, Richard D.; Oneill-Rood, Nora

    1989-01-01

    The NASA Ames-Dryden Flight Research Facility developed a computerized aircraft battery servicing facility called the Aerospace Energy Systems Laboratory (AESL). This system employs distributed processing with communications provided by a 2.4-megabit BITBUS local area network. Customized handlers provide real time status, remote command, and file transfer protocols between a central system running the iRMX-II operating system and ten slave stations running the iRMX-I operating system. The hardware configuration and software components required to implement this BITBUS application are required.

  11. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  12. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  13. Energy efficiency as a commodity: The emergence of a secondary market for efficiency savings in commercial buildings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kats, G.H.; Rosenfield, A.H.; McIntosh, T.A.

    1997-06-01

    The energy efficiency industry is constrained by lack of financing. For example, in the United States, commercial and public buildings need an investment of $100 billion for cost-effective retrofits with an average payback of about four years. But the current level of financing is stagnant at only about 34% of this level per year. The U.S. Department of Energy (DOE) has led the development of the North American Energy Measurement and Verification Protocol (NEMVP). This Protocol will increase the reliability and quality of estimated efficiency savings and improve realized savings. A critical element in the development of low cost financingmore » and a secondary market--whether for homes or credit card debt--is the adoption of protocols to provide uniformity and reliability of the product. This is also true of energy efficiency installations, which have been characterized by inconsistency in the installation methodologies and, frequently, unreliability of savings. This Protocol, published in April 1996, is a DOE-led effort involving American Society of Heating, Refrigerating, and Air-Conditioning Engineers, Inc. ASHRAE, National Association of Energy Service Companies NAESCO, National Association of Regulatory Utility Commissioners NARUC, National Association of State Energy Officials NASEO, US Environmental Protection Agency EPA, Canada`s Canadian Association of Energy Service Companies CAESCO, and Mexico`s Comision Nacional Para El Ahorro De Energia CONAE and Fideicomiso De Apoyo Al Programa De Ahorro De Energia Del Sector Electrico FIDE. DOE has begun to build on this Protocol to develop new forms of lower-cost financing including, ultimately, development of a secondary market for energy efficiency. This could double financing for building energy efficiency within five years.« less

  14. Improving investigational drug service operations through development of an innovative computer system.

    PubMed

    Sweet, Burgunda V; Tamer, Helen R; Siden, Rivka; McCreadie, Scott R; McGregory, Michael E; Benner, Todd; Tankanow, Roberta M

    2008-05-15

    The development of a computerized system for protocol management, dispensing, inventory accountability, and billing by the investigational drug service (IDS) of a university health system is described. After an unsuccessful search for a commercial system that would accommodate the variation among investigational protocols and meet regulatory requirements, the IDS worked with the health-system pharmacy's information technology staff and informatics pharmacists to develop its own system. The informatics pharmacists observed work-flow and information capture in the IDS and identified opportunities for improved efficiency with an automated system. An iterative build-test-design process was used to provide the flexibility needed for individual protocols. The intent was to design a system that would support most IDS processes, using components that would allow automated backup and redundancies. A browser-based system was chosen to allow remote access. Servers, bar-code scanners, and printers were integrated into the final system design. Initial implementation involved 10 investigational protocols chosen on the basis of dispensing volume and complexity of study design. Other protocols were added over a two-year period; all studies whose drugs were dispensed from the IDS were added, followed by those for which the drugs were dispensed from decentralized pharmacy areas. The IDS briefly used temporary staff to free pharmacist and technician time for system implementation. Decentralized pharmacy areas that rarely dispense investigational drugs continue to use manual processes, with subsequent data transcription into the system. Through the university's technology transfer division, the system was licensed by an external company for sale to other IDSs. The WebIDS system has improved daily operations, enhanced safety and efficiency, and helped meet regulatory requirements for investigational drugs.

  15. A qualitative study of diverse providers' behaviour in response to commissioners, patients and innovators in England: research protocol.

    PubMed

    Sheaff, Rod; Halliday, Joyce; Exworthy, Mark; Allen, Pauline; Mannion, Russell; Asthana, Sheena; Gibson, Alex; Clark, Jonathan

    2016-05-13

    The variety of organisations providing National Health Service (NHS)-funded services in England is growing. Besides NHS hospitals and general practitioners (GPs), they include corporations, social enterprises, voluntary organisations and others. The degree to which these organisational types vary, however, in the ways they manage and provide services and in the outcomes for service quality, patient experience and innovation, remains unclear. This research will help those who commission NHS services select among the different types of organisation for different tasks. The main research questions are how organisationally diverse NHS-funded service providers vary in their responsiveness to patient choice, NHS commissioning and policy changes; and their patterns of innovation. We aim to assess the implications for NHS commissioning and managerial practice which follow from these differences. Systematic qualitative comparison across a purposive sample (c.12) of providers selected for maximum variety of organisational type, with qualitative studies of patient experience and choice (in the same sites). We focus is on NHS services heavily used by older people at high risk of hospital admission: community health services; out-of-hours primary care; and secondary care (planned orthopaedics or ophthalmology). The expected outputs will be evidence-based schemas showing how patterns of service development and delivery typically vary between different organisational types of provider. We will ensure informants' organisational and individual anonymity when dealing with high profile case studies and a competitive health economy. The frail elderly is a key demographic sector with significant policy and financial implications. For NHS commissioners, patients, doctors and other stakeholders, the main outcome will be better knowledge about the relative merits of different kinds of healthcare provider. Dissemination will make use of strategies suggested by patient and public involvement, as well as DH and service-specific outlets. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. Protocols for Scholarly Communication

    NASA Astrophysics Data System (ADS)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  17. Formative research and development of innovative tools for "Better Outcomes in Labour Difficulty" (BOLD): study protocol.

    PubMed

    Bohren, Meghan A; Oladapo, Olufemi T; Tunçalp, Özge; Wendland, Melanie; Vogel, Joshua P; Tikkanen, Mari; Fawole, Bukola; Mugerwa, Kidza; Souza, João Paulo; Bahl, Rajiv; Gülmezoglu, A Metin

    2015-05-26

    Most complications during labour and childbirth could be averted with timely interventions by skilled healthcare providers. Yet, the quality and outcomes of childbirth care remains suboptimal in many health facilities in low-resource settings. To accelerate the reduction of childbirth-related maternal, fetal and newborn mortality and morbidity, the World Health Organization has initiated the "Better Outcomes in Labour Difficulty" (BOLD) project to address weaknesses in labour care processes and better connect health systems and communities. The project seeks to develop a "Simplified, Effective, Labour Monitoring-to-Action" tool (SELMA) to assist healthcare providers to monitor labour and take decisive actions more efficiently; and by developing an innovative set of service prototypes and/or tools termed "Passport to Safer Birth", designed with communities and healthcare providers, to promote access to quality care for women during childbirth. This protocol describes the formative research activities to support the development of these tools. We will employ qualitative research and service design methodologies in eight health facilities and their catchment communities in Nigeria and Uganda. In the health facilities, focus group discussions (FGD) and in-depth interviews (IDI) will be conducted among different cadres of healthcare providers and facility administrators. In the communities, FGDs and IDIs will be conducted among women who have delivered in a health facility. We will use service design methods to explore women's journey to access and receive childbirth care in order to innovate and design services around the needs and expectations of women, within the context of the health system. This formative research will serve several roles. First, it will provide an in-depth understanding of healthcare providers and health system issues to be accounted for in the final design and implementation of SELMA. Second, it will help to identify key moments ("touch points") where women's experiences of childbirth care are shaped, and where the overall experience of quality care could be improved. The synthesis of findings from the qualitative and service design activities will help identify potential areas for behaviour change related to the provision and experience of childbirth care, and serve as the basis for the development of Passport to Safer Birth. Please see related articles 'http://dx.doi.org/ 10.1186/s12978-015-0027-6 ' and 'http://dx.doi.org/ 10.1186/s12978-015-0029-4 '.

  18. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  19. A Redesign Approach for Improving Animal Care Services for Researchers

    PubMed Central

    Okpe, Orighomisan; Kovach, Jamison V

    2017-01-01

    Because a research institution's animal care and use program oversees the provision of services specified in approved protocols designed by researchers, the effective provision of services within these programs is paramount to ensuring the humane care and treatment of research animals in accordance with federal, state, and local regulations and institutional policies. To improve the services provided to researchers through animal care and use programs, we investigated the relationship between the researchers who conduct these types of studies and the veterinary operations that provide care and treatment for research animals. Through a case study conducted at a leading public research university, we used an action-research approach to redesign aspects of the process through which researchers and the veterinary operations interact by using the Design for Six Sigma methodology. Using this structured approach for building quality into the design of a process to better serve customers, we identified and prioritized researchers’ expectations regarding the role of veterinary operations in supporting their animal research activities. In addition, ideas for addressing researchers’ top-rated needs were generated through focus groups. By updating online resources, creating checklists and newsletters, and hiring additional veterinary staff, the services provided were amended to provide researchers with increased access to valuable information, improved clarity regarding the process for obtaining access to research facilities, and enhanced support for animal care services. PMID:28724497

  20. A Redesign Approach for Improving Animal Care Services for Researchers.

    PubMed

    Okpe, Orighomisan; Kovach, Jamison V

    2017-07-01

    Because a research institution's animal care and use program oversees the provision of services specified in approved protocols designed by researchers, the effective provision of services within these programs is paramount to ensuring the humane care and treatment of research animals in accordance with federal, state, and local regulations and institutional policies. To improve the services provided to researchers through animal care and use programs, we investigated the relationship between the researchers who conduct these types of studies and the veterinary operations that provide care and treatment for research animals. Through a case study conducted at a leading public research university, we used an action-research approach to redesign aspects of the process through which researchers and the veterinary operations interact by using the Design for Six Sigma methodology. Using this structured approach for building quality into the design of a process to better serve customers, we identified and prioritized researchers' expectations regarding the role of veterinary operations in supporting their animal research activities. In addition, ideas for addressing researchers' top-rated needs were generated through focus groups. By updating online resources, creating checklists and newsletters, and hiring additional veterinary staff, the services provided were amended to provide researchers with increased access to valuable information, improved clarity regarding the process for obtaining access to research facilities, and enhanced support for animal care services.

  1. Practices in habilitation of pediatric recipients of cochlear implants in India: A survey.

    PubMed

    Jeyaraman, Janani

    2013-01-01

    Cochlear implant (CI) (re)habilitation programs are long-term processes, with many factors contributing to the overall success. The clinics in India that are working toward pediatric CI habilitation vary in their team philosophy, clinical practices, and service delivery. It is important to explore their clinical perspectives and practices to appreciate their current state and suggest directions for improvement in the future. The objective of the study was to characterize the current status and clinical practices of the pediatric CI programs in India. Twenty-two clinics involved in the pediatric CI habilitation program across India participated in the survey. The heads of the CI teams of the participant clinics completed a validated survey questionnaire containing multiple-choice and open-ended questions on the details of the CI habilitation team, assessment and therapy protocols used, and other related clinical services. The categorical data obtained were analyzed using descriptive statistical measures. The interpretation of results indicated a need to focus future discussions on early identification and management of hearing impairment, funding for CIs, continuing education programs for professionals, decision processes for providing CIs for children with multiple concerns, choice of language(s) of instruction, assessment protocols used, and outreach/consultation services.

  2. A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability.

    PubMed

    Huang, Chih-Yuan; Wu, Cheng-Hung

    2016-08-31

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human's daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner.

  3. Emergence of a rehabilitation medicine model for low vision service delivery, policy, and funding.

    PubMed

    Stelmack, Joan

    2005-05-01

    A rehabilitation medicine model for low vision rehabilitation is emerging. There have been many challenges to reaching consensus on the roles of each discipline (optometry, ophthalmology, occupational therapy, and vision rehabilitation professionals) in the service delivery model and finding a place in the reimbursement system for all the providers. The history of low vision, legislation associated with Centers for Medicare and Medicaid Services coverage for vision rehabilitation, and research on the effectiveness of low vision service delivery are reviewed. Vision rehabilitation is now covered by Medicare under Physical Medicine and Rehabilitation codes by some Medicare carriers, yet reimbursement is not available for low vision devices or refraction. Also, the role of vision rehabilitation professionals (rehabilitation teachers, orientation and mobility specialists, and low vision therapists) in the model needs to be determined. In a recent systematic review of the scientific literature on the effectiveness of low vision services contracted by the Agency for Health Care Quality Research, no clinical trials were found. The literature consists primarily of longitudinal case studies, which provide weak support for third-party funding for vision rehabilitative services. Providers need to reach consensus on medical necessity, treatment plans, and protocols. Research on low vision outcomes is needed to develop an evidence base to guide clinical practice, policy, and funding decisions.

  4. Dynamic selection mechanism for quality of service aware web services

    NASA Astrophysics Data System (ADS)

    D'Mello, Demian Antony; Ananthanarayana, V. S.

    2010-02-01

    A web service is an interface of the software component that can be accessed by standard Internet protocols. The web service technology enables an application to application communication and interoperability. The increasing number of web service providers throughout the globe have produced numerous web services providing the same or similar functionality. This necessitates the use of tools and techniques to search the suitable services available over the Web. UDDI (universal description, discovery and integration) is the first initiative to find the suitable web services based on the requester's functional demands. However, the requester's requirements may also include non-functional aspects like quality of service (QoS). In this paper, the authors define a QoS model for QoS aware and business driven web service publishing and selection. The authors propose a QoS requirement format for the requesters, to specify their complex demands on QoS for the web service selection. The authors define a tree structure called quality constraint tree (QCT) to represent the requester's variety of requirements on QoS properties having varied preferences. The paper proposes a QoS broker based architecture for web service selection, which facilitates the requesters to specify their QoS requirements to select qualitatively optimal web service. A web service selection algorithm is presented, which ranks the functionally similar web services based on the degree of satisfaction of the requester's QoS requirements and preferences. The paper defines web service provider qualities to distinguish qualitatively competitive web services. The paper also presents the modelling and selection mechanism for the requester's alternative constraints defined on the QoS. The authors implement the QoS broker based system to prove the correctness of the proposed web service selection mechanism.

  5. Receptor binding assay for paralytic shellfish poisoning toxins: optimization and interlaboratory comparison.

    PubMed

    Ruberu, Shryamalie R; Liu, Yun-Gang; Wong, Carolyn T; Perera, S Kusum; Langlois, Gregg W; Doucette, Gregory J; Powell, Christine L

    2003-01-01

    A receptor binding assay (RBA) for detection of paralytic shellfish poisoning (PSP) toxins was formatted for use in a high throughput detection system using microplate scintillation counting. The RBA technology was transferred from the National Ocean Service, which uses a Wallac TriLux 1450 MicroBeta microplate scintillation counter, to the California Department of Health Services, which uses a Packard TopCount scintillation counter. Due to differences in the detector arrangement between these 2 counters, markedly different counting efficiencies were exhibited, requiring optimization of the RBA protocol for the TopCount instrument. Precision, accuracy, and sensitivity [limit of detection = 0.2 microg saxitoxin (STX) equiv/100 g shellfish tissue] of the modified protocol were equivalent to those of the original protocol. The RBA robustness and adaptability were demonstrated by an interlaboratory study, in which STX concentrations in shellfish generated by the TopCount were consistent with MicroBeta-derived values. Comparison of STX reference standards obtained from the U.S. Food and Drug Administration and the National Research Council, Canada, showed no observable differences. This study confirms the RBA's value as a rapid, high throughput screen prior to testing by the conventional mouse bioassay (MBA) and its suitability for providing an early warning of increasing PSP toxicity when toxin levels are below the MBA limit of detection.

  6. A Discussion of the Issue of Football Helmet Removal in Suspected Cervical Spine Injuries

    PubMed Central

    Segan, Ross D.; Cassidy, Christine; Bentkowski, Jamie

    1993-01-01

    In some areas, it is a commonly accepted emergency medical technician protocol to remove a helmet during the initial management of suspected cervical spine injures. After a comprehensive survey of relevant literature, four primary reasons why Emergency Medical Services professionals would desire to remove a helmet emerge. Sources suggest that the presence of a helmet might: 1) interfere with immobilization of the athlete; 2) interfere with the ability to visualize injuries; 3) cause hyperflexion of the cervical spine; and 4) prevent proper airway management during a cardiorespiratory emergency. Many available protocols are designed for the removal of closed chamber motorcycle helmets that do not have removable face masks. There are a great number of differing viewpoints regarding this issue. The varying viewpoints are results of the failure of many emergency medical technician management protocols to address the unique situation presented by a football helmet. We: 1) demonstrate that football helmet removal is potentially dangerous and unnecessary, 2) suggest that cardiorespiratory emergencies can be effectively managed without removing the helmet, and 3) provide sports medicine professional with information that may be used to establish a joint Emergency Medical Services/Sports Medicine emergency action plan. ImagesFig. 1.Fig 2.Fig 3.Fig 4.Fig 5.Fig 6. PMID:16558244

  7. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks

    PubMed Central

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411

  8. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    PubMed

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  9. Catching flies with vinegar: a critique of the Centers for Medicare and Medicaid self-disclosure program.

    PubMed

    Veilleux, Jean Wright

    2012-01-01

    This Article argues that the current approach of the Department of Health and Human Services and the Centers for Medicare and Medicaid Services (CMS) to enforcement of the Ethics in Patient Referrals Act (the "Stark Law") is unnecessarily punitive and discourages health-care providers from self-disclosing even very minor violations of the Stark Law. This Article suggests a number of specific changes to encourage provider self-disclosure and proposes that CMS create a demonstration project under the authority of the Patient Protection and Affordable Care Act to test the reforms. A demonstration project provides the perfect vehicle to prove that increased self-disclosure protocols for the Stark Law can decrease the government's costs of enforcement, improve program integrity, and encourage providers to deal responsibly with the inevitable minor lapses in compliance that arise in such an enormous government program as Medicare.

  10. Naloxone administration for suspected opioid overdose: An expanded scope of practice by a basic life support collegiate-based emergency medical services agency.

    PubMed

    Jeffery, Ryan M; Dickinson, Laura; Ng, Nicholas D; DeGeorge, Lindsey M; Nable, Jose V

    2017-04-01

    Opioid abuse is a growing and significant public health concern in the United States. Naloxone is an opioid antagonist that can rapidly reverse the respiratory depression associated with opioid toxicity. Georgetown University's collegiate-based emergency medical services (EMS) agency recently adopted a protocol, allowing providers to administer intranasal naloxone for patients with suspected opioid overdose. While normally not within the scope of practice of basic life support prehospital agencies, the recognition of an increasing epidemic of opioid abuse has led many states, including the District of Columbia, to expand access to naloxone for prehospital providers of all levels of training. In particular, intranasal naloxone is a method of administering this medication that potentially avoids needlestick injuries among EMS providers. Universities with collegiate-based EMS agencies are well positioned to provide life-saving treatments for patients acutely ill from opioid overdose.

  11. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  12. Implementing screening, brief intervention, and referral for alcohol and drug use: the trauma service perspective.

    PubMed

    Sise, Michael J; Sise, C Beth; Kelley, Dorothy M; Simmons, Charles W; Kelso, Dennis J

    2005-09-01

    Most trauma surgeons are unfamiliar with screening, brief intervention, and referral (SBIR) programs for substance use disorders, and few trauma centers provide them. This report describes how an urban private-teaching hospital adapted a protocol from an existing emergency department-based program to include patients treated by the trauma service. We recorded the rates of SBIR completion and reasons for failure during each phase of the implementation, interviewed trauma service staff and health educators to assess attitudes toward the program, and evaluated patient satisfaction surveys. By adding SBIR staff to the trauma outpatient clinic and to trauma morning rounds, the capture rate increased from 12 to 71%. Most screened patients (59%) were found at risk for problems or probably dependent on alcohol or drugs. Trauma service staff and health educators reported high satisfaction with the program. Patients reported higher satisfaction with SBIR. SBIR services can be effectively integrated into all components of a busy, urban trauma service by adding specially trained health educators to the trauma service staff. This collaboration provides effective SBIR services to both trauma and emergency service patients without interfering with patient flow or medical procedures. The relatively high percentage of patients at risk for alcohol or drug problems supports the inclusion of routine alcohol and drug screening for all eligible trauma patients.

  13. Study protocol: to investigate effects of highly specialized rehabilitation for patients with multiple sclerosis. A randomized controlled trial of a personalized, multidisciplinary intervention

    PubMed Central

    2012-01-01

    Background Multiple sclerosis (MS) is a complex, chronic and progressive disease and rehabilitation services can provide important support to patients. Few MS rehabilitation programs have been shown to provide health improvements to patients in a cost-effective manner. The objective of this study is to assess the effects in terms of changes measured by a variety of standardized quality of life, mastery, coping, compliance and individual goal-related endpoints. This combination provides the basis for analyzing the complexity of MS and outcomes of a personalized rehabilitation. Methods/Design Patients with MS referred to hospital rehabilitation services will be randomized to either early admission (within two months) or usual admission (after an average waiting time of eight months). They will complete a battery of standardized health outcome instruments prior to randomization, and again six and twelve months after randomization, and a battery of goal-related outcome measures at admission and discharge, and again one, six and twelve months after randomization. Discussion The results of the study are expected to contribute to further development of MS rehabilitation services and to discussions about the design and content of such services. The results will also provide additional information to health authorities responsible for providing and financing rehabilitation services. Trial registration Current Controlled Trials (ISRCTN05245917) PMID:22954027

  14. Integration of prevention of mother-to-child HIV transmission into maternal health services in Senegal.

    PubMed

    Cisse, C

    2017-06-01

    The objective of this study was to assess the level of integration of prevention of mother-to-child HIV transmission (PMTCT) in facilities providing services for maternal, newborn, and child health (MNCH) and reproductive health (RH) in Senegal. The survey, conducted from August through November, 2014, comprised five parts : a literature review to assess the place of this integration in the health policies, standards, and protocols in effect in Senegal; an analysis by direct observation of attitudes and practices of 25 healthcare providers at 5 randomly-selected obstetrics and gynecology departments representative of different levels of the health pyramid; a questionnaire evaluating knowledge and attitudes of 10 providers about the integration of PMTCT services into MNCH/RH facilities; interviews to collect the opinions of 70 clients, including 16 HIV-positive, about the quality of PMTCT services they received; and a questionnaire evaluating knowledge and opinions of 14 policy-makers/managers of health programs focusing on mothers and children about this integration. The literature review revealed several constraints impeding this integration : the policy documents, standards, and protocols of each of the programs involved do not clearly indicate the modalities of this integration; the programs are housed in two different divisions while the national Program against the Human Immunodeficiency Virus reports directly to the Prime Minister; program operations remains generally vertical; the resources for the different programs are not sufficiently shared; there is no integrated training module covering integrated management of pregnancy and delivery; and supervision for each of the different programs is organized separately.The observation of the providers supporting women during pregnancy, during childbirth, and in the postpartum period, showed an effort to integrate PMTCT into the MNCH/RH services delivered daily to clients. But this desire is hampered by many problems, including the inconsistent availability of HIV testing and antiretroviral drugs at program sites and the deficit in training and supervision for PMTCT. Clients interviewed after their contact with providers often complained about the lack of information received about PMTCT. They considered that effective integration of these services would provide them with better quality care while reducing their waiting time, costs, and trips to health facilities. The responses of policymakers and program managers interviewed mostly revealed gaps in their understanding and implementation of the integration. There is an effort to integrate MNCH/RH and PMTCT services at the healthcare facilities we visited. But our investigation revealed many shortcomings in both the screening and support of new or expectant HIV+ mothers. To improve this situation it is necessary to improve the skills and motivation of PMTCT providers, enhance the level of equipment, and empower local maternity wards.

  15. Study of participating and nonparticipating states' telemedicine Medicaid reimbursement status: Its impact on Idaho's policymaking process.

    PubMed

    Gray, Gayle A; Stamm, B Hudnall; Toevs, Sarah; Reischl, Uwe; Yarrington, Diane

    2006-12-01

    Although Medicare currently reimburses for telemedicine services, advocates are struggling to increase state Medicaid reimbursement. This study provides data from a national study of Medicaid telemedicine reimbursement policies and examines Idaho as a case study for developing telemedicine reimbursement policies. Idahoans have actively advocated for Medicaid telemedicine reimbursement by forming a statewide network. Working with policymakers, Idaho Medicaid and telemedicine advocates established interpersonal connections, providing policymakers information and support. With developing academic, private, and legislative interest, a window of opportunity opened to allow for positive, albeit minimal, movement. To establish protocols for Idaho's use of telemedicine, a national electronic policy survey was conducted to evaluate the direction of telemedicine policy in state Medicaid agencies. Surveys to explore Medicaid reimbursement status were sent to states that were both participating and non-participating in telemedicine. Responses were received from 10 of the 25 states providing Medicaid telemedicine reimbursement and 17 of the 25 states and one U.S. territory not providing reimbursement. Issues common among participating states included provider and reimbursement complications, allowable services, and modification of reimbursement codes. Nonparticipating states indicated an interest in reimbursing for telemedicine and a need to enhance advocate and state Medicaid agency relationships. In addition, the survey results demonstrated the need to provide cost-benefit analysis on the viability of Medicaid reimbursement for telemedicine. Research outcomes were used to develop Idaho's Interactive Video Telemedicine Protocols. These address identified barriers and fears regarding Medicare reimbursement and state budgetary concerns--the additional major issue identified for state Medicaid agencies.

  16. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    NASA Astrophysics Data System (ADS)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  17. Merging Real-Time and Retrospective Data Services, NOAA's Solar X-Ray Imager

    NASA Astrophysics Data System (ADS)

    Wilkinson, D. C.

    2004-12-01

    The ground systems team for NOAA's first Solar X-ray Imager (SXI) proposed a merger of real-time and retrospective data services with two goals in mind. First, it was anticipated that this would be a more economical approach than legacy systems that divided these services between two separate organizations within NOAA. Also, unifying these services would naturally provide a simpler, and more consistent public interface for all SXI data users. The implementation of this innovative approach has been successful on both accounts. NOAA's Space Environment Center (SEC) receives the telemetry stream from SXI and generates the raw and processed imagery that they use in their Space Weather alert and forecast services. These data are instantaneously transferred to NOAA's National Geophysical Data Center through a combination of data push and pull protocols. The result is an interface that provides access to all SXI data, including images that are less than two minutes old. The success of this system has prompted its use in the ground systems design for the SXI and Space Environment Monitor (SEM) data collected from GOES-N, schedule for launch in December 2004.

  18. 50 CFR 600.757 - Operational protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Operational protocols. 600.757 Section 600.757 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... Operational protocols. (a) Services of conveners and facilitators. A Council or NMFS may employ or enter into...

  19. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  20. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

Top