Sample records for protocols specifically designed

  1. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O`Connell, L.J.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  2. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  3. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  4. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining andmore » exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.« less

  5. Cognitive Protocol Stack Design

    DTIC Science & Technology

    2015-12-30

    SECURITY CLASSIFICATION OF: In the ARO “ Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international...areas related to cognitive networking, opening also new lines of research that was not possible to forecast at the beginning of the project. In a...Distribution Unlimited Final Report: Cognitive Protocol Stack Design The views, opinions and/or findings contained in this report are those of the author(s

  6. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  7. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  8. Gateway design specification for fiber optic local area networks

    NASA Technical Reports Server (NTRS)

    1985-01-01

    This is a Design Specification for a gateway to interconnect fiber optic local area networks (LAN's). The internetworking protocols for a gateway device that will interconnect multiple local area networks are defined. This specification serves as input for preparation of detailed design specifications for the hardware and software of a gateway device. General characteristics to be incorporated in the gateway such as node address mapping, packet fragmentation, and gateway routing features are described.

  9. Protocols for the Design of Kinase-focused Compound Libraries.

    PubMed

    Jacoby, Edgar; Wroblowski, Berthold; Buyck, Christophe; Neefs, Jean-Marc; Meyer, Christophe; Cummings, Maxwell D; van Vlijmen, Herman

    2018-05-01

    Protocols for the design of kinase-focused compound libraries are presented. Kinase-focused compound libraries can be differentiated based on the design goal. Depending on whether the library should be a discovery library specific for one particular kinase, a general discovery library for multiple distinct kinase projects, or even phenotypic screening, there exists today a variety of in silico methods to design candidate compound libraries. We address the following scenarios: 1) Datamining of SAR databases and kinase focused vendor catalogues; 2) Predictions and virtual screening; 3) Structure-based design of combinatorial kinase inhibitors; 4) Design of covalent kinase inhibitors; 5) Design of macrocyclic kinase inhibitors; and 6) Design of allosteric kinase inhibitors and activators. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. An intelligent case-adjustment algorithm for the automated design of population-based quality auditing protocols.

    PubMed

    Advani, Aneel; Jones, Neil; Shahar, Yuval; Goldstein, Mary K; Musen, Mark A

    2004-01-01

    We develop a method and algorithm for deciding the optimal approach to creating quality-auditing protocols for guideline-based clinical performance measures. An important element of the audit protocol design problem is deciding which guide-line elements to audit. Specifically, the problem is how and when to aggregate individual patient case-specific guideline elements into population-based quality measures. The key statistical issue involved is the trade-off between increased reliability with more general population-based quality measures versus increased validity from individually case-adjusted but more restricted measures done at a greater audit cost. Our intelligent algorithm for auditing protocol design is based on hierarchically modeling incrementally case-adjusted quality constraints. We select quality constraints to measure using an optimization criterion based on statistical generalizability coefficients. We present results of the approach from a deployed decision support system for a hypertension guideline.

  11. Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis

    DTIC Science & Technology

    2007-06-01

    Protocol for Improved Specificity in Breast Cancer Diagnosis PRINCIPAL INVESTIGATOR: Luminita Alina Tudorica, Ph.D. CONTRACTING...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis 5b... breast cancer study in a clinical setting. This study aims to improve specificity of breast cancer detection by using a combined MRI/MRS protocol. In

  12. A Protocol for Evaluating Contextual Design Principles

    PubMed Central

    Stamps, Arthur

    2014-01-01

    This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448

  13. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  14. SITE-SPECIFIC PROTOCOL FOR MEASURING SOIL RADON POTENTIALS FOR FLORIDA HOUSES

    EPA Science Inventory

    The report describes a protocol for site-specific measurement of radon potentials for Florida houses that is consistent with existing residential radon protection maps. The protocol gives further guidance on the possible need for radon-protective house construction features. In a...

  15. Gender-Specific Combination HIV Prevention for Youth in High-Burden Settings: The MP3 Youth Observational Pilot Study Protocol

    PubMed Central

    Agot, Kawango

    2017-01-01

    Background Nearly three decades into the epidemic, sub-Saharan Africa (SSA) remains the region most heavily affected by human immunodeficiency virus (HIV), with nearly 70% of the 34 million people living with HIV globally residing in the region. In SSA, female and male youth (15 to 24 years) are at a disproportionately high risk of HIV infection compared to adults. As such, there is a need to target HIV prevention strategies to youth and to tailor them to a gender-specific context. This protocol describes the process for the multi-staged approach in the design of the MP3 Youth pilot study, a gender-specific, combination, HIV prevention intervention for youth in Kenya. Objective The objective of this multi-method protocol is to outline a rigorous and replicable methodology for a gender-specific combination HIV prevention pilot study for youth in high-burden settings, illustrating the triangulated methods undertaken to ensure that age, sex, and context are integral in the design of the intervention. Methods The mixed-methods, cross-sectional, longitudinal cohort pilot study protocol was developed by first conducting a systematic review of the literature, which shaped focus group discussions around prevention package and delivery options, and that also informed age- and sex- stratified mathematical modeling. The review, qualitative data, and mathematical modeling created a triangulated evidence base of interventions to be included in the pilot study protocol. To design the pilot study protocol, we convened an expert panel to select HIV prevention interventions effective for youth in SSA, which will be offered in a mobile health setting. The goal of the pilot study implementation and evaluation is to apply lessons learned to more effective HIV prevention evidence and programming. Results The combination HIV prevention package in this protocol includes (1) offering HIV testing and counseling for all youth; (2) voluntary medical circumcision and condoms for males; (3

  16. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  17. Designing typefaces for maps. A protocol of tests.

    NASA Astrophysics Data System (ADS)

    Biniek, Sébastien; Touya, Guillaume; Rouffineau, Gilles; Huot-Marchand, Thomas

    2018-05-01

    The text management in map design is a topic generally linked to placement and composition issues. Whereas the type design issue is rarely addressed or at least only partially. Moreover the typefaces especially designed for maps are rare. This paper presents a protocol of tests to evaluate characters for digital topographic maps and fonts that were designed for the screen through the use of geographical information systems using this protocol. It was launched by the Atelier National de Recherche Typographique Research (ANRT, located in Nancy, France) and took place over his `post-master' course in 2013. The purpose is to isolate different issues inherent to text in a topographic map: map background, nonlinear text placement and toponymic hierarchies. Further research is necessary to improve this kind of approach.

  18. Development of PCR protocols for specific identification of Clostridium spiroforme and detection of sas and sbs genes.

    PubMed

    Drigo, Ilenia; Bacchin, Cosetta; Cocchi, Monia; Bano, Luca; Agnoletti, Fabrizio

    2008-10-15

    Rabbit diarrhoea caused by toxigenic Clostridium spiroforme is responsible for significant losses in commercial rabbitries but the accurate identification of this micro-organism is difficult due to the absence of both a commercial biochemical panel and biomolecular methods. The aim of this study was therefore to develop PCR protocols for specific detection of C. spiroforme and its binary toxin encoding genes. The C. spiroforme specie-specific primers were designed based on its 16S rDNA published sequences and the specificity of these primers was tested with DNA extracted from closely related Clostridium species. The sa/bs_F and sa/bs _R C. spiroforme binary toxin specific primers were designed to be complementary, respectively, to a sequence of 21 bases on the 3' and of sas gene and on the 5' of the sbs gene. The detection limits of in house developed PCR protocols were 25CFU/ml of bacterial suspension and 1.38x10(4)CFU/g of caecal content for specie-specific primers and 80CFU/ml of bacterial suspension and 2.8x10(4)CFU/g of caecal content in case of sa/bs primers. These results indicated that the described PCR assays enable specific identification of C. spiroforme and its binary toxin genes and can therefore be considered a rapid, reliable tool for the diagnosis of C. spiroforme-related enterotoxaemia.

  19. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  20. An example problem illustrating the application of the national lime association mixture design and testing protocol (MDTP) to ascertain engineering properties of lime-treated subgrades for mechanistic pavement design/analysis.

    DOT National Transportation Integrated Search

    2001-09-01

    This document presents an example of mechanistic design and analysis using a mix design and : testing protocol. More specifically, it addresses the structural properties of lime-treated subgrade, : subbase, and base layers through mechanistic design ...

  1. Gender-Specific Combination HIV Prevention for Youth in High-Burden Settings: The MP3 Youth Observational Pilot Study Protocol.

    PubMed

    Buttolph, Jasmine; Inwani, Irene; Agot, Kawango; Cleland, Charles M; Cherutich, Peter; Kiarie, James N; Osoti, Alfred; Celum, Connie L; Baeten, Jared M; Nduati, Ruth; Kinuthia, John; Hallett, Timothy B; Alsallaq, Ramzi; Kurth, Ann E

    2017-03-08

    Nearly three decades into the epidemic, sub-Saharan Africa (SSA) remains the region most heavily affected by human immunodeficiency virus (HIV), with nearly 70% of the 34 million people living with HIV globally residing in the region. In SSA, female and male youth (15 to 24 years) are at a disproportionately high risk of HIV infection compared to adults. As such, there is a need to target HIV prevention strategies to youth and to tailor them to a gender-specific context. This protocol describes the process for the multi-staged approach in the design of the MP3 Youth pilot study, a gender-specific, combination, HIV prevention intervention for youth in Kenya. The objective of this multi-method protocol is to outline a rigorous and replicable methodology for a gender-specific combination HIV prevention pilot study for youth in high-burden settings, illustrating the triangulated methods undertaken to ensure that age, sex, and context are integral in the design of the intervention. The mixed-methods, cross-sectional, longitudinal cohort pilot study protocol was developed by first conducting a systematic review of the literature, which shaped focus group discussions around prevention package and delivery options, and that also informed age- and sex- stratified mathematical modeling. The review, qualitative data, and mathematical modeling created a triangulated evidence base of interventions to be included in the pilot study protocol. To design the pilot study protocol, we convened an expert panel to select HIV prevention interventions effective for youth in SSA, which will be offered in a mobile health setting. The goal of the pilot study implementation and evaluation is to apply lessons learned to more effective HIV prevention evidence and programming. The combination HIV prevention package in this protocol includes (1) offering HIV testing and counseling for all youth; (2) voluntary medical circumcision and condoms for males; (3) pre-exposure prophylaxis (Pr

  2. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists.

    PubMed

    Russell, Rachel; Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  3. A protocol for better design, application, and communication of population viability analyses.

    PubMed

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  4. Instructor Handbook for the Protocol Modules on Classroom Management. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Langer, Philip; Borg, Walter R.

    This handbook is designed to acquaint the teacher educator with the training materials in classroom management prepared by the Utah State University Protocol Training Project. It deals with the protocol materials generally and with each module specifically, and includes the following sections: (a) an introduction to and rationale for protocol…

  5. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists

    PubMed Central

    Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people. PMID:29682348

  6. Participatory design of a collaborative clinical trial protocol writing system.

    PubMed

    Weng, Chunhua; McDonald, David W; Sparks, Dana; McCoy, Jason; Gennari, John H

    2007-06-01

    To explore concrete approaches to socio-technical design of collaborative healthcare information systems and to design a groupware technology for collaborative clinical trial protocol writing. We conducted "quick and dirty ethnography" through semi-structured interviews, observational studies, and work artifacts analysis to understand the group work for protocol development. We used participatory design through evolutionary prototyping to explore the feature space of a collaborative writing system. Our design strategies include role-based user advocacy, formative evaluation, and change management. Quick and dirty ethnography helped us efficiently understand relevant work practice, and participatory design helped us engage users into design and bring out their tacit work knowledge. Our approach that intertwined both techniques helped achieve a "work-informed and user-oriented" design. This research leads to a collaborative writing system that supports in situ communication, group awareness, and effective work progress tracking. The usability evaluation results have been satisfactory. The system design is being transferred to an organizational tool for daily use.

  7. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  8. The Design of Finite State Machine for Asynchronous Replication Protocol

    NASA Astrophysics Data System (ADS)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  9. Protocol Design Challenges in the Detection of Awareness in Aware Subjects Using EEG Signals.

    PubMed

    Henriques, J; Gabriel, D; Grigoryeva, L; Haffen, E; Moulin, T; Aubry, R; Pazart, L; Ortega, J-P

    2016-10-01

    Recent studies have evidenced serious difficulties in detecting covert awareness with electroencephalography-based techniques both in unresponsive patients and in healthy control subjects. This work reproduces the protocol design in two recent mental imagery studies with a larger group comprising 20 healthy volunteers. The main goal is assessing if modifications in the signal extraction techniques, training-testing/cross-validation routines, and hypotheses evoked in the statistical analysis, can provide solutions to the serious difficulties documented in the literature. The lack of robustness in the results advises for further search of alternative protocols more suitable for machine learning classification and of better performing signal treatment techniques. Specific recommendations are made using the findings in this work. © EEG and Clinical Neuroscience Society (ECNS) 2014.

  10. A calibration protocol for population-specific accelerometer cut-points in children.

    PubMed

    Mackintosh, Kelly A; Fairclough, Stuart J; Stratton, Gareth; Ridgers, Nicola D

    2012-01-01

    To test a field-based protocol using intermittent activities representative of children's physical activity behaviours, to generate behaviourally valid, population-specific accelerometer cut-points for sedentary behaviour, moderate, and vigorous physical activity. Twenty-eight children (46% boys) aged 10-11 years wore a hip-mounted uniaxial GT1M ActiGraph and engaged in 6 activities representative of children's play. A validated direct observation protocol was used as the criterion measure of physical activity. Receiver Operating Characteristics (ROC) curve analyses were conducted with four semi-structured activities to determine the accelerometer cut-points. To examine classification differences, cut-points were cross-validated with free-play and DVD viewing activities. Cut-points of ≤ 372, >2160 and >4806 counts • min(-1) representing sedentary, moderate and vigorous intensity thresholds, respectively, provided the optimal balance between the related needs for sensitivity (accurately detecting activity) and specificity (limiting misclassification of the activity). Cross-validation data demonstrated that these values yielded the best overall kappa scores (0.97; 0.71; 0.62), and a high classification agreement (98.6%; 89.0%; 87.2%), respectively. Specificity values of 96-97% showed that the developed cut-points accurately detected physical activity, and sensitivity values (89-99%) indicated that minutes of activity were seldom incorrectly classified as inactivity. The development of an inexpensive and replicable field-based protocol to generate behaviourally valid and population-specific accelerometer cut-points may improve the classification of physical activity levels in children, which could enhance subsequent intervention and observational studies.

  11. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  12. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  13. Desensitization Protocol in Recipients of Deceased Kidney Donor With Donor-Specific Antibody-Low Titers.

    PubMed

    Kanter Berga, J; Sancho Calabuig, A; Gavela Martinez, E; Puig Alcaraz, N; Avila Bernabeu, A; Crespo Albiach, J; Molina Vila, P; Beltrán Catalan, S; Pallardó Mateu, L

    2016-11-01

    Kidney transplantation is the better option for end-stage renal disease (ESRD), but for patients with human leukocyte antigen (HLA) sensitization, the wait times are significantly longer than for patients without antibodies. Many desensitization protocols have been described involving strong immunosuppression, the use of apheresis, and B-cell-modulating therapies. We have designed a desensitization protocol from day 0 for deceased donor kidney transplantation. Our aim was to present our initial experience with five kidney transplant patients. All patients had a negative complement-dependent cytotoxicity cross-match. The desensitization protocol included five to seven doses of thymoglobulin (1.25 mg/kg) and three sessions of plasmapheresis (PP) within the first week after transplantation, with intravenous immunoglobulin (500 mg/kg) after each PP session and one dose of rituximab on day 8. The presence of donor-specific antibodies (DSA) was analyzed by use of Luminex technology; levels between 1000 and 3000 mean fluorescence intensity were considered for desensitization. The median age was 44 years and median renal replacement therapy time was 9 years. All recipients presented 1 to 3 DSA specificities. There were no severe side effects related to PP, infusion of intravenous immunoglobulin, or rituximab. The median follow-up period was 19.3 months. Median serum creatinine level at last follow-up was 1.7 mg/dL. A kidney biopsy was performed in all patients. Graft and patient survival was 100%. Until now, few data are available concerning whether HLA-incompatible kidney transplantation after desensitization would benefit patients with ERSD. The desensitization strategy using the combination of PP, low doses of intravenous immunoglobulin, and rituximab at our center resulted in a satisfactory clinical outcome. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Reliable multicast protocol specifications flow control and NACK policy

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    This appendix presents the flow and congestion control schemes recommended for RMP and a NACK policy based on the whiteboard tool. Because RMP uses a primarily NACK based error detection scheme, there is no direct feedback path through which receivers can signal losses through low buffer space or congestion. Reliable multicast protocols also suffer from the fact that throughput for a multicast group must be divided among the members of the group. This division is usually very dynamic in nature and therefore does not lend itself well to a priori determination. These facts have led the flow and congestion control schemes of RMP to be made completely orthogonal to the protocol specification. This allows several differing schemes to be used in different environments to produce the best results. As a default, a modified sliding window scheme based on previous algorithms are suggested and described below.

  15. Enriching Peptide Libraries for Binding Affinity and Specificity Through Computationally Directed Library Design.

    PubMed

    Foight, Glenna Wink; Chen, T Scott; Richman, Daniel; Keating, Amy E

    2017-01-01

    Peptide reagents with high affinity or specificity for their target protein interaction partner are of utility for many important applications. Optimization of peptide binding by screening large libraries is a proven and powerful approach. Libraries designed to be enriched in peptide sequences that are predicted to have desired affinity or specificity characteristics are more likely to yield success than random mutagenesis. We present a library optimization method in which the choice of amino acids to encode at each peptide position can be guided by available experimental data or structure-based predictions. We discuss how to use analysis of predicted library performance to inform rounds of library design. Finally, we include protocols for more complex library design procedures that consider the chemical diversity of the amino acids at each peptide position and optimize a library score based on a user-specified input model.

  16. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  17. A Range Finding Protocol to Support Design for Transcriptomics Experimentation: Examples of In-Vitro and In-Vivo Murine UV Exposure

    PubMed Central

    van Oostrom, Conny T.; Jonker, Martijs J.; de Jong, Mark; Dekker, Rob J.; Rauwerda, Han; Ensink, Wim A.; de Vries, Annemieke; Breit, Timo M.

    2014-01-01

    In transcriptomics research, design for experimentation by carefully considering biological, technological, practical and statistical aspects is very important, because the experimental design space is essentially limitless. Usually, the ranges of variable biological parameters of the design space are based on common practices and in turn on phenotypic endpoints. However, specific sub-cellular processes might only be partially reflected by phenotypic endpoints or outside the associated parameter range. Here, we provide a generic protocol for range finding in design for transcriptomics experimentation based on small-scale gene-expression experiments to help in the search for the right location in the design space by analyzing the activity of already known genes of relevant molecular mechanisms. Two examples illustrate the applicability: in-vitro UV-C exposure of mouse embryonic fibroblasts and in-vivo UV-B exposure of mouse skin. Our pragmatic approach is based on: framing a specific biological question and associated gene-set, performing a wide-ranged experiment without replication, eliminating potentially non-relevant genes, and determining the experimental ‘sweet spot’ by gene-set enrichment plus dose-response correlation analysis. Examination of many cellular processes that are related to UV response, such as DNA repair and cell-cycle arrest, revealed that basically each cellular (sub-) process is active at its own specific spot(s) in the experimental design space. Hence, the use of range finding, based on an affordable protocol like this, enables researchers to conveniently identify the ‘sweet spot’ for their cellular process of interest in an experimental design space and might have far-reaching implications for experimental standardization. PMID:24823911

  18. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  19. Enriching peptide libraries for binding affinity and specificity through computationally directed library design

    PubMed Central

    Foight, Glenna Wink; Chen, T. Scott; Richman, Daniel; Keating, Amy E.

    2017-01-01

    Peptide reagents with high affinity or specificity for their target protein interaction partner are of utility for many important applications. Optimization of peptide binding by screening large libraries is a proven and powerful approach. Libraries designed to be enriched in peptide sequences that are predicted to have desired affinity or specificity characteristics are more likely to yield success than random mutagenesis. We present a library optimization method in which the choice of amino acids to encode at each peptide position can be guided by available experimental data or structure-based predictions. We discuss how to use analysis of predicted library performance to inform rounds of library design. Finally, we include protocols for more complex library design procedures that consider the chemical diversity of the amino acids at each peptide position and optimize a library score based on a user-specified input model. PMID:28236241

  20. Representing the work of medical protocols for organizational simulation.

    PubMed Central

    Fridsma, D. B.

    1998-01-01

    Developing and implementing patient care protocols within a specific organizational setting requires knowledge of the protocol, the organization, and the way in which the organization does its work. Computer-based simulation tools have been used in many industries to provide managers with prospective insight into problems of work process and organization design mismatch. Many of these simulation tools are designed for well-understood routine work processes in which there are few contingent tasks. In this paper, we describe theoretic that make it possible to simulate medical protocols using an information-processing theory framework. These simulations will allow medical administrators to test different protocol and organizational designs before actually using them within a particular clinical setting. PMID:9929231

  1. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  2. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  3. 40 CFR Appendix A - Protocol for Using an Electrochemical Analyzer to Determine Oxygen and Carbon Monoxide...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and Process Heaters Using Portable Analyzers”, EMC Conditional Test Protocol 30 (CTM-30), Gas Research... cell design(s) conforming to this protocol will determine the analytical range for each gas component..., selective gas scrubbers, etc.) to meet the design specifications of this protocol. Do not make changes to...

  4. Using Colored Stochastic Petri Net (CS-PN) software for protocol specification, validation, and evaluation

    NASA Technical Reports Server (NTRS)

    Zenie, Alexandre; Luguern, Jean-Pierre

    1987-01-01

    The specification, verification, validation, and evaluation, which make up the different steps of the CS-PN software are outlined. The colored stochastic Petri net software is applied to a Wound/Wait protocol decomposable into two principal modules: request or couple (transaction, granule) treatment module and wound treatment module. Each module is specified, verified, validated, and then evaluated separately, to deduce a verification, validation and evaluation of the complete protocol. The colored stochastic Petri nets tool is shown to be a natural extension of the stochastic tool, adapted to distributed systems and protocols, because the color conveniently takes into account the numerous sites, transactions, granules and messages.

  5. Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems

    NASA Astrophysics Data System (ADS)

    Subhan, Fazli; Hasbullah, Halabi B.

    Bluetooth is an established standard for low cost, low power, wireless personal area network. Currently, Bluetooth does not support any roaming protocol in which handoff occurs dynamically when a Bluetooth device is moving out of the piconet. If a device is losing its connection to the master device, no provision is made to transfer it to another master. Handoff is not possible in a piconet, as in order to stay within the network, a slave would have to keep the same master. So, by definition intra-handoff is not possible within a piconet. This research mainly focuses on Bluetooth technology and designing a roaming protocol for Bluetooth equipped multi agent systems. A mathematical model is derived for an agent. The idea behind the mathematical model is to know when to initiate the roaming process for an agent. A desired trajectory for the agent is calculated using its x and y coordinates system, and is simulated in SIMULINK. Various roaming techniques are also studied and discussed. The advantage of designing a roaming protocol is to ensure the Bluetooth enabled roaming devices can freely move inside the network coverage without losing its connection or break of service in case of changing the base stations.

  6. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  7. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  8. Design, Specification, and Synthesis of Aircraft Electric Power Systems Control Logic

    NASA Astrophysics Data System (ADS)

    Xu, Huan

    Cyber-physical systems integrate computation, networking, and physical processes. Substantial research challenges exist in the design and verification of such large-scale, distributed sensing, actuation, and control systems. Rapidly improving technology and recent advances in control theory, networked systems, and computer science give us the opportunity to drastically improve our approach to integrated flow of information and cooperative behavior. Current systems rely on text-based specifications and manual design. Using new technology advances, we can create easier, more efficient, and cheaper ways of developing these control systems. This thesis will focus on design considerations for system topologies, ways to formally and automatically specify requirements, and methods to synthesize reactive control protocols, all within the context of an aircraft electric power system as a representative application area. This thesis consists of three complementary parts: synthesis, specification, and design. The first section focuses on the synthesis of central and distributed reactive controllers for an aircraft elec- tric power system. This approach incorporates methodologies from computer science and control. The resulting controllers are correct by construction with respect to system requirements, which are formulated using the specification language of linear temporal logic (LTL). The second section addresses how to formally specify requirements and introduces a domain-specific language for electric power systems. A software tool automatically converts high-level requirements into LTL and synthesizes a controller. The final sections focus on design space exploration. A design methodology is proposed that uses mixed-integer linear programming to obtain candidate topologies, which are then used to synthesize controllers. The discrete-time control logic is then verified in real-time by two methods: hardware and simulation. Finally, the problem of partial observability and

  9. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  10. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    DTIC Science & Technology

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  11. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  12. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  13. Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.

    PubMed

    Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel

    2006-02-01

    Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.

  14. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    PubMed

    Ó Conchúir, Shane; Barlow, Kyle A; Pache, Roland A; Ollikainen, Noah; Kundert, Kale; O'Meara, Matthew J; Smith, Colin A; Kortemme, Tanja

    2015-01-01

    The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks) to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  15. Correlation of shear design between AASHTO LRFD bridge design specifications and AASHTO Guide Specifications for the LRFD Seismic Bridge Design.

    DOT National Transportation Integrated Search

    2017-01-05

    This report presents the analytical study of the shear capacity of reinforced concrete columns using both the AASHTO LRFD Bridge Design Specifications and the AASHTO Guide Specifications for the LRFD Seismic Bridge Design. The study investigates vari...

  16. Design Specifications for Adaptive Real-Time Systems

    DTIC Science & Technology

    1991-12-01

    TICfl \\ E CT E Design Specifications for JAN’\\ 1992 Adaptive Real - Time Systems fl Randall W. Lichota U, Alice H. Muntz - December 1991 \\ \\\\/ 0 / r...268-2056 Technical Report CMU/SEI-91-TR-20 ESD-91-TR-20 December 1991 Design Specifications for Adaptive Real - Time Systems Randall W. Lichota Hughes...Design Specifications for Adaptive Real - Time Systems Abstract: The design specification method described in this report treats a software

  17. VO2max Testing in Trail Runners: Is There a Specific Exercise Test Protocol?

    PubMed

    Scheer, Volker; Ramme, Katharina; Reinsberger, Claus; Heitkamp, Hans-Christian

    2018-06-01

    Trail running places specific physiological demands on the human body due to its uphill and downhill running sections. We developed and investigated a more sport-specific trail exercise test protocol (inclination and speed incremental protocol), and compared it to two standard exercise test protocols (horizontal step and ramp protocol) in thirteen highly trained trail runners (age 31±6 years, height 179±6.4 cm, weight 69.2±7.9 kg, BMI 21.6±2.1 kg/m 2 ). The maximum oxygen uptake (VO 2 max) measured during the trail test (62.5±5.9 ml·kg -1 ·min -1 , [95% CI: 59.0-66.1]) was significantly higher compared to both the step test (60.1±5.3 ml·kg -1 ·min -1 , [95% CI: 56.8-63.3], p=0.024) and the ramp test (59.7±5.5 ml·kg -1 ·min -1 , [95% CI: 56.4-63.0], p=0.028). Time to task failure was significantly shorter in the trail test (557±73 s, [95% CI: 512-601]) compared to both the step test (1378±152 s, [95% CI: 1286-1470], p<0.001) and the ramp test (605±95, [95% CI: 547-662], p<0.001). Other physiological measurements obtained were similar. The trail test was the preferred choice in our group of trail runners. This study supports the implementation of the trail test in practice, and recommends that its validity be evaluated further. © Georg Thieme Verlag KG Stuttgart · New York.

  18. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  19. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  20. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  1. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  2. A design protocol for tailoring ice-templated scaffold structure

    PubMed Central

    Pawelec, K. M.; Husmann, A.; Best, S. M.; Cameron, R. E.

    2014-01-01

    In this paper, we show, for the first time, the key link between scaffold architecture and latent heat evolution during the production of porous biomedical collagen structures using freeze-drying. Collagen scaffolds are used widely in the biomedical industry for the repair and reconstruction of skeletal tissues and organs. Freeze-drying of collagen slurries is a standard industrial process, and, until now, the literature has sought to characterize the influence of set processing parameters including the freezing protocol and weight percentage of collagen. However, we are able to demonstrate, by monitoring the local thermal events within the slurry during solidification, that nucleation, growth and annealing processes can be controlled, and therefore we are able to control the resulting scaffold architecture. Based on our correlation of thermal profile measurements with scaffold architecture, we hypothesize that there is a link between the fundamental freezing of ice and the structure of scaffolds, which suggests that this concept is applicable not only for collagen but also for ceramics and pharmaceuticals. We present a design protocol of strategies for tailoring the ice-templated scaffold structure. PMID:24402916

  3. DEVELOPMENT OF A RATIONALLY BASED DESIGN PROTOCOL FOR THE ULTRAVIOLET LIGHT DISINFECTION PROCESS

    EPA Science Inventory

    A protocol is demonstrated for the design and evaluation of ultraviolet (UV) disinfection systems based on a mathematical model. The disinfection model incorporates the system's physical dimensions, the residence time distribution of the reactor and dispersion characteristics, th...

  4. Patient-centred screening for primary immunodeficiency: a multi-stage diagnostic protocol designed for non-immunologists

    PubMed Central

    de Vries, E

    2006-01-01

    Efficient early identification of primary immunodeficiency disease (PID) is important for prognosis, but is not an easy task for non-immunologists. The Clinical Working Party of the European Society for Immunodeficiencies (ESID) has composed a multi-stage diagnostic protocol that is based on expert opinion, in order to increase the awareness of PID among doctors working in different fields. The protocol starts from the clinical presentation of the patient; immunological skills are not needed for its use. The multi-stage design allows cost-effective screening for PID within the large pool of potential cases in all hospitals in the early phases, while more expensive tests are reserved for definitive classification in collaboration with an immunologist at a later stage. Although many PIDs present in childhood, others may present at any age. The protocols presented here are therefore aimed at both adult physicians and paediatricians. While designed for use throughout Europe, there will be national differences which may make modification of this generic algorithm necessary. PMID:16879238

  5. Mercury Assessment and Monitoring Protocol for the Bear Creek Watershed, Colusa County, California

    USGS Publications Warehouse

    Suchanek, Thomas H.; Hothem, Roger L.; Rytuba, James J.; Yee, Julie L.

    2010-01-01

    This report summarizes the known information on the occurrence and distribution of mercury (Hg) in physical/chemical and biological matrices within the Bear Creek watershed. Based on these data, a matrix-specific monitoring protocol for the evaluation of the effectiveness of activities designed to remediate Hg contamination in the Bear Creek watershed is presented. The monitoring protocol documents procedures for collecting and processing water, sediment, and biota for estimation of total Hg (TotHg) and monomethyl mercury (MMeHg) in the Bear Creek watershed. The concurrent sampling of TotHg and MMeHg in biota as well as water and sediment from 10 monitoring sites is designed to assess the relative bioavailability of Hg released from Hg sources in the watershed and identify environments conducive to Hg methylation. These protocols are designed to assist landowners, land managers, water quality regulators, and scientists in determining whether specific restoration/mitigation actions lead to significant progress toward achieving water quality goals to reduce Hg in Bear and Sulphur Creeks.

  6. Rosetta:MSF: a modular framework for multi-state computational protein design.

    PubMed

    Löffler, Patrick; Schmitz, Samuel; Hupfeld, Enrico; Sterner, Reinhard; Merkl, Rainer

    2017-06-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta's protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta's single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design.

  7. Rosetta:MSF: a modular framework for multi-state computational protein design

    PubMed Central

    Hupfeld, Enrico; Sterner, Reinhard

    2017-01-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta’s protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta’s single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design. PMID:28604768

  8. Food Design Thinking: A Branch of Design Thinking Specific to Food Design

    ERIC Educational Resources Information Center

    Zampollo, Francesca; Peacock, Matthew

    2016-01-01

    Is there a need for a set of methods within Design Thinking tailored specifically for the Food Design process? Is there a need for a branch of Design Thinking dedicated to Food Design alone? Chefs are not generally trained in Design or Design Thinking, and we are only just beginning to understand how they ideate and what recourses are available to…

  9. Protocol for chromosome-specific probe construction using PRINS, micromanipulation and DOP-PCR techniques.

    PubMed

    Passamani, Paulo Z; Carvalho, Carlos R; Soares, Fernanda A F

    2018-01-01

    Chromosome-specific probes have been widely used in molecular cytogenetics, being obtained with different methods. In this study, a reproducible protocol for construction of chromosome-specific probes is proposed which associates in situ amplification (PRINS), micromanipulation and degenerate oligonucleotide-primed PCR (DOP-PCR). Human lymphocyte cultures were used to obtain metaphases from male and female individuals. The chromosomes were amplified via PRINS, and subcentromeric fragments of the X chromosome were microdissected using microneedles coupled to a phase contrast microscope. The fragments were amplified by DOP-PCR and labeled with tetramethyl-rhodamine-5-dUTP. The probes were used in fluorescent in situ hybridization (FISH) procedure to highlight these specific regions in the metaphases. The results show one fluorescent red spot in male and two in female X chromosomes and interphase nuclei.

  10. Adaptive Probabilistic Protocols for Advanced Networks/Assuring the Integrity of Highly Decentralized Communications Systems

    DTIC Science & Technology

    2005-03-01

    to obtain a protocol customized to the needs of a specific setting, under control of an automated theorem proving system that can guarantee...new “compositional” method for protocol design and implementation, in which small microprotocols are combined to obtain a protocol customized to the...and Network Centric Enterprise (NCES) visions. This final report documents a wide range of contributions and technology transitions, including: A

  11. Dual sensory loss: development of a dual sensory loss protocol and design of a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Dual sensory loss (DSL) has a negative impact on health and wellbeing and its prevalence is expected to increase due to demographic aging. However, specialized care or rehabilitation programs for DSL are scarce. Until now, low vision rehabilitation does not sufficiently target concurrent impairments in vision and hearing. This study aims to 1) develop a DSL protocol (for occupational therapists working in low vision rehabilitation) which focuses on optimal use of the senses and teaches DSL patients and their communication partners to use effective communication strategies, and 2) describe the multicenter parallel randomized controlled trial (RCT) designed to test the effectiveness and cost-effectiveness of the DSL protocol. Methods/design To develop a DSL protocol, literature was reviewed and content was discussed with professionals in eye/ear care (interviews/focus groups) and DSL patients (interviews). A pilot study was conducted to test and confirm the DSL protocol. In addition, a two-armed international multi-center RCT will evaluate the effectiveness and cost-effectiveness of the DSL protocol compared to waiting list controls, in 124 patients in low vision rehabilitation centers in the Netherlands and Belgium. Discussion This study provides a treatment protocol for rehabilitation of DSL within low vision rehabilitation, which aims to be a valuable addition to the general low vision rehabilitation care. Trial registration Netherlands Trial Register (NTR) identifier: NTR2843 PMID:23941667

  12. Novel primers and PCR protocols for the specific detection and quantification of Sphingobium suberifaciens in situ

    USDA-ARS?s Scientific Manuscript database

    The pathogen causing corky root on lettuce, Sphingobium suberifaciens, is recalcitrant to standard epidemiological methods. Primers were selected from 16S rDNA sequences useful for the specific detection and quantification of S. suberifaciens. Conventional (PCR) and quantitative (qPCR) PCR protocols...

  13. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  14. A trial of a job-specific workers' health surveillance program for construction workers: study protocol

    PubMed Central

    2011-01-01

    Background Dutch construction workers are offered periodic health examinations. This care can be improved by tailoring this workers health surveillance (WHS) to the demands of the job and adjust the preventive actions to the specific health risks of a worker in a particular job. To improve the quality of the WHS for construction workers and stimulate relevant job-specific preventive actions by the occupational physician, we have developed a job-specific WHS. The job-specific WHS consists of modules assessing both physical and psychological requirements. The selected measurement instruments chosen, are based on their appropriateness to measure the workers' capacity and health requirements. They include a questionnaire and biometrical tests, and physical performance tests that measure physical functional capabilities. Furthermore, our job-specific WHS provides occupational physicians with a protocol to increase the worker-behavioural effectiveness of their counselling and to stimulate job-specific preventive actions. The objective of this paper is to describe and clarify our study to evaluate the behavioural effects of this job-specific WHS on workers and occupational physicians. Methods/Design The ongoing study of bricklayers and supervisors is a nonrandomised trial to compare the outcome of an intervention (job-specific WHS) group (n = 206) with that of a control (WHS) group (n = 206). The study includes a three-month follow-up. The primary outcome measure is the proportion of participants who have undertaken one or more of the preventive actions advised by their occupational physician in the three months after attending the WHS. A process evaluation will be carried out to determine context, reach, dose delivered, dose received, fidelity, and satisfaction. The present study is in accordance with the TREND Statement. Discussion This study will allow an evaluation of the behaviour of both the workers and occupational physician regarding the preventive actions

  15. ProtocolNavigator: emulation-based software for the design, documentation and reproduction biological experiments.

    PubMed

    Khan, Imtiaz A; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J; White, Nick S; Carpenter, Anne E; Errington, Rachel J

    2014-12-01

    Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  16. An extended protocol for usability validation of medical devices: Research design and reference model.

    PubMed

    Schmettow, Martin; Schnittker, Raphaela; Schraagen, Jan Maarten

    2017-05-01

    This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences and derive performance measures. Secondly, a prevailing focus on cross-sectional validation studies, ignoring the issues of learnability and training. The U.S. Federal Drug and Food Administration's recent proposal for a validation testing protocol for medical devices is then extended to address these shortcomings: (1) a novel process measure 'normative path deviations' is introduced that is useful for both quantitative and qualitative usability studies and (2) a longitudinal, completely within-subject study design is presented that assesses learnability, training effects and allows analysis of diversity of users. A reference regression model is introduced to analyze data from this and similar studies, drawing upon generalized linear mixed-effects models and a Bayesian estimation approach. The extended protocol is implemented and demonstrated in a study comparing a novel syringe infusion pump prototype to an existing design with a sample of 25 healthcare professionals. Strong performance differences between designs were observed with a variety of usability measures, as well as varying training-on-the-job effects. We discuss our findings with regard to validation testing guidelines, reflect on the extensions and discuss the perspectives they add to the validation process. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Electronic protocol of respiratory physical therapy in patients with idiopathic adolescent scoliosis.

    PubMed

    Cano, Danila Vieira Baldini; Malafaia, Osvaldo; Alves, Vera Lúcia dos Santos; Avanzi, Osmar; Pinto, José Simão de Paula

    2011-01-01

    To create a clinical database of respiratory function in patients with adolescent idiopathic scoliosis; computerize and store this clinical data through the use of a software; incorporate this electronic protocol to the SINPE© (Integrated Electronic Protocols System) and analyze a pilot project with interpretation of results. From the literature review a computerized data bank of clinical data of postural deviations was set up (master protocol). Upon completion of the master protocol a specific protocol of respiratory function in patients with adolescent idiopathic scoliosis was designed and a pilot project was conducted to collect and analyze data from ten patients. It was possible to create the master protocol of postural deviations and the specific protocol of respiratory function in patients with adolescent idiopathic scoliosis. The data collected in the pilot project was processed by the SINPE ANALYZER©, generating charts and statistics. The establishment of the clinical database of adolescent idiopathic scoliosis was possible. Computerization and storage of clinical data using the software were viable. The electronic protocol of adolescent idiopathic scoliosis could be incorporated into the SINPE© and its use in the pilot project was successful.

  18. International Veterinary Epilepsy Task Force recommendations for a veterinary epilepsy-specific MRI protocol.

    PubMed

    Rusbridge, Clare; Long, Sam; Jovanovik, Jelena; Milne, Marjorie; Berendt, Mette; Bhatti, Sofie F M; De Risio, Luisa; Farqhuar, Robyn G; Fischer, Andrea; Matiasek, Kaspar; Muñana, Karen; Patterson, Edward E; Pakozdy, Akos; Penderis, Jacques; Platt, Simon; Podell, Michael; Potschka, Heidrun; Stein, Veronika M; Tipold, Andrea; Volk, Holger A

    2015-08-28

    Epilepsy is one of the most common chronic neurological diseases in veterinary practice. Magnetic resonance imaging (MRI) is regarded as an important diagnostic test to reach the diagnosis of idiopathic epilepsy. However, given that the diagnosis requires the exclusion of other differentials for seizures, the parameters for MRI examination should allow the detection of subtle lesions which may not be obvious with existing techniques. In addition, there are several differentials for idiopathic epilepsy in humans, for example some focal cortical dysplasias, which may only apparent with special sequences, imaging planes and/or particular techniques used in performing the MRI scan. As a result, there is a need to standardize MRI examination in veterinary patients with techniques that reliably diagnose subtle lesions, identify post-seizure changes, and which will allow for future identification of underlying causes of seizures not yet apparent in the veterinary literature.There is a need for a standardized veterinary epilepsy-specific MRI protocol which will facilitate more detailed examination of areas susceptible to generating and perpetuating seizures, is cost efficient, simple to perform and can be adapted for both low and high field scanners. Standardisation of imaging will improve clinical communication and uniformity of case definition between research studies. A 6-7 sequence epilepsy-specific MRI protocol for veterinary patients is proposed and further advanced MR and functional imaging is reviewed.

  19. URPD: a specific product primer design tool.

    PubMed

    Chuang, Li-Yeh; Cheng, Yu-Huei; Yang, Cheng-Hong

    2012-06-19

    Polymerase chain reaction (PCR) plays an important role in molecular biology. Primer design fundamentally determines its results. Here, we present a currently available software that is not located in analyzing large sequence but used for a rather straight-forward way of visualizing the primer design process for infrequent users. URPD (yoUR Primer Design), a web-based specific product primer design tool, combines the NCBI Reference Sequences (RefSeq), UCSC In-Silico PCR, memetic algorithm (MA) and genetic algorithm (GA) primer design methods to obtain specific primer sets. A friendly user interface is accomplished by built-in parameter settings. The incorporated smooth pipeline operations effectively guide both occasional and advanced users. URPD contains an automated process, which produces feasible primer pairs that satisfy the specific needs of the experimental design with practical PCR amplifications. Visual virtual gel electrophoresis and in silico PCR provide a simulated PCR environment. The comparison of Practical gel electrophoresis comparison to virtual gel electrophoresis facilitates and verifies the PCR experiment. Wet-laboratory validation proved that the system provides feasible primers. URPD is a user-friendly tool that provides specific primer design results. The pipeline design path makes it easy to operate for beginners. URPD also provides a high throughput primer design function. Moreover, the advanced parameter settings assist sophisticated researchers in performing experiential PCR. Several novel functions, such as a nucleotide accession number template sequence input, local and global specificity estimation, primer pair redesign, user-interactive sequence scale selection, and virtual and practical PCR gel electrophoresis discrepancies have been developed and integrated into URPD. The URPD program is implemented in JAVA and freely available at http://bio.kuas.edu.tw/urpd/.

  20. Implementation of a 5-Minute Magnetic Resonance Imaging Screening Protocol for Prostate Cancer in Men With Elevated Prostate-Specific Antigen Before Biopsy.

    PubMed

    Weiss, Jakob; Martirosian, Petros; Notohamiprodjo, Mike; Kaufmann, Sascha; Othman, Ahmed E; Grosse, Ulrich; Nikolaou, Konstantin; Gatidis, Sergios

    2018-03-01

    The aims of this study were to establish a 5-minute magnetic resonance (MR) screening protocol for prostate cancer in men before biopsy and to evaluate effects on Prostate Imaging Reporting and Data System (PI-RADS) V2 scoring in comparison to a conventional, fully diagnostic multiparametric MR imaging (mpMRI) approach. Fifty-two patients with elevated prostate-specific antigen levels and without prior biopsy were prospectively included in this institutional review board-approved study. In all patients, an mpMRI protocol according to the PI-RADS recommendations was acquired on a 3 T MRI system. In addition, an accelerated diffusion-weighted imaging sequence was acquired using simultaneous multislice technique (DW-EPISMS). Two readers independently evaluated the images for the presence/absence of prostate cancer according to the PI-RADS criteria and for additional findings. In a first reading session, only the screening protocol consisting of axial T2-weighted and DW-EPISMS images was made available. In a subsequent reading session, the mpMRI protocol was assessed blinded to the results of the first reading, serving as reference standard. Both readers successfully established a final diagnosis according to the PI-RADS criteria in the screening and mpMRI protocol. Mean lesion size was 1.2 cm in the screening and 1.4 cm in the mpMRI protocol (P = 0.4) with 35% (18/52) of PI-RADS IV/V lesions. Diagnostic performance of the screening protocol was excellent with a sensitivity and specificity of 100% for both readers with no significant differences in comparison to the mpMRI standard (P = 1.0). In 3 patients, suspicious lymph nodes were reported as additional finding, which were equally detectable in the screening and mpMRI protocol. A 5-minute MR screening protocol for prostate cancer in men with elevated prostate-specific antigen levels before biopsy is applicable for clinical routine with similar diagnostic performance as the full diagnostic mpMRI approach.

  1. The use of participant-observation protocol in an industrial engineering research.

    PubMed

    Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor

    2012-01-01

    Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.

  2. URPD: a specific product primer design tool

    PubMed Central

    2012-01-01

    Background Polymerase chain reaction (PCR) plays an important role in molecular biology. Primer design fundamentally determines its results. Here, we present a currently available software that is not located in analyzing large sequence but used for a rather straight-forward way of visualizing the primer design process for infrequent users. Findings URPD (yoUR Primer Design), a web-based specific product primer design tool, combines the NCBI Reference Sequences (RefSeq), UCSC In-Silico PCR, memetic algorithm (MA) and genetic algorithm (GA) primer design methods to obtain specific primer sets. A friendly user interface is accomplished by built-in parameter settings. The incorporated smooth pipeline operations effectively guide both occasional and advanced users. URPD contains an automated process, which produces feasible primer pairs that satisfy the specific needs of the experimental design with practical PCR amplifications. Visual virtual gel electrophoresis and in silico PCR provide a simulated PCR environment. The comparison of Practical gel electrophoresis comparison to virtual gel electrophoresis facilitates and verifies the PCR experiment. Wet-laboratory validation proved that the system provides feasible primers. Conclusions URPD is a user-friendly tool that provides specific primer design results. The pipeline design path makes it easy to operate for beginners. URPD also provides a high throughput primer design function. Moreover, the advanced parameter settings assist sophisticated researchers in performing experiential PCR. Several novel functions, such as a nucleotide accession number template sequence input, local and global specificity estimation, primer pair redesign, user-interactive sequence scale selection, and virtual and practical PCR gel electrophoresis discrepancies have been developed and integrated into URPD. The URPD program is implemented in JAVA and freely available at http://bio.kuas.edu.tw/urpd/. PMID:22713312

  3. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  4. Specification, Synthesis, and Verification of Software-based Control Protocols for Fault-Tolerant Space Systems

    DTIC Science & Technology

    2016-08-16

    Force Research Laboratory Space Vehicles Directorate AFRL /RVSV 3550 Aberdeen Ave, SE 11. SPONSOR/MONITOR’S REPORT Kirtland AFB, NM 87117-5776 NUMBER...Ft Belvoir, VA 22060-6218 1 cy AFRL /RVIL Kirtland AFB, NM 87117-5776 2 cys Official Record Copy AFRL /RVSV/Richard S. Erwin 1 cy... AFRL -RV-PS- AFRL -RV-PS- TR-2016-0112 TR-2016-0112 SPECIFICATION, SYNTHESIS, AND VERIFICATION OF SOFTWARE-BASED CONTROL PROTOCOLS FOR FAULT-TOLERANT

  5. PNA-COMBO-FISH: From combinatorial probe design in silico to vitality compatible, specific labelling of gene targets in cell nuclei

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Müller, Patrick; Rößler, Jens; Schwarz-Finsterle, Jutta

    Recently, advantages concerning targeting specificity of PCR constructed oligonucleotide FISH probes in contrast to established FISH probes, e.g. BAC clones, have been demonstrated. These techniques, however, are still using labelling protocols with DNA denaturing steps applying harsh heat treatment with or without further denaturing chemical agents. COMBO-FISH (COMBinatorial Oligonucleotide FISH) allows the design of specific oligonucleotide probe combinations in silico. Thus, being independent from primer libraries or PCR laboratory conditions, the probe sequences extracted by computer sequence data base search can also be synthesized as single stranded PNA-probes (Peptide Nucleic Acid probes). Gene targets can be specifically labelled with atmore » least about 20 PNA-probes obtaining visibly background free specimens. By using appropriately designed triplex forming oligonucleotides, the denaturing procedures can completely be omitted. These results reveal a significant step towards oligonucleotide-FISH maintaining the 3D-nanostructure and even the viability of the cell target. The method is demonstrated with the detection of Her2/neu and GRB7 genes, which are indicators in breast cancer diagnosis and therapy. - Highlights: • Denaturation free protocols preserve 3D architecture of chromosomes and nuclei. • Labelling sets are determined in silico for duplex and triplex binding. • Probes are produced chemically with freely chosen backbones and base variants. • Peptide nucleic acid backbones reduce hindering charge interactions. • Intercalating side chains stabilize binding of short oligonucleotides.« less

  6. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  7. SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks

    NASA Astrophysics Data System (ADS)

    Oberoi, Vikram; Chigan, Chunxiao

    2005-05-01

    Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.

  8. Feasibility study for a numerical aerodynamic simulation facility. Volume 2: Hardware specifications/descriptions

    NASA Technical Reports Server (NTRS)

    Green, F. M.; Resnick, D. R.

    1979-01-01

    An FMP (Flow Model Processor) was designed for use in the Numerical Aerodynamic Simulation Facility (NASF). The NASF was developed to simulate fluid flow over three-dimensional bodies in wind tunnel environments and in free space. The facility is applicable to studying aerodynamic and aircraft body designs. The following general topics are discussed in this volume: (1) FMP functional computer specifications; (2) FMP instruction specification; (3) standard product system components; (4) loosely coupled network (LCN) specifications/description; and (5) three appendices: performance of trunk allocation contention elimination (trace) method, LCN channel protocol and proposed LCN unified second level protocol.

  9. 46 CFR 162.050-21 - Separator: Design specification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 6 2014-10-01 2014-10-01 false Separator: Design specification. 162.050-21 Section 162.050-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Pollution Prevention Equipment § 162.050-21 Separator: Design specification. (a) A...

  10. 46 CFR 162.050-21 - Separator: Design specification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 6 2013-10-01 2013-10-01 false Separator: Design specification. 162.050-21 Section 162.050-21 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Pollution Prevention Equipment § 162.050-21 Separator: Design specification. (a) A...

  11. The Tehran Eye Study: research design and eye examination protocol

    PubMed Central

    Hashemi, Hassan; Fotouhi, Akbar; Mohammad, Kazem

    2003-01-01

    Background Visual impairment has a profound impact on society. The majority of visually impaired people live in developing countries, and since most disorders leading to visual impairment are preventable or curable, their control is a priority in these countries. Considering the complicated epidemiology of visual impairment and the wide variety of factors involved, region specific intervention strategies are required for every community. Therefore, providing appropriate data is one of the first steps in these communities, as it is in Iran. The objectives of this study are to describe the prevalence and causes of visual impairment in the population of Tehran city; the prevalence of refractive errors, lens opacity, ocular hypertension, and color blindness in this population, and also the familial aggregation of refractive errors, lens opacity, ocular hypertension, and color blindness within the study sample. Methods Design Through a population-based, cross-sectional study, a total of 5300 Tehran citizens will be selected from 160 clusters using a stratified cluster random sampling strategy. The eligible people will be enumerated through a door-to-door household survey in the selected clusters and will be invited. All participants will be transferred to a clinic for measurements of uncorrected, best corrected and presenting visual acuity; manifest, subjective and cycloplegic refraction; color vision test; Goldmann applanation tonometry; examination of the external eye, anterior segment, media, and fundus; and an interview about demographic characteristics and history of eye diseases, eye trauma, diabetes mellitus, high blood pressure, and ophthalmologic cares. The study design and eye examination protocol are described. Conclusion We expect that findings from the TES will show the status of visual problems and their causes in the community. This study can highlight the people who should be targeted by visual impairment prevention programs. PMID:12859794

  12. Design Protocols and Analytical Strategies that Incorporate Structural Reliability Models

    NASA Technical Reports Server (NTRS)

    Duffy, Stephen F.

    1995-01-01

    The general goal of this project is to establish design protocols that enable the engineer to analyze and predict certain types of behavior in ceramic composites. Sections of the final report addresses the following: Description of the Problem that Motivated the Technology Development, Description of the New Technology that was Developed, Unique and Novel Features of the Technology and Results/Benefits of Application (year by year accomplishments), and Utilization of New Technology in Non-Aerospace Applications. Activities for this reporting period included the development of a design analysis as part of a cooperative agreement with general Electric Aircraft Engines. The effort focused on modifying the Toughened Ceramics Analysis and Reliability Evaluation of Structures (TCARES) algorithm for use in the design of engine components fabricated from NiAl. Other activities related to the development of an ASTM standard practice for estimating Weibull parameters. The standard focuses on the evaluation and reporting of uniaxial strength data, and the estimation of probability distribution parameters for ceramics which fail in a brittle fashion.

  13. Design of durability test protocol for vehicular fuel cell systems operated in power-follow mode based on statistical results of on-road data

    NASA Astrophysics Data System (ADS)

    Xu, Liangfei; Reimer, Uwe; Li, Jianqiu; Huang, Haiyan; Hu, Zunyan; Jiang, Hongliang; Janßen, Holger; Ouyang, Minggao; Lehnert, Werner

    2018-02-01

    City buses using polymer electrolyte membrane (PEM) fuel cells are considered to be the most likely fuel cell vehicles to be commercialized in China. The technical specifications of the fuel cell systems (FCSs) these buses are equipped with will differ based on the powertrain configurations and vehicle control strategies, but can generally be classified into the power-follow and soft-run modes. Each mode imposes different levels of electrochemical stress on the fuel cells. Evaluating the aging behavior of fuel cell stacks under the conditions encountered in fuel cell buses requires new durability test protocols based on statistical results obtained during actual driving tests. In this study, we propose a systematic design method for fuel cell durability test protocols that correspond to the power-follow mode based on three parameters for different fuel cell load ranges. The powertrain configurations and control strategy are described herein, followed by a presentation of the statistical data for the duty cycles of FCSs in one city bus in the demonstration project. Assessment protocols are presented based on the statistical results using mathematical optimization methods, and are compared to existing protocols with respect to common factors, such as time at open circuit voltage and root-mean-square power.

  14. How to design and write a clinical research protocol in Cosmetic Dermatology*

    PubMed Central

    Bagatin, Ediléia; Miot, Helio A.

    2013-01-01

    Cosmetic Dermatology is a growing subspecialty. High-quality basic science studies have been published; however, few double-blind, randomized controlled clinical trials, which are the major instrument for evidence-based medicine, have been conducted in this area. Clinical research is essential for the discovery of new knowledge, improvement of scientific basis, resolution of challenges, and good clinical practice. Some basic principles for a successful researcher include interest, availability, persistence, and honesty. It is essential to learn how to write a protocol research and to know the international and national regulatory rules. A complete clinical trial protocol should include question, background, objectives, methodology (design, variable description, sample size, randomization, inclusion and exclusion criteria, intervention, efficacy and safety measures, and statistical analysis), consent form, clinical research form, and references. Institutional ethical review board approval and financial support disclosure are necessary. Publication of positive or negative results should be an authors' commitment. PMID:23539006

  15. Transitioning from conceptual design to construction performance specification

    NASA Astrophysics Data System (ADS)

    Jeffers, Paul; Warner, Mark; Craig, Simon; Hubbard, Robert; Marshall, Heather

    2012-09-01

    On successful completion of a conceptual design review by a funding agency or customer, there is a transition phase before construction contracts can be placed. The nature of this transition phase depends on the Project's approach to construction and the particular subsystem being considered. There are generically two approaches; project retention of design authority and issuance of build to print contracts, or issuance of subsystem performance specifications with controlled interfaces. This paper relates to the latter where a proof of concept (conceptual or reference design) is translated into performance based sub-system specifications for competitive tender. This translation is not a straightforward process and there are a number of different issues to consider in the process. This paper deals with primarily the Telescope mount and Enclosure subsystems. The main subjects considered in this paper are: • Typical status of design at Conceptual Design Review compared with the desired status of Specifications and Interface Control Documents at Request for Quotation. • Options for capture and tracking of system requirements flow down from science / operating requirements and sub-system requirements, and functional requirements derived from reference design. • Requirements that may come specifically from the contracting approach. • Methods for effective use of reference design work without compromising a performance based specification. • Management of project team's expectation relating to design. • Effects on cost estimates from reference design to actual. This paper is based on experience and lessons learned through this process on both the VISTA and the ATST projects.

  16. Comparison of a Stimulus Equivalence Protocol and Traditional Lecture for Teaching Single-Subject Designs

    ERIC Educational Resources Information Center

    Lovett, Sadie; Rehfeldt, Ruth Anne; Garcia, Yors; Dunning, Johnna

    2011-01-01

    This study compared the effects of a computer-based stimulus equivalence protocol to a traditional lecture format in teaching single-subject experimental design concepts to undergraduate students. Participants were assigned to either an equivalence or a lecture group, and performance on a paper-and-pencil test that targeted relations among the…

  17. Modular Integrated Stackable Layers (MISL) 1.1 Design Specification. Design Guideline Document

    NASA Technical Reports Server (NTRS)

    Yim, Hester J.

    2012-01-01

    This document establishes the design guideline of the Modular Instrumentation Data Acquisition (MI-DAQ) system in utilization of several designs available in EV. The MI- DAQ provides the options to the customers depending on their system requirements i.e. a 28V interface power supply, a low power battery operated system, a low power microcontroller, a higher performance microcontroller, a USB interface, a Ethernet interface, a wireless communication, various sensor interfaces, etc. Depending on customer's requirements, the each functional board can be stacked up from a bottom level of power supply to a higher level of stack to provide user interfaces. The stack up of boards are accomplished by a predefined and standardized power bus and data bus connections which are included in this document along with other physical and electrical guidelines. This guideline also provides information for a new design options. This specification is the product of a collaboration between NASA/JSC/EV and Texas A&M University. The goal of the collaboration is to open source the specification and allow outside entities to design, build, and market modules that are compatible with the specification. NASA has designed and is using numerous modules that are compatible to this specification. A limited number of these modules will also be released as open source designs to support the collaboration. The released designs are listed in the Applicable Documents.

  18. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 2: Protocol specification

    NASA Technical Reports Server (NTRS)

    Mckee, James W.

    1990-01-01

    This volume (2 of 4) contains the specification, structured flow charts, and code listing for the protocol. The purpose of an autonomous power system on a spacecraft is to relieve humans from having to continuously monitor and control the generation, storage, and distribution of power in the craft. This implies that algorithms will have been developed to monitor and control the power system. The power system will contain computers on which the algorithms run. There should be one control computer system that makes the high level decisions and sends commands to and receive data from the other distributed computers. This will require a communications network and an efficient protocol by which the computers will communicate. One of the major requirements on the protocol is that it be real time because of the need to control the power elements.

  19. WASP: a Web-based Allele-Specific PCR assay designing tool for detecting SNPs and mutations

    PubMed Central

    Wangkumhang, Pongsakorn; Chaichoompu, Kridsadakorn; Ngamphiw, Chumpol; Ruangrit, Uttapong; Chanprasert, Juntima; Assawamakin, Anunchai; Tongsima, Sissades

    2007-01-01

    Background Allele-specific (AS) Polymerase Chain Reaction is a convenient and inexpensive method for genotyping Single Nucleotide Polymorphisms (SNPs) and mutations. It is applied in many recent studies including population genetics, molecular genetics and pharmacogenomics. Using known AS primer design tools to create primers leads to cumbersome process to inexperience users since information about SNP/mutation must be acquired from public databases prior to the design. Furthermore, most of these tools do not offer the mismatch enhancement to designed primers. The available web applications do not provide user-friendly graphical input interface and intuitive visualization of their primer results. Results This work presents a web-based AS primer design application called WASP. This tool can efficiently design AS primers for human SNPs as well as mutations. To assist scientists with collecting necessary information about target polymorphisms, this tool provides a local SNP database containing over 10 million SNPs of various populations from public domain databases, namely NCBI dbSNP, HapMap and JSNP respectively. This database is tightly integrated with the tool so that users can perform the design for existing SNPs without going off the site. To guarantee specificity of AS primers, the proposed system incorporates a primer specificity enhancement technique widely used in experiment protocol. In particular, WASP makes use of different destabilizing effects by introducing one deliberate 'mismatch' at the penultimate (second to last of the 3'-end) base of AS primers to improve the resulting AS primers. Furthermore, WASP offers graphical user interface through scalable vector graphic (SVG) draw that allow users to select SNPs and graphically visualize designed primers and their conditions. Conclusion WASP offers a tool for designing AS primers for both SNPs and mutations. By integrating the database for known SNPs (using gene ID or rs number), this tool facilitates the

  20. A comparative study of wireless sensor networks and their routing protocols.

    PubMed

    Bhattacharyya, Debnath; Kim, Tai-hoon; Pal, Subhajit

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  1. Patient-centred screening for primary immunodeficiency, a multi-stage diagnostic protocol designed for non-immunologists: 2011 update

    PubMed Central

    de Vries, E

    2012-01-01

    Members of the European Society for Immunodeficiencies (ESID) and other colleagues have updated the multi-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs). The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage. PMID:22132890

  2. Design and performance evaluation of a distributed OFDMA-based MAC protocol for MANETs.

    PubMed

    Park, Jaesung; Chung, Jiyoung; Lee, Hyungyu; Lee, Jung-Ryun

    2014-01-01

    In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.

  3. Quarantine and protocol

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The purpose of the Orbiting Quarantine Facility is to provide maximum protection of the terrestrial biosphere by ensuring that the returned Martian samples are safe to bring to Earth. The protocol designed to detect the presence of biologically active agents in the Martian soil is described. The protocol determines one of two things about the sample: (1) that it is free from nonterrestrial life forms and can be sent to a terrestrial containment facility where extensive chemical, biochemical, geological, and physical investigations can be conducted; or (2) that it exhibits "biological effects" of the type that dictate second order testing. The quarantine protocol is designed to be conducted on a small portion of the returned sample, leaving the bulk of the sample undisturbed for study on Earth.

  4. Reflight certification software design specifications

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The PDSS/IMC Software Design Specification for the Payload Development Support System (PDSS)/Image Motion Compensator (IMC) is contained. The PDSS/IMC is to be used for checkout and verification of the IMC flight hardware and software by NASA/MSFC.

  5. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  6. Implementation of an Intensive Care Unit-Specific Alcohol Withdrawal Syndrome Management Protocol Reduces the Need for Mechanical Ventilation.

    PubMed

    Heavner, Jason J; Akgün, Kathleen M; Heavner, Mojdeh S; Eng, Claire C; Drew, Matthew; Jackson, Peter; Pritchard, David; Honiden, Shyoko

    2018-05-25

    Alcohol use disorders are prevalent and put patients at risk for developing alcohol withdrawal syndrome (AWS). Treatment of AWS with a symptom-triggered protocol standardizes management and may avoid AWS-related complications. The objective of this study was to evaluate whether implementation of an intensive care unit (ICU)-specific, symptom-triggered protocol for management of AWS was associated with improved clinical outcomes and, in particular, would reduce the risk of patients with AWS requiring mechanical ventilation. Retrospective pre-post-protocol implementation study. Thirty-six-bed, closed medical ICU (MICU) at a large, tertiary care, teaching hospital in an urban setting. A total of 233 adults admitted to the MICU with any diagnosis of alcohol use disorders based on International Classification of Diseases, Ninth Revision codes and who received at least one dose of any benzodiazepine; of these patients, 139 were in the pre-protocol era (August 2009-January 2010 and August 2010-January 2011), and 94 were in the post-protocol era (August 2012-January 2013), after implementation of the Yale Alcohol Withdrawal Protocol (YAWP) in April 2012. The YAWP pairs a modified Minnesota Detoxification Scale with an order set that includes benzodiazepine dosing regimens and suggests adjuvant therapies. AWS was the primary reason for ICU admission (107/233 patients [45.9%]) and did not significantly vary between eras (P=0.2). Of the 233 patients included, 81.1% were male and 67.0% were white, which did not significantly differ by study era. Severity of illness at MICU admission did not significantly differ between patients in the pre-protocol and post-protocol eras (median [interquartile range] Acute Physiology and Chronic Health Evaluation [APACHE] II scores of 12 [9-17] and 12.5 [7-16], respectively, p=0.4). Median lorazepam-equivalent dose per MICU day, duration of benzodiazepine infusion, and use of adjuvant therapy were not significantly different between eras. MICU

  7. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    PubMed

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  8. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  9. Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.

    PubMed

    Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y

    2017-08-14

    Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  11. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  12. Design of primers and probes for quantitative real-time PCR methods.

    PubMed

    Rodríguez, Alicia; Rodríguez, Mar; Córdoba, Juan J; Andrade, María J

    2015-01-01

    Design of primers and probes is one of the most crucial factors affecting the success and quality of quantitative real-time PCR (qPCR) analyses, since an accurate and reliable quantification depends on using efficient primers and probes. Design of primers and probes should meet several criteria to find potential primers and probes for specific qPCR assays. The formation of primer-dimers and other non-specific products should be avoided or reduced. This factor is especially important when designing primers for SYBR(®) Green protocols but also in designing probes to ensure specificity of the developed qPCR protocol. To design primers and probes for qPCR, multiple software programs and websites are available being numerous of them free. These tools often consider the default requirements for primers and probes, although new research advances in primer and probe design should be progressively added to different algorithm programs. After a proper design, a precise validation of the primers and probes is necessary. Specific consideration should be taken into account when designing primers and probes for multiplex qPCR and reverse transcription qPCR (RT-qPCR). This chapter provides guidelines for the design of suitable primers and probes and their subsequent validation through the development of singlex qPCR, multiplex qPCR, and RT-qPCR protocols.

  13. A GMP-compliant protocol to expand and transfect cancer patient T cells with mRNA encoding a tumor-specific chimeric antigen receptor.

    PubMed

    Krug, Christian; Wiesinger, Manuel; Abken, Hinrich; Schuler-Thurner, Beatrice; Schuler, Gerold; Dörrie, Jan; Schaft, Niels

    2014-10-01

    Chimeric antigen receptors (CARs), which combine an antibody-derived binding domain (single chain fragment variable) with T-cell-activating signaling domains, have become a promising tool in the adoptive cellular therapy of cancer. Retro- and lenti-viral transductions are currently the standard methods to equip T cells with a CAR; permanent CAR expression, however, harbors several risks like uncontrolled auto-reactivity. Modification of T cells by electroporation with CAR-encoding RNA to achieve transient expression likely circumvents these difficulties. We here present a GMP-compliant protocol to activate and expand T cells for clinical application. The protocol is optimized in particular to produce CAR-modified T cells in clinically sufficient numbers under full GMP-compliance from late-stage cancer patients. This protocol allows the generation of 6.7 × 10(8) CAR-expressing T cells from one patient leukapheresis. The CAR-engineered T cells produced pro-inflammatory cytokines after stimulation with antigen-bearing tumor cells and lysed tumor cells in an antigen-specific manner. This functional capacity was maintained after cryopreservation. Taken together, we provide a clinically applicable protocol to transiently engineer sufficient numbers of antigen-specific patient T cells for use in adoptive cell therapy of cancer.

  14. Rosetta comparative modeling for library design: Engineering alternative inducer specificity in a transcription factor.

    PubMed

    Jha, Ramesh K; Chakraborti, Subhendu; Kern, Theresa L; Fox, David T; Strauss, Charlie E M

    2015-07-01

    Structure-based rational mutagenesis for engineering protein functionality has been limited by the scarcity and difficulty of obtaining crystal structures of desired proteins. On the other hand, when high-throughput selection is possible, directed evolution-based approaches for gaining protein functionalities have been random and fortuitous with limited rationalization. We combine comparative modeling of dimer structures, ab initio loop reconstruction, and ligand docking to select positions for mutagenesis to create a library focused on the ligand-contacting residues. The rationally reduced library requirement enabled conservative control of the substitutions by oligonucleotide synthesis and bounding its size within practical transformation efficiencies (∼ 10(7) variants). This rational approach was successfully applied on an inducer-binding domain of an Acinetobacter transcription factor (TF), pobR, which shows high specificity for natural effector molecule, 4-hydroxy benzoate (4HB), but no native response to 3,4-dihydroxy benzoate (34DHB). Selection for mutants with high transcriptional induction by 34DHB was carried out at the single-cell level under flow cytometry (via green fluorescent protein expression under the control of pobR promoter). Critically, this selection protocol allows both selection for induction and rejection of constitutively active mutants. In addition to gain-of-function for 34DHB induction, the selected mutants also showed enhanced sensitivity and response for 4HB (native inducer) while no sensitivity was observed for a non-targeted but chemically similar molecule, 2-hydroxy benzoate (2HB). This is unique application of the Rosetta modeling protocols for library design to engineer a TF. Our approach extends applicability of the Rosetta redesign protocol into regimes without a priori precision structural information. © 2015 Wiley Periodicals, Inc.

  15. 46 CFR 162.050-25 - Cargo monitor: Design specification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 6 2014-10-01 2014-10-01 false Cargo monitor: Design specification. 162.050-25 Section 162.050-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Pollution Prevention Equipment § 162.050-25 Cargo monitor: Design specification. (...

  16. 46 CFR 162.050-25 - Cargo monitor: Design specification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 6 2013-10-01 2013-10-01 false Cargo monitor: Design specification. 162.050-25 Section 162.050-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Pollution Prevention Equipment § 162.050-25 Cargo monitor: Design specification. (...

  17. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    PubMed

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  18. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    PubMed Central

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  19. Design protocols and analytical strategies that incorporate structural reliability models

    NASA Technical Reports Server (NTRS)

    Duffy, Stephen F.

    1995-01-01

    In spite of great improvements in accuracy through the use of computers, design methods, which can be equally critical in establishing the commercial success of a material, have been treated as afterthoughts. Early investment in design and development technologies can easily reduce manufacturing costs later in the product cycle. To avoid lengthy product development times for ceramic composites, funding agencies for materials research must commit resources to support design and development technologies early in the material life cycle. These technologies need not focus on designing the material, rather, the technology must focus on designing with the material, i. e., developing methods to design components fabricated from the new material. Thus a basic tenet that motivated this research effort is that a persistent need exists for improvements in the analysis of components fabricated from CMC material systems. From an aerospace design engineer's perspective the new generation of ceramic composites offers a significant potential for raising the thrust/weight ratio and reducing NOx emissions of gas turbine engines. Continuous ceramic fiber composites exhibit an increase in work of fracture, which allows for 'graceful' rather than catastrophic failure. When loaded in the fiber direction, these composites retain substantial strength capacity beyond the initiation of transverse matrix cracking despite the fact that neither of its constituents would exhibit such behavior if tested alone. As additional load is applied beyond first matrix cracking, the matrix tends to break in a series of cracks bridged by the ceramic fibers. Thus any additional load is born increasingly by the fibers until the ultimate strength of the composite is reached. Establishing design protocols that enable the engineer to analyze and predict this type of behavior in ceramic composites was the general goal of this project.

  20. Design protocols and analytical strategies that incorporate structural reliability models

    NASA Astrophysics Data System (ADS)

    Duffy, Stephen F.

    1995-08-01

    In spite of great improvements in accuracy through the use of computers, design methods, which can be equally critical in establishing the commercial success of a material, have been treated as afterthoughts. Early investment in design and development technologies can easily reduce manufacturing costs later in the product cycle. To avoid lengthy product development times for ceramic composites, funding agencies for materials research must commit resources to support design and development technologies early in the material life cycle. These technologies need not focus on designing the material, rather, the technology must focus on designing with the material, i. e., developing methods to design components fabricated from the new material. Thus a basic tenet that motivated this research effort is that a persistent need exists for improvements in the analysis of components fabricated from CMC material systems. From an aerospace design engineer's perspective the new generation of ceramic composites offers a significant potential for raising the thrust/weight ratio and reducing NOx emissions of gas turbine engines. Continuous ceramic fiber composites exhibit an increase in work of fracture, which allows for 'graceful' rather than catastrophic failure. When loaded in the fiber direction, these composites retain substantial strength capacity beyond the initiation of transverse matrix cracking despite the fact that neither of its constituents would exhibit such behavior if tested alone. As additional load is applied beyond first matrix cracking, the matrix tends to break in a series of cracks bridged by the ceramic fibers. Thus any additional load is born increasingly by the fibers until the ultimate strength of the composite is reached. Establishing design protocols that enable the engineer to analyze and predict this type of behavior in ceramic composites was the general goal of this project.

  1. SEPAC flight software detailed design specifications, volume 1

    NASA Technical Reports Server (NTRS)

    1982-01-01

    The detailed design specifications (as built) for the SEPAC Flight Software are defined. The design includes a description of the total software system and of each individual module within the system. The design specifications describe the decomposition of the software system into its major components. The system structure is expressed in the following forms: the control-flow hierarchy of the system, the data-flow structure of the system, the task hierarchy, the memory structure, and the software to hardware configuration mapping. The component design description includes details on the following elements: register conventions, module (subroutines) invocaton, module functions, interrupt servicing, data definitions, and database structure.

  2. Flood type specific construction of synthetic design hydrographs

    NASA Astrophysics Data System (ADS)

    Brunner, Manuela I.; Viviroli, Daniel; Sikorska, Anna E.; Vannier, Olivier; Favre, Anne-Catherine; Seibert, Jan

    2017-02-01

    Accurate estimates of flood peaks, corresponding volumes, and hydrographs are required to design safe and cost-effective hydraulic structures. In this paper, we propose a statistical approach for the estimation of the design variables peak and volume by constructing synthetic design hydrographs for different flood types such as flash-floods, short-rain floods, long-rain floods, and rain-on-snow floods. Our approach relies on the fitting of probability density functions to observed flood hydrographs of a certain flood type and accounts for the dependence between peak discharge and flood volume. It makes use of the statistical information contained in the data and retains the process information of the flood type. The method was tested based on data from 39 mesoscale catchments in Switzerland and provides catchment specific and flood type specific synthetic design hydrographs for all of these catchments. We demonstrate that flood type specific synthetic design hydrographs are meaningful in flood-risk management when combined with knowledge on the seasonality and the frequency of different flood types.

  3. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations.

    PubMed

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. From designed door's thickness, the door designed by the MC simulation and Wu-McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations.

  4. Chapter 22: Compressed Air Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Benton, Nathanael; Burns, Patrick

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: High-efficiency/variable speed drive (VSD) compressormore » replacing modulating, load/unload, or constant-speed compressor; and Compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.« less

  5. Database integration of protocol-specific neurological imaging datasets

    PubMed Central

    Pacurar, Emil E.; Sethi, Sean K.; Habib, Charbel; Laze, Marius O.; Martis-Laze, Rachel; Haacke, E. Mark

    2016-01-01

    For many years now, Magnetic Resonance Innovations (MR Innovations), a magnetic resonance imaging (MRI) software development, technology, and research company, has been aggregating a multitude of MRI data from different scanning sites through its collaborations and research contracts. The majority of the data has adhered to neuroimaging protocols developed by our group which has helped ensure its quality and consistency. The protocols involved include the study of: traumatic brain injury, extracranial venous imaging for multiple sclerosis and Parkinson's disease, and stroke. The database has proven invaluable in helping to establish disease biomarkers, validate findings across multiple data sets, develop and refine signal processing algorithms, and establish both public and private research collaborations. Myriad Masters and PhD dissertations have been possible thanks to the availability of this database. As an example of a project that cuts across diseases, we have used the data and specialized software to develop new guidelines for detecting cerebral microbleeds. Ultimately, the database has been vital in our ability to provide tools and information for researchers and radiologists in diagnosing their patients, and we encourage collaborations and welcome sharing of similar data in this database. PMID:25959660

  6. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  7. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    PubMed

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  8. Surgeon Design Interface for Patient-Specific Concentric Tube Robots

    PubMed Central

    Morimoto, Tania K.; Greer, Joseph D.; Hsieh, Michael H.; Okamura, Allison M.

    2017-01-01

    Concentric tube robots have potential for use in a wide variety of surgical procedures due to their small size, dexterity, and ability to move in highly curved paths. Unlike most existing clinical robots, the design of these robots can be developed and manufactured on a patient- and procedure-specific basis. The design of concentric tube robots typically requires significant computation and optimization, and it remains unclear how the surgeon should be involved. We propose to use a virtual reality-based design environment for surgeons to easily and intuitively visualize and design a set of concentric tube robots for a specific patient and procedure. In this paper, we describe a novel patient-specific design process in the context of the virtual reality interface. We also show a resulting concentric tube robot design, created by a pediatric urologist to access a kidney stone in a pediatric patient. PMID:28656124

  9. Surgeon Design Interface for Patient-Specific Concentric Tube Robots.

    PubMed

    Morimoto, Tania K; Greer, Joseph D; Hsieh, Michael H; Okamura, Allison M

    2016-06-01

    Concentric tube robots have potential for use in a wide variety of surgical procedures due to their small size, dexterity, and ability to move in highly curved paths. Unlike most existing clinical robots, the design of these robots can be developed and manufactured on a patient- and procedure-specific basis. The design of concentric tube robots typically requires significant computation and optimization, and it remains unclear how the surgeon should be involved. We propose to use a virtual reality-based design environment for surgeons to easily and intuitively visualize and design a set of concentric tube robots for a specific patient and procedure. In this paper, we describe a novel patient-specific design process in the context of the virtual reality interface. We also show a resulting concentric tube robot design, created by a pediatric urologist to access a kidney stone in a pediatric patient.

  10. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  11. Development of the protocol for purification of artemisinin based on combination of commercial and computationally designed adsorbents.

    PubMed

    Piletska, Elena V; Karim, Kal; Cutler, Malcolm; Piletsky, Sergey A

    2013-01-01

    A polymeric adsorbent for extraction of the antimalarial drug artemisinin from Artemisia annua L. was computationally designed. This polymer demonstrated a high capacity for artemisinin (120 mg g(-1) ), quantitative recovery (87%) and was found to be an effective material for purification of artemisinin from complex plant matrix. The artemisinin quantification was conducted using an optimised HPLC-MS protocol, which was characterised by high precision and linearity in the concentration range between 0.05 and 2 μg mL(-1) . Optimisation of the purification protocol also involved screening of commercial adsorbents for the removal of waxes and other interfering natural compounds, which inhibit the crystallisation of artemisinin. As a result of a two step-purification protocol crystals of artemisinin were obtained, and artemisinin purity was evaluated as 75%. By performing the second stage of purification twice, the purity of artemisinin can be further improved to 99%. The developed protocol produced high-purity artemisinin using only a few purification steps that makes it suitable for large scale industrial manufacturing process. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Difficult‐to‐control asthma management through the use of a specific protocol

    PubMed Central

    Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge

    2010-01-01

    The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219

  13. Adapt Design: A Methodology for Enabling Modular Design for Mission Specific SUAS

    DTIC Science & Technology

    2016-08-24

    ADAPT DESIGN: A METHODOLOGY FOR ENABLING MODULAR DESIGN FOR MISSION SPECIFIC SUAS Zachary C. Fisher David Locascio K. Daniel Cooksey...vehicle’s small scale. This paper considers a different approach to SUAS design aimed at addressing this issue. In this approach, a hybrid modular and...Two types of platforms have been identified: scalable platforms where variants are produced by varying scalable design variables, and modular

  14. Safe Use of Acoustic Vestibular-Evoked Myogenic Potential Stimuli: Protocol and Patient-Specific Considerations.

    PubMed

    Portnuff, Cory D F; Kleindienst, Samantha; Bogle, Jamie M

    2017-09-01

    Vestibular-evoked myogenic potentials (VEMPs) are commonly used clinical assessments for patients with complaints of dizziness. However, relatively high air-conducted stimuli are required to elicit the VEMP, and ultimately may compromise safe noise exposure limits. Recently, research has reported the potential for noise-induced hearing loss (NIHL) from VEMP stimulus exposure through studies of reduced otoacoustic emission levels after VEMP testing, as well as a recent case study showing permanent sensorineural hearing loss associated with VEMP exposure. The purpose of this report is to review the potential for hazardous noise exposure from VEMP stimuli and to suggest clinical parameters for safe VEMP testing. Literature review with presentation of clinical guidelines and a clinical tool for estimating noise exposure. The literature surrounding VEMP stimulus-induced hearing loss is reviewed, including several cases of overexposure. The article then presents a clinical calculation tool for the estimation of a patient's safe noise exposure from VEMP stimuli, considering stimulus parameters, and includes a discussion of how varying stimulus parameters affect a patient's noise exposure. Finally, recommendations are provided for recognizing and managing specific patient populations who may be at higher risk for NIHL from VEMP stimulus exposure. A sample protocol is provided that allows for safe noise exposure. VEMP stimuli have the potential to cause NIHL due to high sound exposure levels. However, with proper safety protocols in place, clinicians may reduce or eliminate this risk to their patients. Use of the tools provided, including the noise exposure calculation tool and sample protocols, may help clinicians to understand and ensure safe use of VEMP stimuli. American Academy of Audiology

  15. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations

    PubMed Central

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    Aim The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. Background High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. Materials and methods The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. Results From designed door's thickness, the door designed by the MC simulation and Wu–McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Conclusion Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations. PMID:26900357

  16. Formalisms for user interface specification and design

    NASA Technical Reports Server (NTRS)

    Auernheimer, Brent J.

    1989-01-01

    The application of formal methods to the specification and design of human-computer interfaces is described. A broad outline of human-computer interface problems, a description of the field of cognitive engineering and two relevant research results, the appropriateness of formal specification techniques, and potential NASA application areas are described.

  17. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  18. A survey on routing protocols for large-scale wireless sensor networks.

    PubMed

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. "Large-scale" means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and

  19. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    PubMed Central

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner

  20. PNA-COMBO-FISH: From combinatorial probe design in silico to vitality compatible, specific labelling of gene targets in cell nuclei.

    PubMed

    Müller, Patrick; Rößler, Jens; Schwarz-Finsterle, Jutta; Schmitt, Eberhard; Hausmann, Michael

    2016-07-01

    Recently, advantages concerning targeting specificity of PCR constructed oligonucleotide FISH probes in contrast to established FISH probes, e.g. BAC clones, have been demonstrated. These techniques, however, are still using labelling protocols with DNA denaturing steps applying harsh heat treatment with or without further denaturing chemical agents. COMBO-FISH (COMBinatorial Oligonucleotide FISH) allows the design of specific oligonucleotide probe combinations in silico. Thus, being independent from primer libraries or PCR laboratory conditions, the probe sequences extracted by computer sequence data base search can also be synthesized as single stranded PNA-probes (Peptide Nucleic Acid probes) or TINA-DNA (Twisted Intercalating Nucleic Acids). Gene targets can be specifically labelled with at least about 20 probes obtaining visibly background free specimens. By using appropriately designed triplex forming oligonucleotides, the denaturing procedures can completely be omitted. These results reveal a significant step towards oligonucleotide-FISH maintaining the 3d-nanostructure and even the viability of the cell target. The method is demonstrated with the detection of Her2/neu and GRB7 genes, which are indicators in breast cancer diagnosis and therapy. Copyright © 2016. Published by Elsevier Inc.

  1. Test Protocol for Room-to-Room Distribution of Outside Air by Residential Ventilation Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barley, C. D.; Anderson, R.; Hendron, B.

    2007-12-01

    This test and analysis protocol has been developed as a practical approach for measuring outside air distribution in homes. It has been used successfully in field tests and has led to significant insights on ventilation design issues. Performance advantages of more sophisticated ventilation systems over simpler, less-costly designs have been verified, and specific problems, such as airflow short-circuiting, have been identified.

  2. Protocol for determining bull trout presence

    USGS Publications Warehouse

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  3. 256 Slice Multi-detector Computed Tomography Thoracic Aorta Computed Tomography Angiography: Improved Luminal Opacification Using a Patient-Specific Contrast Protocol and Caudocranial Scan Acquisition.

    PubMed

    Saade, Charbel; El-Merhi, Fadi; El-Achkar, Bassam; Kerek, Racha; Vogl, Thomas J; Maroun, Gilbert Georges; Jamjoom, Lamia; Al-Mohiy, Hussain; Naffaa, Lena

    Caudocranial scan direction and contrast injection timing based on measured patient vessel dynamics can significantly improve arterial and aneurysmal opacification and reduce both contrast and radiation dose in the assessment of thoracic aortic aneurysms (TAA) using helical thoracic computed tomography angiography (CTA). To investigate opacification of the thoracic aorta and TAA using a caudocranial scan direction and a patient-specific contrast protocol. Thoracic aortic CTA was performed in 160 consecutive patients with suspected TAA using a 256-slice computed tomography scanner and a dual barrel contrast injector. Patients were subjected in equal numbers to one of two contrast protocols. Patient age and sex were equally distributed across both groups. Protocol A, the department's standard protocol, consisted of a craniocaudal scan direction with 100 mL of contrast, intravenously injected at a flow rate of 4.5 mL/s. Protocol B involved a caudocranial scan direction and a novel contrast formula based on patient cardiovascular dynamics, followed by 100 mL of saline at 4.5 mL/s. Each scan acquisition comprised of 120 kVp, 200 mA with modulation, temporal resolution 0.27 seconds, and pitch 0.889:1. The dose length product was measured between each protocol and data generated were compared using Mann-Whitney U nonparametric statistics. Receiver operating characteristic analysis, visual grading characteristic (VGC), and κ analyses were performed. Mean opacification in the thoracic aorta and aneurysm measured was 24 % and 55%, respectively. The mean contrast volume was significantly lower in protocol B (73 ± 10 mL) compared with A (100 ± 1 mL) (P<0.001). The contrast-to-noise ratio demonstrated significant differences between the protocols (protocol A, 18.2 ± 12.9; protocol B, 29.7 ± 0.61; P < 0.003). Mean effective dose in protocol B (2.6 ± 0.4 mSv) was reduced by 19% compared with A (3.2 ± 0.8 mSv) (P < 0.004). Aneurysmal detectability demonstrated significant

  4. Guidelines for experimental design protocol and validation procedure for the measurement of heat resistance of microorganisms in milk.

    PubMed

    Condron, Robin; Farrokh, Choreh; Jordan, Kieran; McClure, Peter; Ross, Tom; Cerf, Olivier

    2015-01-02

    Studies on the heat resistance of dairy pathogens are a vital part of assessing the safety of dairy products. However, harmonized methodology for the study of heat resistance of food pathogens is lacking, even though there is a need for such harmonized experimental design protocols and for harmonized validation procedures for heat treatment studies. Such an approach is of particular importance to allow international agreement on appropriate risk management of emerging potential hazards for human and animal health. This paper is working toward establishment of a harmonized protocol for the study of the heat resistance of pathogens, identifying critical issues for establishment of internationally agreed protocols, including a harmonized framework for reporting and interpretation of heat inactivation studies of potentially pathogenic microorganisms. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Absorbable energy monitoring scheme: new design protocol to test vehicle structural crashworthiness.

    PubMed

    Ofochebe, Sunday M; Enibe, Samuel O; Ozoegwu, Chigbogu G

    2016-05-01

    In vehicle crashworthiness design optimization detailed system evaluation capable of producing reliable results are basically achieved through high-order numerical computational (HNC) models such as the dynamic finite element model, mesh-free model etc. However the application of these models especially during optimization studies is basically challenged by their inherent high demand on computational resources, conditional stability of the solution process, and lack of knowledge of viable parameter range for detailed optimization studies. The absorbable energy monitoring scheme (AEMS) presented in this paper suggests a new design protocol that attempts to overcome such problems in evaluation of vehicle structure for crashworthiness. The implementation of the AEMS involves studying crash performance of vehicle components at various absorbable energy ratios based on a 2DOF lumped-mass-spring (LMS) vehicle impact model. This allows for prompt prediction of useful parameter values in a given design problem. The application of the classical one-dimensional LMS model in vehicle crash analysis is further improved in the present work by developing a critical load matching criterion which allows for quantitative interpretation of the results of the abstract model in a typical vehicle crash design. The adequacy of the proposed AEMS for preliminary vehicle crashworthiness design is demonstrated in this paper, however its extension to full-scale design-optimization problem involving full vehicle model that shows greater structural detail requires more theoretical development.

  6. Design of the Protocol Processor for the ROBUS-2 Communication System

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo; Malekpour, Mahyar R.; Miner, Paul S.

    2005-01-01

    The ROBUS-2 Protocol Processor (RPP) is a custom-designed hardware component implementing the functionality of the ROBUS-2 fault-tolerant communication system. The Reliable Optical Bus (ROBUS) is the core communication system of the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault tolerant integrated modular architecture currently under development at NASA Langley Research Center. ROBUS is a time-division multiple access (TDMA) broadcast communication system with medium access control by means of time-indexed communication schedule. ROBUS-2 is a developmental version of the ROBUS providing guaranteed fault-tolerant services to the attached processing elements (PEs), in the presence of a bounded number of faults. These services include message broadcast (Byzantine Agreement), dynamic communication schedule update, time reference (clock synchronization), and distributed diagnosis (group membership). ROBUS also features fault-tolerant startup and restart capabilities. ROBUS-2 tolerates internal as well as PE faults, and incorporates a dynamic self-reconfiguration capability driven by the internal diagnostic system. ROBUS consists of RPPs connected to each other by a lower-level physical communication network. The RPP has a pipelined architecture and the design is parameterized in the behavioral and structural domains. The design of the RPP enables the bus to achieve a PE-message throughput that approaches the available bandwidth at the physical layer.

  7. Designing Epigenome Editors: Considerations of Biochemical and Locus Specificities.

    PubMed

    Sen, Dilara; Keung, Albert J

    2018-01-01

    The advent of locus-specific protein recruitment technologies has enabled a new class of studies in chromatin biology. Epigenome editors enable biochemical modifications of chromatin at almost any specific endogenous locus. Their locus specificity unlocks unique information including the functional roles of distinct modifications at specific genomic loci. Given the growing interest in using these tools for biological and translational studies, there are many specific design considerations depending on the scientific question or clinical need. Here we present and discuss important design considerations and challenges regarding the biochemical and locus specificities of epigenome editors. These include how to account for the complex biochemical diversity of chromatin; control for potential interdependency of epigenome editors and their resultant modifications; avoid sequestration effects; quantify the locus specificity of epigenome editors; and improve locus specificity by considering concentration, affinity, avidity, and sequestration effects.

  8. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Romberger, Jeff

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions.

  9. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    PubMed Central

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-01-01

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495

  10. A Passive Testing Approach for Protocols in Wireless Sensor Networks.

    PubMed

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-11-19

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  11. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    NASA Technical Reports Server (NTRS)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  12. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  13. Chapter 16: Retrocommissioning Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Tiessen, Alex

    Retrocommissioning (RCx) is a systematic process for optimizing energy performance in existing buildings. It specifically focuses on improving the control of energy-using equipment (e.g., heating, ventilation, and air conditioning [HVAC] equipment and lighting) and typically does not involve equipment replacement. Field results have shown proper RCx can achieve energy savings ranging from 5 percent to 20 percent, with a typical payback of two years or less (Thorne 2003). The method presented in this protocol provides direction regarding: (1) how to account for each measure's specific characteristics and (2) how to choose the most appropriate savings verification approach.

  14. A model based security testing method for protocol implementation.

    PubMed

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  15. Design Specification Issues in Time-Series Intervention Models.

    ERIC Educational Resources Information Center

    Huitema, Bradley E.; McKean, Joseph W.

    2000-01-01

    Presents examples of egregious errors of interpretation in time-series intervention models and makes recommendations regarding the correct specification of the design matrix. Discusses the profound effects of variants of the slope change variable in the design matrix. (SLD)

  16. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    NASA Astrophysics Data System (ADS)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  17. Working Notes from the 1992 AAAI Workshop on Automating Software Design. Theme: Domain Specific Software Design

    NASA Technical Reports Server (NTRS)

    Keller, Richard M. (Editor); Barstow, David; Lowry, Michael R.; Tong, Christopher H.

    1992-01-01

    The goal of this workshop is to identify different architectural approaches to building domain-specific software design systems and to explore issues unique to domain-specific (vs. general-purpose) software design. Some general issues that cut across the particular software design domain include: (1) knowledge representation, acquisition, and maintenance; (2) specialized software design techniques; and (3) user interaction and user interface.

  18. An Alternative Approach to "Identification of Unknowns": Designing a Protocol to Verify the Identities of Nitrogen Fixing Bacteria.

    PubMed

    Martinez-Vaz, Betsy M; Denny, Roxanne; Young, Nevin D; Sadowsky, Michael J

    2015-12-01

    Microbiology courses often include a laboratory activity on the identification of unknown microbes. This activity consists of providing students with microbial cultures and running biochemical assays to identify the organisms. This approach lacks molecular techniques such as sequencing of genes encoding 16S rRNA, which is currently the method of choice for identification of unknown bacteria. A laboratory activity was developed to teach students how to identify microorganisms using 16S rRNA polymerase chain reaction (PCR) and validate microbial identities using biochemical techniques. We hypothesized that designing an experimental protocol to confirm the identity of a bacterium would improve students' knowledge of microbial identification techniques and the physiological characteristics of bacterial species. Nitrogen-fixing bacteria were isolated from the root nodules of Medicago truncatula and prepared for 16S rRNA PCR analysis. Once DNA sequencing revealed the identity of the organisms, the students designed experimental protocols to verify the identity of rhizobia. An assessment was conducted by analyzing pre- and posttest scores and by grading students' verification protocols and presentations. Posttest scores were higher than pretest scores at or below p = 0.001. Normalized learning gains (G) showed an improvement of students' knowledge of microbial identification methods (LO4, G = 0.46), biochemical properties of nitrogen-fixing bacteria (LO3, G = 0.45), and the events leading to the establishment of nitrogen-fixing symbioses (LO1&2, G = 0.51, G = 0.37). An evaluation of verification protocols also showed significant improvement with a p value of less than 0.001.

  19. The Tehran Eye Study: research design and eye examination protocol.

    PubMed

    Hashemi, Hassan; Fotouhi, Akbar; Mohammad, Kazem

    2003-07-15

    Visual impairment has a profound impact on society. The majority of visually impaired people live in developing countries, and since most disorders leading to visual impairment are preventable or curable, their control is a priority in these countries. Considering the complicated epidemiology of visual impairment and the wide variety of factors involved, region specific intervention strategies are required for every community. Therefore, providing appropriate data is one of the first steps in these communities, as it is in Iran. The objectives of this study are to describe the prevalence and causes of visual impairment in the population of Tehran city; the prevalence of refractive errors, lens opacity, ocular hypertension, and color blindness in this population, and also the familial aggregation of refractive errors, lens opacity, ocular hypertension, and color blindness within the study sample. Through a population-based, cross-sectional study, a total of 5300 Tehran citizens will be selected from 160 clusters using a stratified cluster random sampling strategy. The eligible people will be enumerated through a door-to-door household survey in the selected clusters and will be invited. All participants will be transferred to a clinic for measurements of uncorrected, best corrected and presenting visual acuity; manifest, subjective and cycloplegic refraction; color vision test; Goldmann applanation tonometry; examination of the external eye, anterior segment, media, and fundus; and an interview about demographic characteristics and history of eye diseases, eye trauma, diabetes mellitus, high blood pressure, and ophthalmologic cares. The study design and eye examination protocol are described. We expect that findings from the TES will show the status of visual problems and their causes in the community. This study can highlight the people who should be targeted by visual impairment prevention programs.

  20. Designing timber highway bridge superstructures using AASHTO?LRFD specifications

    Treesearch

    James P. Wacker; James S. Groenier

    2007-01-01

    The allowable-stress design methodology that has been used for decades to design timber bridge superstructures is being replaced in the near future. Beginning in October 2007, bridge designers will be required by the Federal Highway Administration (FHWA) to utilize the Load and Resistance Factor Design (LRFD) design specifications published by the American Association...

  1. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  2. CT protocol management: simplifying the process by using a master protocol concept

    PubMed Central

    Bour, Robert K.; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two‐tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade‐offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  3. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  4. DARPA Internet Program. Internet and Transmission Control Specifications,

    DTIC Science & Technology

    1981-09-01

    Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information

  5. High-resolution Modeling Assisted Design of Customized and Individualized Transcranial Direct Current Stimulation Protocols

    PubMed Central

    Bikson, Marom; Rahman, Asif; Datta, Abhishek; Fregni, Felipe; Merabet, Lotfi

    2012-01-01

    Objectives Transcranial direct current stimulation (tDCS) is a neuromodulatory technique that delivers low-intensity currents facilitating or inhibiting spontaneous neuronal activity. tDCS is attractive since dose is readily adjustable by simply changing electrode number, position, size, shape, and current. In the recent past, computational models have been developed with increased precision with the goal to help customize tDCS dose. The aim of this review is to discuss the incorporation of high-resolution patient-specific computer modeling to guide and optimize tDCS. Methods In this review, we discuss the following topics: (i) The clinical motivation and rationale for models of transcranial stimulation is considered pivotal in order to leverage the flexibility of neuromodulation; (ii) The protocols and the workflow for developing high-resolution models; (iii) The technical challenges and limitations of interpreting modeling predictions, and (iv) Real cases merging modeling and clinical data illustrating the impact of computational models on the rational design of rehabilitative electrotherapy. Conclusions Though modeling for non-invasive brain stimulation is still in its development phase, it is predicted that with increased validation, dissemination, simplification and democratization of modeling tools, computational forward models of neuromodulation will become useful tools to guide the optimization of clinical electrotherapy. PMID:22780230

  6. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS

  7. Experimental evaluation and design of unfilled and concrete-filled FRP composite piles : Task 4A : design specifications.

    DOT National Transportation Integrated Search

    2015-08-01

    The overall goal of this project is the experimental evaluation and design of unfilled and concrete-filled FRP composite piles for load-bearing in bridges. This report covers Task 4A, Design Specifications. : Structural design specifications are base...

  8. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  9. Specification, Design, and Analysis of Advanced HUMS Architectures

    NASA Technical Reports Server (NTRS)

    Mukkamala, Ravi

    2004-01-01

    During the two-year project period, we have worked on several aspects of domain-specific architectures for HUMS. In particular, we looked at using scenario-based approach for the design and designed a language for describing such architectures. The language is now being used in all aspects of our HUMS design. In particular, we have made contributions in the following areas. 1) We have employed scenarios in the development of HUMS in three main areas. They are: (a) To improve reusability by using scenarios as a library indexing tool and as a domain analysis tool; (b) To improve maintainability by recording design rationales from two perspectives - problem domain and solution domain; (c) To evaluate the software architecture. 2) We have defined a new architectural language called HADL or HUMS Architectural Definition Language. It is a customized version of xArch/xADL. It is based on XML and, hence, is easily portable from domain to domain, application to application, and machine to machine. Specifications written in HADL can be easily read and parsed using the currently available XML parsers. Thus, there is no need to develop a plethora of software to support HADL. 3) We have developed an automated design process that involves two main techniques: (a) Selection of solutions from a large space of designs; (b) Synthesis of designs. However, the automation process is not an absolute Artificial Intelligence (AI) approach though it uses a knowledge-based system that epitomizes a specific HUMS domain. The process uses a database of solutions as an aid to solve the problems rather than creating a new design in the literal sense. Since searching is adopted as the main technique, the challenges involved are: (a) To minimize the effort in searching the database where a very large number of possibilities exist; (b) To develop representations that could conveniently allow us to depict design knowledge evolved over many years; (c) To capture the required information that aid the

  10. Comparison of low back mobility and stability exercises from Pilates in non-specific low back pain: A study protocol of a randomized controlled trial.

    PubMed

    Miranda, Iã Ferreira; Souza, Catiane; Schneider, Alexandre Tavares; Chagas, Leandro Campos; Loss, Jefferson Fagundes

    2018-05-01

    There is some evidence in the literature about the effectiveness of the Pilates methods in the low back pain. Moreover, Pilates focus on exercises that empathizes the stability and/or mobility of the spine. Therefore, it is discussed in the literature whether higher levels of stability or mobility of the lumbar spine generates better results, both in performance and rehabilitation for low back pain. Compare the effects of the low back mobility and stability exercises from Pilates Method on low back pain, disability and movement functionality in individuals with non-specific chronic low back pain. 28 participants will be randomized into two exercise protocol from Pilates methods, one focusing on low back stability and other on low back mobility. Low back pain (visual analogic scale), low back disability (Oswestry) and movement functionality (7 functional movement tasks) will be evaluated before and after 10 sessions of Pilates exercise by the same trained assessor. A mixed designed ANOVA with two factors will be used. This study is the first to compare these outcomes for chronic low back pain participants with two exercises protocol focusing on low back mobility and stability and the results will evaluate what to prioritize with Pilates exercises to give better results for that population. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Documentation of operational protocol for the use of MAMA software

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schwartz, Daniel S.

    2016-01-21

    Image analysis of Scanning Electron Microscope (SEM) micrographs is a complex process that can vary significantly between analysts. The factors causing the variation are numerous, and the purpose of Task 2b is to develop and test a set of protocols designed to minimize variation in image analysis between different analysts and laboratories, specifically using the MAMA software package, Version 2.1. The protocols were designed to be “minimally invasive”, so that expert SEM operators will not be overly constrained in the way they analyze particle samples. The protocols will be tested using a round-robin approach where results from expert SEM usersmore » at Los Alamos National Laboratory, Lawrence Livermore National Laboratory, Pacific Northwest National Laboratory, Savannah River National Laboratory, and the National Institute of Standards and Testing will be compared. The variation of the results will be used to quantify uncertainty in the particle image analysis process. The round-robin exercise will proceed with 3 levels of rigor, each with their own set of protocols, as described below in Tasks 2b.1, 2b.2, and 2b.3. The uncertainty will be developed using NIST standard reference material SRM 1984 “Thermal Spray Powder – Particle Size Distribution, Tungsten Carbide/Cobalt (Acicular)” [Reference 1]. Full details are available in the Certificate of Analysis, posted on the NIST website (http://www.nist.gov/srm/).« less

  12. Guidelines for Inclusion of Patient-Reported Outcomes in Clinical Trial Protocols: The SPIRIT-PRO Extension.

    PubMed

    Calvert, Melanie; Kyte, Derek; Mercieca-Bebber, Rebecca; Slade, Anita; Chan, An-Wen; King, Madeleine T; Hunn, Amanda; Bottomley, Andrew; Regnault, Antoine; Chan, An-Wen; Ells, Carolyn; O'Connor, Daniel; Revicki, Dennis; Patrick, Donald; Altman, Doug; Basch, Ethan; Velikova, Galina; Price, Gary; Draper, Heather; Blazeby, Jane; Scott, Jane; Coast, Joanna; Norquist, Josephine; Brown, Julia; Haywood, Kirstie; Johnson, Laura Lee; Campbell, Lisa; Frank, Lori; von Hildebrand, Maria; Brundage, Michael; Palmer, Michael; Kluetz, Paul; Stephens, Richard; Golub, Robert M; Mitchell, Sandra; Groves, Trish

    2018-02-06

    = 21) reduced this to 56 items, which were considered by 138 international stakeholder survey participants and 99 Delphi panelists. The final wording of the SPIRIT-PRO Extension was agreed on at a consensus meeting (n = 29 participants) and reviewed by external group of experts during a consultation period. Eleven extensions and 5 elaborations to the SPIRIT 2013 checklist were recommended for inclusion in clinical trial protocols in which PROs are a primary or key secondary outcome. Extension items focused on PRO-specific issues relating to the trial rationale, objectives, eligibility criteria, concepts used to evaluate the intervention, time points for assessment, PRO instrument selection and measurement properties, data collection plan, translation to other languages, proxy completion, strategies to minimize missing data, and whether PRO data will be monitored during the study to inform clinical care. The SPIRIT-PRO guidelines provide recommendations for items that should be addressed and included in clinical trial protocols in which PROs are a primary or key secondary outcome. Improved design of clinical trials including PROs could help ensure high-quality data that may inform patient-centered care.

  13. Chapter 12: Survey Design and Implementation for Estimating Gross Savings Cross-Cutting Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Baumgartner, Robert

    This chapter presents an overview of best practices for designing and executing survey research to estimate gross energy savings in energy efficiency evaluations. A detailed description of the specific techniques and strategies for designing questions, implementing a survey, and analyzing and reporting the survey procedures and results is beyond the scope of this chapter. So for each topic covered below, readers are encouraged to consult articles and books cited in References, as well as other sources that cover the specific topics in greater depth. This chapter focuses on the use of survey methods to collect data for estimating gross savingsmore » from energy efficiency programs.« less

  14. Microcomputer Nurse-Practitioner Protocols

    PubMed Central

    Way, Anthony B.; Rowley, Blair A.; White, Melanie A.

    1982-01-01

    We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.

  15. Method- and species-specific detection probabilities of fish occupancy in Arctic lakes: Implications for design and management

    USGS Publications Warehouse

    Haynes, Trevor B.; Rosenberger, Amanda E.; Lindberg, Mark S.; Whitman, Matthew; Schmutz, Joel A.

    2013-01-01

    Studies examining species occurrence often fail to account for false absences in field sampling. We investigate detection probabilities of five gear types for six fish species in a sample of lakes on the North Slope, Alaska. We used an occupancy modeling approach to provide estimates of detection probabilities for each method. Variation in gear- and species-specific detection probability was considerable. For example, detection probabilities for the fyke net ranged from 0.82 (SE = 0.05) for least cisco (Coregonus sardinella) to 0.04 (SE = 0.01) for slimy sculpin (Cottus cognatus). Detection probabilities were also affected by site-specific variables such as depth of the lake, year, day of sampling, and lake connection to a stream. With the exception of the dip net and shore minnow traps, each gear type provided the highest detection probability of at least one species. Results suggest that a multimethod approach may be most effective when attempting to sample the entire fish community of Arctic lakes. Detection probability estimates will be useful for designing optimal fish sampling and monitoring protocols in Arctic lakes.

  16. Analysis of novel low specific speed pump designs

    NASA Astrophysics Data System (ADS)

    Klas, R.; Pochylý, F.; Rudolf, P.

    2014-03-01

    Centrifugal pumps with very low specific speed present significant design challenges. Narrow blade channels, large surface area of hub and shroud discs relative to the blade area, and the presence of significant of blade channel vortices are typical features linked with the difficulty to achieve head and efficiency requirements for such designs. This paper presents an investigation of two novel designs of very low specific speed impellers: impeller having blades with very thick trailing edges and impeller with thick trailing edges and recirculating channels, which are bored along the impeller circumference. Numerical simulations and experimental measurements were used to study the flow dynamics of those new designs. It was shown that thick trailing edges suppress local eddies in the blade channels and decrease energy dissipation due to excessive swirling. Furthermore the recirculating channels will increase the circumferential velocity component on impeller outlet thus increasing the specific energy, albeit adversely affecting the hydraulic efficiency. Analysis of the energy dissipation in the volute showed that the number of the recirculating channels, their geometry and location, all have significant impact on the magnitude of dissipated energy and its distribution which in turn influences the shape of the head curve and the stability of the pump operation. Energy dissipation within whole pump interior (blade channels, volute, rotor- stator gaps) was also studied.

  17. Molecular beacon-enabled purification of living cells by targeting cell type-specific mRNAs.

    PubMed

    Wile, Brian M; Ban, Kiwon; Yoon, Young-Sup; Bao, Gang

    2014-10-01

    Molecular beacons (MBs) are dual-labeled oligonucleotides that fluoresce only in the presence of complementary mRNA. The use of MBs to target specific mRNAs allows sorting of specific cells from a mixed cell population. In contrast to existing approaches that are limited by available surface markers or selectable metabolic characteristics, the MB-based method enables the isolation of a wide variety of cells. For example, the ability to purify specific cell types derived from pluripotent stem cells (PSCs) is important for basic research and therapeutics. In addition to providing a general protocol for MB design, validation and nucleofection into cells, we describe how to isolate a specific cell population from differentiating PSCs. By using this protocol, we have successfully isolated cardiomyocytes differentiated from mouse or human PSCs (hPSCs) with ∼ 97% purity, as confirmed by electrophysiology and immunocytochemistry. After designing MBs, their ordering and validation requires 2 weeks, and the isolation process requires 3 h.

  18. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks.

    PubMed

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-11-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.

  19. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

    PubMed Central

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-01-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285

  20. Protocols for efficient simulations of long-time protein dynamics using coarse-grained CABS model.

    PubMed

    Jamroz, Michal; Kolinski, Andrzej; Kmiecik, Sebastian

    2014-01-01

    Coarse-grained (CG) modeling is a well-acknowledged simulation approach for getting insight into long-time scale protein folding events at reasonable computational cost. Depending on the design of a CG model, the simulation protocols vary from highly case-specific-requiring user-defined assumptions about the folding scenario-to more sophisticated blind prediction methods for which only a protein sequence is required. Here we describe the framework protocol for the simulations of long-term dynamics of globular proteins, with the use of the CABS CG protein model and sequence data. The simulations can start from a random or a selected (e.g., native) structure. The described protocol has been validated using experimental data for protein folding model systems-the prediction results agreed well with the experimental results.

  1. Transit safety retrofit package development : architecture and design specifications.

    DOT National Transportation Integrated Search

    2014-05-01

    The Architecture and Design Specifications capture the TRP system architecture and design that fulfills the technical objectives stated in the TRP requirements document. The document begins with an architectural overview that identifies and describes...

  2. Remote Memory Access Protocol Target Node Intellectual Property

    NASA Technical Reports Server (NTRS)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  3. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    PubMed

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  4. SU-E-I-32: Benchmarking Head CT Doses: A Pooled Vs. Protocol Specific Analysis of Radiation Doses in Adult Head CT Examinations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fujii, K; UCLA School of Medicine, Los Angeles, CA; Bostani, M

    Purpose: The aim of this study was to collect CT dose index data from adult head exams to establish benchmarks based on either: (a) values pooled from all head exams or (b) values for specific protocols. One part of this was to investigate differences in scan frequency and CT dose index data for inpatients versus outpatients. Methods: We collected CT dose index data (CTDIvol) from adult head CT examinations performed at our medical facilities from Jan 1st to Dec 31th, 2014. Four of these scanners were used for inpatients, the other five were used for outpatients. All scanners used Tubemore » Current Modulation. We used X-ray dose management software to mine dose index data and evaluate CTDIvol for 15807 inpatients and 4263 outpatients undergoing Routine Brain, Sinus, Facial/Mandible, Temporal Bone, CTA Brain and CTA Brain-Neck protocols, and combined across all protocols. Results: For inpatients, Routine Brain series represented 84% of total scans performed. For outpatients, Sinus scans represented the largest fraction (36%). The CTDIvol (mean ± SD) across all head protocols was 39 ± 30 mGy (min-max: 3.3–540 mGy). The CTDIvol for Routine Brain was 51 ± 6.2 mGy (min-max: 36–84 mGy). The values for Sinus were 24 ± 3.2 mGy (min-max: 13–44 mGy) and for Facial/Mandible were 22 ± 4.3 mGy (min-max: 14–46 mGy). The mean CTDIvol for inpatients and outpatients was similar across protocols with one exception (CTA Brain-Neck). Conclusion: There is substantial dose variation when results from all protocols are pooled together; this is primarily a function of the differences in technical factors of the protocols themselves. When protocols are analyzed separately, there is much less variability. While analyzing pooled data affords some utility, reviewing protocols segregated by clinical indication provides greater opportunity for optimization and establishing useful benchmarks.« less

  5. Specification and Design of Electrical Flight System Architectures with SysML

    NASA Technical Reports Server (NTRS)

    McKelvin, Mark L., Jr.; Jimenez, Alejandro

    2012-01-01

    Modern space flight systems are required to perform more complex functions than previous generations to support space missions. This demand is driving the trend to deploy more electronics to realize system functionality. The traditional approach for the specification, design, and deployment of electrical system architectures in space flight systems includes the use of informal definitions and descriptions that are often embedded within loosely coupled but highly interdependent design documents. Traditional methods become inefficient to cope with increasing system complexity, evolving requirements, and the ability to meet project budget and time constraints. Thus, there is a need for more rigorous methods to capture the relevant information about the electrical system architecture as the design evolves. In this work, we propose a model-centric approach to support the specification and design of electrical flight system architectures using the System Modeling Language (SysML). In our approach, we develop a domain specific language for specifying electrical system architectures, and we propose a design flow for the specification and design of electrical interfaces. Our approach is applied to a practical flight system.

  6. A novel qPCR protocol for the specific detection and quantification of the fuel-deteriorating fungus Hormoconis resinae.

    PubMed

    Martin-Sanchez, Pedro M; Gorbushina, Anna A; Kunte, Hans-Jörg; Toepel, Jörg

    2016-07-01

    A wide variety of fungi and bacteria are known to contaminate fuels and fuel systems. These microbial contaminants have been linked to fuel system fouling and corrosion. The fungus Hormoconis resinae, a common jet fuel contaminant, is used in this study as a model for developing innovative risk assessment methods. A novel qPCR protocol to detect and quantify H. resinae in, and together with, total fungal contamination of fuel systems is reported. Two primer sets, targeting the markers RPB2 and ITS, were selected for their remarkable specificity and sensitivity. These primers were successfully applied on fungal cultures and diesel samples demonstrating the validity and reliability of the established qPCR protocol. This novel tool allows clarification of the current role of H. resinae in fuel contamination cases, as well as providing a technique to detect fungal outbreaks in fuel systems. This tool can be expanded to other well-known fuel-deteriorating microorganisms.

  7. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  8. IVOA Credential Delegation Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  9. Energy-efficient and fast data gathering protocols for indoor wireless sensor networks.

    PubMed

    Tümer, Abdullah Erdal; Gündüz, Mesut

    2010-01-01

    Wireless Sensor Networks have become an important technology with numerous potential applications for the interaction of computers and the physical environment in civilian and military areas. In the routing protocols that are specifically designed for the applications used by sensor networks, the limited available power of the sensor nodes has been taken into consideration in order to extend the lifetime of the networks. In this paper, two protocols based on LEACH and called R-EERP and S-EERP with base and threshold values are presented. R-EERP and S-EERP are two efficient energy aware routing protocols that can be used for some critical applications such as detecting dangerous gases (methane, ammonium, carbon monoxide, etc.) in an indoor environment. In R-EERP, sensor nodes are deployed randomly in a field similar to LEACH. In S-EERP, nodes are deployed sequentially in the rooms of the flats of a multi-story building. In both protocols, nodes forming clusters do not change during a cluster change time, only the cluster heads change. Furthermore, an XOR operation is performed on the collected data in order to prevent the sending of the same data sensed by the nodes close to each other. Simulation results show that our proposed protocols are more energy-efficient than the conventional LEACH protocol.

  10. A domain-specific design architecture for composite material design and aircraft part redesign

    NASA Technical Reports Server (NTRS)

    Punch, W. F., III; Keller, K. J.; Bond, W.; Sticklen, J.

    1992-01-01

    Advanced composites have been targeted as a 'leapfrog' technology that would provide a unique global competitive position for U.S. industry. Composites are unique in the requirements for an integrated approach to designing, manufacturing, and marketing of products developed utilizing the new materials of construction. Numerous studies extending across the entire economic spectrum of the United States from aerospace to military to durable goods have identified composites as a 'key' technology. In general there have been two approaches to composite construction: build models of a given composite materials, then determine characteristics of the material via numerical simulation and empirical testing; and experience-directed construction of fabrication plans for building composites with given properties. The first route sets a goal to capture basic understanding of a device (the composite) by use of a rigorous mathematical model; the second attempts to capture the expertise about the process of fabricating a composite (to date) at a surface level typically expressed in a rule based system. From an AI perspective, these two research lines are attacking distinctly different problems, and both tracks have current limitations. The mathematical modeling approach has yielded a wealth of data but a large number of simplifying assumptions are needed to make numerical simulation tractable. Likewise, although surface level expertise about how to build a particular composite may yield important results, recent trends in the KBS area are towards augmenting surface level problem solving with deeper level knowledge. Many of the relative advantages of composites, e.g., the strength:weight ratio, is most prominent when the entire component is designed as a unitary piece. The bottleneck in undertaking such unitary design lies in the difficulty of the re-design task. Designing the fabrication protocols for a complex-shaped, thick section composite are currently very difficult. It is in

  11. Determination of photovoltaic concentrator optical design specifications using performance modeling

    NASA Astrophysics Data System (ADS)

    Kerschen, Kevin A.; Levy, Sheldon L.

    The strategy used to develop an optical design specification for a 500X concentration photovoltaic module to be used with a 28-percent-efficient concentrator photovoltaic cell is reported. The computer modeling code (PVOPTICS) developed for this purpose, a Fresnel lens design strategy, and optical component specification procedures are described. Comparisons are made between the predicted performance and the measured performance of components fabricated to those specifications. An acrylic lens and a reflective secondary optical element have been tested, showing efficiencies exceeding 88 percent.

  12. Decision Making and the IACUC: Part 1—Protocol Information Discussed at Full-Committee Reviews

    PubMed Central

    Silverman, Jerald; Lidz, Charles W; Clayfield, Jonathan C; Murray, Alexandra; Simon, Lorna J; Rondeau, Richard G

    2015-01-01

    IACUC protocols can be reviewed by either the full committee or designated members. Both review methods use the principles of the 3 Rs (reduce, refine, replace) as the overarching paradigm, with federal regulations and policies providing more detailed guidance. The primary goal of this study was to determine the frequency of topics discussed by IACUC during full-committee reviews and whether the topics included those required for consideration by IACUC (for example, pain and distress, number of animals used, availability of alternatives, skill and experience of researchers). We recorded and transcribed 87 protocol discussions undergoing full-committee review at 10 academic institutions. Each transcript was coded to capture the key concepts of the discussion and analyzed for the frequency of the codes mentioned. Pain and distress was the code mentioned most often, followed by the specific procedures performed, the study design, and the completeness of the protocol form. Infrequently mentioned topics were alternatives to animal use or painful or distressful procedures, the importance of the research, and preliminary data. Not all of the topics required to be considered by the IACUC were openly discussed for all protocols, and many of the discussions were limited in their depth. PMID:26224439

  13. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    PubMed Central

    Hughes, Laurie; Wang, Xinheng; Chen, Tao

    2012-01-01

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient's own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring. PMID:23202185

  14. Design and implementation of a telemedicine system using Bluetooth protocol and GSM/GPRS network, for real time remote patient monitoring.

    PubMed

    Jasemian, Yousef; Nielsen, Lars Arendt

    2005-01-01

    This paper introduces the design and implementation of a generic wireless and Real-time Multi-purpose Health Care Telemedicine system applying Bluetooth protocol, Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS). The paper explores the factors that should be considered when evaluating different technologies for application in telemedicine system. The design and implementation of an embedded wireless communication platform utilising Bluetooth protocol is described, and the implementation problems and limitations are investigated. The system is tested and its telecommunication general aspects are verified. The results showed that the system has (97.9 +/- 1.3)% Up-time, 2.5 x 10(-5) Bit Error Rate, 1% Dropped Call Rate, 97.4% Call Success Rate, 5 second transmission delay in average, (3.42 +/- 0.11) kbps throughput, and the system may have application in electrocardiography.

  15. SP-Designer: a user-friendly program for designing species-specific primer pairs from DNA sequence alignments.

    PubMed

    Villard, Pierre; Malausa, Thibaut

    2013-07-01

    SP-Designer is an open-source program providing a user-friendly tool for the design of specific PCR primer pairs from a DNA sequence alignment containing sequences from various taxa. SP-Designer selects PCR primer pairs for the amplification of DNA from a target species on the basis of several criteria: (i) primer specificity, as assessed by interspecific sequence polymorphism in the annealing regions, (ii) the biochemical characteristics of the primers and (iii) the intended PCR conditions. SP-Designer generates tables, detailing the primer pair and PCR characteristics, and a FASTA file locating the primer sequences in the original sequence alignment. SP-Designer is Windows-compatible and freely available from http://www2.sophia.inra.fr/urih/sophia_mart/sp_designer/info_sp_designer.php. © 2013 John Wiley & Sons Ltd.

  16. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    DTIC Science & Technology

    2017-06-01

    transmit their information through the network based on the specific protocols that are implemented. Nodes may be designed to perform any combination of...band, and one channel in the 868-MHz band. The IEEE 802.15.4 standard is designed to provide Low-Rate Wireless Personal Area Network (LR-WPAN...MANETs and is currently a draft at the IETF Network Working Group [9]. It was derived from the Ad hoc On -Demand Distance Vector (AODV) routing

  17. Development of a Protocol for Automated Glucose Measurement Transmission Used in Clinical Decision Support Systems Based on the Continua Design Guidelines.

    PubMed

    Meyer, Markus; Donsa, Klaus; Truskaller, Thomas; Frohner, Matthias; Pohn, Birgit; Felfernig, Alexander; Sinner, Frank; Pieber, Thomas

    2018-01-01

    A fast and accurate data transmission from glucose meter to clinical decision support systems (CDSSs) is crucial for the management of type 2 diabetes mellitus since almost all therapeutic interventions are derived from glucose measurements. Aim was to develop a prototype of an automated glucose measurement transmission protocol based on the Continua Design Guidelines and to embed the protocol into a CDSS used by healthcare professionals. A literature and market research was performed to analyze the state-of-the-art and thereupon develop, integrate and validate an automated glucose measurement transmission protocol in an iterative process. Findings from literature and market research guided towards the development of a standardized glucose measurement transmission protocol using a middleware. The interface description to communicate with the glucose meter was illustrated and embedded into a CDSS. A prototype of an interoperable transmission of glucose measurements was developed and implemented in a CDSS presenting a promising way to reduce medication errors and improve user satisfaction.

  18. A protocol for preparing, characterizing and using three RNA-specific, live cell imaging probes: E36, E144 and F22.

    PubMed

    Li, Qian; Chang, Young-Tae

    2006-01-01

    This protocol outlines a methodology for the preparation and characterization of three RNA-specific fluorescent probes (E36, E144 and F22) and their use in live cell imaging. It describes a detailed procedure for their chemical synthesis and purification; serial product characterization and quality control tests, including measurements of their fluorescence properties in solution, measurement of RNA specificity and analysis of cellular toxicity; and live cell staining and counterstaining with Hoechst or DAPI. Preparation and application of these RNA imaging probes takes 1 week.

  19. 46 CFR 162.050-33 - Bilge alarm: Design specification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Bilge alarm: Design specification. 162.050-33 Section 162.050-33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ENGINEERING EQUIPMENT Pollution Prevention Equipment § 162...

  20. Water quality monitoring protocol for wadeable streams and rivers in the Northern Great Plains Network

    USGS Publications Warehouse

    Wilson, Marcia H.; Rowe, Barbara L.; Gitzen, Robert A.; Wilson, Stephen K.; Paintner-Green, Kara J.

    2014-01-01

    As recommended by Oakley et al. (2003), this protocol provides a narrative and the rationale for selection of streams and rivers within the NGPN that will be measured for water quality, including dissolved oxygen, pH, specific conductivity, and temperature. Standard operating procedures (SOPs) that detail the steps to collect, manage, and disseminate the NGPN water quality data are in an accompanying document. The sampling design documented in this protocol may be updated as monitoring information is collected and interpreted, and as refinement of methodologies develop through time. In addition, evaluation of data and refinement of the program may necessitate potential changes of program objectives. Changes to the NGPN water quality protocols and SOPs will be carefully documented in a revision history log.

  1. Adaptive change in electrically stimulated muscle: a framework for the design of clinical protocols.

    PubMed

    Salmons, Stanley

    2009-12-01

    Adult mammalian skeletal muscles have a remarkable capacity for adapting to increased use. Although this behavior is familiar from the changes brought about by endurance exercise, it is seen to a much greater extent in the response to long-term neuromuscular stimulation. The associated phenomena include a markedly increased resistance to fatigue, and this is the key to several clinical applications. However, a more rational basis is needed for designing regimes of stimulation that are conducive to an optimal outcome. In this review I examine relevant factors, such as the amount, frequency, and duty cycle of stimulation, the influence of force generation, and the animal model. From these considerations a framework emerges for the design of protocols that yield an overall functional profile appropriate to the application. Three contrasting examples illustrate the issues that need to be addressed clinically.

  2. SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other

    NASA Astrophysics Data System (ADS)

    Taylor, M. B.; Boch, T.; Taylor, J.

    2015-06-01

    SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.

  3. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  4. Designing Domain-Specific HUMS Architectures: An Automated Approach

    NASA Technical Reports Server (NTRS)

    Mukkamala, Ravi; Agarwal, Neha; Kumar, Pramod; Sundaram, Parthiban

    2004-01-01

    The HUMS automation system automates the design of HUMS architectures. The automated design process involves selection of solutions from a large space of designs as well as pure synthesis of designs. Hence the whole objective is to efficiently search for or synthesize designs or parts of designs in the database and to integrate them to form the entire system design. The automation system adopts two approaches in order to produce the designs: (a) Bottom-up approach and (b) Top down approach. Both the approaches are endowed with a Suite of quantitative and quantitative techniques that enable a) the selection of matching component instances, b) the determination of design parameters, c) the evaluation of candidate designs at component-level and at system-level, d) the performance of cost-benefit analyses, e) the performance of trade-off analyses, etc. In short, the automation system attempts to capitalize on the knowledge developed from years of experience in engineering, system design and operation of the HUMS systems in order to economically produce the most optimal and domain-specific designs.

  5. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  6. A PROTOCOL FOR DETERMINING WWF SETTLING VELOCITIES FOR TREATMENT PROCESS DESIGN ENHANCEMENT

    EPA Science Inventory

    Urban wet weather flows (WWF) contain a high proportion of suspended solids (SS) which must be rapidly reduced before release to receiving waters. Site specific, storm-event data evaluations for designing WWF-treatment facilities differs from dry-weather flow design. WWF-sett...

  7. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  8. Rationale, Timeline, Study Design, and Protocol Overview of the Therapeutic Hypothermia After Pediatric Cardiac Arrest Trials

    PubMed Central

    Moler, Frank W.; Silverstein, Faye S.; Meert, Kathleen L.; Clark, Amy E.; Holubkov, Richard; Browning, Brittan; Slomine, Beth S.; Christensen, James R.; Dean, Michael

    2014-01-01

    Objective To describe the rationale, timeline, study design, and protocol overview of the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Design Multicenter randomized controlled trials. Setting Pediatric intensive care and cardiac ICUs in the United States and Canada. Patients Children from 48 hours to 18 years old, who have return of circulation after cardiac arrest, who meet trial eligibility criteria, and whose guardians provide written consent. Interventions Therapeutic hypothermia or therapeutic normothermia. Measurements and Main Results From concept inception in 2002 until trial initiation in 2009, 7 years were required to plan and operationalize the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Two National Institute of Child Health and Human Development clinical trial planning grants (R21 and R34) supported feasibility assessment and protocol development. Two clinical research networks, Pediatric Emergency Care Applied Research Network and Collaborative Pediatric Critical Care Research Network, provided infrastructure resources. Two National Heart Lung Blood Institute U01 awards provided funding to conduct separate trials of in-hospital and out-of-hospital cardiac arrest. A pilot vanguard phase that included half the clinical sites began on March 9, 2009, and this was followed by full trial funding through 2015. Conclusions Over a decade will have been required to plan, design, operationalize, and conduct the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Details described in this report, such as participation of clinical research networks and clinical trial planning grants utilization, may be of utility for individuals who are planning investigator-initiated, federally supported clinical trials. PMID:23842585

  9. Functional design specification for the problem data system. [space shuttle

    NASA Technical Reports Server (NTRS)

    Boatman, T. W.

    1975-01-01

    The purpose of the Functional Design Specification is to outline the design for the Problem Data System. The Problem Data System is a computer-based data management system designed to track the status of problems and corrective actions pertinent to space shuttle hardware.

  10. Maintenance Training Equipment: Design Specification Based on Instructional System Development. Revision

    DTIC Science & Technology

    1984-12-01

    model pr, vides a method for communicating a specific training equipment design to the procurement office after A"~- ISD ana lysis has est~blished a...maintenance trainer has been identified. The model provides a method by which a training equipment design can be communicated to the System Project Office...ensure * ase of development of procurement specifications and consistency between different documented designs. A completed application of this maodel

  11. High efficiency endocrine operation protocol: From design to implementation.

    PubMed

    Mascarella, Marco A; Lahrichi, Nadia; Cloutier, Fabienne; Kleiman, Simcha; Payne, Richard J; Rosenberg, Lawrence

    2016-10-01

    We developed a high efficiency endocrine operative protocol based on a mathematical programming approach, process reengineering, and value-stream mapping to increase the number of operations completed per day without increasing operating room time at a tertiary-care, academic center. Using this protocol, a case-control study of 72 patients undergoing endocrine operation during high efficiency days were age, sex, and procedure-matched to 72 patients undergoing operation during standard days. The demographic profile, operative times, and perioperative complications were noted. The average number of cases per 8-hour workday in the high efficiency and standard operating rooms were 7 and 5, respectively. Mean procedure times in both groups were similar. The turnaround time (mean ± standard deviation) in the high efficiency group was 8.5 (±2.7) minutes as compared with 15.4 (±4.9) minutes in the standard group (P < .001). Transient postoperative hypocalcemia was 6.9% (5/72) and 8.3% (6/72) for the high efficiency and standard groups, respectively (P = .99). In this study, patients undergoing high efficiency endocrine operation had similar procedure times and perioperative complications compared with the standard group. The proposed high efficiency protocol seems to better utilize operative time and decrease the backlog of patients waiting for endocrine operation in a country with a universal national health care program. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. The Verification-based Analysis of Reliable Multicast Protocol

    NASA Technical Reports Server (NTRS)

    Wu, Yunqing

    1996-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP Multicasting. In this paper, we develop formal models for R.W using existing automatic verification systems, and perform verification-based analysis on the formal RMP specifications. We also use the formal models of RW specifications to generate a test suite for conformance testing of the RMP implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress between the implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  13. Patient-based estimation of organ dose for a population of 58 adult patients across 13 protocol categories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sahbaee, Pooyan, E-mail: psahbae@ncsu.edu; Segars, W. Paul; Samei, Ehsan

    2014-07-15

    Purpose: This study aimed to provide a comprehensive patient-specific organ dose estimation across a multiplicity of computed tomography (CT) examination protocols. Methods: A validated Monte Carlo program was employed to model a common CT system (LightSpeed VCT, GE Healthcare). The organ and effective doses were estimated from 13 commonly used body and neurological CT examination. The dose estimation was performed on 58 adult computational extended cardiac-torso phantoms (35 male, 23 female, mean age 51.5 years, mean weight 80.2 kg). The organ dose normalized by CTDI{sub vol} (h factor) and effective dose normalized by the dose length product (DLP) (k factor)more » were calculated from the results. A mathematical model was derived for the correlation between the h and k factors with the patient size across the protocols. Based on this mathematical model, a dose estimation iPhone operating system application was designed and developed to be used as a tool to estimate dose to the patients for a variety of routinely used CT examinations. Results: The organ dose results across all the protocols showed an exponential decrease with patient body size. The correlation was generally strong for the organs which were fully or partially located inside the scan coverage (Pearson sample correlation coefficient (r) of 0.49). The correlation was weaker for organs outside the scan coverage for which distance between the organ and the irradiation area was a stronger predictor of dose to the organ. For body protocols, the effective dose before and after normalization by DLP decreased exponentially with increasing patient's body diameter (r > 0.85). The exponential relationship between effective dose and patient's body diameter was significantly weaker for neurological protocols (r < 0.41), where the trunk length was a slightly stronger predictor of effective dose (0.15 < r < 0.46). Conclusions: While the most accurate estimation of a patient dose requires specific modeling of the

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  15. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.

    PubMed

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M

    2016-11-29

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify

  16. Using knowledge translation as a framework for the design of a research protocol.

    PubMed

    Fredericks, Suzanne; Martorella, Géraldine; Catallo, Cristina

    2015-05-01

    Knowledge translation has been defined as the synthesis, dissemination, exchange and ethically sound application of knowledge to improve health, resulting in a stronger health-care system. Using KT activities to aid in the adoption of evidence into practice can address current health-care challenges such as increasing organizational practice standards, alleviating the risk for adverse events and meeting practitioner needs for evidence at the bedside. Two general forms of KT have been identified. These being integrated KT and end-of-grant KT. Integrated KT involves the knowledge users in the research team and in the majority of stages of the research process. End-of-grant KT relates to the translation of findings through a well-developed dissemination plan. This paper describes the process of using an integrated knowledge translation approach to design a research protocol that will examine the effectiveness of a web-based patient educational intervention. It begins with a description of integrated knowledge translation, followed by the presentation of a specific case example in which integrated knowledge translation is used to develop a nursing intervention. The major elements of integrated knowledge translation pertain to need for a knowledge user who represents the broad target user group, and who is knowledgeable in the area under investigation and who as authority to enact changes to practice. Use of knowledge users as equal partners within the research team; exploring all feasible opportunities for knowledge exchange; and working with knowledge users to identify all outcomes related to knowledge translation are the other major elements of integrated knowledge translation that are addressed throughout this paper. Furthermore, the relevance of psychosocial or educational interventions to knowledge translation is also discussed as a source of knowledge. In summary, integrated knowledge translation is an important tool for the development of new interventions, as

  17. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  18. Structural, kinetic, and thermodynamic studies of specificity designed HIV-1 protease.

    PubMed

    Alvizo, Oscar; Mittal, Seema; Mayo, Stephen L; Schiffer, Celia A

    2012-07-01

    HIV-1 protease recognizes and cleaves more than 12 different substrates leading to viral maturation. While these substrates share no conserved motif, they are specifically selected for and cleaved by protease during viral life cycle. Drug resistant mutations evolve within the protease that compromise inhibitor binding but allow the continued recognition of all these substrates. While the substrate envelope defines a general shape for substrate recognition, successfully predicting the determinants of substrate binding specificity would provide additional insights into the mechanism of altered molecular recognition in resistant proteases. We designed a variant of HIV protease with altered specificity using positive computational design methods and validated the design using X-ray crystallography and enzyme biochemistry. The engineered variant, Pr3 (A28S/D30F/G48R), was designed to preferentially bind to one out of three of HIV protease's natural substrates; RT-RH over p2-NC and CA-p2. In kinetic assays, RT-RH binding specificity for Pr3 increased threefold compared to the wild-type (WT), which was further confirmed by isothermal titration calorimetry. Crystal structures of WT protease and the designed variant in complex with RT-RH, CA-p2, and p2-NC were determined. Structural analysis of the designed complexes revealed that one of the engineered substitutions (G48R) potentially stabilized heterogeneous flap conformations, thereby facilitating alternate modes of substrate binding. Our results demonstrate that while substrate specificity could be engineered in HIV protease, the structural pliability of protease restricted the propagation of interactions as predicted. These results offer new insights into the plasticity and structural determinants of substrate binding specificity of the HIV-1 protease. Copyright © 2012 The Protein Society.

  19. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by

  20. Design of an ecological momentary assessment study of exposure to radiofrequency electromagnetic fields and non-specific physical symptoms

    PubMed Central

    Bogers, Rik P; Bolte, John F B; Houtveen, Jan H; Lebret, Erik; van Strien, Rob T; Schipper, C Maarten A; Alkadhimi, Mehdi; Baliatsas, Christos; van Kamp, Irene

    2013-01-01

    Introduction Idiopathic Environmental Intolerance (IEI) attributed to electromagnetic fields (EMF) refers to self-reported sensitivity mainly characterised by the attribution of non-specific physical symptoms to low-level EMF exposure emitted from sources such as mobile phones. Scientific studies have not provided evidence for the existence of IEI-EMF, but these studies did not resemble the real-life situation or suffered from poor exposure characterisation and biased recall of health symptoms. To improve existing methods for the study of IEI-EMF, an Ecological Momentary Assessment (EMA) study is designed. Methods and analysis The study is an EMA study in which respondents carry personal exposure metres (exposimeters) that measure radiofrequency (RF) EMF, with frequent assessment of health symptoms and perceived EMF exposure through electronic diary registration during five consecutive days. Participants will be a selection from an epidemiological study who report to be sensitive to RF EMF. The exposimeters measure electric field strength in 12 frequency bands. Diary questions include the occurrence and severity of 10 non-specific physical symptoms, mood states and perceived exposure to (sources of) EMF. The relationship of actual and perceived EMF exposure and mood with non-specific physical symptoms will be analysed using multilevel regression analysis with time-shift models. Discussion The study has several advantages over previous studies, including assessment of personal EMF exposure and non-specific physical symptoms by an ecological method with a minimised chance of recall bias. The within-person design reduces confounding by time-stable factors (eg, personal characteristics). In the conduct of the study and the analysis and interpretation of its outcomes, some methodological issues including a high participant burden, reactivity, compliance to the study protocol and the potential of chance findings due to multiple statistical testing will be accounted for

  1. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  2. NASIS data base management system: IBM 360 TSS implementation. Volume 4: Program design specifications

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The design specifications for the programs and modules within the NASA Aerospace Safety Information System (NASIS) are presented. The purpose of the design specifications is to standardize the preparation of the specifications and to guide the program design. Each major functional module within the system is a separate entity for documentation purposes. The design specifications contain a description of, and specifications for, all detail processing which occurs in the module. Sub-models, reference tables, and data sets which are common to several modules are documented separately.

  3. A Learning Design Ontology Based on the IMS Specification

    ERIC Educational Resources Information Center

    Amorim, Ricardo R.; Lama, Manuel; Sanchez, Eduardo; Riera, Adolfo; Vila, Xose A.

    2006-01-01

    In this paper, we present an ontology to represent the semantics of the IMS Learning Design (IMS LD) specification, a meta-language used to describe the main elements of the learning design process. The motivation of this work relies on the expressiveness limitations found on the current XML-Schema implementation of the IMS LD conceptual model. To…

  4. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  5. Dose-response relationship between cigarette smoking and site-specific cancer risk: protocol for a systematic review with an original design combining umbrella and traditional reviews.

    PubMed

    Lugo, Alessandra; Bosetti, Cristina; Peveri, Giulia; Rota, Matteo; Bagnardi, Vincenzo; Gallus, Silvano

    2017-11-01

    Only a limited number of meta-analyses providing risk curve functions of dose-response relationships between various smoking-related variables and cancer-specific risk are available. To identify all relevant original publications on the issue, we will conduct a series of comprehensive systematic reviews based on three subsequent literature searches: (1) an umbrella review, to identify meta-analyses, pooled analyses and systematic reviews published before 28 April 2017 on the association between cigarette smoking and the risk of 28 (namely all) malignant neoplasms; (2) for each cancer site, an updated review of original publications on the association between cigarette smoking and cancer risk, starting from the last available comprehensive review identified through the umbrella review; and (3) a review of all original articles on the association between cigarette smoking and site-specific cancer risk included in the publications identified through the umbrella review and the updated reviews. The primary outcomes of interest will be (1) the excess incidence/mortality of various cancers for smokers compared with never smokers; and (2) the dose-response curves describing the association between smoking intensity, duration and time since stopping and incidence/mortality for various cancers. For each cancer site, we will perform a meta-analysis by pooling study-specific estimates for smoking status. We will also estimate the dose-response curves for other smoking-related variables through random-effects meta-regression models based on a non-linear dose-response relationship framework. Ethics approval is not required for this study. Main results will be published in peer-reviewed journals and will also be included in a publicly available website. We will provide therefore the most complete and updated estimates on the association between various measures of cigarette smoking and site-specific cancer risk. This will allow us to obtain precise estimates on the cancer burden

  6. Establishing treatment protocols for clinical mastitis.

    PubMed

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  7. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey

    PubMed Central

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.

    2016-01-01

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify

  8. Genetic Analysis and Species Specific Amplification of the Artemisinin Resistance-Associated Kelch Propeller Domain in P. falciparum and P. vivax.

    PubMed

    Talundzic, Eldin; Chenet, Stella M; Goldman, Ira F; Patel, Dhruviben S; Nelson, Julia A; Plucinski, Mateusz M; Barnwell, John W; Udhayakumar, Venkatachalam

    2015-01-01

    Plasmodium falciparum resistance to artemisinin has emerged in the Greater Mekong Subregion and now poses a threat to malaria control and prevention. Recent work has identified mutations in the kelch propeller domain of the P. falciparum K13 gene to be associated artemisinin resistance as defined by delayed parasite clearance and ex vivo ring stage survival assays. Species specific primers for the two most prevalent human malaria species, P. falciparum and P. vivax, were designed and tested on multiple parasite isolates including human, rodent, and non- humans primate Plasmodium species. The new protocol described here using the species specific primers only amplified their respective species, P. falciparum and P. vivax, and did not cross react with any of the other human malaria Plasmodium species. We provide an improved species specific PCR and sequencing protocol that could be effectively used in areas where both P. falciparum and P. vivax are circulating. To design this improved protocol, the kelch gene was analyzed and compared among different species of Plasmodium. The kelch propeller domain was found to be highly conserved across the mammalian Plasmodium species.

  9. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  10. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. Sampling protocol for post-landfall Deepwater Horizon oil release, Gulf of Mexico, 2010

    USGS Publications Warehouse

    Wilde, F.D.; Skrobialowski, S.C.; Hart, J.S.

    2010-01-01

    The protocols and procedures described in this report are designed to be used by U.S. Geological Survey (USGS) field teams for the collection of environmental data and samples in coastal areas affected by the 2010 Deepwater Horizon oil spill in the Gulf of Mexico. This sampling protocol focuses specifically on sampling for water, sediments, benthic invertebrates, and microorganisms (ambient bacterial populations) after shoreline arrival of petroleum-associated product on beach, barrier island, and wetland environments of the Gulf of Mexico coastal states. Deployment to sampling sites, site setup, and sample collection in these environments necessitates modifications to standard USGS sampling procedures in order to address the regulatory, logistical, and legal requirements associated with samples collected in oil-impacted coastal areas. This document, therefore, has been written as an addendum to the USGS National Field Manual for the Collection of Water-Quality Data (NFM) (http://pubs.water.usgs.gov/twri9A/), which provides the basis for training personnel in the use of standard USGS sampling protocols. The topics covered in this Gulf of Mexico oil-spill sampling protocol augment NFM protocols for field-deployment preparations, health and safety precautions, sampling and quality-assurance procedures, and decontamination requirements under potentially hazardous environmental conditions. Documentation procedures and maintenance of sample integrity by use of chain-of-custody procedures also are described in this protocol.

  12. Protocols | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.

  13. GSP: A web-based platform for designing genome-specific primers in polyploids

    USDA-ARS?s Scientific Manuscript database

    The sequences among subgenomes in a polyploid species have high similarity. This makes difficult to design genome-specific primers for sequence analysis. We present a web-based platform named GSP for designing genome-specific primers to distinguish subgenome sequences in the polyploid genome backgr...

  14. TU-A-201-02: Treatment Site-Specific Considerations for Clinical IGRT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wijesooriya, K.

    2016-06-15

    Recent years have seen a widespread proliferation of available in-room image guidance systems for radiation therapy target localization with many centers having multiple in-room options. In this session, available imaging systems for in-room IGRT will be reviewed highlighting the main differences in workflow efficiency, targeting accuracy and image quality as it relates to target visualization. Decision-making strategies for integrating these tools into clinical image guidance protocols that are tailored to specific disease sites like H&N, lung, pelvis, and spine SBRT will be discussed. Learning Objectives: Major system characteristics of a wide range of available in-room imaging systems for IGRT. Advantagesmore » / disadvantages of different systems for site-specific IGRT considerations. Concepts of targeting accuracy and time efficiency in designing clinical imaging protocols.« less

  15. Rationale, timeline, study design, and protocol overview of the therapeutic hypothermia after pediatric cardiac arrest trials.

    PubMed

    Moler, Frank W; Silverstein, Faye S; Meert, Kathleen L; Clark, Amy E; Holubkov, Richard; Browning, Brittan; Slomine, Beth S; Christensen, James R; Dean, J Michael

    2013-09-01

    To describe the rationale, timeline, study design, and protocol overview of the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Multicenter randomized controlled trials. Pediatric intensive care and cardiac ICUs in the United States and Canada. Children from 48 hours to 18 years old, who have return of circulation after cardiac arrest, who meet trial eligibility criteria, and whose guardians provide written consent. Therapeutic hypothermia or therapeutic normothermia. From concept inception in 2002 until trial initiation in 2009, 7 years were required to plan and operationalize the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Two National Institute of Child Health and Human Development clinical trial planning grants (R21 and R34) supported feasibility assessment and protocol development. Two clinical research networks, Pediatric Emergency Care Applied Research Network and Collaborative Pediatric Critical Care Research Network, provided infrastructure resources. Two National Heart Lung Blood Institute U01 awards provided funding to conduct separate trials of in-hospital and out-of-hospital cardiac arrest. A pilot vanguard phase that included half the clinical sites began on March 9, 2009, and this was followed by full trial funding through 2015. Over a decade will have been required to plan, design, operationalize, and conduct the Therapeutic Hypothermia after Pediatric Cardiac Arrest trials. Details described in this report, such as participation of clinical research networks and clinical trial planning grants utilization, may be of utility for individuals who are planning investigator-initiated, federally supported clinical trials.

  16. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    ERIC Educational Resources Information Center

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  17. Level of functional capacities following soccer-specific warm-up methods among elite collegiate soccer players.

    PubMed

    Vazini Taher, Amir; Parnow, Abdolhossein

    2017-05-01

    Different methods of warm-up may have implications in improving various aspects of soccer performance. The present study aimed to investigate acute effects of soccer specific warm-up protocols on functional performance tests. This study using randomized within-subject design, investigated the performance of 22 collegiate elite soccer player following soccer specific warm-ups using dynamic stretching, static stretching, and FIFA 11+ program. Post warm-up examinations consisted: 1) Illinois Agility Test; 2) vertical jump; 3) 30 meter sprint; 4) consecutive turns; 5) flexibility of knee. Vertical jump performance was significantly lower following static stretching, as compared to dynamic stretching (P=0.005). Sprint performance declined significantly following static stretching as compared to FIFA 11+ (P=0.023). Agility time was significantly faster following dynamic stretching as compared to FIFA 11+ (P=0.001) and static stretching (P=0.001). Knee flexibility scores were significantly improved following the static stretching as compared to dynamic stretching (P=016). No significant difference was observed for consecutive turns between three warm-up protocol. The present finding showed that a soccer specific warm-up protocol relied on dynamic stretching is preferable in enhancing performance as compared to protocols relying on static stretches and FIFA 11+ program. Investigators suggest that while different soccer specific warm-up protocols have varied types of effects on performance, acute effects of dynamic stretching on performance in elite soccer players are assured, however application of static stretching in reducing muscle stiffness is demonstrated.

  18. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  19. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  20. Bank robberies: A psychological protocol of intervention in financial institutions and principal effects.

    PubMed

    Tabanelli, Maria Carla; Bonfiglioli, Roberta; Violante, Francesco S

    2013-03-26

    BACKGROUND: Robbery in workplaces represents a potentially traumatic experience for workers. OBJECTIVES: This article describes the set up and evaluation of a comprehensive psychological intervention designed to help to reduce the adverse consequences of bank robberies. PARTICIPANTS: The study population was selected among the employees of two Italian banks.METHODS: The psychological protocol was designed according to the results of a comprehensive non-systematic review of the scientific literature and it was evaluated at work site. RESULTS: The protocol consists of a "pre-event" formative intervention and "post-event" psychological support. The qualitative data collected allowed us to understand that the reactions after a robbery can differ depending on the phase during which the workers were exposed to the robbery. We noted that the main consequences can be classified in emotional/sentimental reactions, behavioral reactions, physiological reactions and experiences during the event; emotions/feelings following the robbery and psycho/physical state and emotions/feelings in the following days.CONCLUSIONS: In a working environment, the chance to take advantage of a specific protocol for the traumatic event of a bank robbery offers both the company and the workers important tools for well-being, including post-robbery psychological support and classroom instructions.

  1. [Protocols for the health surveillance of fisherman].

    PubMed

    Soleo, Leonardo; Cannizzaro, Emanuele; Lovreglio, Piero; Basso, Antonella; D'Errico, Maria Nicolà; Pira, Enrico

    2013-01-01

    To define protocols for health surveillance of workers in the marine fishing sector for specific occupational risk factors, considering the latest and most advanced scientific knowledge. The specific literature was analyzed to identify the occupational risk factors to which fishermen are exposed. Then, for each risk factor a protocol for the relative health checkups and their time schedule was defined. The risk factors to which fishermen are exposed are essentially noise, vibrations, solar and ultraviolet radiation, climatic agents (heat, cold, wind, rain, damp), chemical agents, shifts, work rate, night work, physical strain, stress, manual handling of loads, upper limb repetitive tasks, incongruous postures. The health protocols stipulate the health screening investigations to be carried out in all workers of a homogeneous group, and in-depth diagnostic investigations to be carried out in symptomatic workers. Complementary health investigations must be focused on a functional exploration of the organs specifically exposed to the risk factor. For hearing impairments due to noise exposure, the medico-legal measures with which the occupational health physician must comply, in cases of occupational disease, are indicated.

  2. Development and Implementation of Clinical Trial Protocol Templates at the National Institute of Allergy and Infectious Diseases

    PubMed Central

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-01-01

    Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal

  3. Practical Findings from Applying the PSD Model for Evaluating Software Design Specifications

    NASA Astrophysics Data System (ADS)

    Räisänen, Teppo; Lehto, Tuomas; Oinas-Kukkonen, Harri

    This paper presents practical findings from applying the PSD model to evaluating the support for persuasive features in software design specifications for a mobile Internet device. On the one hand, our experiences suggest that the PSD model fits relatively well for evaluating design specifications. On the other hand, the model would benefit from more specific heuristics for evaluating each technique to avoid unnecessary subjectivity. Better distinction between the design principles in the social support category would also make the model easier to use. Practitioners who have no theoretical background can apply the PSD model to increase the persuasiveness of the systems they design. The greatest benefit of the PSD model for researchers designing new systems may be achieved when it is applied together with a sound theory, such as the Elaboration Likelihood Model. Using the ELM together with the PSD model, one may increase the chances for attitude change.

  4. SpaceWire Protocol ID: What Does It Mean To You?

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parks, Steve

    2006-01-01

    Spacewire is becoming a popular solution for satellite high-speed data buses because it is a simple standard that provides great flexibility for a wide range of system requirements. It is simple in packet format and protocol, allowing users to easily tailor their implementation for their specific application. Some of the attractive aspects of Spacewire that make it easy to implement also make it hard for future reuse. Protocol reuse is difficult because Spacewire does not have a defined mechanism to communicate with the higher layers of the protocol stack. This has forced users of Spacewire to define unique packet formats and define how these packets are to be processed. Each mission writes their own Interface Control Document (ICD) and tailors Spacewire for their specific requirements making reuse difficult. Part of the reason for this habit may be because engineers typically optimize designs for their own requirements in the absence of a standard. This is an inefficient use of project resources and costs more to develop missions. A new packet format for Spacewire has been defined as a solution for this problem. This new packet format is a compliment to the Spacewire standard that will support protocol development upon Spacewire. The new packet definition does not replace the current packet structure, i.e., does not make the standard obsolete, but merely extends the standard for those who want to develop protocols over Spacewire. The Spacewire packet is defined with the first part being the Destination Address, which may be one or more bytes. This is followed by the packet cargo, which is user defined. The cargo is truncated with an End-Of-Packet (EOP) marker. This packet structure offers low packet overhead and allows the user to define how the contents are to be formatted. It also provides for many different addressing schemes, which provide flexibility in the system. This packet flexibility is typically an attractive part of the Spacewire. The new extended

  5. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  6. Structured output-feedback controller synthesis with design specifications

    NASA Astrophysics Data System (ADS)

    Hao, Yuqing; Duan, Zhisheng

    2017-03-01

    This paper considers the problem of structured output-feedback controller synthesis with finite frequency specifications. Based on the orthogonal space information of input matrix, an improved parameter-dependent Lyapunov function method is first proposed. Then, a two-stage construction method is designed, which depends on an initial centralised controller. Corresponding design conditions for three types of output-feedback controllers are presented in terms of unified representations. Moreover, heuristic algorithms are provided to explore the desirable controllers. Finally, the effectiveness of these proposed methods is illustrated via some practical examples.

  7. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  8. Outcome and toxicity associated with a dose-intensified, maintenance-free CHOP-based chemotherapy protocol in canine lymphoma: 130 cases.

    PubMed

    Sorenmo, Karin; Overley, B; Krick, E; Ferrara, T; LaBlanc, A; Shofer, F

    2010-09-01

    A dose-intensified/dose-dense chemotherapy protocol for canine lymphoma was designed and implemented at the Veterinary Hospital of the University of Pennsylvania. In this study, we describe the clinical characteristics, prognostic factors, efficacy and toxicity in 130 dogs treated with this protocol. The majority of the dogs had advanced stage disease (63.1% stage V) and sub-stage b (58.5%). The median time to progression (TTP) and lymphoma-specific survival were 219 and 323 days, respectively. These results are similar to previous less dose-intense protocols. Sub-stage was a significant negative prognostic factor for survival. The incidence of toxicity was high; 53.9 and 45% of the dogs needed dose reductions and treatment delays, respectively. Dogs that required dose reductions and treatment delays had significantly longer TTP and lymphoma-specific survival times. These results suggest that dose density is important, but likely relative, and needs to be adjusted according to the individual patient's toxicity for optimal outcome.

  9. Educational Specifications: Linking Design of School Facilities to Educational Program.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento. Div. of School Facilities Planning.

    The California Department of Education, directed to formalize regulations governing standards for new school design and construction, has prepared a guide to help school districts develop specifications based on the architectural principle that form follows function. This guide discusses the meaning of educational specifications and their…

  10. A Logical Analysis of Quantum Voting Protocols

    NASA Astrophysics Data System (ADS)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  11. [Palliative sedation in a university hospital: experience after introducing a specific protocol].

    PubMed

    Boceta Osuna, J; Nabal Vicuña, M; Martínez Peñalver, F; Blanco Picabia, A; Aguayo Canela, M; Royo Aguado, J L

    2013-01-01

    A descriptive prospective study of palliative sedation (PS) records during a one year period after starting the PS protocol. Patients included in the PS protocol and those who had completed the "data registry form". Registry forms included in the PS protocol as Annex 5 (included as Annex 1 in this study). Personal data, data regarding basal disease, prognosis, level of information. Refractory symptoms: type, time of evolution and treatments employed. Involvement of the patient and/or representatives in decision making. Type of sedation, continuity, depth, employed, duration and results, and readjustment of other therapeutic measures. The SPSS 14.0 was used. For qualitative variables we studied absolute frequencies and proportions. For quantitative variables with normal distribution, we used means and standard deviations, and for non-normal distribution, medians and ranges. In the study period 90 cases of PS were counted. This represented 27.6% of the patients treated in the hospital palliative care support team (PCST), and 7.03% of the total deceased patients in our hospital. Mean age of patients undergoing PS was 59.22 years old, range between 40.86 and 77.58 years, and 68.1% were men. All patients were in an advanced or terminal stage of their condition, and 49.5% in an agonal phase. In 90.4% of the cases, the main pathology was oncological. Regarding PS indication, this was jointly made between the PCST physician and the patient's usual doctor in 60 cases (66.6%). Symptoms leading to sedation were mainly dyspnea, delirium and pain. The Ethics committee was consulted in five cases. Mean time under sedation was 134.02 hours (5.5 days). In 90% of the cases, duration ranged from 50 to 218.04 hours (2-9 days). Depth of PS after induction was registered in 88.8% of the cases. Informed consent (IC) was explicit in 11.2% of the cases,and given prior to the appearance of refractory symptoms and/or agonal phase. In 88.8% of sedation cases, the IC was given by a

  12. Breaking Megrelishvili protocol using matrix diagonalization

    NASA Astrophysics Data System (ADS)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  13. Towards sensible toxicity testing for nanomaterials: proposal for the specification of test design

    NASA Astrophysics Data System (ADS)

    Potthoff, Annegret; Weil, Mirco; Meißner, Tobias; Kühnel, Dana

    2015-12-01

    During the last decade, nanomaterials (NM) were extensively tested for potential harmful effects towards humans and environmental organisms. However, a sound hazard assessment was so far hampered by uncertainties and a low comparability of test results. The reason for the low comparability is a high variation in the (1) type of NM tested with regard to raw material, size and shape and (2) procedures before and during the toxicity testing. This calls for tailored, nanomaterial-specific protocols. Here, a structured approach is proposed, intended to lead to test protocols not only tailored to specific types of nanomaterials, but also to respective test system for toxicity testing. There are existing standards on single procedures involving nanomaterials, however, not all relevant procedures are covered by standards. Hence, our approach offers a detailed way of weighting several plausible alternatives for e.g. sample preparation, in order to decide on the procedure most meaningful for a specific nanomaterial and toxicity test. A framework of several decision trees (DT) and flow charts to support testing of NM is proposed as a basis for further refinement and in-depth elaboration. DT and flow charts were drafted for (1) general procedure—physicochemical characterisation, (2) choice of test media, (3) decision on test scenario and application of NM to liquid media, (4) application of NM to the gas phase, (5) application of NM to soil and sediments, (6) dose metrics, (S1) definition of a nanomaterial, and (S2) dissolution. The applicability of the proposed approach was surveyed by using experimental data retrieved from studies on nanoscale CuO. This survey demonstrated the DT and flow charts to be a convenient tool to systematically decide upon test procedures and processes, and hence pose an important step towards harmonisation of NM testing.

  14. Towards sensible toxicity testing for nanomaterials: proposal for the specification of test design.

    PubMed

    Potthoff, Annegret; Weil, Mirco; Meißner, Tobias; Kühnel, Dana

    2015-12-01

    During the last decade, nanomaterials (NM) were extensively tested for potential harmful effects towards humans and environmental organisms. However, a sound hazard assessment was so far hampered by uncertainties and a low comparability of test results. The reason for the low comparability is a high variation in the (1) type of NM tested with regard to raw material, size and shape and (2) procedures before and during the toxicity testing. This calls for tailored, nanomaterial-specific protocols. Here, a structured approach is proposed, intended to lead to test protocols not only tailored to specific types of nanomaterials, but also to respective test system for toxicity testing. There are existing standards on single procedures involving nanomaterials, however, not all relevant procedures are covered by standards. Hence, our approach offers a detailed way of weighting several plausible alternatives for e.g. sample preparation, in order to decide on the procedure most meaningful for a specific nanomaterial and toxicity test. A framework of several decision trees (DT) and flow charts to support testing of NM is proposed as a basis for further refinement and in-depth elaboration. DT and flow charts were drafted for (1) general procedure-physicochemical characterisation, (2) choice of test media, (3) decision on test scenario and application of NM to liquid media, (4) application of NM to the gas phase, (5) application of NM to soil and sediments, (6) dose metrics, (S1) definition of a nanomaterial, and (S2) dissolution. The applicability of the proposed approach was surveyed by using experimental data retrieved from studies on nanoscale CuO. This survey demonstrated the DT and flow charts to be a convenient tool to systematically decide upon test procedures and processes, and hence pose an important step towards harmonisation of NM testing.

  15. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  16. National protocol framework for the inventory and monitoring of bees

    USGS Publications Warehouse

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    describes the history and need for the protocol framework and summarizes the basic elements of objectives, sampling design, field methods, training, data management, analysis, and reporting. The SOPs provide more detail and specific instructions for implementing the protocol framework. A central database, for managing all the resulting data is under development. We welcome use of this protocol framework by our partners, as appropriate for their bee inventory and monitoring objectives.

  17. A formal protocol test procedure for the Survivable Adaptable Fiber Optic Embedded Network (SAFENET)

    NASA Astrophysics Data System (ADS)

    High, Wayne

    1993-03-01

    This thesis focuses upon a new method for verifying the correct operation of a complex, high speed fiber optic communication network. These networks are of growing importance to the military because of their increased connectivity, survivability, and reconfigurability. With the introduction and increased dependence on sophisticated software and protocols, it is essential that their operation be correct. Because of the speed and complexity of fiber optic networks being designed today, they are becoming increasingly difficult to test. Previously, testing was accomplished by application of conformance test methods which had little connection with an implementation's specification. The major goal of conformance testing is to ensure that the implementation of a profile is consistent with its specification. Formal specification is needed to ensure that the implementation performs its intended operations while exhibiting desirable behaviors. The new conformance test method presented is based upon the System of Communicating Machine model which uses a formal protocol specification to generate a test sequence. The major contribution of this thesis is the application of the System of Communicating Machine model to formal profile specifications of the Survivable Adaptable Fiber Optic Embedded Network (SAFENET) standard which results in the derivation of test sequences for a SAFENET profile. The results applying this new method to SAFENET's OSI and Lightweight profiles are presented.

  18. De novo design of protein homo-oligomers with modular hydrogen bond network-mediated specificity

    PubMed Central

    Boyken, Scott E.; Chen, Zibo; Groves, Benjamin; Langan, Robert A.; Oberdorfer, Gustav; Ford, Alex; Gilmore, Jason; Xu, Chunfu; DiMaio, Frank; Pereira, Jose Henrique; Sankaran, Banumathi; Seelig, Georg; Zwart, Peter H.; Baker, David

    2017-01-01

    In nature, structural specificity in DNA and proteins is encoded quite differently: in DNA, specificity arises from modular hydrogen bonds in the core of the double helix, whereas in proteins, specificity arises largely from buried hydrophobic packing complemented by irregular peripheral polar interactions. Here we describe a general approach for designing a wide range of protein homo-oligomers with specificity determined by modular arrays of central hydrogen bond networks. We use the approach to design dimers, trimers, and tetramers consisting of two concentric rings of helices, including previously not seen triangular, square, and supercoiled topologies. X-ray crystallography confirms that the structures overall, and the hydrogen bond networks in particular, are nearly identical to the design models, and the networks confer interaction specificity in vivo. The ability to design extensive hydrogen bond networks with atomic accuracy is a milestone for protein design and enables the programming of protein interaction specificity for a broad range of synthetic biology applications. PMID:27151862

  19. Molecular design of sequence specific DNA alkylating agents.

    PubMed

    Minoshima, Masafumi; Bando, Toshikazu; Shinohara, Ken-ichi; Sugiyama, Hiroshi

    2009-01-01

    Sequence-specific DNA alkylating agents have great interest for novel approach to cancer chemotherapy. We designed the conjugates between pyrrole (Py)-imidazole (Im) polyamides and DNA alkylating chlorambucil moiety possessing at different positions. The sequence-specific DNA alkylation by conjugates was investigated by using high-resolution denaturing polyacrylamide gel electrophoresis (PAGE). The results showed that polyamide chlorambucil conjugates alkylate DNA at flanking adenines in recognition sequences of Py-Im polyamides, however, the reactivities and alkylation sites were influenced by the positions of conjugation. In addition, we synthesized conjugate between Py-Im polyamide and another alkylating agent, 1-(chloromethyl)-5-hydroxy-1,2-dihydro-3H-benz[e]indole (seco-CBI). DNA alkylation reactivies by both alkylating polyamides were almost comparable. In contrast, cytotoxicities against cell lines differed greatly. These comparative studies would promote development of appropriate sequence-specific DNA alkylating polyamides against specific cancer cells.

  20. Outcome analysis of individualized vestibular rehabilitation protocols

    NASA Technical Reports Server (NTRS)

    Black, F. O.; Angel, C. R.; Pesznecker, S. C.; Gianna, C.

    2000-01-01

    OBJECTIVE: To determine the outcome of vestibular rehabilitation protocols in subjects with peripheral vestibular disorders compared with normal and abnormal control subjects. STUDY DESIGN: Prospective study using repeated measure, matched control design. Subjects were solicited consecutively according to these criteria: vestibular disorder subjects who had abnormal results of computerized dynamic posturography (CDP) sensory organization tests (SOTs) 5 and 6 and underwent rehabilitation; vestibular disorder subjects who had abnormal results of SOTs 5 and 6 and did not undergo rehabilitation; and normal subjects (normal SOTs). SETTING: Tertiary neurotology clinic. SUBJECTS: Men and women over age 18 with chronic vestibular disorders and chief complaints of unsteadiness, imbalance, and/or motion intolerance, and normal subjects. INTERVENTIONS: Pre- and post-rehabilitation assessment included CDP, vestibular disability, and activities of daily living questionnaires. Individualized rehabilitation plans were designed and implemented to address the subject's specific complaints and functional deficits. Supervised sessions were held at weekly intervals, and self-administered programs were devised for daily home use. MAIN OUTCOME MEASURES: CDP composite and SOT scores, number of falls on CDP, and self-assessment questionnaire results. RESULTS: Subjects who underwent rehabilitation (Group A) showed statistically significant improvements in SOTs, overall composite score, and reduction in falls compared with abnormal (Group B) control groups. Group A's performances after rehabilitation were not significantly different from those of normal subjects (Group C) in SOTs 3 through 6, and close to normal on SOTs 1 and 2. Subjects in Group A also reported statistically significant symptomatic improvement. CONCLUSIONS: Outcome measures of vestibular protocol physical therapy confirmed objective and subjective improvement in subjects with chronic peripheral vestibular disorders. These

  1. Development of a domain-specific genetic language to design Chlamydomonas reinhardtii expression vectors.

    PubMed

    Wilson, Mandy L; Okumoto, Sakiko; Adam, Laura; Peccoud, Jean

    2014-01-15

    Expression vectors used in different biotechnology applications are designed with domain-specific rules. For instance, promoters, origins of replication or homologous recombination sites are host-specific. Similarly, chromosomal integration or viral delivery of an expression cassette imposes specific structural constraints. As de novo gene synthesis and synthetic biology methods permeate many biotechnology specialties, the design of application-specific expression vectors becomes the new norm. In this context, it is desirable to formalize vector design strategies applicable in different domains. Using the design of constructs to express genes in the chloroplast of Chlamydomonas reinhardtii as an example, we show that a vector design strategy can be formalized as a domain-specific language. We have developed a graphical editor of context-free grammars usable by biologists without prior exposure to language theory. This environment makes it possible for biologists to iteratively improve their design strategies throughout the course of a project. It is also possible to ensure that vectors designed with early iterations of the language are consistent with the latest iteration of the language. The context-free grammar editor is part of the GenoCAD application. A public instance of GenoCAD is available at http://www.genocad.org. GenoCAD source code is available from SourceForge and licensed under the Apache v2.0 open source license.

  2. NASIS data base management system - IBM 360/370 OS MVT implementation. 4: Program design specifications

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The design specifications for the programs and modules within the NASA Aerospace Safety Information System (NASIS) are presented. The purpose of the design specifications is to standardize the preparation of the specifications and to guide the program design. Each major functional module within the system is a separate entity for documentation purposes. The design specifications contain a description of, and specifications for, all detail processing which occurs in the module. Sub-modules, reference tables, and data sets which are common to several modules are documented separately.

  3. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS Specific Chemical Testing/Reporting Requirements § 766.28 Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Expert review of protocols. 766.28...

  4. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS Specific Chemical Testing/Reporting Requirements § 766.28 Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Expert review of protocols. 766.28...

  5. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS Specific Chemical Testing/Reporting Requirements § 766.28 Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Expert review of protocols. 766.28...

  6. 40 CFR 766.28 - Expert review of protocols.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS Specific Chemical Testing/Reporting Requirements § 766.28 Expert review of protocols. EPA will gather a panel of experts in analysis of chemical matrices for HDDs... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Expert review of protocols. 766.28...

  7. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  8. Variability in Criteria for Emergency Medical Services Routing of Acute Stroke Patients to Designated Stroke Center Hospitals.

    PubMed

    Dimitrov, Nikolay; Koenig, William; Bosson, Nichole; Song, Sarah; Saver, Jeffrey L; Mack, William J; Sanossian, Nerses

    2015-09-01

    Comprehensive stroke systems of care include routing to the nearest designated stroke center hospital, bypassing non-designated hospitals. Routing protocols are implemented at the state or county level and vary in qualification criteria and determination of destination hospital. We surveyed all counties in the state of California for presence and characteristics of their prehospital stroke routing protocols. Each county's local emergency medical services agency (LEMSA) was queried for the presence of a stroke routing protocol. We reviewed these protocols for method of stroke identification and criteria for patient transport to a stroke center. Thirty-three LEMSAs serve 58 counties in California with populations ranging from 1,175 to nearly 10 million. Fifteen LEMSAs (45%) had stroke routing protocols, covering 23 counties (40%) and 68% of the state population. Counties with protocols had higher population density (1,500 vs. 140 persons per square mile). In the six counties without designated stroke centers, patients meeting criteria were transported out of county. Stroke identification in the field was achieved using the Cincinnati Prehospital Stroke Screen in 72%, Los Angeles Prehospital Stroke Screen in 7% and a county-specific protocol in 22%. California EMS prehospital acute stroke routing protocols cover 68% of the state population and vary in characteristics including activation by symptom onset time and destination facility features, reflecting matching of system design to local geographic resources.

  9. THE MASTER PROTOCOL CONCEPT

    PubMed Central

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  10. Isolation of tumor antigen-specific single-chain variable fragments using a chimeric antigen receptor bicistronic retroviral vector in a Mammalian screening protocol.

    PubMed

    Lipowska-Bhalla, Grazyna; Gilham, David E; Hawkins, Robert E; Rothwell, Dominic G

    2013-12-01

    The clinical potential of chimeric antigen receptors in adoptive cellular therapy is beginning to be realized with several recent clinical trials targeting CD19 showing promising results in advanced B cell malignancies. This increased efficacy corresponds with improved engineering of the chimeric receptors with the latest-generation receptors eliciting greater signaling and proliferation potential. However, the antigen-binding single-chain variable fragment (scFv) domain of the receptors is critical in determining the activity of the chimeric receptor-expressing T cells, as this determines specificity and affinity to the tumor antigen. In this study, we describe a mammalian T cell line screening protocol employing a 2A-based bicistronic retroviral vector to isolate functional scFvs. This approach involves expression of the scFv library in a chimeric antigen receptor, and is based on selection of clones capable of stimulating CD69 upregulation in a T cell line and has a number of advantages over previously described methods in that the use of a 2A cassette ensures the exclusion of nonexpressing scFvs and the screening using a chimeric receptor in a mammalian T cell line ensures selection in the optimum context for therapeutic use. Proof-of-principle experiments show that the protocol was capable of a 10(5)-fold enrichment of positive clones after three rounds of selection. Furthermore, an antigen-specific clone was successfully isolated from a partially enriched scFv library, confirming the strength of the protocol. This approach has the potential to identify novel scFvs of use in adoptive T cell therapy and, potentially, wider antibody-based applications.

  11. A Protocol for Epigenetic Imprinting Analysis with RNA-Seq Data.

    PubMed

    Zou, Jinfeng; Xiang, Daoquan; Datla, Raju; Wang, Edwin

    2018-01-01

    Genomic imprinting is an epigenetic regulatory mechanism that operates through expression of certain genes from maternal or paternal in a parent-of-origin-specific manner. Imprinted genes have been identified in diverse biological systems that are implicated in some human diseases and in embryonic and seed developmental programs in plants. The molecular underpinning programs and mechanisms involved in imprinting are yet to be explored in depth in plants. The recent advances in RNA-Seq-based methods and technologies offer an opportunity to systematically analyze epigenetic imprinting that operates at the whole genome level in the model and crop plants. We are interested using Arabidopsis model system, to investigate gene expression patterns associated with parent of origin and their implications to imprinting during embryo and seed development. Toward this, we have generated early embryo development RNA-Seq-based transcriptome datasets in F1s from a genetic cross between two diverse Arabidopsis thaliana ecotypes Col-0 and Tsu-1. With the data, we developed a protocol for evaluating the maternal and paternal contributions of genes during the early stages of embryo development after fertilization. This protocol is also designed to consider the contamination from other potential seed tissues, sequencing quality, proper processing of sequenced reads and variant calling, and appropriate inference of the parental contributions based on the parent-of-origin-specific single-nucleotide polymorphisms within the expressed genes. The approach, methods and the protocol developed in this study can be used for evaluating the effects of epigenetic imprinting in plants.

  12. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  13. Designing Endocrine Disruption Out of the Next Generation of Chemicals.

    PubMed

    Schug, T T; Abagyan, R; Blumberg, B; Collins, T J; Crews, D; DeFur, P L; Dickerson, S M; Edwards, T M; Gore, A C; Guillette, L J; Hayes, T; Heindel, J J; Moores, A; Patisaul, H B; Tal, T L; Thayer, K A; Vandenberg, L N; Warner, J; Watson, C S; Saal, F S Vom; Zoeller, R T; O'Brien, K P; Myers, J P

    2013-01-01

    A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical's potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at "the drawing board." It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a 'proof-of-principle' test, we ran 6 endocrine disrupting chemicals (EDCs) that act via

  14. Designing Endocrine Disruption Out of the Next Generation of Chemicals

    PubMed Central

    Schug, T.T; Abagyan, R.; Blumberg, B.; Collins, T.J.; Crews, D.; DeFur, P.L.; Dickerson, S.M.; Edwards, T.M.; Gore, A.C.; Guillette, L.J.; Hayes, T.; Heindel, J.J.; Moores, A.; Patisaul, H.B.; Tal, T.L.; Thayer, K.A.; Vandenberg, L.N.; Warner, J.; Watson, C.S.; Saal, F.S. vom; Zoeller, R.T.; O’Brien, K.P.; Myers, J.P.

    2013-01-01

    A central goal of green chemistry is to avoid hazard in the design of new chemicals. This objective is best achieved when information about a chemical’s potential hazardous effects is obtained as early in the design process as feasible. Endocrine disruption is a type of hazard that to date has been inadequately addressed by both industrial and regulatory science. To aid chemists in avoiding this hazard, we propose an endocrine disruption testing protocol for use by chemists in the design of new chemicals. The Tiered Protocol for Endocrine Disruption (TiPED) has been created under the oversight of a scientific advisory committee composed of leading representatives from both green chemistry and the environmental health sciences. TiPED is conceived as a tool for new chemical design, thus it starts with a chemist theoretically at “the drawing board.” It consists of five testing tiers ranging from broad in silico evaluation up through specific cell- and whole organism-based assays. To be effective at detecting endocrine disruption, a testing protocol must be able to measure potential hormone-like or hormone-inhibiting effects of chemicals, as well as the many possible interactions and signaling sequellae such chemicals may have with cell-based receptors. Accordingly, we have designed this protocol to broadly interrogate the endocrine system. The proposed protocol will not detect all possible mechanisms of endocrine disruption, because scientific understanding of these phenomena is advancing rapidly. To ensure that the protocol remains current, we have established a plan for incorporating new assays into the protocol as the science advances. In this paper we present the principles that should guide the science of testing new chemicals for endocrine disruption, as well as principles by which to evaluate individual assays for applicability, and laboratories for reliability. In a ‘proof-of-principle’ test, we ran 6 endocrine disrupting chemicals (EDCs) that act

  15. Robust Routing Protocol For Digital Messages

    NASA Technical Reports Server (NTRS)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  16. College of American Pathologists Cancer Protocols: Optimizing Format for Accuracy and Efficiency.

    PubMed

    Strickland-Marmol, Leah B; Muro-Cacho, Carlos A; Barnett, Scott D; Banas, Matthew R; Foulis, Philip R

    2016-06-01

    -The data in College of American Pathologists cancer protocols have to be presented effectively to health care providers. There is no consensus on the format of those protocols, resulting in various designs among pathologists. Cancer protocols are independently created by site-specific experts, so there is inconsistent wording and repetition of data. This lack of standardization can be confusing and may lead to interpretation errors. -To define a synopsis format that is effective in delivering essential pathologic information and to evaluate the aesthetic appeal and the impact of varying format styles on the speed and accuracy of data extraction. -We queried individuals from several health care backgrounds using varying formats of the fallopian tube protocol of the College of American Pathologists without content modification to investigate their aesthetic appeal, accuracy, efficiency, and readability/complexity. Descriptive statistics, an item difficulty index, and 3 tests of readability were used. -Columned formats were aesthetically more appealing than justified formats (P < .001) and were associated with greater accuracy and efficiency. Incorrect assumptions were made about items not included in the protocol. Uniform wording and short sentences were associated with better performance by participants. -Based on these data, we propose standardized protocol formats for cancer resections of the fallopian tube and the more-familiar colon, employing headers, short phrases, and uniform terminology. This template can be easily and minimally modified for other sites, standardizing format and verbiage and increasing user accuracy and efficiency. Principles of human factors engineering should be considered in the display of patient data.

  17. Rapid Sampling of Hydrogen Bond Networks for Computational Protein Design.

    PubMed

    Maguire, Jack B; Boyken, Scott E; Baker, David; Kuhlman, Brian

    2018-05-08

    Hydrogen bond networks play a critical role in determining the stability and specificity of biomolecular complexes, and the ability to design such networks is important for engineering novel structures, interactions, and enzymes. One key feature of hydrogen bond networks that makes them difficult to rationally engineer is that they are highly cooperative and are not energetically favorable until the hydrogen bonding potential has been satisfied for all buried polar groups in the network. Existing computational methods for protein design are ill-equipped for creating these highly cooperative networks because they rely on energy functions and sampling strategies that are focused on pairwise interactions. To enable the design of complex hydrogen bond networks, we have developed a new sampling protocol in the molecular modeling program Rosetta that explicitly searches for sets of amino acid mutations that can form self-contained hydrogen bond networks. For a given set of designable residues, the protocol often identifies many alternative sets of mutations/networks, and we show that it can readily be applied to large sets of residues at protein-protein interfaces or in the interior of proteins. The protocol builds on a recently developed method in Rosetta for designing hydrogen bond networks that has been experimentally validated for small symmetric systems but was not extensible to many larger protein structures and complexes. The sampling protocol we describe here not only recapitulates previously validated designs with performance improvements but also yields viable hydrogen bond networks for cases where the previous method fails, such as the design of large, asymmetric interfaces relevant to engineering protein-based therapeutics.

  18. Near-optimal protocols in complex nonequilibrium transformations

    DOE PAGES

    Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...

    2016-08-29

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less

  19. Actions of the fall prevention protocol: mapping with the classification of nursing interventions.

    PubMed

    Alves, Vanessa Cristina; Freitas, Weslen Carlos Junior de; Ramos, Jeferson Silva; Chagas, Samantha Rodrigues Garbis; Azevedo, Cissa; Mata, Luciana Regina Ferreira da

    2017-12-21

    to analyze the correspondence between the actions contained in the fall prevention protocol of the Ministry of Health and the Nursing Interventions Classification (NIC) by a cross-mapping. this is a descriptive study carried out in four stages: protocol survey, identification of NIC interventions related to nursing diagnosis, the risk of falls, cross-mapping, and validation of the mapping from the Delphi technique. there were 51 actions identified in the protocol and 42 interventions in the NIC. Two rounds of mapping evaluation were carried out by the experts. There were 47 protocol actions corresponding to 25 NIC interventions. The NIC interventions that presented the highest correspondence with protocol actions were: fall prevention, environmental-safety control, and risk identification. Regarding the classification of similarity and comprehensiveness of the 47 actions of the protocol mapped, 44.7% were considered more detailed and specific than the NIC, 29.8% less specific than the NIC and 25.5% were classified as similar in significance to the NIC. most of the actions contained in the protocol are more specific and detailed, however, the NIC contemplates a greater diversity of interventions and may base a review of the protocol to increase actions related to falls prevention..

  20. Genetic Analysis and Species Specific Amplification of the Artemisinin Resistance-Associated Kelch Propeller Domain in P. falciparum and P. vivax

    PubMed Central

    Talundzic, Eldin; Chenet, Stella M.; Goldman, Ira F.; Patel, Dhruviben S.; Nelson, Julia A.; Plucinski, Mateusz M.; Barnwell, John W.; Udhayakumar, Venkatachalam

    2015-01-01

    Plasmodium falciparum resistance to artemisinin has emerged in the Greater Mekong Subregion and now poses a threat to malaria control and prevention. Recent work has identified mutations in the kelch propeller domain of the P. falciparum K13 gene to be associated artemisinin resistance as defined by delayed parasite clearance and ex vivo ring stage survival assays. Species specific primers for the two most prevalent human malaria species, P. falciparum and P. vivax, were designed and tested on multiple parasite isolates including human, rodent, and non- humans primate Plasmodium species. The new protocol described here using the species specific primers only amplified their respective species, P. falciparum and P. vivax, and did not cross react with any of the other human malaria Plasmodium species. We provide an improved species specific PCR and sequencing protocol that could be effectively used in areas where both P. falciparum and P. vivax are circulating. To design this improved protocol, the kelch gene was analyzed and compared among different species of Plasmodium. The kelch propeller domain was found to be highly conserved across the mammalian Plasmodium species. PMID:26292024

  1. A mechanical protocol to replicate impact in walking footwear.

    PubMed

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (p<.001). The mean difference between the human and adapted protocol was 12.7±17.5% (p<.001) for peak acceleration and 25.2±17.7% (p=.786) for peak force. This paper demonstrates that altered mechanical test protocols can more closely replicate loading on the lower limb in walking. This therefore suggests that testing of material properties of footbeds not only needs to be gait style specific (e.g. running versus walking), but also footwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Development of an integrated CAD-FEA system for patient-specific design of spinal cages.

    PubMed

    Zhang, Mingzheng; Pu, Fang; Xu, Liqiang; Zhang, Linlin; Liang, Hang; Li, Deyu; Wang, Yu; Fan, Yubo

    2017-03-01

    Spinal cages are used to create a suitable mechanical environment for interbody fusion in cases of degenerative spinal instability. Due to individual variations in bone structures and pathological conditions, patient-specific cages can provide optimal biomechanical conditions for fusion, strengthening patient recovery. Finite element analysis (FEA) is a valuable tool in the biomechanical evaluation of patient-specific cage designs, but the time- and labor-intensive process of modeling limits its clinical application. In an effort to facilitate the design and analysis of patient-specific spinal cages, an integrated CAD-FEA system (CASCaDeS, comprehensive analytical spinal cage design system) was developed. This system produces a biomechanical-based patient-specific design of spinal cages and is capable of rapid implementation of finite element modeling. By comparison with commercial software, this system was validated and proven to be both accurate and efficient. CASCaDeS can be used to design patient-specific cages with a superior biomechanical performance to commercial spinal cages.

  3. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    PubMed

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field.

  4. Processing Protocol for Soil Samples Potentially ...

    EPA Pesticide Factsheets

    Method Operating Procedures This protocol describes the processing steps for 45 g and 9 g soil samples potentially contaminated with Bacillus anthracis spores. The protocol is designed to separate and concentrate the spores from bulk soil down to a pellet that can be used for further analysis. Soil extraction solution and mechanical shaking are used to disrupt soil particle aggregates and to aid in the separation of spores from soil particles. Soil samples are washed twice with soil extraction solution to maximize recovery. Differential centrifugation is used to separate spores from the majority of the soil material. The 45 g protocol has been demonstrated by two laboratories using both loamy and sandy soil types. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol would be robust enough to use at multiple laboratories while achieving comparable recoveries. The 45 g protocol has demonstrated a matrix limit of detection at 14 spores/gram of soil for loamy and sandy soils.

  5. Systematic Evaluation of the Patient-Reported Outcome (PRO) Content of Clinical Trial Protocols

    PubMed Central

    Kyte, Derek; Duffy, Helen; Fletcher, Benjamin; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; King, Madeleine; Draper, Heather; Ives, Jonathan; Brundage, Michael; Blazeby, Jane; Calvert, Melanie

    2014-01-01

    Background Qualitative evidence suggests patient-reported outcome (PRO) information is frequently absent from clinical trial protocols, potentially leading to inconsistent PRO data collection and risking bias. Direct evidence regarding PRO trial protocol content is lacking. The aim of this study was to systematically evaluate the PRO-specific content of UK National Institute for Health Research (NIHR) Health Technology Assessment (HTA) programme trial protocols. Methods and Findings We conducted an electronic search of the NIHR HTA programme database (inception to August 2013) for protocols describing a randomised controlled trial including a primary/secondary PRO. Two investigators independently reviewed the content of each protocol, using a specially constructed PRO-specific protocol checklist, alongside the ‘Standard Protocol Items: Recommendations for Interventional Trials’ (SPIRIT) checklist. Disagreements were resolved through discussion with a third investigator. 75 trial protocols were included in the analysis. Protocols included a mean of 32/51 (63%) SPIRIT recommendations (range 16–41, SD 5.62) and 11/33 (33%) PRO-specific items (range 4–18, SD 3.56). Over half (61%) of the PRO items were incomplete. Protocols containing a primary PRO included slightly more PRO checklist items (mean 14/33 (43%)). PRO protocol content was not associated with general protocol completeness; thus, protocols judged as relatively ‘complete’ using SPIRIT were still likely to have omitted a large proportion of PRO checklist items. Conclusions The PRO components of HTA clinical trial protocols require improvement. Information on the PRO rationale/hypothesis, data collection methods, training and management was often absent. This low compliance is unsurprising; evidence shows existing PRO guidance for protocol developers remains difficult to access and lacks consistency. Study findings suggest there are a number of PRO protocol checklist items that are not fully

  6. Security analysis of standards-driven communication protocols for healthcare scenarios.

    PubMed

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  7. OSI-compatible protocols for mobile-satellite communications: The AMSS experience

    NASA Technical Reports Server (NTRS)

    Moher, Michael

    1990-01-01

    The protocol structure of the international aeronautical mobile satellite service (AMSS) is reviewed with emphasis on those aspects of protocol performance, validation, and conformance which are peculiar to mobile services. This is in part an analysis of what can be learned from the AMSS experience with protocols which is relevant to the design of other mobile satellite data networks, e.g., land mobile.

  8. QUALITY CONTROL - VARIABILITY IN PROTOCOLS

    EPA Science Inventory

    The EPA Risk Reduction Engineering Laboratory’s Quality Assurance Office, which published the popular pocket guide Preparing Perfect Project Plans, is now introducing another quality assurance reference aid. The document Variability in Protocols (VIP) was initially designed as a ...

  9. Verification and validation of a reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  10. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 6; Special Topics in Ocean Optics Protocols and Appendices; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giulietta S. (Editor); McClain, Charles R. (Editor)

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  11. Transport Protocols for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Eddie Law, K. L.

    Transmission control protocol (TCP) provides reliable connection-oriented services between any two end systems on the Internet. With TCP congestion control algorithm, multiple TCP connections can share network and link resources simultaneously. These TCP congestion control mechanisms have been operating effectively in wired networks. However, performance of TCP connections degrades rapidly in wireless and lossy networks. To sustain the throughput performance of TCP connections in wireless networks, design modifications may be required accordingly in the TCP flow control algorithm, and potentially, in association with other protocols in other layers for proper adaptations. In this chapter, we explain the limitations of the latest TCP congestion control algorithm, and then review some popular designs for TCP connections to operate effectively in wireless mesh network infrastructure.

  12. NASA software specification and evaluation system design, part 2

    NASA Technical Reports Server (NTRS)

    1976-01-01

    A survey and analysis of the existing methods, tools and techniques employed in the development of software are presented along with recommendations for the construction of reliable software. Functional designs for software specification language, and the data base verifier are presented.

  13. Space tug thermal control. [design criteria and specifications

    NASA Technical Reports Server (NTRS)

    1974-01-01

    It was determined that space tug will require the capability to perform its mission within a broad range of thermal environments with currently planned mission durations of up to seven days, so an investigation was conducted to define a thermal design for the forward and intertank compartments and fuel cell heat rejection system that satisfies tug requirements for low inclination geosynchronous deploy and retrieve missions. Passive concepts were demonstrated analytically for both the forward and intertank compartments, and a worst case external heating environment was determined for use during the study. The thermal control system specifications and designs which resulted from the research are shown.

  14. Transforming Multidisciplinary Customer Requirements to Product Design Specifications

    NASA Astrophysics Data System (ADS)

    Ma, Xiao-Jie; Ding, Guo-Fu; Qin, Sheng-Feng; Li, Rong; Yan, Kai-Yin; Xiao, Shou-Ne; Yang, Guang-Wu

    2017-09-01

    With the increasing of complexity of complex mechatronic products, it is necessary to involve multidisciplinary design teams, thus, the traditional customer requirements modeling for a single discipline team becomes difficult to be applied in a multidisciplinary team and project since team members with various disciplinary backgrounds may have different interpretations of the customers' requirements. A new synthesized multidisciplinary customer requirements modeling method is provided for obtaining and describing the common understanding of customer requirements (CRs) and more importantly transferring them into a detailed and accurate product design specifications (PDS) to interact with different team members effectively. A case study of designing a high speed train verifies the rationality and feasibility of the proposed multidisciplinary requirement modeling method for complex mechatronic product development. This proposed research offersthe instruction to realize the customer-driven personalized customization of complex mechatronic product.

  15. Dose specification and quality assurance of RTOG protocol 95-17; a cooperative group study of 192Ir breast implants as sole therapy

    PubMed Central

    Ibbott, Geoffrey S.; Hanson, W.F.; Martin, Elizabeth; Kuske, Robert R.; Arthur, Douglas; Rabinovitch, Rachel; White, Julia; Wilenzick, Raymond M.; Harris, Irene; Tailor, Ramesh C.

    2007-01-01

    Purpose RTOG protocol 95-17 was a phase I/II trial to evaluate multi-catheter brachytherapy as the sole method of adjuvant breast radiotherapy for stage I/II breast carcinoma following breast conserving surgery. Low or high dose rate sources were allowed. Dose prescription and treatment evaluation were based on recommendations in ICRU Report 58, and included the parameters mean central dose (MCD), average peripheral dose, dose homogeneity index (DHI), and the dimensions of the low and high dose regions. Methods and Materials Three levels of quality assurance were implemented: (1) Credentialing of institutions was required prior to entering patients onto the study. (2) Rapid review of each treatment plan was conducted prior to treatment, and (3) Retrospective review was performed by the Radiological Physics Center in conjunction with the study chairman and RTOG dosimetry staff. Results Credentialing focused on the accuracy of dose calculation algorithm and compliance with protocol guidelines. Rapid review was designed to identify and correct deviations from the protocol prior to treatment. The retrospective review involved recalculation of dosimetry parameters and review of dose distributions to evaluate the treatment. Specifying both central and peripheral doses resulted in uniform dose distributions, with a mean dose homogeneity index of 0.83 ±0.06. Conclusions Vigorous quality assurance resulted in a high-quality study with few deviations; only 4 of 100 patients were judged as minor variations from protocol and no patient was judged a major deviation. This study should be considered a model for quality assurance of future trials. PMID:18035213

  16. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  17. 78 FR 33863 - Relationship Between General Design Criteria and Technical Specification Operability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-05

    ... NUCLEAR REGULATORY COMMISSION [NRC-2012-0179] Relationship Between General Design Criteria and...) 2013-05, ``NRC Position on the Relationship Between General Design Criteria and Technical Specification Operability.'' This RIS clarifies the NRC staff's position on the relationship between the general design...

  18. Evaluating the Process of Generating a Clinical Trial Protocol

    PubMed Central

    Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.

    2002-01-01

    The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.

  19. Open architecture design and approach for the Integrated Sensor Architecture (ISA)

    NASA Astrophysics Data System (ADS)

    Moulton, Christine L.; Krzywicki, Alan T.; Hepp, Jared J.; Harrell, John; Kogut, Michael

    2015-05-01

    Integrated Sensor Architecture (ISA) is designed in response to stovepiped integration approaches. The design, based on the principles of Service Oriented Architectures (SOA) and Open Architectures, addresses the problem of integration, and is not designed for specific sensors or systems. The use of SOA and Open Architecture approaches has led to a flexible, extensible architecture. Using these approaches, and supported with common data formats, open protocol specifications, and Department of Defense Architecture Framework (DoDAF) system architecture documents, an integration-focused architecture has been developed. ISA can help move the Department of Defense (DoD) from costly stovepipe solutions to a more cost-effective plug-and-play design to support interoperability.

  20. The UNC/UMN Baby Connectome Project (BCP): An overview of the study design and protocol development.

    PubMed

    Howell, Brittany R; Styner, Martin A; Gao, Wei; Yap, Pew-Thian; Wang, Li; Baluyot, Kristine; Yacoub, Essa; Chen, Geng; Potts, Taylor; Salzwedel, Andrew; Li, Gang; Gilmore, John H; Piven, Joseph; Smith, J Keith; Shen, Dinggang; Ugurbil, Kamil; Zhu, Hongtu; Lin, Weili; Elison, Jed T

    2018-03-22

    The human brain undergoes extensive and dynamic growth during the first years of life. The UNC/UMN Baby Connectome Project (BCP), one of the Lifespan Connectome Projects funded by NIH, is an ongoing study jointly conducted by investigators at the University of North Carolina at Chapel Hill and the University of Minnesota. The primary objective of the BCP is to characterize brain and behavioral development in typically developing infants across the first 5 years of life. The ultimate goals are to chart emerging patterns of structural and functional connectivity during this period, map brain-behavior associations, and establish a foundation from which to further explore trajectories of health and disease. To accomplish these goals, we are combining state of the art MRI acquisition and analysis techniques, including high-resolution structural MRI (T1-and T2-weighted images), diffusion imaging (dMRI), and resting state functional connectivity MRI (rfMRI). While the overall design of the BCP largely is built on the protocol developed by the Lifespan Human Connectome Project (HCP), given the unique age range of the BCP cohort, additional optimization of imaging parameters and consideration of an age appropriate battery of behavioral assessments were needed. Here we provide the overall study protocol, including approaches for subject recruitment, strategies for imaging typically developing children 0-5 years of age without sedation, imaging protocol and optimization, a description of the battery of behavioral assessments, and QA/QC procedures. Combining HCP inspired neuroimaging data with well-established behavioral assessments during this time period will yield an invaluable resource for the scientific community. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. RNA-seq mixology: designing realistic control experiments to compare protocols and analysis methods

    PubMed Central

    Holik, Aliaksei Z.; Law, Charity W.; Liu, Ruijie; Wang, Zeya; Wang, Wenyi; Ahn, Jaeil; Asselin-Labat, Marie-Liesse; Smyth, Gordon K.

    2017-01-01

    Abstract Carefully designed control experiments provide a gold standard for benchmarking different genomics research tools. A shortcoming of many gene expression control studies is that replication involves profiling the same reference RNA sample multiple times. This leads to low, pure technical noise that is atypical of regular studies. To achieve a more realistic noise structure, we generated a RNA-sequencing mixture experiment using two cell lines of the same cancer type. Variability was added by extracting RNA from independent cell cultures and degrading particular samples. The systematic gene expression changes induced by this design allowed benchmarking of different library preparation kits (standard poly-A versus total RNA with Ribozero depletion) and analysis pipelines. Data generated using the total RNA kit had more signal for introns and various RNA classes (ncRNA, snRNA, snoRNA) and less variability after degradation. For differential expression analysis, voom with quality weights marginally outperformed other popular methods, while for differential splicing, DEXSeq was simultaneously the most sensitive and the most inconsistent method. For sample deconvolution analysis, DeMix outperformed IsoPure convincingly. Our RNA-sequencing data set provides a valuable resource for benchmarking different protocols and data pre-processing workflows. The extra noise mimics routine lab experiments more closely, ensuring any conclusions are widely applicable. PMID:27899618

  2. Optimization of protocol design: a path to efficient, lower cost clinical trial execution

    PubMed Central

    Malikova, Marina A

    2016-01-01

    Managing clinical trials requires strategic planning and efficient execution. In order to achieve a timely delivery of important clinical trials’ outcomes, it is useful to establish standardized trial management guidelines and develop robust scoring methodology for evaluation of study protocol complexity. This review will explore the challenges clinical teams face in developing protocols to ensure that the right patients are enrolled and the right data are collected to demonstrate that a drug is safe and efficacious, while managing study costs and study complexity based on proposed comprehensive scoring model. Key factors to consider when developing protocols and techniques to minimize complexity will be discussed. A methodology to identify processes at planning phase, approaches to increase fiscal return and mitigate fiscal compliance risk for clinical trials will be addressed. PMID:28031939

  3. Visualisation and interaction design solutions to address specific demands in shared home care.

    PubMed

    Scandurra, Isabella; Hägglund, Maria; Koch, Sabine

    2006-01-01

    When care professionals from different organisations are involved in patient care, their different views on the care process may not be meaningfully integrated. To use visualisation and interaction design solutions addressing the specific demands of shared care in order to support a collaborative work process. Participatory design, comprising interdisciplinary seminar series with real users and iterative prototyping, was applied. A set of interaction and visualisation design solutions to address care professionals' requirements in shared home care is presented, introducing support for identifying origin of information, holistic presentation of information, user group specific visualisation, avoiding cognitive overload, coordination of work and planning, and quick overviews. The design solutions are implemented in an integrated virtual health record system supporting cooperation and coordination in shared home care for the elderly. The described requirements are, however, generalized to comprise all shared care work. The presented design considerations allow healthcare professionals in different organizations to share patient data on mobile devices. Visualization and interaction design facilitates specific work situations and assists in handling specific demands in shared care. The user interface is adapted to different user groups with similar yet distinct needs. Consequently different views supporting cooperative work and presenting shared information in holistic overviews are developed.

  4. Target-cancer cell specific activatable fluorescence imaging Probes: Rational Design and in vivo Applications

    PubMed Central

    Kobayashi, Hisataka; Choyke, Peter L.

    2010-01-01

    CONSPECTUS Conventional imaging methods, such as angiography, computed tomography, magnetic resonance imaging and radionuclide imaging, rely on contrast agents (iodine, gadolinium, radioisotopes) that are “always on”. While these agents have proven clinically useful, they are not sufficiently sensitive because of the inadequate target to background ratio. A unique aspect of optical imaging is that fluorescence probes can be designed to be activatable, i.e. only “turned on” under certain conditions. These probes can be designed to emit signal only after binding a target tissue, greatly increasing sensitivity and specificity in the detection of disease. There are two basic types of activatable fluorescence probes; 1) conventional enzymatically activatable probes, which exist in the quenched state until activated by enzymatic cleavage mostly outside of the cells, and 2) newly designed target-cell specific activatable probes, which are quenched until activated in targeted cells by endolysosomal processing that results when the probe binds specific cell-surface receptors and is subsequently internalized. Herein, we present a review of the rational design and in vivo applications of target-cell specific activatable probes. Designing these probes based on their photo-chemical (e.g. activation strategy), pharmacological (e.g. biodistribution), and biological (e.g. target specificity) properties has recently allowed the rational design and synthesis of target-cell specific activatable fluorescence imaging probes, which can be conjugated to a wide variety of targeting molecules. Several different photo-chemical mechanisms have been utilized, each of which offers a unique capability for probe design. These include: self-quenching, homo- and hetero-fluorescence resonance energy transfer (FRET), H-dimer formation and photon-induced electron transfer (PeT). In addition, the repertoire is further expanded by the option for reversibility or irreversibility of the signal

  5. Avoidance of harvesting and sampling artefacts in hydraulic analyses: a protocol tested on Malus domestica

    PubMed Central

    Beikircher, Barbara; Mayr, Stefan

    2016-01-01

    A prerequisite for reliable hydraulic measurements is an accurate collection of the plant material. Thereby, the native hydraulic state of the sample has to be preserved during harvesting (i.e., cutting the plant or plant parts) and preparation (i.e., excising the target section). This is particularly difficult when harvesting has to be done under transpiring conditions. In this article, we present a harvesting and sampling protocol designed for hydraulic measurements on Malus domestica Borkh. and checked for possible sampling artefacts. To test for artefacts, we analysed the percentage loss of hydraulic conductivity, maximum specific conductivity and water contents of bark and wood of branches, taking into account conduit length, time of day of harvesting, different shoot ages and seasonal effects. Our results prove that use of appropriate protocols can avoid artefactual embolization or refilling even when the xylem is under tension at harvest. The presented protocol was developed for Malus but may also be applied for other angiosperms with similar anatomy and refilling characteristics. PMID:26705311

  6. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    PubMed

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  7. Salt bridges: geometrically specific, designable interactions.

    PubMed

    Donald, Jason E; Kulp, Daniel W; DeGrado, William F

    2011-03-01

    Salt bridges occur frequently in proteins, providing conformational specificity and contributing to molecular recognition and catalysis. We present a comprehensive analysis of these interactions in protein structures by surveying a large database of protein structures. Salt bridges between Asp or Glu and His, Arg, or Lys display extremely well-defined geometric preferences. Several previously observed preferences are confirmed, and others that were previously unrecognized are discovered. Salt bridges are explored for their preferences for different separations in sequence and in space, geometric preferences within proteins and at protein-protein interfaces, co-operativity in networked salt bridges, inclusion within metal-binding sites, preference for acidic electrons, apparent conformational side chain entropy reduction on formation, and degree of burial. Salt bridges occur far more frequently between residues at close than distant sequence separations, but, at close distances, there remain strong preferences for salt bridges at specific separations. Specific types of complex salt bridges, involving three or more members, are also discovered. As we observe a strong relationship between the propensity to form a salt bridge and the placement of salt-bridging residues in protein sequences, we discuss the role that salt bridges might play in kinetically influencing protein folding and thermodynamically stabilizing the native conformation. We also develop a quantitative method to select appropriate crystal structure resolution and B-factor cutoffs. Detailed knowledge of these geometric and sequence dependences should aid de novo design and prediction algorithms. Copyright © 2010 Wiley-Liss, Inc.

  8. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  9. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  10. The effects of physical therapy with neuromuscular electrical stimulation in patients with septic shock: Study protocol for a randomized cross-over design.

    PubMed

    Lago, Alessandra Fabiane; de Oliveira, Anamaria Siriani; de Souza, Hugo Celso Dutra; da Silva, João Santana; Basile-Filho, Anibal; Gastaldi, Ada Clarice

    2018-02-01

    Septic shock is a potentially fatal organ dysfunction caused by an imbalance of the host response to infection. The changes in microcirculation during sepsis can be explained by the alterations in the endothelial barrier function. Endothelial progenitor cells (EPCs) are a potential recovery index of endothelial function and it an increase in response to neuromuscular electrical stimulation (NMES) was demonstrated. Therefore, the objective of this study is to investigate the effects of NMES in patients with septic shock. It is a study protocol for a randomized cross-over design in an intensive care unit of a tertiary University hospital. Thirty-one patients aged 18 to 65 years. The study will be divided in 2 phases: the phase one will be held in the first 72 hours of septic shock and the phase two after 3 days of first assessment. Patients will be randomly selected to the intervention protocol (decubitus position with the limbs raised and NMES) and control protocol (decubitus position with the limbs raised without NMES). After this procedure, the patients will be allocated in group 1 (intervention and control protocol) or group 2 (control and intervention protocol) with a wash-out period of 4 to 6 hours between them. The main outcome is mobilization of EPCs. The secondary outcome is metabolic and hemodynamic data. A linear mixed model will be used for analysis of dependent variables and estimated values of the mean of the differences of each effect.

  11. Zebrafish embryology and cartilage staining protocols for high school students.

    PubMed

    Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A

    2009-06-01

    The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.

  12. A Machine-to-Machine protocol benchmark for eHealth applications - Use case: Respiratory rehabilitation.

    PubMed

    Talaminos-Barroso, Alejandro; Estudillo-Valderrama, Miguel A; Roa, Laura M; Reina-Tosina, Javier; Ortega-Ruiz, Francisco

    2016-06-01

    M2M (Machine-to-Machine) communications represent one of the main pillars of the new paradigm of the Internet of Things (IoT), and is making possible new opportunities for the eHealth business. Nevertheless, the large number of M2M protocols currently available hinders the election of a suitable solution that satisfies the requirements that can demand eHealth applications. In the first place, to develop a tool that provides a benchmarking analysis in order to objectively select among the most relevant M2M protocols for eHealth solutions. In the second place, to validate the tool with a particular use case: the respiratory rehabilitation. A software tool, called Distributed Computing Framework (DFC), has been designed and developed to execute the benchmarking tests and facilitate the deployment in environments with a large number of machines, with independence of the protocol and performance metrics selected. DDS, MQTT, CoAP, JMS, AMQP and XMPP protocols were evaluated considering different specific performance metrics, including CPU usage, memory usage, bandwidth consumption, latency and jitter. The results obtained allowed to validate a case of use: respiratory rehabilitation of chronic obstructive pulmonary disease (COPD) patients in two scenarios with different types of requirement: Home-Based and Ambulatory. The results of the benchmark comparison can guide eHealth developers in the choice of M2M technologies. In this regard, the framework presented is a simple and powerful tool for the deployment of benchmark tests under specific environments and conditions. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. From ergonomics to design specifications: contributions to the design of a processing machine in a tire company.

    PubMed

    Moraes, A S P; Arezes, P M; Vasconcelos, R

    2012-01-01

    The development of ergonomics' recommendations, guidelines and standards are attempts to promote the integration of ergonomics into industrial contexts. Such developments result from several sources and professionals and represent the effort that has been done to develop healthier and safer work environments. However, the availability of large amount of data and documents regarding ergonomics does not guarantee their applicability. The main goal of this paper is to use a specific case to demonstrate how ergonomics criteria were developed in order to contribute to the design of workplaces. Based on the obtained results from research undertaken in a tire company, it was observed that the ergonomics criteria should be presented as design specifications in order to be used by engineers and designers. In conclusion, it is observed that the multiple constraint environment impeded the appliance of the ergonomics criteria. It was also observed that the knowledge on technical design and the acquaintance with ergonomic standards, the level of integration in the design team, and the ability to communicate with workers and other technical staff have paramount importance in integrating ergonomics criteria into the design process.

  14. Development of a dynamic quality assurance testing protocol for multisite clinical trial DCE-CT accreditation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Driscoll, B.; Keller, H.; Jaffray, D.

    2013-08-15

    Purpose: Credentialing can have an impact on whether or not a clinical trial produces useful quality data that is comparable between various institutions and scanners. With the recent increase of dynamic contrast enhanced-computed tomography (DCE-CT) usage as a companion biomarker in clinical trials, effective quality assurance, and control methods are required to ensure there is minimal deviation in the results between different scanners and protocols at various institutions. This paper attempts to address this problem by utilizing a dynamic flow imaging phantom to develop and evaluate a DCE-CT quality assurance (QA) protocol.Methods: A previously designed flow phantom, capable of producingmore » predictable and reproducible time concentration curves from contrast injection was fully validated and then utilized to design a DCE-CT QA protocol. The QA protocol involved a set of quantitative metrics including injected and total mass error, as well as goodness of fit comparison to the known truth concentration curves. An additional region of interest (ROI) sensitivity analysis was also developed to provide additional details on intrascanner variability and determine appropriate ROI sizes for quantitative analysis. Both the QA protocol and ROI sensitivity analysis were utilized to test variations in DCE-CT results using different imaging parameters (tube voltage and current) as well as alternate reconstruction methods and imaging techniques. The developed QA protocol and ROI sensitivity analysis was then applied at three institutions that were part of clinical trial involving DCE-CT and results were compared.Results: The inherent specificity of robustness of the phantom was determined through calculation of the total intraday variability and determined to be less than 2.2 ± 1.1% (total calculated output contrast mass error) with a goodness of fit (R{sup 2}) of greater than 0.99 ± 0.0035 (n= 10). The DCE-CT QA protocol was capable of detecting significant deviations

  15. Design of MPPT Controller Monitoring Software Based on QT Framework

    NASA Astrophysics Data System (ADS)

    Meng, X. Z.; Lu, P. G.

    2017-10-01

    The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.

  16. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  17. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    PubMed

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  18. The ODD protocol: A review and first update

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; DeAngelis, Donald L.; Polhill, J. Gary; Giske, Jarl; Railsback, Steve F.

    2010-01-01

    The 'ODD' (Overview, Design concepts, and Details) protocol was published in 2006 to standardize the published descriptions of individual-based and agent-based models (ABMs). The primary objectives of ODD are to make model descriptions more understandable and complete, thereby making ABMs less subject to criticism for being irreproducible. We have systematically evaluated existing uses of the ODD protocol and identified, as expected, parts of ODD needing improvement and clarification. Accordingly, we revise the definition of ODD to clarify aspects of the original version and thereby facilitate future standardization of ABM descriptions. We discuss frequently raised critiques in ODD but also two emerging, and unanticipated, benefits: ODD improves the rigorous formulation of models and helps make the theoretical foundations of large models more visible. Although the protocol was designed for ABMs, it can help with documenting any large, complex model, alleviating some general objections against such models.

  19. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  20. Toward a bioethical framework for antibiotic use, antimicrobial resistance and for empirically designing ethically robust strategies to protect human health: a research protocol

    PubMed Central

    Martins Pereira, Sandra; de Sá Brandão, Patrícia Joana; Araújo, Joana; Carvalho, Ana Sofia

    2017-01-01

    Introduction Antimicrobial resistance (AMR) is a challenging global and public health issue, raising bioethical challenges, considerations and strategies. Objectives This research protocol presents a conceptual model leading to formulating an empirically based bioethics framework for antibiotic use, AMR and designing ethically robust strategies to protect human health. Methods Mixed methods research will be used and operationalized into five substudies. The bioethical framework will encompass and integrate two theoretical models: global bioethics and ethical decision-making. Results Being a study protocol, this article reports on planned and ongoing research. Conclusions Based on data collection, future findings and using a comprehensive, integrative, evidence-based approach, a step-by-step bioethical framework will be developed for (i) responsible use of antibiotics in healthcare and (ii) design of strategies to decrease AMR. This will entail the analysis and interpretation of approaches from several bioethical theories, including deontological and consequentialist approaches, and the implications of uncertainty to these approaches. PMID:28459355

  1. Development of an HPV Educational Protocol for Adolescents

    PubMed Central

    Wetzel, Caitlin; Tissot, Abbigail; Kollar, Linda M.; Hillard, Paula A.; Stone, Rachel; Kahn, Jessica A.

    2007-01-01

    Study Objectives To develop an educational protocol about HPV and Pap tests for adolescents, to evaluate the protocol for understandability and clarity, and to evaluate the protocol for its effectiveness in increasing knowledge about HPV. Design In phase 1, investigators and adolescents developed the protocol. In phase 2, adolescents evaluated the protocol qualitatively, investigators evaluated its effectiveness in increasing HPV knowledge in a sample of adolescents, and the protocol was revised. In phase 3, investigators evaluated the effectiveness of the revised protocol in an additional adolescent sample. Setting Urban, hospital-based teen health center. Participants A total of 252 adolescent girls and boys in the three study phases. Main Outcome Measures Pre- and post-protocol knowledge about HPV, measured using a 10- or 11-item scale. Results Scores on the HPV knowledge scale increased significantly (p<.0001) among adolescents who participated in phases 2 and 3 after they received the protocol. Initial differences in scores based on race, insurance type and condom use were not noted post-protocol. Conclusion The protocol significantly increased knowledge scores about HPV in this population, regardless of sociodemographic characteristics and risk behaviors. Effective, developmentally appropriate educational protocols about HPV and Pap tests are particularly important in clinical settings as cervical cancer screening guidelines evolve, HPV DNA testing is integrated into screening protocols, and HPV vaccines become available. In-depth, one-on-one education about HPV may also prevent adverse psychosocial responses and promote healthy sexual and Pap screening behaviors in adolescents with abnormal HPV or Pap test results. Synopsis The investigators developed an educational protocol about HPV and Pap tests and evaluated its effectiveness in increasing knowledge about HPV among adolescents. PMID:17868894

  2. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  3. Normalization of cortical thickness measurements across different T1 magnetic resonance imaging protocols by novel W-Score standardization.

    PubMed

    Chung, Jinyong; Yoo, Kwangsun; Lee, Peter; Kim, Chan Mi; Roh, Jee Hoon; Park, Ji Eun; Kim, Sang Joon; Seo, Sang Won; Shin, Jeong-Hyeon; Seong, Joon-Kyung; Jeong, Yong

    2017-10-01

    The use of different 3D T1-weighted magnetic resonance (T1 MR) imaging protocols induces image incompatibility across multicenter studies, negating the many advantages of multicenter studies. A few methods have been developed to address this problem, but significant image incompatibility still remains. Thus, we developed a novel and convenient method to improve image compatibility. W-score standardization creates quality reference values by using a healthy group to obtain normalized disease values. We developed a protocol-specific w-score standardization to control the protocol effect, which is applied to each protocol separately. We used three data sets. In dataset 1, brain T1 MR images of normal controls (NC) and patients with Alzheimer's disease (AD) from two centers, acquired with different T1 MR protocols, were used (Protocol 1 and 2, n = 45/group). In dataset 2, data from six subjects, who underwent MRI with two different protocols (Protocol 1 and 2), were used with different repetition times, echo times, and slice thicknesses. In dataset 3, T1 MR images from a large number of healthy normal controls (Protocol 1: n = 148, Protocol 2: n = 343) were collected for w-score standardization. The protocol effect and disease effect on subjects' cortical thickness were analyzed before and after the application of protocol-specific w-score standardization. As expected, different protocols resulted in differing cortical thickness measurements in both NC and AD subjects. Different measurements were obtained for the same subject when imaged with different protocols. Multivariate pattern difference between measurements was observed between the protocols. Classification accuracy between two protocols was nearly 90%. After applying protocol-specific w-score standardization, the differences between the protocols substantially decreased. Most importantly, protocol-specific w-score standardization reduced both univariate and multivariate differences in the images while

  4. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  5. mREST Interface Specification

    NASA Technical Reports Server (NTRS)

    McCartney, Patrick; MacLean, John

    2012-01-01

    mREST is an implementation of the REST architecture specific to the management and sharing of data in a system of logical elements. The purpose of this document is to clearly define the mREST interface protocol. The interface protocol covers all of the interaction between mREST clients and mREST servers. System-level requirements are not specifically addressed. In an mREST system, there are typically some backend interfaces between a Logical System Element (LSE) and the associated hardware/software system. For example, a network camera LSE would have a backend interface to the camera itself. These interfaces are specific to each type of LSE and are not covered in this document. There are also frontend interfaces that may exist in certain mREST manager applications. For example, an electronic procedure execution application may have a specialized interface for configuring the procedures. This interface would be application specific and outside of this document scope. mREST is intended to be a generic protocol which can be used in a wide variety of applications. A few scenarios are discussed to provide additional clarity but, in general, application-specific implementations of mREST are not specifically addressed. In short, this document is intended to provide all of the information necessary for an application developer to create mREST interface agents. This includes both mREST clients (mREST manager applications) and mREST servers (logical system elements, or LSEs).

  6. Innovations for Evaluation Research: Multiform Protocols, Visual Analog Scaling, and the Retrospective Pretest-Posttest Design.

    PubMed

    Chang, Rong; Little, Todd D

    2018-06-01

    In this article, we review three innovative methods: multiform protocols, visual analog scaling, and the retrospective pretest-posttest design that can be used in evaluation research. These three techniques have been proposed for decades, but unfortunately, they are still not utilized readily in evaluation research. Our goal is to familiarize researchers with these underutilized research techniques that could reduce personnel effort and costs for data collection while producing better inferences for a study. We begin by discussing their applications and special unique features. We then discuss each technique's strengths and limitations and offer practical tips on how to better implement these methods in evaluation research. We then showcase two recent empirical studies that implement these methods in real-world evaluation research applications.

  7. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  8. 48 CFR 2052.227-70 - Drawings, designs, specifications, and other data.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Drawings, designs, specifications, and other data. 2052.227-70 Section 2052.227-70 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 2052.227-70 Drawings, designs...

  9. 48 CFR 2052.227-70 - Drawings, designs, specifications, and other data.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Drawings, designs, specifications, and other data. 2052.227-70 Section 2052.227-70 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 2052.227-70 Drawings, designs...

  10. 48 CFR 2052.227-70 - Drawings, designs, specifications, and other data.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Drawings, designs, specifications, and other data. 2052.227-70 Section 2052.227-70 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 2052.227-70 Drawings, designs,...

  11. So you think you've designed an effective recruitment protocol?

    PubMed

    Green, Cara; Vandall-Walker, Virginia

    2017-03-22

    Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.

  12. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    PubMed Central

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  13. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    NASA Astrophysics Data System (ADS)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  14. Space shuttle configuration accounting functional design specification

    NASA Technical Reports Server (NTRS)

    1974-01-01

    An analysis is presented of the requirements for an on-line automated system which must be capable of tracking the status of requirements and engineering changes and of providing accurate and timely records. The functional design specification provides the definition, description, and character length of the required data elements and the interrelationship of data elements to adequately track, display, and report the status of active configuration changes. As changes to the space shuttle program levels II and III configuration are proposed, evaluated, and dispositioned, it is the function of the configuration management office to maintain records regarding changes to the baseline and to track and report the status of those changes. The configuration accounting system will consist of a combination of computers, computer terminals, software, and procedures, all of which are designed to store, retrieve, display, and process information required to track proposed and proved engineering changes to maintain baseline documentation of the space shuttle program levels II and III.

  15. Translational Neuromodulation: Approximating Human Transcranial Magnetic Stimulation Protocols In Rats

    PubMed Central

    Vahabzadeh-Hagh, Andrew M.; Muller, Paul A.; Gersner, Roman; Zangen, Abraham; Rotenberg, Alexander

    2015-01-01

    Objective Transcranial magnetic stimulation (TMS) is a well-established clinical protocol with numerous potential therapeutic and diagnostic applications. Yet, much work remains in the elucidation of TMS mechanisms, optimization of protocols, and in development of novel therapeutic applications. As with many technologies, the key to these issues lies in the proper experimentation and translation of TMS methods to animal models, among which rat models have proven popular. A significant increase in the number of rat TMS publications has necessitated analysis of their relevance to human work. We therefore review the essential principles necessary for the approximation of human TMS protocols in rats as well as specific methods that addressed these issues in published studies. Materials and Methods We performed an English language literature search combined with our own experience and data. We address issues that we see as important in the translation of human TMS methods to rat models and provide a summary of key accomplishments in these areas. Results An extensive literature review illustrated the growth of rodent TMS studies in recent years. Current advances in the translation of single, paired-pulse, and repetitive stimulation paradigms to rodent models are presented. The importance of TMS in the generation of data for preclinical trials is also highlighted. Conclusions Rat TMS has several limitations when considering parallels between animal and human stimulation. However, it has proven to be a useful tool in the field of translational brain stimulation and will likely continue to aid in the design and implementation of stimulation protocols for therapeutic and diagnostic applications. PMID:22780329

  16. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    PubMed

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  17. Design, rationale and feasibility of a multidimensional experimental protocol to study early life stress.

    PubMed

    Bartholomeusz, M Dillwyn; Bolton, Philip S; Callister, Robin; Skinner, Virginia; Hodgson, Deborah

    2017-09-01

    There is a rapidly accumulating body of evidence regarding the influential role of early life stress (ELS) upon medical and psychiatric conditions. While self-report instruments, with their intrinsic limitations of recall, remain the primary means of detecting ELS in humans, biological measures are generally limited to a single biological system. This paper describes the design, rationale and feasibility of a study to simultaneously measure neuroendocrine, immune and autonomic nervous system (ANS) responses to psychological and physiological stressors in relation to ELS. Five healthy university students were recruited by advertisement. Exclusion criteria included chronic medical conditions, psychotic disorders, needle phobia, inability to tolerate pain, and those using anti-inflammatory medications. They were clinically interviewed and physiological recordings made over a two-hour period pre, during and post two acute stressors: the cold pressor test and recalling a distressing memory. The Childhood Trauma Questionnaire and the Parental Bonding Index were utilised to measure ELS. Other psychological measures of mood and personality were also administered. Measurements of heart rate, blood pressure, respiratory rate, skin conductance, skin blood flow and temporal plasma samples were successfully obtained before, during and after acute stress. Participants reported the extensive psychological and multisystem physiological data collection and stress provocations were tolerable. Most (4/5) participants indicated a willingness to return to repeat the protocol, indicating acceptability. Our protocol is viable and safe in young physically healthy adults and allows us to assess simultaneously neuroendocrine, immune and autonomic nervous system responses to stressors in persons assessed for ELS.

  18. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  19. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  20. Accelerated treatment protocols: full arch treatment with interim and definitive prostheses.

    PubMed

    Drago, Carl

    2012-01-01

    With the advent of titanium, root form implants and osseointegration, dental treatment has undergone a metamorphosis in recent years. These new techniques enable dentists to provide anchorage for various kinds of prostheses that improve masticatory function, esthetics, and comfort for patients. Implant treatment protocols have been improved relative to implant macro- and micro-geometries, surgical and prosthetic components, and treatment times. Over the past 20 years, immediate occlusal function (also known as loading) has been established as a predictable treatment modality, provided certain specific criteria are met. In many cases, edentulous patients, crippled by the loss of their teeth, can undergo outpatient surgical and prosthetic procedures and return to a masticatory function that is near normal--sometimes after only one day of surgical and prosthetic treatment. This treatment option is also available for patients with advanced, generalized periodontal disease. Computer-assisted design/Computer-assisted manufacturing (CAD/CAM) has transformed how dental prostheses are made, offering improved accuracy, longevity, and biocompatibility; along with reduced labor costs and fewer complications than casting technologies. This article reviews the principles associated with immediate occlusal loading and illustrates one specific accelerated prosthodontic treatment protocol used to treat edentulous and partially edentulous patients with interim and definitive prostheses.

  1. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  2. SPIRIT 2013 Statement: Defining Standard Protocol Items for Clinical Trials

    PubMed Central

    Chan, An-Wen; Tetzlaff, Jennifer M.; Altman, Douglas G.; Laupacis, Andreas; Gøtzsche, Peter C.; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A.; Doré, Caroline J.; Parulekar, Wendy R.; Summerskill, William S.M.; Groves, Trish; Schulz, Kenneth F.; Sox, Harold C.; Rockhold, Frank W.; Rennie, Drummond; Moher, David

    2016-01-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders. PMID:23295957

  3. SPIRIT 2013 statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Doré, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2013-02-05

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol.The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  4. BLUE-protocol and FALLS-protocol: two applications of lung ultrasound in the critically ill.

    PubMed

    Lichtenstein, Daniel A

    2015-06-01

    This review article describes two protocols adapted from lung ultrasound: the bedside lung ultrasound in emergency (BLUE)-protocol for the immediate diagnosis of acute respiratory failure and the fluid administration limited by lung sonography (FALLS)-protocol for the management of acute circulatory failure. These applications require the mastery of 10 signs indicating normal lung surface (bat sign, lung sliding, A-lines), pleural effusions (quad and sinusoid sign), lung consolidations (fractal and tissue-like sign), interstitial syndrome (lung rockets), and pneumothorax (stratosphere sign and the lung point). These signs have been assessed in adults, with diagnostic accuracies ranging from 90% to 100%, allowing consideration of ultrasound as a reasonable bedside gold standard. In the BLUE-protocol, profiles have been designed for the main diseases (pneumonia, congestive heart failure, COPD, asthma, pulmonary embolism, pneumothorax), with an accuracy > 90%. In the FALLS-protocol, the change from A-lines to lung rockets appears at a threshold of 18 mm Hg of pulmonary artery occlusion pressure, providing a direct biomarker of clinical volemia. The FALLS-protocol sequentially rules out obstructive, then cardiogenic, then hypovolemic shock for expediting the diagnosis of distributive (usually septic) shock. These applications can be done using simple grayscale machines and one microconvex probe suitable for the whole body. Lung ultrasound is a multifaceted tool also useful for decreasing radiation doses (of interest in neonates where the lung signatures are similar to those in adults), from ARDS to trauma management, and from ICUs to points of care. If done in suitable centers, training is the least of the limitations for making use of this kind of visual medicine.

  5. 'Be active, eat right', evaluation of an overweight prevention protocol among 5-year-old children: design of a cluster randomised controlled trial.

    PubMed

    Veldhuis, Lydian; Struijk, Mirjam K; Kroeze, Willemieke; Oenema, Anke; Renders, Carry M; Bulk-Bunschoten, Anneke Mw; Hirasing, Remy A; Raat, Hein

    2009-06-08

    The prevalence of overweight and obesity in children has at least doubled in the past 25 years with a major impact on health. In 2005 a prevention protocol was developed applicable within Youth Health Care. This study aims to assess the effects of this protocol on prevalence of overweight and health behaviour among children. A cluster randomised controlled trial is conducted among 5-year-old children included by 44 Youth Health Care teams randomised within 9 Municipal Health Services. The teams are randomly allocated to the intervention or control group. The teams measure the weight and height of all children. When a child in the intervention group is detected with overweight according to the international age and gender specific cut-off points of BMI, the prevention protocol is applied. According to this protocol parents of overweight children are invited for up to three counselling sessions during which they receive personal advice about a healthy lifestyle, and are motivated for and assisted in behavioural change.The primary outcome measures are Body Mass Index and waist circumference of the children. Parents will complete questionnaires to assess secondary outcome measures: levels of overweight inducing/reducing behaviours (i.e. being physically active, having breakfast, drinking sweet beverages and watching television/playing computer games), parenting styles, parenting practices, and attitudes of parents regarding these behaviours, health-related quality of life of the children, and possible negative side effects of the prevention protocol. Data will be collected at baseline (when the children are aged 5 years), and after 12 and 24 months of follow-up. Additionally, a process and a cost-effectiveness evaluation will be conducted. In this study called 'Be active, eat right' we evaluate an overweight prevention protocol for use in the setting of Youth Health Care. It is hypothesized that the use of this protocol will result in a healthier lifestyle of the

  6. Engaging Gatekeepers, Optimizing Decision Making, and Mitigating Bias: Design Specifications for Systemic Diversity Interventions.

    PubMed

    Vinkenburg, Claartje J

    2017-06-01

    In this contribution to the Journal of Applied Behavioral Science Special Issue on Understanding Diversity Dynamics in Systems: Social Equality as an Organization Change Issue, I develop and describe design specifications for systemic diversity interventions in upward mobility career systems, aimed at optimizing decision making through mitigating bias by engaging gatekeepers. These interventions address the paradox of meritocracy that underlies the surprising lack of diversity at the top of the career pyramid in these systems. I ground the design specifications in the limited empirical evidence on "what works" in systemic interventions. Specifically, I describe examples from interventions in academic settings, including a bias literacy program, participatory modeling, and participant observation. The design specifications, paired with inspirational examples of successful interventions, should assist diversity officers and consultants in designing and implementing interventions to promote the advancement to and representation of nondominant group members at the top of the organizational hierarchy.

  7. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  8. Effects of general, specific and combined warm-up on explosive muscular performance

    PubMed Central

    Henriquez–Olguín, C; Beltrán, AR; Ramírez, MA; Labarca, C; Cornejo, M; Álvarez, C; Ramírez-Campillo, R

    2015-01-01

    The purpose of this study was to compare the acute effects of general, specific and combined warm-up (WU) on explosive performance. Healthy male (n = 10) subjects participated in six WU protocols in a crossover randomized study design. Protocols were: passive rest (PR; 15 min of passive rest), running (Run; 5 min of running at 70% of maximum heart rate), stretching (STR; 5 min of static stretching exercise), jumping [Jump; 5 min of jumping exercises – 3x8 countermovement jumps (CMJ) and 3x8 drop jumps from 60 cm (DJ60)], and combined (COM; protocols Run+STR+Jump combined). Immediately before and after each WU, subjects were assessed for explosive concentric-only (i.e. squat jump – SJ), slow stretch-shortening cycle (i.e. CMJ), fast stretch-shortening cycle (i.e. DJ60) and contact time (CT) muscle performance. PR significantly reduced SJ performance (p =0.007). Run increased SJ (p =0.0001) and CMJ (p =0.002). STR increased CMJ (p =0.048). Specific WU (i.e. Jump) increased SJ (p =0.001), CMJ (p =0.028) and DJ60 (p =0.006) performance. COM increased CMJ performance (p =0.006). Jump was superior in SJ performance vs. PR (p =0.001). Jump reduced (p =0.03) CT in DJ60. In conclusion, general, specific and combined WU increase slow stretch-shortening cycle (SSC) muscle performance, but only specific WU increases fast SSC muscle performance. Therefore, to increase fast SSC performance, specific fast SSC muscle actions must be included during the WU. PMID:26060335

  9. Computational Design of DNA-Binding Proteins.

    PubMed

    Thyme, Summer; Song, Yifan

    2016-01-01

    Predicting the outcome of engineered and naturally occurring sequence perturbations to protein-DNA interfaces requires accurate computational modeling technologies. It has been well established that computational design to accommodate small numbers of DNA target site substitutions is possible. This chapter details the basic method of design used in the Rosetta macromolecular modeling program that has been successfully used to modulate the specificity of DNA-binding proteins. More recently, combining computational design and directed evolution has become a common approach for increasing the success rate of protein engineering projects. The power of such high-throughput screening depends on computational methods producing multiple potential solutions. Therefore, this chapter describes several protocols for increasing the diversity of designed output. Lastly, we describe an approach for building comparative models of protein-DNA complexes in order to utilize information from homologous sequences. These models can be used to explore how nature modulates specificity of protein-DNA interfaces and potentially can even be used as starting templates for further engineering.

  10. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  11. The Robinson Protocol: a treadmill anaerobic performance test.

    PubMed

    Robinson, Ellyn M; Graham, Louise B; Headley, Samuel A

    2004-08-01

    The current investigation was designed to further examine the reliability of the Robinson protocol, which is a run-to-exhaustion treadmill test. Robinson (10) originally examined this protocol with 5 subjects. The significance of the initial exploratory study was the impetus for expanding the study to examine the reliability of the protocol with a larger sample. Fifteen male subjects participated in 3 trial runs on the treadmill. The first trial was a modified McConnell (7) test to determine the aerobic capacity of each subject. The second and third trials were identical Robinson protocols (10). The first trial run mean, in seconds (262.04 +/- 74.50), was not significantly different from the second trial run mean (257.30 +/- 72.65), p = 0.526 (2 tailed). As expected, trial 1 and trial 2 were highly correlated (intraclass) (r = 0.927, p < 0.001). These results provide additional support for the hypothesis that the Robinson protocol with a greater subject pool is a reliable protocol that can be used in research studies interested in examining various physiological interventions or anaerobic training.

  12. Evaluation of Aspergillus PCR protocols for testing serum specimens.

    PubMed

    White, P Lewis; Mengoli, Carlo; Bretagne, Stéphane; Cuenca-Estrella, Manuel; Finnstrom, Niklas; Klingspor, Lena; Melchers, Willem J G; McCulloch, Elaine; Barnes, Rosemary A; Donnelly, J Peter; Loeffler, Juergen

    2011-11-01

    A panel of human serum samples spiked with various amounts of Aspergillus fumigatus genomic DNA was distributed to 23 centers within the European Aspergillus PCR Initiative to determine analytical performance of PCR. Information regarding specific methodological components and PCR performance was requested. The information provided was made anonymous, and meta-regression analysis was performed to determine any procedural factors that significantly altered PCR performance. Ninety-seven percent of protocols were able to detect a threshold of 10 genomes/ml on at least one occasion, with 83% of protocols reproducibly detecting this concentration. Sensitivity and specificity were 86.1% and 93.6%, respectively. Positive associations between sensitivity and the use of larger sample volumes, an internal control PCR, and PCR targeting the internal transcribed spacer (ITS) region were shown. Negative associations between sensitivity and the use of larger elution volumes (≥100 μl) and PCR targeting the mitochondrial genes were demonstrated. Most Aspergillus PCR protocols used to test serum generate satisfactory analytical performance. Testing serum requires less standardization, and the specific recommendations shown in this article will only improve performance.

  13. Flaws in current human training protocols for spontaneous Brain-Computer Interfaces: lessons learned from instructional design

    PubMed Central

    Lotte, Fabien; Larrue, Florian; Mühl, Christian

    2013-01-01

    While recent research on Brain-Computer Interfaces (BCI) has highlighted their potential for many applications, they remain barely used outside laboratories. The main reason is their lack of robustness. Indeed, with current BCI, mental state recognition is usually slow and often incorrect. Spontaneous BCI (i.e., mental imagery-based BCI) often rely on mutual learning efforts by the user and the machine, with BCI users learning to produce stable ElectroEncephaloGraphy (EEG) patterns (spontaneous BCI control being widely acknowledged as a skill) while the computer learns to automatically recognize these EEG patterns, using signal processing. Most research so far was focused on signal processing, mostly neglecting the human in the loop. However, how well the user masters the BCI skill is also a key element explaining BCI robustness. Indeed, if the user is not able to produce stable and distinct EEG patterns, then no signal processing algorithm would be able to recognize them. Unfortunately, despite the importance of BCI training protocols, they have been scarcely studied so far, and used mostly unchanged for years. In this paper, we advocate that current human training approaches for spontaneous BCI are most likely inappropriate. We notably study instructional design literature in order to identify the key requirements and guidelines for a successful training procedure that promotes a good and efficient skill learning. This literature study highlights that current spontaneous BCI user training procedures satisfy very few of these requirements and hence are likely to be suboptimal. We therefore identify the flaws in BCI training protocols according to instructional design principles, at several levels: in the instructions provided to the user, in the tasks he/she has to perform, and in the feedback provided. For each level, we propose new research directions that are theoretically expected to address some of these flaws and to help users learn the BCI skill more

  14. Laboratory Protocol for Genetic Gut Content Analyses of Aquatic Macroinvertebrates Using Group-specific rDNA Primers.

    PubMed

    Koester, Meike; Gergs, René

    2017-10-05

    Analyzing food webs is essential for a better understanding of ecosystems. For example, food web interactions can undergo severe changes caused by the invasion of non-indigenous species. However, an exact identification of field predator-prey interactions is difficult in many cases. These analyses are often based on a visual evaluation of gut content or the analysis of stable isotope ratios (δ 15 N and δ 13 C). Such methods require comprehensive knowledge about, respectively, morphologic diversity or isotopic signature from individual prey organisms, leading to obstacles in the exact identification of prey organisms. Visual gut content analyses especially underestimate soft bodied prey organisms, because maceration, ingestion and digestion of prey organisms make identification of specific species difficult. Hence, polymerase chain reaction (PCR) based strategies, for example the use of group-specific primer sets, provide a powerful tool for the investigation of food web interactions. Here, we describe detailed protocols to investigate the gut contents of macroinvertebrate consumers from the field using group-specific primer sets for nuclear ribosomal deoxyribonucleic acid (rDNA). DNA can be extracted either from whole specimens (in the case of small taxa) or out of gut contents of specimens collected in the field. Presence and functional efficiency of the DNA templates need to be confirmed directly from the tested individual using universal primer sets targeting the respective subunit of DNA. We also demonstrate that consumed prey can be determined further down to species level via PCR with unmodified group-specific primers combined with subsequent single strand conformation polymorphism (SSCP) analyses using polyacrylamide gels. Furthermore, we show that the use of different fluorescent dyes as labels enables parallel screening for DNA fragments of different prey groups from multiple gut content samples via automated fragment analysis.

  15. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    PubMed

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  16. High specific energy, high capacity nickel-hydrogen cell design

    NASA Technical Reports Server (NTRS)

    Wheeler, James R.

    1993-01-01

    A 3.5 inch rabbit-ear-terminal nickel-hydrogen cell has been designed and tested to deliver high capacity at a C/1.5 discharge rate. Its specific energy yield of 60.6 wh/kg is believed to be the highest yet achieved in a slurry-process nickel-hydrogen cell, and its 10 C capacity of 113.9 AH the highest capacity yet made at a discharge rate this high in the 3.5 inch diameter size. The cell also demonstrated a pulse capability of 180 amps for 20 seconds. Specific cell parameters, performance, and future test plans are described.

  17. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  18. Abbreviated breast magnetic resonance protocol: Value of high-resolution temporal dynamic sequence to improve lesion characterization.

    PubMed

    Oldrini, Guillaume; Fedida, Benjamin; Poujol, Julie; Felblinger, Jacques; Trop, Isabelle; Henrot, Philippe; Darai, Emile; Thomassin-Naggara, Isabelle

    2017-10-01

    To evaluate the added value of ULTRAFAST-MR sequence to an abbreviated FAST protocol in comparison with FULL protocol to distinguish benign from malignant lesions in a population of women, regardless of breast MR imaging indication. From March 10th to September 22th, 2014, we retrospectively included a total of 70 consecutive patients with 106 histologically proven lesions (58 malignant and 48 benign) who underwent breast MR imaging for preoperative breast staging (n=38), high-risk screening (n=7), problem solving (n=18), and nipple discharge (n=4) with 12 time resolved imaging of contrast kinetics (TRICKS) acquisitions during contrast inflow interleaved in a regular high-resolution dynamic MRI protocol (FULL protocol). Two readers scored MR exams as either positive or negative and described significant lesions according to Bi-RADS lexicon with a TRICKS images (ULTRAFAST), an abbreviated protocol (FAST) and all images (FULL protocol). Sensitivity, specificity, positive and negative predictive values, and accuracy were calculated for each protocol and compared with McNemar's test. For all readers, the combined FAST-ULTRAFAST protocol significantly improved the reading with a specificity of 83.3% and 70.8% in comparison with FAST protocol or FULL protocol, respectively, without change in sensitivity. By adding ULTRAFAST protocol to FAST protocol, readers 1 and 2 were able to correctly change the diagnosis in 22.9% (11/48) and 10.4% (5/48) of benign lesions, without missing any malignancy, respectively. Both interpretation and image acquisition times for combined FAST-ULTRAFAST protocol and FAST protocol were shorter compared to FULL protocol (p<0.001). Compared to FULL protocol, adding ULTRAFAST to FAST protocol improves specificity, mainly in correctly reclassifying benign masses and reducing interpretation and acquisition time, without decreasing sensitivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. A Natural Language Processing-based Model to Automate MRI Brain Protocol Selection and Prioritization.

    PubMed

    Brown, Andrew D; Marotta, Thomas R

    2017-02-01

    Incorrect imaging protocol selection can contribute to increased healthcare cost and waste. To help healthcare providers improve the quality and safety of medical imaging services, we developed and evaluated three natural language processing (NLP) models to determine whether NLP techniques could be employed to aid in clinical decision support for protocoling and prioritization of magnetic resonance imaging (MRI) brain examinations. To test the feasibility of using an NLP model to support clinical decision making for MRI brain examinations, we designed three different medical imaging prediction tasks, each with a unique outcome: selecting an examination protocol, evaluating the need for contrast administration, and determining priority. We created three models for each prediction task, each using a different classification algorithm-random forest, support vector machine, or k-nearest neighbor-to predict outcomes based on the narrative clinical indications and demographic data associated with 13,982 MRI brain examinations performed from January 1, 2013 to June 30, 2015. Test datasets were used to calculate the accuracy, sensitivity and specificity, predictive values, and the area under the curve. Our optimal results show an accuracy of 82.9%, 83.0%, and 88.2% for the protocol selection, contrast administration, and prioritization tasks, respectively, demonstrating that predictive algorithms can be used to aid in clinical decision support for examination protocoling. NLP models developed from the narrative clinical information provided by referring clinicians and demographic data are feasible methods to predict the protocol and priority of MRI brain examinations. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  20. Engaging Gatekeepers, Optimizing Decision Making, and Mitigating Bias: Design Specifications for Systemic Diversity Interventions

    PubMed Central

    Vinkenburg, Claartje J.

    2017-01-01

    In this contribution to the Journal of Applied Behavioral Science Special Issue on Understanding Diversity Dynamics in Systems: Social Equality as an Organization Change Issue, I develop and describe design specifications for systemic diversity interventions in upward mobility career systems, aimed at optimizing decision making through mitigating bias by engaging gatekeepers. These interventions address the paradox of meritocracy that underlies the surprising lack of diversity at the top of the career pyramid in these systems. I ground the design specifications in the limited empirical evidence on “what works” in systemic interventions. Specifically, I describe examples from interventions in academic settings, including a bias literacy program, participatory modeling, and participant observation. The design specifications, paired with inspirational examples of successful interventions, should assist diversity officers and consultants in designing and implementing interventions to promote the advancement to and representation of nondominant group members at the top of the organizational hierarchy. PMID:28546644

  1. Protocol for communications in potentially noisy environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  2. Running key mapping in a quantum stream cipher by the Yuen 2000 protocol

    NASA Astrophysics Data System (ADS)

    Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki

    2008-03-01

    A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

  3. CCSDS File Delivery Protocol (CFDP): Why it's Useful and How it Works

    NASA Technical Reports Server (NTRS)

    Ray, Tim

    2003-01-01

    Reliable delivery of data products is often required across space links. For example, a NASA mission will require reliable delivery of images produced by an on-board detector. Many missions have their own (unique) way of accomplishing this, requiring custom software. Many missions also require manual operations (e.g. the telemetry receiver software keeps track of what data is missing, and a person manually inputs the appropriate commands to request retransmissions). The Consultative Committee for Space Data Systems (CCSDS) developed the CCSDS File Delivery Protocol (CFDP) specifically for this situation. CFDP is an international standard communication protocol that provides reliable delivery of data products. It is designed for use across space links. It will work well if run over the widely used CCSDS Telemetry and Telecommand protocols. However, it can be run over any protocol, and will work well as long as the underlying protocol delivers a reasonable portion of the data. The CFDP receiver will autonomously determine what data is missing, and request retransmissions as needed. The CFDP sender will autonomously perform the requested transmissions. When the entire data product is delivered, the CFDP receiver will let the CFDP sender know that the transaction has completed successfully. The result is that custom software becomes standard, and manual operations become autonomous. This paper will consider various ways of achieving reliable file delivery, explain why CFDP is the optimal choice for use over space links, explain how the core protocol works, and give some guidance on how to best utilize CFDP within various mission scenarios. It will also touch on additional features of CFDP, as well as other uses for CFDP (e.g. the loading of on-board memory and tables).

  4. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the test system. (8) A description of the experimental design, including methods for the control of... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Protocol. 792.120 Section 792.120... at which the study is being conducted. (4) The proposed experimental start and termination dates. (5...

  5. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  6. Intensive group training protocol versus guideline physiotherapy for patients with chronic low back pain: a randomised controlled trial.

    PubMed

    van der Roer, Nicole; van Tulder, Maurits; Barendse, Johanna; Knol, Dirk; van Mechelen, Willem; de Vet, Henrica

    2008-09-01

    Intensive group training using principles of graded activity has been proven to be effective in occupational care for workers with chronic low back pain. Objective of the study was to compare the effects of an intensive group training protocol aimed at returning to normal daily activities and guideline physiotherapy for primary care patients with non-specific chronic low back pain. The study was designed as pragmatic randomised controlled trial with a setup of 105 primary care physiotherapists in 49 practices and 114 patients with non-specific low back pain of more than 12 weeks duration participated in the study. In the intensive group training protocol exercise therapy, back school and operant-conditioning behavioural principles are combined. Patients were treated during 10 individual sessions along 20 group sessions. Usual care consisted of physiotherapy according to the Dutch guidelines for Low Back Pain. Main outcome measures were functional disability (Roland Morris disability questionnaire), pain intensity, perceived recovery and sick leave because of low back pain assessed at baseline and after 6, 13, 26 and 52 weeks. Both an intention-to-treat analysis and a per-protocol analysis were performed. Multilevel analysis did not show significant differences between both treatment groups on any outcome measures during the complete follow-up period, with one exception. After 26 weeks the protocol group showed more reduction in pain intensity than the guideline group, but this difference was absent after 52 weeks. We finally conclude that an intensive group training protocol was not more effective than usual physiotherapy for chronic low back pain.

  7. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  8. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  9. A Modified Protocol for High-Quality RNA Extraction from Oleoresin-Producing Adult Pines.

    PubMed

    de Lima, Júlio César; Füller, Thanise Nogueira; de Costa, Fernanda; Rodrigues-Corrêa, Kelly C S; Fett-Neto, Arthur G

    2016-01-01

    RNA extraction resulting in good yields and quality is a fundamental step for the analyses of transcriptomes through high-throughput sequencing technologies, microarray, and also northern blots, RT-PCR, and RTqPCR. Even though many specific protocols designed for plants with high content of secondary metabolites have been developed, these are often expensive, time consuming, and not suitable for a wide range of tissues. Here we present a modification of the method previously described using the commercially available Concert™ Plant RNA Reagent (Invitrogen) buffer for field-grown adult pine trees with high oleoresin content.

  10. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    PubMed

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  11. Allergic contact dermatitis to nickel: modified in vitro test protocols for better detection of allergen-specific response.

    PubMed

    Spiewak, Radoslaw; Moed, Heleen; von Blomberg, Brigitta Mary E; Bruynzeel, Derk P; Scheper, Rik J; Gibbs, Susan; Rustemeyer, Thomas

    2007-02-01

    To date, no in vitro test is suitable for routine diagnosis of contact allergy. The aim of our study was to establish improved in vitro test protocol for the detection of antigen-specific responses of lymphocytes from patients with allergic contact dermatitis to nickel (Ni-ACD). Blood leucocytes from 14 Ni-ACD patients and 14 controls were cultured in the presence of 'cytokine cocktails' skewing lymphocytes towards 'type 1' [interferon-gamma (IFN-gamma)-secreting] or 'type 2' [interleukin (IL)-5 and IL-13-secreting] phenotypes. The cocktails consisted of IL-7 and, respectively, either IL-12 or IL-4. Cell responses to nickel were measured with enzyme-linked immunospot assay (ELISpot), enzyme-linked immunosorbent assay (ELISA), and lymphocyte proliferation test (LPT). Significant differences between patients with Ni-ACD and controls were found for the 'type 2' cytokines IL-13 and IL-5, with further increase of allergen-specific responses occurring when cultures were supplemented with IL-7 and IL-4. No significant differences were found for IFN-gamma. The best correlate to clinical diagnosis was LPT with 'type 2' skewing (r= 0.739, P < 0.001), followed by IL-13 ELISpot with 'type 2' skewing (r= 0.654, P < 0.001). The non-radioactive method that correlated best with LPT was IL-2 ELISpot (r= 0.809, P < 0.001). Overall, we conclude that combining ELISpot assay with proposed modifications of culture conditions improves detection of specific lymphocyte responses in contact allergy to nickel.

  12. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    NASA Astrophysics Data System (ADS)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  13. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  14. Latency correction of event-related potentials between different experimental protocols

    NASA Astrophysics Data System (ADS)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  15. Control systems and coordination protocols of the secretory pathway.

    PubMed

    Luini, Alberto; Mavelli, Gabriella; Jung, Juan; Cancino, Jorge

    2014-01-01

    Like other cellular modules, the secretory pathway and the Golgi complex are likely to be supervised by control systems that support homeostasis and optimal functionality under all conditions, including external and internal perturbations. Moreover, the secretory apparatus must be functionally connected with other cellular modules, such as energy metabolism and protein degradation, via specific rules of interaction, or "coordination protocols". These regulatory devices are of fundamental importance for optimal function; however, they are generally "hidden" at steady state. The molecular components and the architecture of the control systems and coordination protocols of the secretory pathway are beginning to emerge through studies based on the use of controlled transport-specific perturbations aimed specifically at the detection and analysis of these internal regulatory devices.

  16. Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.; Siminiceanu, Radu

    2006-01-01

    Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.

  17. Kineto-dynamic design optimisation for vehicle-specific seat-suspension systems

    NASA Astrophysics Data System (ADS)

    Shangguan, Wen-Bin; Shui, Yijie; Rakheja, Subhash

    2017-11-01

    Designs and analyses of seat-suspension systems are invariably performed considering effective vertical spring rate and damping properties, while neglecting important contributions due to kinematics of the widely used cross-linkage mechanism. In this study, a kineto-dynamic model of a seat-suspension is formulated to obtain relations for effective vertical suspension stiffness and damping characteristics as functions of those of the air spring and the hydraulic damper, respectively. The proposed relations are verified through simulations of the multi-body dynamic model of the cross-linkage seat-suspension in the ADAMS platform. The validity of the kineto-dynamic model is also demonstrated through comparisons of its vibration transmission response with the experimental data. The model is used to identify optimal air spring coordinates to attain nearly constant natural frequency of the suspension, irrespective of the seated body mass and seated height. A methodology is further proposed to identify optimal damping requirements for vehicle-specific suspension designs to achieve minimal seat effective amplitude transmissibility (SEAT) and vibration dose value (VDV) considering vibration spectra of different classes of earthmoving vehicles. The shock and vibration isolation performance potentials of the optimal designs are evaluated under selected vehicle vibration superimposed with shock motions. Results show that the vehicle-specific optimal designs could provide substantial reductions in the SEAT and VDV values for the vehicle classes considered.

  18. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 4; Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giuletta S. (Editor); McClain, Charles R. (Editor); Pegau, Scott; Zaneveld, J. Ronald V.; Mitchell, B. Gregg; Kahru, Mati; Wieland, John; Stramska, Malgorzat

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  19. The Tobacco Pack Surveillance System: A Protocol for Assessing Health Warning Compliance, Design Features, and Appeals of Tobacco Packs Sold in Low- and Middle-Income Countries.

    PubMed

    Smith, Katherine; Washington, Carmen; Brown, Jennifer; Vadnais, Alison; Kroart, Laura; Ferguson, Jacqueline; Cohen, Joanna

    2015-01-01

    Tobacco remains the world's leading preventable cause of death, with the majority of tobacco-caused deaths occurring in low- and middle-income countries. The first global health treaty, the Framework Convention on Tobacco Control (FCTC), outlines a set of policy initiatives that have been demonstrated as effective in reducing tobacco use. Article 11 of the FCTC focuses on using the tobacco package to communicate tobacco-caused harms; it also seeks to restrict the delivery of misleading information about the product on the pack. The objective of this study was to establish a surveillance system for tobacco packs in the 14 low- and middle-income countries with the greatest number of smokers. The Tobacco Pack Surveillance System (TPackSS) monitors whether required health warnings on tobacco packages are being implemented as intended, and identifies pack designs and appeals that might violate or detract from the communication of harm-related information and undermine the impact of a country's tobacco packaging laws. The protocol outlined is intended to be applicable or adaptable for surveillance efforts in other countries. Tobacco packs were collected in 14 countries during 2013. The intention was, to the extent possible, to construct a census of "unique" pack presentations available for purchase in each country. The TPackSS team partnered with in-country field staff to implement a standardized protocol for acquiring packs from 36 diverse neighborhoods across three cities in each country. At the time of purchase, data on price and place of acquisition of each pack was recorded. The field staff, according to a standardized protocol, then photographed packs before they were shipped to the United States for coding and archiving. Each pack was coded for compliance with the country-specific health warning label laws, as well as for key design features of the pack and appeals of the branding elements. The coding protocols were developed based upon prior research, expert

  20. The Tobacco Pack Surveillance System: A Protocol for Assessing Health Warning Compliance, Design Features, and Appeals of Tobacco Packs Sold in Low- and Middle-Income Countries

    PubMed Central

    Washington, Carmen; Brown, Jennifer; Vadnais, Alison; Kroart, Laura; Ferguson, Jacqueline; Cohen, Joanna

    2015-01-01

    Background Tobacco remains the world’s leading preventable cause of death, with the majority of tobacco-caused deaths occurring in low- and middle-income countries. The first global health treaty, the Framework Convention on Tobacco Control (FCTC), outlines a set of policy initiatives that have been demonstrated as effective in reducing tobacco use. Article 11 of the FCTC focuses on using the tobacco package to communicate tobacco-caused harms; it also seeks to restrict the delivery of misleading information about the product on the pack. Objective The objective of this study was to establish a surveillance system for tobacco packs in the 14 low- and middle-income countries with the greatest number of smokers. The Tobacco Pack Surveillance System (TPackSS) monitors whether required health warnings on tobacco packages are being implemented as intended, and identifies pack designs and appeals that might violate or detract from the communication of harm-related information and undermine the impact of a country’s tobacco packaging laws. The protocol outlined is intended to be applicable or adaptable for surveillance efforts in other countries. Methods Tobacco packs were collected in 14 countries during 2013. The intention was, to the extent possible, to construct a census of “unique” pack presentations available for purchase in each country. The TPackSS team partnered with in-country field staff to implement a standardized protocol for acquiring packs from 36 diverse neighborhoods across three cities in each country. At the time of purchase, data on price and place of acquisition of each pack was recorded. The field staff, according to a standardized protocol, then photographed packs before they were shipped to the United States for coding and archiving. Results Each pack was coded for compliance with the country-specific health warning label laws, as well as for key design features of the pack and appeals of the branding elements. The coding protocols were

  1. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    NASA Technical Reports Server (NTRS)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  2. Treatment outcomes after implementation of an adapted WHO protocol for severe sepsis and septic shock in Haiti.

    PubMed

    Papali, Alfred; Eoin West, T; Verceles, Avelino C; Augustin, Marc E; Nathalie Colas, L; Jean-Francois, Carl H; Patel, Devang M; Todd, Nevins W; McCurdy, Michael T

    2017-10-01

    The World Health Organization (WHO) has developed a simplified algorithm specific to resource-limited settings for the treatment of severe sepsis emphasizing early fluids and antibiotics. However, this protocol's clinical effectiveness is unknown. We describe patient outcomes before and after implementation of an adapted WHO severe sepsis protocol at a community hospital in Haiti. Using a before-and-after study design, we retrospectively enrolled 99 adult Emergency Department patients with severe sepsis from January through March 2012. After protocol implementation in January 2014, we compared outcomes to 67 patients with severe sepsis retrospectively enrolled from February to April 2014. We defined sepsis according to the WHO's Integrated Management of Adult Illness guidelines and severe sepsis as sepsis plus organ dysfunction. After protocol implementation, quantity of fluid administered increased and the physician's differential diagnoses more often included sepsis. Patients were more likely to have follow-up vital signs taken sooner, a radiograph performed, and a lactic acid tested. There were no improvements in mortality, time to fluids or antimicrobials. Use of a simplified sepsis protocol based primarily on physiologic parameters allows for substantial improvements in process measures in the care of severely septic patients in a resource-constrained setting. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Etoricoxib - preemptive and postoperative analgesia (EPPA) in patients with laparotomy or thoracotomy - design and protocols

    PubMed Central

    2010-01-01

    Background and Objective Our objective was to report on the design and essentials of the Etoricoxib protocol- Preemptive and Postoperative Analgesia (EPPA) Trial, investigating whether preemptive analgesia with cox-2 inhibitors is more efficacious than placebo in patients who receive either laparotomy or thoracotomy. Design and Methods The study is a 2 × 2 factorial armed, double blinded, bicentric, randomised placebo-controlled trial comparing (a) etoricoxib and (b) placebo in a pre- and postoperative setting. The total observation period is 6 months. According to a power analysis, 120 patients scheduled for abdominal or thoracic surgery will randomly be allocated to either the preemptive or the postoperative treatment group. These two groups are each divided into two arms. Preemptive group patients receive etoricoxib prior to surgery and either etoricoxib again or placebo postoperatively. Postoperative group patients receive placebo prior to surgery and either placebo again or etoricoxib after surgery (2 × 2 factorial study design). The Main Outcome Measure is the cumulative use of morphine within the first 48 hours after surgery (measured by patient controlled analgesia PCA). Secondary outcome parameters include a broad range of tests including sensoric perception and genetic polymorphisms. Discussion The results of this study will provide information on the analgesic effectiveness of etoricoxib in preemptive analgesia and will give hints on possible preventive effects of persistent pain. Trial registration NCT00716833 PMID:20504378

  4. Software Design for Real-Time Systems on Parallel Computers: Formal Specifications.

    DTIC Science & Technology

    1996-04-01

    This research investigated the important issues related to the analysis and design of real - time systems targeted to parallel architectures. In...particular, the software specification models for real - time systems on parallel architectures were evaluated. A survey of current formal methods for...uniprocessor real - time systems specifications was conducted to determine their extensibility in specifying real - time systems on parallel architectures. In

  5. Fixation and Commitment while Designing and Its Measurement

    ERIC Educational Resources Information Center

    Gero, John S.

    2011-01-01

    This paper introduces the notion that fixation and commitment while designing can be measured by studying the protocol of the design session. It is hypothesized that the dynamic entropy of the linkograph of the protocol provides the basis for such a measurement. The hypothesis is empirically tested using a design protocol and the results…

  6. Target-cancer-cell-specific activatable fluorescence imaging probes: rational design and in vivo applications.

    PubMed

    Kobayashi, Hisataka; Choyke, Peter L

    2011-02-15

    Conventional imaging methods, such as angiography, computed tomography (CT), magnetic resonance imaging (MRI), and radionuclide imaging, rely on contrast agents (iodine, gadolinium, and radioisotopes, for example) that are "always on." Although these indicators have proven clinically useful, their sensitivity is lacking because of inadequate target-to-background signal ratio. A unique aspect of optical imaging is that fluorescence probes can be designed to be activatable, that is, only "turned on" under certain conditions. These probes are engineered to emit signal only after binding a target tissue; this design greatly increases sensitivity and specificity in the detection of disease. Current research focuses on two basic types of activatable fluorescence probes. The first developed were conventional enzymatically activatable probes. These fluorescent molecules exist in the quenched state until activated by enzymatic cleavage, which occurs mostly outside of the cells. However, more recently, researchers have begun designing target-cell-specific activatable probes. These fluorophores exist in the quenched state until activated within targeted cells by endolysosomal processing, which results when the probe binds specific receptors on the cell surface and is subsequently internalized. In this Account, we present a review of the rational design and in vivo applications of target-cell-specific activatable probes. In engineering these probes, researchers have asserted control over a variety of factors, including photochemistry, pharmacological profile, and biological properties. Their progress has recently allowed the rational design and synthesis of target-cell-specific activatable fluorescence imaging probes, which can be conjugated to a wide variety of targeting molecules. Several different photochemical mechanisms have been utilized, each of which offers a unique capability for probe design. These include self-quenching, homo- and hetero-fluorescence resonance

  7. Structure based re-design of the binding specificity of anti-apoptotic Bcl-xL

    PubMed Central

    Chen, T. Scott; Palacios, Hector; Keating, Amy E.

    2012-01-01

    Many native proteins are multi-specific and interact with numerous partners, which can confound analysis of their functions. Protein design provides a potential route to generating synthetic variants of native proteins with more selective binding profiles. Re-designed proteins could be used as research tools, diagnostics or therapeutics. In this work, we used a library screening approach to re-engineer the multi-specific anti-apoptotic protein Bcl-xL to remove its interactions with many of its binding partners, making it a high affinity and selective binder of the BH3 region of pro-apoptotic protein Bad. To overcome the enormity of the potential Bcl-xL sequence space, we developed and applied a computational/experimental framework that used protein structure information to generate focused combinatorial libraries. Sequence features were identified using structure-based modeling, and an optimization algorithm based on integer programming was used to select degenerate codons that maximally covered these features. A constraint on library size was used to ensure thorough sampling. Using yeast surface display to screen a designed library of Bcl-xL variants, we successfully identified a protein with ~1,000-fold improvement in binding specificity for the BH3 region of Bad over the BH3 region of Bim. Although negative design was targeted only against the BH3 region of Bim, the best re-designed protein was globally specific against binding to 10 other peptides corresponding to native BH3 motifs. Our design framework demonstrates an efficient route to highly specific protein binders and may readily be adapted for application to other design problems. PMID:23154169

  8. Chapter 2: Commercial and Industrial Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Gowans, Dakers; Telarico, Chad

    The Commercial and Industrial Lighting Evaluation Protocol (the protocol) describes methods to account for gross energy savings resulting from the programmatic installation of efficient lighting equipment in large populations of commercial, industrial, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. A separate Uniform Methods Project (UMP) protocol, Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol, addresses methods for evaluating savings resulting from lighting control measures such as adding time clocks, tuning energy management system commands, and adding occupancy sensors.

  9. Evaluation of two clinical protocols for the management of women with vaginal discharge in southern Thailand

    PubMed Central

    Chandeying, V.; Skov, S.; Kemapunmanus, M.; Law, M.; Geater, A.; Rowe, P.

    1998-01-01

    OBJECTIVES: (1) To compare the effectiveness of two clinical protocols for the management of vaginal discharge in the situations where no laboratory facilities are available but speculum examination is possible and where basic laboratory facilities are available. (2) To determine clinical and simple laboratory indicators for diagnosis of patients with vaginal discharge in the local setting. DESIGN: Alternate allocation of subjects to one of two management protocols. SUBJECTS: Women presenting to university gynaecology outpatients department with a complaint of vaginal discharge. METHODS: Subjects were alternately allocated management according to one of two protocols: one without (group A) and one with (group B) immediate access to results of basic laboratory tests. Full clinical assessment including speculum examination and microbiological assessment for infection with gonorrhoea, chlamydia, candida, trichomonas, and bacterial vaginosis was performed on all women. Follow up assessment of clinical and microbiological response was performed 1-2 weeks later. RESULTS: At initial assessment, both groups were similar in all respects except that more group B women had inflammation of the vulva. The prevalences of various conditions were: candidiasis 22%, bacterial vaginosis 38%, trichomoniasis 4%, chlamydia 4%, gonorrhoea 0.4%. There was no association between any demographic characteristic and diagnosis of cause of the discharge. Both protocols resulted in clinically and statistically significant improvements for women with candidiasis, bacterial vaginosis, and trichomoniasis. There were no clinically important differences in outcomes between the two protocols. The sensitivities and specificities of various indicators were: curd-like vaginal discharge for candidiasis, 72% and 100%; homogeneous vaginal discharge for bacterial vaginosis or trichomoniasis, 94% and 88%; absent or scanty lactobacilli for bacterial vaginosis, 99% and 68%; > 20% clue cells for bacterial

  10. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  11. Validation of Autoclave Protocols for Successful Decontamination of Category A Medical Waste Generated from Care of Patients with Serious Communicable Diseases

    PubMed Central

    Reimers, Mallory; Ernst, Neysa; Bova, Gregory; Nowakowski, Elaine; Bukowski, James; Ellis, Brandon C.; Smith, Chris; Sauer, Lauren; Dionne, Kim; Carroll, Karen C.; Maragakis, Lisa L.; Parrish, Nicole M.

    2016-01-01

    ABSTRACT In response to the Ebola outbreak in 2014, many hospitals designated specific areas to care for patients with Ebola and other highly infectious diseases. The safe handling of category A infectious substances is a unique challenge in this environment. One solution is on-site waste treatment with a steam sterilizer or autoclave. The Johns Hopkins Hospital (JHH) installed two pass-through autoclaves in its biocontainment unit (BCU). The JHH BCU and The Johns Hopkins biosafety level 3 (BSL-3) clinical microbiology laboratory designed and validated waste-handling protocols with simulated patient trash to ensure adequate sterilization. The results of the validation process revealed that autoclave factory default settings are potentially ineffective for certain types of medical waste and highlighted the critical role of waste packaging in successful sterilization. The lessons learned from the JHH validation process can inform the design of waste management protocols to ensure effective treatment of highly infectious medical waste. PMID:27927920

  12. Validation of Autoclave Protocols for Successful Decontamination of Category A Medical Waste Generated from Care of Patients with Serious Communicable Diseases.

    PubMed

    Garibaldi, Brian T; Reimers, Mallory; Ernst, Neysa; Bova, Gregory; Nowakowski, Elaine; Bukowski, James; Ellis, Brandon C; Smith, Chris; Sauer, Lauren; Dionne, Kim; Carroll, Karen C; Maragakis, Lisa L; Parrish, Nicole M

    2017-02-01

    In response to the Ebola outbreak in 2014, many hospitals designated specific areas to care for patients with Ebola and other highly infectious diseases. The safe handling of category A infectious substances is a unique challenge in this environment. One solution is on-site waste treatment with a steam sterilizer or autoclave. The Johns Hopkins Hospital (JHH) installed two pass-through autoclaves in its biocontainment unit (BCU). The JHH BCU and The Johns Hopkins biosafety level 3 (BSL-3) clinical microbiology laboratory designed and validated waste-handling protocols with simulated patient trash to ensure adequate sterilization. The results of the validation process revealed that autoclave factory default settings are potentially ineffective for certain types of medical waste and highlighted the critical role of waste packaging in successful sterilization. The lessons learned from the JHH validation process can inform the design of waste management protocols to ensure effective treatment of highly infectious medical waste. Copyright © 2017 American Society for Microbiology.

  13. Design for Additive Bio-Manufacturing: From Patient-Specific Medical Devices to Rationally Designed Meta-Biomaterials.

    PubMed

    Zadpoor, Amir A

    2017-07-25

    Recent advances in additive manufacturing (AM) techniques in terms of accuracy, reliability, the range of processable materials, and commercial availability have made them promising candidates for production of functional parts including those used in the biomedical industry. The complexity-for-free feature offered by AM means that very complex designs become feasible to manufacture, while batch-size-indifference enables fabrication of fully patient-specific medical devices. Design for AM (DfAM) approaches aim to fully utilize those features for development of medical devices with substantially enhanced performance and biomaterials with unprecedented combinations of favorable properties that originate from complex geometrical designs at the micro-scale. This paper reviews the most important approaches in DfAM particularly those applicable to additive bio-manufacturing including image-based design pipelines, parametric and non-parametric designs, metamaterials, rational and computationally enabled design, topology optimization, and bio-inspired design. Areas with limited research have been identified and suggestions have been made for future research. The paper concludes with a brief discussion on the practical aspects of DfAM and the potential of combining AM with subtractive and formative manufacturing processes in so-called hybrid manufacturing processes.

  14. Design for Additive Bio-Manufacturing: From Patient-Specific Medical Devices to Rationally Designed Meta-Biomaterials

    PubMed Central

    Zadpoor, Amir A.

    2017-01-01

    Recent advances in additive manufacturing (AM) techniques in terms of accuracy, reliability, the range of processable materials, and commercial availability have made them promising candidates for production of functional parts including those used in the biomedical industry. The complexity-for-free feature offered by AM means that very complex designs become feasible to manufacture, while batch-size-indifference enables fabrication of fully patient-specific medical devices. Design for AM (DfAM) approaches aim to fully utilize those features for development of medical devices with substantially enhanced performance and biomaterials with unprecedented combinations of favorable properties that originate from complex geometrical designs at the micro-scale. This paper reviews the most important approaches in DfAM particularly those applicable to additive bio-manufacturing including image-based design pipelines, parametric and non-parametric designs, metamaterials, rational and computationally enabled design, topology optimization, and bio-inspired design. Areas with limited research have been identified and suggestions have been made for future research. The paper concludes with a brief discussion on the practical aspects of DfAM and the potential of combining AM with subtractive and formative manufacturing processes in so-called hybrid manufacturing processes. PMID:28757572

  15. j5 DNA assembly design automation.

    PubMed

    Hillson, Nathan J

    2014-01-01

    Modern standardized methodologies, described in detail in the previous chapters of this book, have enabled the software-automated design of optimized DNA construction protocols. This chapter describes how to design (combinatorial) scar-less DNA assembly protocols using the web-based software j5. j5 assists biomedical and biotechnological researchers construct DNA by automating the design of optimized protocols for flanking homology sequence as well as type IIS endonuclease-mediated DNA assembly methodologies. Unlike any other software tool available today, j5 designs scar-less combinatorial DNA assembly protocols, performs a cost-benefit analysis to identify which portions of an assembly process would be less expensive to outsource to a DNA synthesis service provider, and designs hierarchical DNA assembly strategies to mitigate anticipated poor assembly junction sequence performance. Software integrated with j5 add significant value to the j5 design process through graphical user-interface enhancement and downstream liquid-handling robotic laboratory automation.

  16. Considerations for the design and execution of protocols for animal research and treatment to improve reproducibility and standardization: "DEPART well-prepared and ARRIVE safely".

    PubMed

    Smith, M M; Clarke, E C; Little, C B

    2017-03-01

    To review the factors in experimental design that contribute to poor translation of pre-clinical research to therapies for patients with osteoarthritis (OA) and how this might be improved. Narrative review of the literature, and evaluation of the different stages of design conduct and analysis of studies using animal models of OA to define specific issues that might reduce quality of evidence and how this can be minimised. Preventing bias and improving experimental rigour and reporting are important modifiable factors to improve translation from pre-clinical animal models to successful clinical trials of therapeutic agents. Despite publication and adoption by many journals of guidelines such as Animals in Research: Reporting In Vivo Experiments (ARRIVE), experimental animal studies published in leading rheumatology journals are still deficient in their reporting. In part, this may be caused by researchers first consulting these guidelines after the completion of experiments, at the time of publication. This review discusses factors that can (1) bias the outcome of experimental studies using animal models of osteoarthritis or (2) alter the quality of evidence for translation. We propose a checklist to consult prior to starting experiments; in the Design and Execution of Protocols for Animal Research and Treatment (DEPART). Following DEPART during the design phase will enable completion of the ARRIVE checklist at the time of publication, and thus improve the quality of evidence for inclusion of experimental animal research in meta-analyses and systematic reviews: "DEPART well-prepared and ARRIVE safely". Copyright © 2016 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  17. Assessing Design Activity in Complex CMOS Circuit Design.

    ERIC Educational Resources Information Center

    Biswas, Gautam; And Others

    This report characterizes human problem solving in digital circuit design. Protocols of 11 different designers with varying degrees of training were analyzed by identifying the designers' problem solving strategies and discussing activity patterns that differentiate the designers. These methods are proposed as a tentative basis for assessing…

  18. Research Protocol: Collections Related to Synthetic Turf ...

    EPA Pesticide Factsheets

    The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su

  19. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  20. Performance analysis of simultaneous dense coding protocol under decoherence

    NASA Astrophysics Data System (ADS)

    Huang, Zhiming; Zhang, Cai; Situ, Haozhen

    2017-09-01

    The simultaneous dense coding (SDC) protocol is useful in designing quantum protocols. We analyze the performance of the SDC protocol under the influence of noisy quantum channels. Six kinds of paradigmatic Markovian noise along with one kind of non-Markovian noise are considered. The joint success probability of both receivers and the success probabilities of one receiver are calculated for three different locking operators. Some interesting properties have been found, such as invariance and symmetry. Among the three locking operators we consider, the SWAP gate is most resistant to noise and results in the same success probabilities for both receivers.

  1. The Johnson Space Center Management Information Systems (JSCMIS). 1: Requirements Definition and Design Specifications for Versions 2.1 and 2.1.1. 2: Documented Test Scenario Environments. 3: Security Design and Specifications

    NASA Technical Reports Server (NTRS)

    1986-01-01

    The Johnson Space Center Management Information System (JSCMIS) is an interface to computer data bases at NASA Johnson which allows an authorized user to browse and retrieve information from a variety of sources with minimum effort. This issue gives requirements definition and design specifications for versions 2.1 and 2.1.1, along with documented test scenario environments, and security object design and specifications.

  2. EON: a component-based approach to automation of protocol-directed therapy.

    PubMed Central

    Musen, M A; Tu, S W; Das, A K; Shahar, Y

    1996-01-01

    Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854

  3. Evaluation of Aspergillus PCR Protocols for Testing Serum Specimens▿†

    PubMed Central

    White, P. Lewis; Mengoli, Carlo; Bretagne, Stéphane; Cuenca-Estrella, Manuel; Finnstrom, Niklas; Klingspor, Lena; Melchers, Willem J. G.; McCulloch, Elaine; Barnes, Rosemary A.; Donnelly, J. Peter; Loeffler, Juergen

    2011-01-01

    A panel of human serum samples spiked with various amounts of Aspergillus fumigatus genomic DNA was distributed to 23 centers within the European Aspergillus PCR Initiative to determine analytical performance of PCR. Information regarding specific methodological components and PCR performance was requested. The information provided was made anonymous, and meta-regression analysis was performed to determine any procedural factors that significantly altered PCR performance. Ninety-seven percent of protocols were able to detect a threshold of 10 genomes/ml on at least one occasion, with 83% of protocols reproducibly detecting this concentration. Sensitivity and specificity were 86.1% and 93.6%, respectively. Positive associations between sensitivity and the use of larger sample volumes, an internal control PCR, and PCR targeting the internal transcribed spacer (ITS) region were shown. Negative associations between sensitivity and the use of larger elution volumes (≥100 μl) and PCR targeting the mitochondrial genes were demonstrated. Most Aspergillus PCR protocols used to test serum generate satisfactory analytical performance. Testing serum requires less standardization, and the specific recommendations shown in this article will only improve performance. PMID:21940479

  4. Quantum Dot Solar Cell Fabrication Protocols

    DOE PAGES

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.; ...

    2016-09-26

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. Here we include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solarmore » cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.« less

  5. Quantum Dot Solar Cell Fabrication Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. Here we include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solarmore » cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.« less

  6. High specific energy, high capacity nickel-hydrogen cell design

    NASA Technical Reports Server (NTRS)

    Wheeler, James R.

    1993-01-01

    A 3.5 inch rabbit-ear-terminal nickel-hydrogen cell was designed and tested to deliver high capacity at steady discharge rates up to and including a C rate. Its specific energy yield of 60.6 wh/kg is believed to be the highest yet achieved in a slurry-process nickel-hydrogen cell, and its 10 C capacity of 113.9 AH the highest capacity yet of any type in a 3.5 inch diameter size. The cell also demonstrated a pulse capability of 180 amps for 20 seconds. Specific cell parameters and performance are described. Also covered is an episode of capacity fading due to electrode swelling and its successful recovery by means of additional activation procedures.

  7. Evaluation of Interoperability Protocols in Repositories of Electronic Theses and Dissertations

    ERIC Educational Resources Information Center

    Hakimjavadi, Hesamedin; Masrek, Mohamad Noorman

    2013-01-01

    Purpose: The purpose of this study is to evaluate the status of eight interoperability protocols within repositories of electronic theses and dissertations (ETDs) as an introduction to further studies on feasibility of deploying these protocols in upcoming areas of interoperability. Design/methodology/approach: Three surveys of 266 ETD…

  8. A standard protocol for describing individual-based and agent-based models

    USGS Publications Warehouse

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  9. Development of a computationally-designed polymeric adsorbent specific for mycotoxin patulin.

    PubMed

    Piletska, Elena V; Pink, Demi; Karim, Kal; Piletsky, Sergey A

    2017-12-04

    Patulin is a toxic compound which is found predominantly in apples affected by mould rot. Since apples and apple-containing products are a popular food for the elderly, children and babies, the monitoring of the toxin is crucial. This paper describes a development of a computationally-designed polymeric adsorbent for the solid-phase extraction of patulin, which provides an effective clean-up of the food samples and allows the detection and accurate quantification of patulin levels present in apple juice using conventional chromatography methods. The developed bespoke polymer demonstrates a quantitative binding towards the patulin present in undiluted apple juice. The polymer is inexpensive and easy to mass-produce. The contributing factors to the function of the adsorbent is a combination of acidic and basic functional monomers producing a zwitterionic complex in the solution that formed stronger binding complexes with the patulin molecule. The protocols described in this paper provide a blueprint for the development of polymeric adsorbents for other toxins or different food matrices.

  10. Mechanical Stimulation Protocols of Human Derived Cells in Articular Cartilage Tissue Engineering - A Systematic Review.

    PubMed

    Khozoee, Baktash; Mafi, Pouya; Mafi, Reza; Khan, Wasim S

    2017-01-01

    Mechanical stimulation is a key factor in articular cartilage generation and maintenance. Bioreactor systems have been designed and built in order to deliver specific types of mechanical stimulation. The focus has been twofold, applying a type of preconditioning in order to stimulate cell differentiation, and to simulate in vivo conditions in order to gain further insight into how cells respond to different stimulatory patterns. Due to the complex forces at work within joints, it is difficult to simulate mechanical conditions using a bioreactor. The aim of this review is to gain a deeper understanding of the complexities of mechanical stimulation protocols by comparing those employed in bioreactors in the context of tissue engineering for articular cartilage, and to consider their effects on cultured cells. Allied and Complementary Medicine 1985 to 2016, Ovid MEDLINE[R] 1946 to 2016, and Embase 1974 to 2016 were searched using key terms. Results were subject to inclusion and exclusion criteria, key findings summarised into a table and subsequently discussed. Based on this review it is overwhelmingly clear that mechanical stimulation leads to increased chondrogenic properties in the context of bioreactor articular cartilage tissue engineering using human cells. However, given the variability and lack of controlled factors between research articles, results are difficult to compare, and a standardised method of evaluating stimulation protocols proved challenging. With improved standardisation in mechanical stimulation protocol reporting, bioreactor design and building processes, along with a better understanding of joint behaviours, we hope to perform a meta-analysis on stimulation protocols and methods. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  11. Primer-BLAST: A tool to design target-specific primers for polymerase chain reaction

    PubMed Central

    2012-01-01

    Background Choosing appropriate primers is probably the single most important factor affecting the polymerase chain reaction (PCR). Specific amplification of the intended target requires that primers do not have matches to other targets in certain orientations and within certain distances that allow undesired amplification. The process of designing specific primers typically involves two stages. First, the primers flanking regions of interest are generated either manually or using software tools; then they are searched against an appropriate nucleotide sequence database using tools such as BLAST to examine the potential targets. However, the latter is not an easy process as one needs to examine many details between primers and targets, such as the number and the positions of matched bases, the primer orientations and distance between forward and reverse primers. The complexity of such analysis usually makes this a time-consuming and very difficult task for users, especially when the primers have a large number of hits. Furthermore, although the BLAST program has been widely used for primer target detection, it is in fact not an ideal tool for this purpose as BLAST is a local alignment algorithm and does not necessarily return complete match information over the entire primer range. Results We present a new software tool called Primer-BLAST to alleviate the difficulty in designing target-specific primers. This tool combines BLAST with a global alignment algorithm to ensure a full primer-target alignment and is sensitive enough to detect targets that have a significant number of mismatches to primers. Primer-BLAST allows users to design new target-specific primers in one step as well as to check the specificity of pre-existing primers. Primer-BLAST also supports placing primers based on exon/intron locations and excluding single nucleotide polymorphism (SNP) sites in primers. Conclusions We describe a robust and fully implemented general purpose primer design tool

  12. Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

    NASA Astrophysics Data System (ADS)

    Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping

    2018-02-01

    Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.

  13. Molecular Design of Antifouling Polymer Brushes Using Sequence-Specific Peptoids.

    PubMed

    Lau, King Hang Aaron; Sileika, Tadas S; Park, Sung Hyun; Sousa, Ana Maria Leal; Burch, Patrick; Szleifer, Igal; Messersmith, Phillip B

    2015-01-07

    Material systems that can be used to flexibly and precisely define the chemical nature and molecular arrangement of a surface would be invaluable for the control of complex biointerfacial interactions. For example, progress in antifouling polymer biointerfaces that prevent non-specific protein adsorption and cell attachment, which can significantly improve the performance of an array of biomedical and industrial applications, is hampered by a lack of chemical models to identify the molecular features conferring their properties. Poly(N-substituted glycine) "peptoids" are peptidomimetic polymers that can be conveniently synthesized with specific monomer sequences and chain lengths, and are presented as a versatile platform for investigating the molecular design of antifouling polymer brushes. Zwitterionic antifouling polymer brushes have captured significant recent attention, and a targeted library of zwitterionic peptoid brushes with a different charge densities, hydration, separations between charged groups, chain lengths, and grafted chain densities, is quantitatively evaluated for their antifouling properties through a range of protein adsorption and cell attachment assays. Specific zwitterionic brush designs were found to give rise to distinct but subtle differences in properties. The results also point to the dominant roles of the grafted chain density and chain length in determining the performance of antifouling polymer brushes.

  14. A communication protocol for mobile satellite systems affected by rain attenuation

    NASA Technical Reports Server (NTRS)

    Lay, Norman; Dessouky, Khaled

    1992-01-01

    A communication protocol is described that has been developed as part of a K/Ka-band mobile terminal breadboard system to be demonstrated through NASA's Advanced Communications Technology Satellite (ACTS) in 1993. The protocol is aimed at providing the means for enhancing link availability and continuity by supporting real-time data rate selection and changes during rain events. Particular attention is given to the system architecture; types of links, connections, and packets; the protocol procedures; and design rationales.

  15. Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mayhorn, Ebony T.; Sullivan, Greg P.; Petersen, Joseph M.

    2015-09-29

    This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.

  16. Services, architectures, and protocols for space data systems

    NASA Technical Reports Server (NTRS)

    Helgert, Hermann J.

    1991-01-01

    The author presents a comprehensive discussion of three major aspects of the work of the Consultative Committee for Space Data Systems (CCSDS), a worldwide cooperative effort of national space agencies. The author examines the CCSDS space data communications network concept on which the data communications facilities of future advanced orbiting systems will be based. He derives the specifications of an open communications architecture as a reference model for the development of services and protocols that support the transfer of information over space data communications networks. Detailed specifications of the communication services and information transfer protocols that have reached a high degree of maturity and stability are offered. The author also includes a complete list of currently available CCSDS standards and supporting documentation.

  17. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    PubMed Central

    2009-01-01

    Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS) for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development), a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH) protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community. PMID:19941647

  18. Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation) (Preliminary Assessment Materials)

    EPA Science Inventory

    In January 2018, EPA released the Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation). As part of developing a draft IRIS assessment, EPA presents a methods document, referred to as the protocol, for conducting a chemical-specific systematic revie...

  19. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  20. Investigating an Open Methodology for Designing Domain-Specific Language Collections

    ERIC Educational Resources Information Center

    Fitzgerald, Alannah; Wu, Shaoqun; Barge, Martin

    2014-01-01

    With this research and design paper, we are proposing that Open Educational Resources (OERs) and Open Access (OA) publications give increasing access to high quality online educational and research content for the development of powerful domain-specific language collections that can be further enhanced linguistically with the Flexible Language…

  1. Just-in-time Design and Additive Manufacture of Patient-specific Medical Implants

    NASA Astrophysics Data System (ADS)

    Shidid, Darpan; Leary, Martin; Choong, Peter; Brandt, Milan

    Recent advances in medical imaging and manufacturing science have enabled the design and production of complex, patient-specific orthopaedic implants. Additive Manufacture (AM) generates three-dimensional structures layer by layer, and is not subject to the constraints associated with traditional manufacturing methods. AM provides significant opportunities for the design of novel geometries and complex lattice structures with enhanced functional performance. However, the design and manufacture of patient-specific AM implant structures requires unique expertise in handling various optimization platforms. Furthermore, the design process for complex structures is computationally intensive. The primary aim of this research is to enable the just-in-time customisation of AM prosthesis; whereby AM implant design and manufacture be completed within the time constraints of a single surgical procedure, while minimising prosthesis mass and optimising the lattice structure to match the stiffness of the surrounding bone tissue. In this research, a design approach using raw CT scan data is applied to the AM manufacture of femoral prosthesis. Using the proposed just-in-time concept, the mass of the prosthesis was rapidly designed and manufactured while satisfying the associated structural requirements. Compressive testing of lattice structures manufactured using proposed method shows that the load carrying capacity of the resected composite bone can be recovered by up to 85% and the compressive stiffness of the AM prosthesis is statistically indistinguishable from the stiffness of the initial bone.

  2. 40 CFR 53.51 - Demonstration of compliance with design specifications and manufacturing and test requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... compliance with design specifications and manufacturing and test requirements. (a) Overview. (1) Paragraphs... 40 Protection of Environment 5 2010-07-01 2010-07-01 false Demonstration of compliance with design specifications and manufacturing and test requirements. 53.51 Section 53.51 Protection of Environment...

  3. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  4. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  5. Bell nonlocality: a resource for device-independent quantum information protocols

    NASA Astrophysics Data System (ADS)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  6. Distance bounded energy detecting ultra-wideband impulse radio secure protocol.

    PubMed

    Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J

    2014-01-01

    We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.

  7. An implementation of the SNR high speed network communication protocol (Receiver part)

    NASA Astrophysics Data System (ADS)

    Wan, Wen-Jyh

    1995-03-01

    This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.

  8. A contribution to the design specification of single-cell multi-resonant converters

    NASA Astrophysics Data System (ADS)

    Franck, F.; Schroeder, D.

    The state plane technique is used to develop a design-specification procedure that enables the designer to directly calculate the stresses on all elements of the different topologies for quasi-resonant converters. If parasitic elements are considered, multiresonant topologies are obtained. These topologies can be calculated for the design specification if the procedure for quasi-resonant topologies is adapted to this situation. A novel theoretical approach for describing the internal behavior of multiresonant converters and for visualizing the switching conditions and the points of maximum component stresses is proposed. The multiresonant switching technique combines two advantages: the lossless snubbing of both the transistor and the diode is achieved by only three reactive elements, and a controllable no-load operation is possible. This analysis procedure is well suited for calculating dc-dc converter with an output power up to several hundred watts.

  9. The design of maternal centered life-style modification program for weight gain management during pregnancy - a study protocol.

    PubMed

    Farajzadegan, Ziba; Pozveh, Zahra Amini

    2013-08-01

    Abnormal weight gain during pregnancy increases the adverse health outcomes during the pregnancy, delivery, and the postpartum period. Most of the pregnant women develop weight gain more than the recommended limits; therefore, interventions to manage such disproportionate weight gain are needed. In this paper, the design of the maternal centered life-style intervention study is described, which focuses on controlling weight gaining during pregnancy for all body mass index (BMI) groups. In our randomized field trial, 160 pregnant women with 6-10 weeks of gestational age who visit one of the participating Isfahan four urban public-health centers and 4 private obstetric offices are included. The maternal centered life-style intervention carried out by trained midwives is standardized in a protocol. All the participants are visited at 6-10, 11-15, 16-20, 21-25, 26-30, 31-34, 35-37, 38, 39, and 40 weeks of pregnancy. The women who are randomized in the intervention group receive maternal centered educational package of prenatal care for the pregnant woman and a log book in the first visit. Counselors accompany the pregnant women to maintain or develop a healthy life-style. Data collection will perform monthly measuring body weight, BMI. Because, we don't have structured protocol for weight management during pregnancy especially, in private sectors if the maternal centered life-style intervention proves to be effective, it will be suggested to merge this package to routine care. Therewith by empowering women to manage their weight the public-health burden can be reduced. Beside that private obstetricians also have structured protocol for their client management.

  10. Emulation of Industrial Control Field Device Protocols

    DTIC Science & Technology

    2013-03-01

    platforms such as the Arduino ( based on the Atmel AVR architecture) or popular PIC architecture based devices, which are programmed for specific functions...UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base , Ohio DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION...confidence intervals for the mean. Based on these results, extensive knowledge of the specific implementations of the protocols or timing profiles of the

  11. A survey on temperature-aware routing protocols in wireless body sensor networks.

    PubMed

    Oey, Christian Henry Wijaya; Moh, Sangman

    2013-08-02

    The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN) is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node's circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols.

  12. A Survey on Temperature-Aware Routing Protocols in Wireless Body Sensor Networks

    PubMed Central

    Oey, Christian Henry Wijaya; Moh, Sangman

    2013-01-01

    The rapid growth of the elderly population in the world and the rising cost of healthcare impose big issues for healthcare and medical monitoring. A Wireless Body Sensor Network (WBSN) is comprised of small sensor nodes attached inside, on or around a human body, the main purpose of which is to monitor the functions and surroundings of the human body. However, the heat generated by the node's circuitry and antenna could cause damage to the human tissue. Therefore, in designing a routing protocol for WBSNs, it is important to reduce the heat by incorporating temperature into the routing metric. The main contribution of this paper is to survey existing temperature-aware routing protocols that have been proposed for WBSNs. In this paper, we present a brief overview of WBSNs, review the existing routing protocols comparatively and discuss challenging open issues in the design of routing protocols. PMID:23917259

  13. Experiences with the hydraulic design of the high specific speed Francis turbine

    NASA Astrophysics Data System (ADS)

    Obrovsky, J.; Zouhar, J.

    2014-03-01

    The high specific speed Francis turbine is still suitable alternative for refurbishment of older hydro power plants with lower heads and worse cavitation conditions. In the paper the design process of such kind of turbine together with the results comparison of homological model tests performed in hydraulic laboratory of ČKD Blansko Engineering is introduced. The turbine runner was designed using the optimization algorithm and considering the high specific speed hydraulic profile. It means that hydraulic profiles of the spiral case, the distributor and the draft tube were used from a Kaplan turbine. The optimization was done as the automatic cycle and was based on a simplex optimization method as well as on a genetic algorithm. The number of blades is shown as the parameter which changes the resulting specific speed of the turbine between ns=425 to 455 together with the cavitation characteristics. Minimizing of cavitation on the blade surface as well as on the inlet edge of the runner blade was taken into account during the design process. The results of CFD analyses as well as the model tests are mentioned in the paper.

  14. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Keates, Steven

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  15. Methods for CT automatic exposure control protocol translation between scanner platforms.

    PubMed

    McKenney, Sarah E; Seibert, J Anthony; Lamba, Ramit; Boone, John M

    2014-03-01

    An imaging facility with a diverse fleet of CT scanners faces considerable challenges when propagating CT protocols with consistent image quality and patient dose across scanner makes and models. Although some protocol parameters can comfortably remain constant among scanners (eg, tube voltage, gantry rotation time), the automatic exposure control (AEC) parameter, which selects the overall mA level during tube current modulation, is difficult to match among scanners, especially from different CT manufacturers. Objective methods for converting tube current modulation protocols among CT scanners were developed. Three CT scanners were investigated, a GE LightSpeed 16 scanner, a GE VCT scanner, and a Siemens Definition AS+ scanner. Translation of the AEC parameters such as noise index and quality reference mAs across CT scanners was specifically investigated. A variable-diameter poly(methyl methacrylate) phantom was imaged on the 3 scanners using a range of AEC parameters for each scanner. The phantom consisted of 5 cylindrical sections with diameters of 13, 16, 20, 25, and 32 cm. The protocol translation scheme was based on matching either the volumetric CT dose index or image noise (in Hounsfield units) between two different CT scanners. A series of analytic fit functions, corresponding to different patient sizes (phantom diameters), were developed from the measured CT data. These functions relate the AEC metric of the reference scanner, the GE LightSpeed 16 in this case, to the AEC metric of a secondary scanner. When translating protocols between different models of CT scanners (from the GE LightSpeed 16 reference scanner to the GE VCT system), the translation functions were linear. However, a power-law function was necessary to convert the AEC functions of the GE LightSpeed 16 reference scanner to the Siemens Definition AS+ secondary scanner, because of differences in the AEC functionality designed by these two companies. Protocol translation on the basis of

  16. Assessing the Quality, Feasibility, and Efficacy of Electronic Patient Platforms Designed to Support Adolescents and Young Adults With Cancer: A Systematic Review Protocol

    PubMed Central

    McCann, Lisa

    2017-01-01

    Background A range of innovative websites, mobile technologies, eHealth and mHealth platforms have emerged to support adolescents and young adults (AYAs) with cancer. Previous reviews have identified these various applications and solutions, but no review has summarized the quality, feasibility, and efficacy of existing patient platforms (inclusive of websites, mobile technologies, mHealth and eHealth platforms) developed specifically for young people with cancer. Objective This paper describes the design of a protocol to conduct a review of published studies or reports which describe or report on an existing platform designed specifically for AYAs who have had a cancer diagnosis. Methods A search string was developed using a variety of key words and Medical Subject Heading and applied to bibliographic databases. General data (sample characteristics, patient platform development, design and, if applicable, pilot testing outcomes) will be extracted from reports and studies. Drawing on a previously developed coding schematic, the identified patient platforms will be coded for mode of delivery into (1) automated functions, (2) communicative functions, and (3) use of supplementary modes. An adapted version of the Mobile App Rating Scale (MARS) will be used to assess the of quality of each identified patient platform. The methodological quality of included studies will be assessed using the Quality Assessment Criteria for Evaluating Primary Research Papers from a Variety of Fields (QualSyst). Both authors will independently screen eligible studies for final inclusion and will both be responsible for data extraction and appraisal. Data will be synthesized narratively to provide an overview of identified patient platforms. Results The review began in October 2016 and is currently in progress. The review paper will be submitted for peer-review and publication in the summer of 2017. Conclusions This review will be unique in its focus on assessing, where possible, the

  17. Guidelines for randomized clinical trial protocol content: a systematic review.

    PubMed

    Tetzlaff, Jennifer M; Chan, An-Wen; Kitchen, Jessica; Sampson, Margaret; Tricco, Andrea C; Moher, David

    2012-09-24

    All randomized clinical trials (RCTs) require a protocol; however, numerous studies have highlighted protocol deficiencies. Reporting guidelines may improve the content of research reports and, if developed using robust methods, may increase the utility of reports to stakeholders. The objective of this study was to systematically identify and review RCT protocol guidelines, to assess their characteristics and methods of development, and to compare recommendations. We conducted a systematic review of indexed literature (MEDLINE, EMBASE and the Cochrane Methodology Register from inception to September 2010; reference lists; related article features; forward citation searching) and a targeted search of supplementary sources, including a survey of major trial funding agencies in six countries. Records were eligible if they described a content guideline in English or French relevant to RCT protocols. Guidelines were excluded if they specified content for protocols for trials of specific procedures or conditions or were intended to assess trial quality. We extracted guideline characteristics and methods. Content was mapped for a subset of guidelines that described development methods or had institutional endorsement. Forty guidelines published in journals, books and institutional reports were included in the review; seven were specific to RCT protocols. Only eight (20%) described development methods which included informal consensus methods, pilot testing and formal validation; no guideline described all of these methods. No guideline described formal consensus methods or a systematic retrieval of empirical evidence to inform its development. The guidelines included a median of 23 concepts per guideline (interquartile range (IQR) = 14 to 34; range = 7 to 109). Among the subset of guidelines (n = 23) for which content was mapped, approximately 380 concepts were explicitly addressed (median concepts per guideline IQR = 31 (24,80); range = 16 to 150

  18. 2018 EPA Protocol Gas Verification Program Participants

    EPA Pesticide Factsheets

    A list of participants for 2016 EPA's Protocol Gas Verification Program (PGVP) for stationary source monitoring. The list also has vendor IDs, which are production site-specific, and are the same ones used in the PGVP for ambient air monitoring.

  19. Does bone debris in anterior cruciate ligament reconstruction really matter? A cohort study of a protocol for bone debris debridement

    PubMed Central

    Imam, Mohamed A.; Abdelkafy, Ashraf; Dinah, Feroz; Adhikari, Ajeya

    2015-01-01

    Background: The purpose of the current study was to determine whether a systematic five-step protocol for debridement and evacuation of bone debris during anterior cruciate ligament reconstruction (ACLR) reduces the presence of such debris on post-operative radiographs. Methods: A five-step protocol for removal of bone debris during arthroscopic assisted ACLR was designed. It was applied to 60 patients undergoing ACLR (Group 1), and high-quality digital radiographs were taken post-operatively in each case to assess for the presence of intra-articular bone debris. A control group of 60 consecutive patients in whom no specific bone debris protocol was applied (Group 2) and their post-operative radiographs were also checked for the presence of intra-articular bone debris. Results: In Group 1, only 15% of post-operative radiographs showed residual bone debris, compared to 69% in Group 2 (p < 0.001). Conclusion: A five-step systematic protocol for bone debris removal during arthroscopic assisted ACLR resulted in a significant decrease in residual bone debris seen on high-quality post-operative radiographs. PMID:27163060

  20. Evaluation of counterfactuality in counterfactual communication protocols

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.

    2017-12-01

    We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.

  1. Redesigning the specificity of protein-DNA interactions with Rosetta.

    PubMed

    Thyme, Summer; Baker, David

    2014-01-01

    Building protein tools that can selectively bind or cleave specific DNA sequences requires efficient technologies for modifying protein-DNA interactions. Computational design is one method for accomplishing this goal. In this chapter, we present the current state of protein-DNA interface design with the Rosetta macromolecular modeling program. The LAGLIDADG endonuclease family of DNA-cleaving enzymes, under study as potential gene therapy reagents, has been the main testing ground for these in silico protocols. At this time, the computational methods are most useful for designing endonuclease variants that can accommodate small numbers of target site substitutions. Attempts to engineer for more extensive interface changes will likely benefit from an approach that uses the computational design results in conjunction with a high-throughput directed evolution or screening procedure. The family of enzymes presents an engineering challenge because their interfaces are highly integrated and there is significant coordination between the binding and catalysis events. Future developments in the computational algorithms depend on experimental feedback to improve understanding and modeling of these complex enzymatic features. This chapter presents both the basic method of design that has been successfully used to modulate specificity and more advanced procedures that incorporate DNA flexibility and other properties that are likely necessary for reliable modeling of more extensive target site changes.

  2. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  3. A tool for design of primers for microRNA-specific quantitative RT-qPCR.

    PubMed

    Busk, Peter K

    2014-01-28

    MicroRNAs are small but biologically important RNA molecules. Although different methods can be used for quantification of microRNAs, quantitative PCR is regarded as the reference that is used to validate other methods. Several commercial qPCR assays are available but they often come at a high price and the sequences of the primers are not disclosed. An alternative to commercial assays is to manually design primers but this work is tedious and, hence, not practical for the design of primers for a larger number of targets. I have developed the software miRprimer for automatic design of primers for the method miR-specific RT-qPCR, which is one of the best performing microRNA qPCR methods available. The algorithm is based on an implementation of the previously published rules for manual design of miR-specific primers with the additional feature of evaluating the propensity of formation of secondary structures and primer dimers. Testing of the primers showed that 76 out of 79 primers (96%) worked for quantification of microRNAs by miR-specific RT-qPCR of mammalian RNA samples. This success rate corresponds to the success rate of manual primer design. Furthermore, primers designed by this method have been distributed to several labs and used successfully in published studies. The software miRprimer is an automatic and easy method for design of functional primers for miR-specific RT-qPCR. The application is available as stand-alone software that will work on the MS Windows platform and in a developer version written in the Ruby programming language.

  4. Toward fidelity between specification and implementation

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Morrison, Jeff; Wu, Yunqing

    1994-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  5. Advanced Wet Tantalum Capacitors: Design, Specifications and Performance

    NASA Technical Reports Server (NTRS)

    Teverovsky, Alexander

    2016-01-01

    Insertion of new types of commercial, high volumetric efficiency wet tantalum capacitors in space systems requires reassessment of the existing quality assurance approaches that have been developed for capacitors manufactured to MIL-PRF-39006 requirements. The specifics of wet electrolytic capacitors is that leakage currents flowing through electrolyte can cause gas generation resulting in building up of internal gas pressure and rupture of the case. The risk associated with excessive leakage currents and increased pressure is greater for high value advanced wet tantalum capacitors, but it has not been properly evaluated yet. This presentation gives a review of specifics of the design, performance, and potential reliability risks associated with advanced wet tantalum capacitors. Problems related to setting adequate requirements for DPA, leakage currents, hermeticity, stability at low and high temperatures, ripple currents for parts operating in vacuum, and random vibration testing are discussed. Recommendations for screening and qualification to reduce risks of failures have been suggested.

  6. Advanced Wet Tantalum Capacitors: Design, Specifications and Performance

    NASA Technical Reports Server (NTRS)

    Teverovsky, Alexander

    2017-01-01

    Insertion of new types of commercial, high volumetric efficiency wet tantalum capacitors in space systems requires reassessment of the existing quality assurance approaches that have been developed for capacitors manufactured to MIL-PRF-39006 requirements. The specifics of wet electrolytic capacitors is that leakage currents flowing through electrolyte can cause gas generation resulting in building up of internal gas pressure and rupture of the case. The risk associated with excessive leakage currents and increased pressure is greater for high value advanced wet tantalum capacitors, but it has not been properly evaluated yet. This presentation gives a review of specifics of the design, performance, and potential reliability risks associated with advanced wet tantalum capacitors. Problems related to setting adequate requirements for DPA, leakage currents, hermeticity, stability at low and high temperatures, ripple currents for parts operating in vacuum, and random vibration testing are discussed. Recommendations for screening and qualification to reduce risks of failures have been suggested.

  7. [Protocols for the diagnostic verification of lymph node toxoplasmosis].

    PubMed

    Carosi, G; Ghezzi, L G; Filice, G; Maccabruni, A; Parisi, A; Carnevale, G

    1983-05-31

    The protocol we have fixed for the diagnosis of lymphonodal toxoplasmosis includes a precise succession of tests: 1) specific repeated serological tests (I.H.A.T., I.F.A.T., IgM--I.F.A.T. on total serum and on pure IgM fraction); 2) lymphonodal biopsy for histological examination and biological test (isolation procedure in mouse). We have evaluated the effectiveness of our protocol in 20 cases that we observed during 1980.

  8. Application-specific coarse-grained reconfigurable array: architecture and design methodology

    NASA Astrophysics Data System (ADS)

    Zhou, Li; Liu, Dongpei; Zhang, Jianfeng; Liu, Hengzhu

    2015-06-01

    Coarse-grained reconfigurable arrays (CGRAs) have shown potential for application in embedded systems in recent years. Numerous reconfigurable processing elements (PEs) in CGRAs provide flexibility while maintaining high performance by exploring different levels of parallelism. However, a difference remains between the CGRA and the application-specific integrated circuit (ASIC). Some application domains, such as software-defined radios (SDRs), require flexibility with performance demand increases. More effective CGRA architectures are expected to be developed. Customisation of a CGRA according to its application can improve performance and efficiency. This study proposes an application-specific CGRA architecture template composed of generic PEs (GPEs) and special PEs (SPEs). The hardware of the SPE can be customised to accelerate specific computational patterns. An automatic design methodology that includes pattern identification and application-specific function unit generation is also presented. A mapping algorithm based on ant colony optimisation is provided. Experimental results on the SDR target domain show that compared with other ordinary and application-specific reconfigurable architectures, the CGRA generated by the proposed method performs more efficiently for given applications.

  9. OfftargetFinder: a web tool for species-specific RNAi design.

    PubMed

    Good, R T; Varghese, T; Golz, J F; Russell, D A; Papanicolaou, A; Edwards, O; Robin, C

    2016-04-15

    RNA interference (RNAi) technology is being developed as a weapon for pest insect control. To maximize the specificity that such an approach affords we have developed a bioinformatic web tool that searches the ever-growing arthropod transcriptome databases so that pest-specific RNAi sequences can be identified. This will help technology developers finesse the design of RNAi sequences and suggests which non-target species should be assessed in the risk assessment process. http://rnai.specifly.org crobin@unimelb.edu.au. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  11. [Protocols Related to Food Allergies and Intolerances in Preschools in Reykjavik, Iceland].

    PubMed

    Thrastardottir, Adalheidur Ran; Thordardottir, Frida Run; Torfadottir, Johanna

    2018-01-01

    The aim of the study was to explore prevalence of food allergies and intolerances among children in preschools in Reykjavik, Iceland. Also, to investigate how well preschools maintain a safe environment for children with food allergies. In 2014, a questionnaire designed specifically for this study, was sent to 65 preschools. Forty-nine participated (75%) representing a total of 4225 children. Prevalence of food allergy and intolerance was determined based on medical certificates from physi-cians delivered to the preschools. Descriptive statistics were used to assess whether there were protocols related to food allergy, and if there was a difference between schools based on staff's education and number of children. The prevalence of documented food allergies/intolerances in children aged 2-6 years was 5%, 1% had severe allergy and 1% had multiple food allergies. Lactose intolerance was most frequent (2%), then milk allergy (2%) and egg allergy (1%). Only 41% preschools had a protocol that was activated if food with an allergen was accidentally given. Moreover, only 55% of preschools with children with severe -allergy reported all of their staff to have knowledge of symptoms related to anaphylaxis and only 64% were trained to respond to an anaphylactic shock. The education of preschool principals, kitchen employees and number of children in preschool were not related to having an active protocol at site. Prevalence of food allergy and intolerance was 5% in preschools in Reykjavik. Strategy for an active protocol related to food allergy was lacking in 59% of pre-schools.

  12. Relationships of pediatric anthropometrics for CT protocol selection.

    PubMed

    Phillips, Grace S; Stanescu, Arta-Luana; Alessio, Adam M

    2014-07-01

    Determining the optimal CT technique to minimize patient radiation exposure while maintaining diagnostic utility requires patient-specific protocols that are based on patient characteristics. This work develops relationships between different anthropometrics and CT image noise to determine appropriate protocol classification schemes. We measured the image noise in 387 CT examinations of pediatric patients (222 boys, 165 girls) of the chest, abdomen, and pelvis and generated mathematic relationships between image noise and patient lateral and anteroposterior dimensions, age, and weight. At the chest level, lateral distance (ld) across the body is strongly correlated with weight (ld = 0.23 × weight + 16.77; R(2) = 0.93) and is less well correlated with age (ld = 1.10 × age + 17.13; R(2) = 0.84). Similar trends were found for anteroposterior dimensions and at the abdomen level. Across all studies, when acquisition-specific parameters are factored out of the noise, the log of image noise was highly correlated with lateral distance (R(2) = 0.72) and weight (R(2) = 0.72) and was less correlated with age (R(2) = 0.62). Following first-order relationships of image noise and scanner technique, plots were formed to show techniques that could achieve matched noise across the pediatric population. Patient lateral distance and weight are essentially equally effective metrics to base maximum technique settings for pediatric patient-specific protocols. These metrics can also be used to help categorize appropriate reference levels for CT technique and size-specific dose estimates across the pediatric population.

  13. Methacholine challenge testing: improved patient comfort with a 2-tiered protocol.

    PubMed

    Segel, Michael J; Rabinovich, Einat; Schwarz, Yehuda; Ben-Dov, Issahar

    2013-06-01

    The methacholine challenge test (MCT) is a test of bronchial hyperreactivity used as an aid in the diagnosis of asthma. MCT results are reported as the provocation concentration at which the forced expiratory volume in 1 second (FEV1) decreases 20% (PC20). The requirement for a 20% or greater decrease in FEV1 results in precipitous decreases in FEV1 in some patients. To improve MCT safety without compromising accuracy. We performed a retrospective analysis of 879 consecutive MCTs (derivation cohort). A novel protocol for MCT was developed and validated in a cohort of 564 MCTs performed in a second institution. In comparison with a PC20 cutoff of less than 8 mg/mL, a provocation concentration at which the FEV1 decreases 10% (PC10) cutoff of 1 mg/mL or less has a sensitivity of 86%, a specificity of 98%, a positive predictive value (PPV) of 97%, and a negative predictive value (NPV) of 91%. We propose a novel 2-tiered protocol for MCT. If the PC10 is 1 mg/mL or less, bronchial hyperreactivity is present; if the PC10 is greater than 1 mg/mL, the test is continued until the provocative concentration is 8 mg/mL or a 20% decrease in FEV1 is achieved. Compared with the standard protocol, the proposed protocol has a sensitivity, specificity, PPV, NPV, and overall accuracy of 100%, 98%, 97.6%, 100%, and 99%, respectively. The modified protocol would have enabled us to avoid 26 of 42 cases (62%) in which a 40% or greater decrease in FEV1 occurred and would save 0.65 dose for every MCT performed. The 2-tiered protocol performed well in the validation cohort; sensitivity, specificity, PPV, NPV, and overall accuracy were 100%, 98%, 87%, 100%, and 98%, respectively. The proposed 2-tiered protocol is accurate, saves time, and avoids precipitous decreases in FEV1. Copyright © 2013 American College of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  14. PROTOCOL TO EVALUATE THE MOISTURE DURABILITY OF ENERGY-EFFICIENT WALLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudreaux, Philip R; Pallin, Simon B; Hun, Diana E

    Walls account for about 8% of the energy used in residential buildings. This energy penalty can be reduced with higher insulation levels and increased airtightness. However, these measures can compromise the moisture durability and long-term performance of wall assemblies because they can lead to lower moisture tolerance due to reduced drying potential. To avert these problems, a moisture durability protocol was developed to evaluate the probability that an energy-efficient wall design will experience mold growth. This protocol examines the effects of moisture sources in walls through a combination of simulations and lab experiments, uses the mold growth index as themore » moisture durability indicator, and is based on a probabilistic approach that utilizes stochastically varying input parameters. The simulation tools used include a new validated method for taking into account the effects of air leakage in wall assemblies This paper provides an overview of the developed protocol, discussion of the probabilistic simulation approach and describes results from the evaluation of two wall assemblies in Climate Zones 2, 4, and 6. The protocol will be used to supply builders with wall designs that are energy efficient, moisture durable and cost-effective.« less

  15. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  16. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  17. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  18. A model protocol for a diabetes and other noncommunicable disease field survey.

    PubMed

    Dowse, G K; Zimmet, P

    1992-01-01

    Field surveys of diabetes and other noncommunicable diseases and their risk factors are increasingly being performed in both developed and developing countries. Although individual priorities and circumstances will influence survey design, a model survey manual and protocol is described which might assist investigators in formulating plans and preparing manuals for their own surveys. The model presented has been successfully used in developing countries, for both rural and urban communities, over more than a decade. It describes examples of survey objectives, and gives specific details of survey procedures and measurement techniques which may be utilized. It contains sufficient flexibility to allow its adaptation to local circumstances.

  19. Evolution of design considerations in complex craniofacial reconstruction using patient-specific implants.

    PubMed

    Peel, Sean; Bhatia, Satyajeet; Eggbeer, Dominic; Morris, Daniel S; Hayhurst, Caroline

    2017-06-01

    Previously published evidence has established major clinical benefits from using computer-aided design, computer-aided manufacturing, and additive manufacturing to produce patient-specific devices. These include cutting guides, drilling guides, positioning guides, and implants. However, custom devices produced using these methods are still not in routine use, particularly by the UK National Health Service. Oft-cited reasons for this slow uptake include the following: a higher up-front cost than conventionally fabricated devices, material-choice uncertainty, and a lack of long-term follow-up due to their relatively recent introduction. This article identifies a further gap in current knowledge - that of design rules, or key specification considerations for complex computer-aided design/computer-aided manufacturing/additive manufacturing devices. This research begins to address the gap by combining a detailed review of the literature with first-hand experience of interdisciplinary collaboration on five craniofacial patient case studies. In each patient case, bony lesions in the orbito-temporal region were segmented, excised, and reconstructed in the virtual environment. Three cases translated these digital plans into theatre via polymer surgical guides. Four cases utilised additive manufacturing to fabricate titanium implants. One implant was machined from polyether ether ketone. From the literature, articles with relevant abstracts were analysed to extract design considerations. In all, 19 frequently recurring design considerations were extracted from previous publications. Nine new design considerations were extracted from the case studies - on the basis of subjective clinical evaluation. These were synthesised to produce a design considerations framework to assist clinicians with prescribing and design engineers with modelling. Promising avenues for further research are proposed.

  20. Design optimization of a high specific speed Francis turbine runner

    NASA Astrophysics Data System (ADS)

    Enomoto, Y.; Kurosawa, S.; Kawajiri, H.

    2012-11-01

    Francis turbine is used in many hydroelectric power stations. This paper presents the development of hydraulic performance in a high specific speed Francis turbine runner. In order to achieve the improvements of turbine efficiency throughout a wide operating range, a new runner design method which combines the latest Computational Fluid Dynamics (CFD) and a multi objective optimization method with an existing design system was applied in this study. The validity of the new design system was evaluated by model performance tests. As the results, it was confirmed that the optimized runner presented higher efficiency compared with an originally designed runner. Besides optimization of runner, instability vibration which occurred at high part load operating condition was investigated by model test and gas-liquid two-phase flow analysis. As the results, it was confirmed that the instability vibration was caused by oval cross section whirl which was caused by recirculation flow near runner cone wall.

  1. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.

    PubMed

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker

    2013-12-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.

  2. The design of strain-specific polymerase chain reactions for discrimination of the racoon rabies virus strain from indigenous rabies viruses of Ontario.

    PubMed

    Nadin-Davis, S A; Huang, W; Wandeler, A I

    1996-03-01

    Since its recognition as a discrete epizootic in Florida in the early 1950s, the raccoon strain of rabies virus (RV) has spread over almost the entire eastern seaboard of the US and now threatens to enter the southernmost regions of Canada. To characterise this RV strain in more detail, nucleotide sequencing of the N and G genes, encoding the nucleoprotein and glycoprotein, respectively, of representative isolates has been undertaken. This sequence information generated a conserved restriction map of the N gene, thereby permitting unequivocal identification of this strain by molecular techniques. Comparisons of the predicted nucleoprotein and glycoprotein products with those of other RV strains identified a number of amino acid sequence variations conserved only in the raccoon strain. This information was used to design strain-specific primers targeted to the N gene sequences encoding these residues. The incorporation of these primers into a multiplex polymerase chain reaction (PCR) protocol permitted easy and rapid discrimination between the raccoon RV strain and indigenous Ontario RVs.

  3. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  4. Specific coil design for SENSE: a six-element cardiac array.

    PubMed

    Weiger, M; Pruessmann, K P; Leussler, C; Röschmann, P; Boesiger, P

    2001-03-01

    In sensitivity encoding (SENSE), the effects of inhomogeneous spatial sensitivity of surface coils are utilized for signal localization in addition to common Fourier encoding using magnetic field gradients. Unlike standard Fourier MRI, SENSE images exhibit an inhomogeneous noise distribution, which crucially depends on the geometrical sensitivity relations of the coils used. Thus, for optimum signal-to-noise-ratio (SNR) and noise homogeneity, specialized coil configurations are called for. In this article we study the implications of SENSE imaging for coil layout by means of simulations and imaging experiments in a phantom and in vivo. New, specific design principles are identified. For SENSE imaging, the elements of a coil array should be smaller than for common phased-array imaging. Furthermore, adjacent coil elements should not overlap. Based on the findings of initial investigations, a configuration of six coils was designed and built specifically for cardiac applications. The in vivo evaluation of this array showed a considerable SNR increase in SENSE images, as compared with a conventional array. Magn Reson Med 45:495-504, 2001. Copyright 2001 Wiley-Liss, Inc.

  5. An Approach to Verification and Validation of a Reliable Multicasting Protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1994-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or offnominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  6. An approach to verification and validation of a reliable multicasting protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.

  7. Analysis of dental students' written peer feedback from a prospective peer assessment protocol.

    PubMed

    Tricio, J; Woolford, M; Escudier, M

    2016-11-01

    Peer assessment and feedback is encouraged to enhance students' learning. The aim of this study was to quantitatively and qualitatively analyse pre-clinical and clinical dental students' written peer feedback provided as part of a continuous, formative and structured peer assessment protocol. A total of 309 Year-2 and Year-5 dental students were invited to participate in a peer assessment and peer feedback protocol. Consenting volunteer students were trained to observe each other whilst working in the skills laboratory (Year-2) and in the dental clinic (Year-5). Subsequently, they followed a structured protocol of peer assessment and peer feedback using specially designed work-based forms during a complete academic year. The content of their written feedback was coded according to the UK General Dental Council domain, sign (positive or negative), specificity (task specific or general), and grouped into themes. A total of 108 participants (40 Year-2 and 68 Year-5) completed 1169 peer assessment work-based forms (516 pre-clinical and 653 clinical); 94% contained written feedback. The large majority (82%) of Year-2 feedback represented the clinical domain, 89% were positive, 77% were task specific, and they were grouped into 14 themes. Year-5 feedback was related mostly to Management and Leadership (37%) and Communication (32%), 64% were positive, 75% task specific, and they were clustered into 24 themes. The content of the feedback showed notable differences between Year-2 and Year-5 students. Senior students focused more on Communication and Management and Leadership skills, whilst juniors were more concerned with clinical skills. Year-5 students provided 13% negative feedback compared to only 2% from Year-2. Regulatory focus theory is discussed to explain these differences. Both groups provided peer feedback on a wide and different range of themes. However, four themes emerged in both groups: efficiency, infection control, time management and working speed. A

  8. Development of Uniform Protocol for Alopecia Areata Clinical Trials.

    PubMed

    Solomon, James A

    2015-11-01

    Developing a successful treatment for alopecia areata (AA), clearly has not been at the forefront of the agenda for new drug/device development among the pharmaceutical and medical device industry. The National Alopecia Areata Foundation (NAAF), a patient advocacy group, initiated a plan to facilitate and drive clinical research toward finding safe and efficacious treatments for AA. As such, Alopecia Areata Uniform Protocols for clinical trials to test new treatments for AA were developed. The design of the uniform protocol is to accomplish the development of a plug-and-play template as well as to provide a framework wherein data from studies utilizing the uniform protocol can be compared through consistency of inclusions/exclusions, safety, and outcome assessment measures. A core uniform protocol for use by pharmaceutical companies in testing proof of concept for investigational products to treat AA. The core protocol includes standardized title, informed consent, inclusion/exclusion criteria, disease outcome assessments, and safety assessments. The statistical methodology to assess successful outcomes will also be standardized. The protocol as well as the informed consent form has been approved in concept by Liberty IRB and is ready to present to pharmaceutical companies.

  9. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks

    PubMed Central

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-01-01

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs. PMID:28786915

  10. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.

    PubMed

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-08-08

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.

  11. Chapter 6: Residential Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Dimetrosky, Scott; Parkinson, Katie

    Given new regulations, increased complexity in the market, and the general shift from CFLs to LEDs, this evaluation protocol was updated in 2017 to shift the focus of the protocols toward LEDs and away from CFLs and to resolve evaluation uncertainties affecting residential lighting incentive programs.

  12. Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.

    2009-03-27

    This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated manymore » questions on the performance and operational cost of these buildings.« less

  13. Toward identifying specification requirements for digital bone-anchored prosthesis design incorporating substructure fabrication: a pilot study.

    PubMed

    Eggbeer, Dominic; Bibb, Richard; Evans, Peter

    2006-01-01

    This paper is the first in a series that aims to identify the specification requirements for advanced digital technologies that may be used to design and fabricate complex, soft tissue facial prostheses. Following a review of previously reported techniques, appropriate and currently available technologies were selected and applied in a pilot study. This study uses a range of optical surface scanning, computerized tomography, computer-aided design, and rapid prototyping technologies to capture, design, and fabricate a bone-anchored auricular prosthesis, including the retentive components. The techniques are assessed in terms of their effectiveness, and the results are used to identify future research and specification requirements to direct developments. The case study identifies that while digital technologies may be used to design implant-retained facial prostheses, many limitations need to be addressed to make the techniques clinically viable. It also identifies the need to develop a more robust specification that covers areas such as resolution, accuracy, materials, and design, against which potential technologies may be assessed. There is a need to develop a specification against which potential technologies may be assessed for their suitability in soft tissue facial prosthetics. The specification will be developed using further experimental research studies.

  14. A simplified protocol for molecular identification of Eimeria species in field samples.

    PubMed

    Haug, Anita; Thebo, Per; Mattsson, Jens G

    2007-05-15

    This study aimed to find a fast, sensitive and efficient protocol for molecular identification of chicken Eimeria spp. in field samples. Various methods for each of the three steps of the protocol were evaluated: oocyst wall rupturing methods, DNA extraction methods, and identification of species-specific DNA sequences by PCR. We then compared and evaluated five complete protocols. Three series of oocyst suspensions of known number of oocysts from Eimeria mitis, Eimeria praecox, Eimeria maxima and Eimeria tenella were prepared and ground using glass beads or mini-pestle. DNA was extracted from ruptured oocysts using commercial systems (GeneReleaser, Qiagen Stoolkit and Prepman) or phenol-chloroform DNA extraction, followed by identification of species-specific ITS-1 sequences by optimised single species PCR assays. The Stoolkit and Prepman protocols showed insufficient repeatability, and the former was also expensive and relatively time-consuming. In contrast, both the GeneReleaser protocol and phenol-chloroform protocols were robust and sensitive, detecting less than 0.4 oocysts of each species per PCR. Finally, we evaluated our new protocol on 68 coccidia positive field samples. Our data suggests that rupturing the oocysts by mini-pestle grinding, preparing the DNA with GeneReleaser, followed by optimised single species PCR assays, makes a robust and sensitive procedure for identifying chicken Eimeria species in field samples. Importantly, it also provides minimal hands-on-time in the pre-PCR process, lower contamination risk and no handling of toxic chemicals.

  15. A bibliography on formal methods for system specification, design and validation

    NASA Technical Reports Server (NTRS)

    Meyer, J. F.; Furchtgott, D. G.; Movaghar, A.

    1982-01-01

    Literature on the specification, design, verification, testing, and evaluation of avionics systems was surveyed, providing 655 citations. Journal papers, conference papers, and technical reports are included. Manual and computer-based methods were employed. Keywords used in the online search are listed.

  16. 24 CFR 3280.904 - Specific requirements for designing the transportation system.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the transportation system. 3280.904 Section 3280.904 Housing and Urban Development Regulations... SAFETY STANDARDS Transportation § 3280.904 Specific requirements for designing the transportation system. (a) General. The entire system (frame, drawbar and coupling mechanism, running gear assembly, and...

  17. Spaceborne computer executive routine functional design specification. Volume 2: Computer executive design for space station/base

    NASA Technical Reports Server (NTRS)

    Kennedy, J. R.; Fitzpatrick, W. S.

    1971-01-01

    The computer executive functional system design concepts derived from study of the Space Station/Base are presented. Information Management System hardware configuration as directly influencing the executive design is reviewed. The hardware configuration and generic executive design requirements are considered in detail in a previous report (System Configuration and Executive Requirements Specifications for Reusable Shuttle and Space Station/Base, 9/25/70). This report defines basic system primitives and delineates processes and process control. Supervisor states are considered for describing basic multiprogramming and multiprocessing systems. A high-level computer executive including control of scheduling, allocation of resources, system interactions, and real-time supervisory functions is defined. The description is oriented to provide a baseline for a functional simulation of the computer executive system.

  18. A proposed protocol for hand and table sanitizing in chiropractic clinics and education institutions

    PubMed Central

    Evans, Marion Willard; Ramcharan, Michael; Floyd, Rod; Globe, Gary; Ndetan, Harrison; Williams, Ronald; Ivie, Ronald

    2009-01-01

    Abstract Objective By nature, chiropractic is a hands-on profession using manipulation applied to the joints with direct skin-to-skin contacts. Chiropractic tables are designed with a face piece to accommodate the prone patient's head in a neutral position and hand rests to allow for relaxed shoulders and upper spine so treatment is facilitated. The purpose of this article is to present a proposed guideline for hand and treatment table surface sanitizing for the chiropractic profession that is evidence-based and can easily be adopted by teaching institutions and doctors in the field. Methods A review of the chiropractic literature demonstrated that pathogenic microbes are present on treatment tables in teaching clinics at multiple facilities, yet no standardized protocols exist in the United States regarding table sanitizing and hand hygiene in chiropractic clinics or education institutions. This article reviews the scientific literature on the subject by using several search engines, databases, and specific reviews of documents pertaining to the topic including existing general guidelines. Results The literature has several existing guidelines that the authors used to develop a proposed protocol for hand and table sanitizing specific to the chiropractic profession. Recommendations were developed and are presented on hand hygiene and table sanitizing procedures that could lower the risk of infection for both clinical personnel and patients in chiropractic facilities. Conclusion This article offers a protocol for hand and table sanitizing in chiropractic clinics and education institutions. The chiropractic profession should consider adoption of these or similar measures and disseminate them to teaching clinics, institutions, and private practitioners. PMID:19646384

  19. Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment

    NASA Astrophysics Data System (ADS)

    Devane, Satish; Phatak, Deepak

    Common Electronic Purse Specification (CEPS) used by European countries, elaborately defines the transaction between customer’s CEP card and merchant’s point of sales (POS) terminal. However it merely defines the specification to transfer the transactions between the Merchant and Merchant Acquirer (MA). This paper proposes a novel approach by introducing an entity, mobile merchant acquirer (MMA) which is a trusted agent of MA and principally works on man in middle concept, but facilitates remote two fold mutual authentication and secure transaction transfer between Merchant and MA through MMA. This approach removes the bottle-neck of connectivity issues between Merchant and MA in limited connectivity environment. The proposed protocol ensures the confidentiality, integrity and money atomicity of transaction batch. The proposed protocol has been verified for correctness by Spin, a model checker and security properties of the protocol have been verified by avispa.

  20. Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects: The PROMOTE Study Protocol.

    PubMed

    Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T

    2016-11-01

    The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.

  1. High-Intensity Interval Exercises' Acute Impact on Heart Rate Variability: Comparison Between Whole-Body and Cycle Ergometer Protocols.

    PubMed

    Schaun, Gustavo Z; Del Vecchio, Fabrício B

    2018-01-01

    Schaun, GZ and Del Vecchio, FB. High-intensity interval exercises' acute impact on heart rate variability: comparison between whole-body and cycle ergometer protocols. J Strength Cond Res 32(1): 223-229, 2018-Study aimed to compare the effects of 2 high-intensity interval training (HIIT) protocols on heart rate variability. Twelve young adult males (23.3 ± 3.9 years, 177.8 ± 7.4 cm, 76.9 ± 12.9 kg) volunteered to participate. In a randomized cross-over design, subjects performed 2 HIIT protocols, 1 on a cycle ergometer (Tabata protocol [TBT]; eight 20-second bouts at 170% Pmax interspersed by 10-second rest) and another with whole-body calisthenic exercises (McRae protocol; eight 20-second all-out intervals interspersed by 10-second rest). Heart rate variability outcomes in the time, frequency, and nonlinear domains were assessed on 3 moments: (a) presession; (b) immediately postsession; and (c) 24 hours postsession. Results revealed that RRmean, Ln rMSSD, Ln high frequency (HF), and Ln low frequency (LF) were significantly reduced immediately postsession (p ≤ 0.001) and returned to baseline 24 h after both protocols. In addition, LF/HF ratio was reduced 24 h postsession (p ≤ 0.01) and SD2 was significantly lower immediately postsession only in TBT. Our main finding was that responses from heart rate autonomic control were similar in both protocols, despite different modes of exercise performed. Specifically, exercises resulted in a high parasympathetic inhibition immediately after session with subsequent recovery within 1 day. These results suggest that subjects were already recovered the day after and can help coaches to better program training sessions with such protocols.

  2. Designing Flavoprotein-GFP Fusion Probes for Analyte-Specific Ratiometric Fluorescence Imaging.

    PubMed

    Hudson, Devin A; Caplan, Jeffrey L; Thorpe, Colin

    2018-02-20

    The development of genetically encoded fluorescent probes for analyte-specific imaging has revolutionized our understanding of intracellular processes. Current classes of intracellular probes depend on the selection of binding domains that either undergo conformational changes on analyte binding or can be linked to thiol redox chemistry. Here we have designed novel probes by fusing a flavoenzyme, whose fluorescence is quenched on reduction by the analyte of interest, with a GFP domain to allow for rapid and specific ratiometric sensing. Two flavoproteins, Escherichia coli thioredoxin reductase and Saccharomyces cerevisiae lipoamide dehydrogenase, were successfully developed into thioredoxin and NAD + /NADH specific probes, respectively, and their performance was evaluated in vitro and in vivo. A flow cell format, which allowed dynamic measurements, was utilized in both bacterial and mammalian systems. In E. coli the first reported intracellular steady-state of the cytoplasmic thioredoxin pool was measured. In HEK293T mammalian cells, the steady-state cytosolic ratio of NAD + /NADH induced by glucose was determined. These genetically encoded fluorescent constructs represent a modular approach to intracellular probe design that should extend the range of metabolites that can be quantitated in live cells.

  3. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  4. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  5. Simplified Protocol for Carba NP Test for Enhanced Detection of Carbapenemase Producers Directly from Bacterial Cultures

    PubMed Central

    Pasteran, Fernando; Tijet, Nathalie; Melano, Roberto G.

    2015-01-01

    We compared carbapenemase detection among 266 Gram-negative bacilli (161 carbapenemase producers) using the Carba NP tests issued by the CLSI (CNPt-CLSI) and a novel protocol (CNPt-direct) designed for carbapenemase detection direct from bacterial cultures (instead of bacterial extracts required by the CLSI tests). The specificities were comparable (100%), but the CNPt-direct was more sensitive (98% versus 84%). The CNPt-direct was easier to perform due to the direct use of colonies and offered a more robust detection of carbapenemase producers. PMID:26424841

  6. SU-F-R-11: Designing Quality and Safety Informatics Through Implementation of a CT Radiation Dose Monitoring Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, JM; Samei, E; Departments of Physics, Electrical and Computer Engineering, and Biomedical Engineering, and Medical Physics Graduate Program, Duke University, Durham, NC

    2016-06-15

    Purpose: Recent legislative and accreditation requirements have driven rapid development and implementation of CT radiation dose monitoring solutions. Institutions must determine how to improve quality, safety, and consistency of their clinical performance. The purpose of this work was to design a strategy and meaningful characterization of results from an in-house, clinically-deployed dose monitoring solution. Methods: A dose monitoring platform was designed by our imaging physics group that focused on extracting protocol parameters, dose metrics, and patient demographics and size. Compared to most commercial solutions, which focus on individual exam alerts and global thresholds, the program sought to characterize overall consistencymore » and targeted thresholds based on eight analytic interrogations. Those were based on explicit questions related to protocol application, national benchmarks, protocol and size-specific dose targets, operational consistency, outliers, temporal trends, intra-system variability, and consistent use of electronic protocols. Using historical data since the start of 2013, 95% and 99% intervals were used to establish yellow and amber parameterized dose alert thresholds, respectively, as a function of protocol, scanner, and size. Results: Quarterly reports have been generated for three hospitals for 3 quarters of 2015 totaling 27880, 28502, 30631 exams, respectively. Four adult and two pediatric protocols were higher than external institutional benchmarks. Four protocol dose levels were being inconsistently applied as a function of patient size. For the three hospitals, the minimum and maximum amber outlier percentages were [1.53%,2.28%], [0.76%,1.8%], [0.94%,1.17%], respectively. Compared with the electronic protocols, 10 protocols were found to be used with some inconsistency. Conclusion: Dose monitoring can satisfy requirements with global alert thresholds and patient dose records, but the real value is in optimizing patient-specific

  7. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  8. TU-H-207A-09: An Automated Technique for Estimating Patient-Specific Regional Imparted Energy and Dose From TCM CT Exams Across 13 Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanders, J; Tian, X; Segars, P

    2016-06-15

    Purpose: To develop an automated technique for estimating patient-specific regional imparted energy and dose from tube current modulated (TCM) computed tomography (CT) exams across a diverse set of head and body protocols. Methods: A library of 58 adult computational anthropomorphic extended cardiac-torso (XCAT) phantoms were used to model a patient population. A validated Monte Carlo program was used to simulate TCM CT exams on the entire library of phantoms for three head and 10 body protocols. The net imparted energy to the phantoms, normalized by dose length product (DLP), and the net tissue mass in each of the scan regionsmore » were computed. A knowledgebase containing relationships between normalized imparted energy and scanned mass was established. An automated computer algorithm was written to estimate the scanned mass from actual clinical CT exams. The scanned mass estimate, DLP of the exam, and knowledgebase were used to estimate the imparted energy to the patient. The algorithm was tested on 20 chest and 20 abdominopelvic TCM CT exams. Results: The normalized imparted energy increased with increasing kV for all protocols. However, the normalized imparted energy was relatively unaffected by the strength of the TCM. The average imparted energy was 681 ± 376 mJ for abdominopelvic exams and 274 ± 141 mJ for chest exams. Overall, the method was successful in providing patientspecific estimates of imparted energy for 98% of the cases tested. Conclusion: Imparted energy normalized by DLP increased with increasing tube potential. However, the strength of the TCM did not have a significant effect on the net amount of energy deposited to tissue. The automated program can be implemented into the clinical workflow to provide estimates of regional imparted energy and dose across a diverse set of clinical protocols.« less

  9. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical

  10. Custom-Designed Molecular Scissors for Site-Specific Manipulation of the Plant and Mammalian Genomes

    NASA Astrophysics Data System (ADS)

    Kandavelou, Karthikeyan; Chandrasegaran, Srinivasan

    Zinc finger nucleases (ZFNs) are custom-designed molecular scissors, engineered to cut at specific DNA sequences. ZFNs combine the zinc finger proteins (ZFPs) with the nonspecific cleavage domain of the FokI restriction enzyme. The DNA-binding specificity of ZFNs can be easily altered experimentally. This easy manipulation of the ZFN recognition specificity enables one to deliver a targeted double-strand break (DSB) to a genome. The targeted DSB stimulates local gene targeting by several orders of magnitude at that specific cut site via homologous recombination (HR). Thus, ZFNs have become an important experimental tool to make site-specific and permanent alterations to genomes of not only plants and mammals but also of many other organisms. Engineering of custom ZFNs involves many steps. The first step is to identify a ZFN site at or near the chosen chromosomal target within the genome to which ZFNs will bind and cut. The second step is to design and/or select various ZFP combinations that will bind to the chosen target site with high specificity and affinity. The DNA coding sequence for the designed ZFPs are then assembled by polymerase chain reaction (PCR) using oligonucleotides. The third step is to fuse the ZFP constructs to the FokI cleavage domain. The ZFNs are then expressed as proteins by using the rabbit reticulocyte in vitro transcription/translation system and the protein products assayed for their DNA cleavage specificity.

  11. Tolerance design of patient-specific range QA using the DMAIC framework in proton therapy.

    PubMed

    Rah, Jeong-Eun; Shin, Dongho; Manger, Ryan P; Kim, Tae Hyun; Oh, Do Hoon; Kim, Dae Yong; Kim, Gwe-Ya

    2018-02-01

    To implement the DMAIC (Define-Measure-Analyze-Improve-Control) can be used for customizing the patient-specific QA by designing site-specific range tolerances. The DMAIC framework (process flow diagram, cause and effect, Pareto chart, control chart, and capability analysis) were utilized to determine the steps that need focus for improving the patient-specific QA. The patient-specific range QA plans were selected according to seven treatment site groups, a total of 1437 cases. The process capability index, C pm was used to guide the tolerance design of patient site-specific range. For prostate field, our results suggested that the patient range measurements were capable at the current tolerance level of ±1 mm in clinical proton plans. For other site-specific ranges, we analyzed that the tolerance tends to be overdesigned to insufficient process capability calculated by the patient-specific QA data. The customized tolerances were calculated for treatment sites. Control charts were constructed to simulate the patient QA time before and after the new tolerances were implemented. It is found that the total simulation QA time was decreased on average of approximately 20% after establishing new site-specific range tolerances. We simulated the financial impact of this project. The QA failure for whole process in proton therapy would lead up to approximately 30% increase in total cost. DMAIC framework can be used to provide an effective QA by setting customized tolerances. When tolerance design is customized, the quality is reasonably balanced with time and cost demands. © 2017 American Association of Physicists in Medicine.

  12. Facilitating interdisciplinary design specification of "smart" homes for aging in place.

    PubMed

    Demiris, George; Skubic, Marjorie; Rantz, Marilyn J; Courtney, Karen L; Aud, Myra A; Tyrer, Harry W; He, Zhihai; Lee, Jia

    2006-01-01

    "Smart homes" are defined as residences equipped with sensors and other advanced technology applications that enhance residents' independence and can be used for aging in place. The objective of this study is to determine design specifications for smart residences as defined by professional groups involved both in care delivery to senior citizens and development of devices and technologies to support aging. We assessed the importance of specific devices and sensors and their advantages and disadvantages as perceived by the interdisciplinary expert team. This work lays the ground for the implementation of smart home residencies and confirms that only an interdisciplinary design approach can address all the technical, clinical and human factors related challenges associated with home-based technologies that support aging. Our findings indicate that the use of adaptive technology that can be installed in the home environment has the potential to not only support but also empower individual senior users.

  13. Abbreviated Combined MR Protocol: A New Faster Strategy for Characterizing Breast Lesions.

    PubMed

    Moschetta, Marco; Telegrafo, Michele; Rella, Leonarda; Stabile Ianora, Amato Antonio; Angelelli, Giuseppe

    2016-06-01

    The use of an abbreviated magnetic resonance (MR) protocol has been recently proposed for cancer screening. The aim of our study is to evaluate the diagnostic accuracy of an abbreviated MR protocol combining short TI inversion recovery (STIR), turbo-spin-echo (TSE)-T2 sequences, a pre-contrast T1, and a single intermediate (3 minutes after contrast injection) post-contrast T1 sequence for characterizing breast lesions. A total of 470 patients underwent breast MR examination for screening, problem solving, or preoperative staging. Two experienced radiologists evaluated both standard and abbreviated protocols in consensus. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and diagnostic accuracy for both protocols were calculated (with the histological findings and 6-month ultrasound follow-up as the reference standard) and compared with the McNemar test. The post-processing and interpretation times for the MR images were compared with the paired t test. In 177 of 470 (38%) patients, the MR sequences detected 185 breast lesions. Standard and abbreviated protocols obtained sensitivity, specificity, diagnostic accuracy, PPV, and NPV values respectively of 92%, 92%, 92%, 68%, and 98% and of 89%, 91%, 91%, 64%, and 98% with no statistically significant difference (P < .0001). The mean post-processing and interpretation time were, respectively, 7 ± 1 minutes and 6 ± 3.2 minutes for the standard protocol and 1 ± 1.2 minutes and 2 ± 1.2 minutes for the abbreviated protocol, with a statistically significant difference (P < .01). An abbreviated combined MR protocol represents a time-saving tool for radiologists and patients with the same diagnostic potential as the standard protocol in patients undergoing breast MRI for screening, problem solving, or preoperative staging. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Long‐term exercise‐specific neuroprotection in spinal muscular atrophy‐like mice

    PubMed Central

    Chali, Farah; Desseille, Céline; Houdebine, Léo; Benoit, Evelyne; Rouquet, Thaïs; Bariohay, Bruno; Lopes, Philippe; Branchu, Julien; Della Gaspera, Bruno; Pariset, Claude; Chanoine, Christophe; Charbonnier, Frédéric

    2016-01-01

    Key points The real impact of physical exercise parameters, i.e. intensity, type of contraction and solicited energetic metabolism, on neuroprotection in the specific context of neurodegeneration remains poorly explored.In this study behavioural, biochemical and cellular analyses were conducted to compare the effects of two different long‐term exercise protocols, high intensity swimming and low intensity running, on motor units of a type 3 spinal muscular atrophy (SMA)‐like mouse model.Our data revealed a preferential SMA‐induced death of intermediate and fast motor neurons which was limited by the swimming protocol only, suggesting a close relationship between neuron‐specific protection and their activation levels by specific exercise.The exercise‐induced neuroprotection was independent of SMN protein expression and associated with specific metabolic and behavioural adaptations with notably a swimming‐induced reduction of muscle fatigability.Our results provide new insight into the motor units’ adaptations to different physical exercise parameters and will contribute to the design of new active physiotherapy protocols for patient care. Abstract Spinal muscular atrophy (SMA) is a group of autosomal recessive neurodegenerative diseases differing in their clinical outcome, characterized by the specific loss of spinal motor neurons, caused by insufficient level of expression of the protein survival of motor neuron (SMN). No cure is at present available for SMA. While physical exercise might represent a promising approach for alleviating SMA symptoms, the lack of data dealing with the effects of different exercise types on diseased motor units still precludes the use of active physiotherapy in SMA patients. In the present study, we have evaluated the efficiency of two long‐term physical exercise paradigms, based on either high intensity swimming or low intensity running, in alleviating SMA symptoms in a mild type 3 SMA‐like mouse model. We found that

  15. Long-term exercise-specific neuroprotection in spinal muscular atrophy-like mice.

    PubMed

    Chali, Farah; Desseille, Céline; Houdebine, Léo; Benoit, Evelyne; Rouquet, Thaïs; Bariohay, Bruno; Lopes, Philippe; Branchu, Julien; Della Gaspera, Bruno; Pariset, Claude; Chanoine, Christophe; Charbonnier, Frédéric; Biondi, Olivier

    2016-04-01

    The real impact of physical exercise parameters, i.e. intensity, type of contraction and solicited energetic metabolism, on neuroprotection in the specific context of neurodegeneration remains poorly explored. In this study behavioural, biochemical and cellular analyses were conducted to compare the effects of two different long-term exercise protocols, high intensity swimming and low intensity running, on motor units of a type 3 spinal muscular atrophy (SMA)-like mouse model. Our data revealed a preferential SMA-induced death of intermediate and fast motor neurons which was limited by the swimming protocol only, suggesting a close relationship between neuron-specific protection and their activation levels by specific exercise. The exercise-induced neuroprotection was independent of SMN protein expression and associated with specific metabolic and behavioural adaptations with notably a swimming-induced reduction of muscle fatigability. Our results provide new insight into the motor units' adaptations to different physical exercise parameters and will contribute to the design of new active physiotherapy protocols for patient care. Spinal muscular atrophy (SMA) is a group of autosomal recessive neurodegenerative diseases differing in their clinical outcome, characterized by the specific loss of spinal motor neurons, caused by insufficient level of expression of the protein survival of motor neuron (SMN). No cure is at present available for SMA. While physical exercise might represent a promising approach for alleviating SMA symptoms, the lack of data dealing with the effects of different exercise types on diseased motor units still precludes the use of active physiotherapy in SMA patients. In the present study, we have evaluated the efficiency of two long-term physical exercise paradigms, based on either high intensity swimming or low intensity running, in alleviating SMA symptoms in a mild type 3 SMA-like mouse model. We found that 10 months' physical training

  16. An application protocol for CAD to CAD transfer of electronic information

    NASA Technical Reports Server (NTRS)

    Azu, Charles C., Jr.

    1993-01-01

    The exchange of Computer Aided Design (CAD) information between dissimilar CAD systems is a problem. This is especially true for transferring electronics CAD information such as multi-chip module (MCM), hybrid microcircuit assembly (HMA), and printed circuit board (PCB) designs. Currently, there exists several neutral data formats for transferring electronics CAD information. These include IGES, EDIF, and DXF formats. All these formats have limitations for use in exchanging electronic data. In an attempt to overcome these limitations, the Navy's MicroCIM program implemented a project to transfer hybrid microcircuit design information between dissimilar CAD systems. The IGES (Initial Graphics Exchange Specification) format is used since it is well established within the CAD industry. The goal of the project is to have a complete transfer of microelectronic CAD information, using IGES, without any data loss. An Application Protocol (AP) is being developed to specify how hybrid microcircuit CAD information will be represented by IGES entity constructs. The AP defines which IGES data items are appropriate for describing HMA geometry, connectivity, and processing as well as HMA material characteristics.

  17. Hypersensitivity and desensitization to antineoplastic agents: outcomes of 189 procedures with a new short protocol and novel diagnostic tools assessment.

    PubMed

    Madrigal-Burgaleta, R; Berges-Gimeno, M P; Angel-Pereira, D; Ferreiro-Monteagudo, R; Guillen-Ponce, C; Pueyo, C; Gomez de Salazar, E; Alvarez-Cuesta, E

    2013-07-01

    Desensitization to antineoplastic agents is becoming a standard of care. Efforts to establish and improve these techniques are being made at many institutions. Our aims are to evaluate a new rapid desensitization protocol designed to be shorter (approximately 4 h) and safer (reducing hazardous drugs exposure risks) and to assess the oxaliplatin-specific immunoglobulin E (IgE) as a novel diagnostic tool. Prospective, observational, longitudinal study with patients who, for a 1-year period, suffered reactions to antineoplastic agents and were referred to the Desensitization Program at Ramon y Cajal University Hospital (RCUH). Patients were included or excluded as desensitization candidates after anamnesis, skin testing, risk assessment, and graded challenge. Specific IgE was determined in oxaliplatin-reactive patients. Candidate patients were desensitized using the new RCUH rapid desensitization protocol. Of 189 intravenous rapid desensitizations, 188 were successfully accomplished in the 23 patients who met inclusion criteria for desensitization (of 58 referred patients). No breakthrough reactions occurred in 94% of desensitizations, and most breakthrough reactions were mild. In 10 oxaliplatin-reactive patients, 38 desensitizations were successfully accomplished. Sensitivity for oxaliplatin-specific IgE was 38% (0.35UI/l cutoff point) and 54% (0.10UI/l cutoff point); specificity was 100% for both cutoff points. In the hands of a Desensitization Program, managed by drug desensitization experts, this new protocol has proven an effective therapeutic tool for hypersensitivity to several antineoplastic agents (oxaliplatin, carboplatin, paclitaxel, docetaxel, cyclophosphamide, and rituximab); moreover, it improves safety handling of hazardous drugs. We report the first large series of oxaliplatin desensitizations. Oxaliplatin-specific IgE determination could be helpful. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  18. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersedemore » its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.« less

  20. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.