Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
NASA Technical Reports Server (NTRS)
Ingels, Frank; Owens, John; Daniel, Steven
1989-01-01
The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias
2016-06-01
Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks
Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517
An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.
Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.
Traffic management mechanism for intranets with available-bit-rate access to the Internet
NASA Astrophysics Data System (ADS)
Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed
1997-10-01
The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.
Quantum random oracle model for quantum digital signature
NASA Astrophysics Data System (ADS)
Shang, Tao; Lei, Qi; Liu, Jianwei
2016-10-01
The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.
Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias
2016-01-01
Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol. PMID:27352244
A Pilot and Feasibility Study of Virtual Reality as a Distraction for Children with Cancer
ERIC Educational Resources Information Center
Gershon, Jonathan; Zimand, Elana; Pickering, Melissa; Rothbaum, Barbara Olasov; Hodges, Larry
2004-01-01
Objective: To pilot and test the feasibility of a novel technology to reduce anxiety and pain associated with an invasive medical procedure in children with cancer. Method: Children with cancer (ages 7-19) whose treatment protocols required access of their subcutaneous venous port device (port access) were randomly assigned to a virtual reality…
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
Deployment of 802.15.4 Sensor Networks for C4ISR Operations
2006-06-01
43 Figure 20.MSP410CA Dense Grid Monitoring (Crossbow User’s Manual, 2005). ....................................44 Figure 21.(a)MICA2 without...Deployment of Sensor Grid (COASTS OPORD, 2006). ...56 Figure 27.Topology View of Two Nodes and Base Station .......57 Figure 28.Nodes Employing Multi...Random Access Memory TCP/IP Transmission Control Protocol/Internet Protocol TinyOS Tiny Micro Threading Operating System UARTs Universal
Lin, Huifa; Shin, Won-Yong
2017-01-01
We study secondary random access in multi-input multi-output cognitive radio networks, where a slotted ALOHA-type protocol and successive interference cancellation are used. We first introduce three types of transmit beamforming performed by secondary users, where multiple antennas are used to suppress the interference at the primary base station and/or to increase the received signal power at the secondary base station. Then, we show a simple decentralized power allocation along with the equivalent single-antenna conversion. To exploit the multiuser diversity gain, an opportunistic transmission protocol is proposed, where the secondary users generating less interference are opportunistically selected, resulting in a further reduction of the interference temperature. The proposed methods are validated via computer simulations. Numerical results show that increasing the number of transmit antennas can greatly reduce the interference temperature, while increasing the number of receive antennas leads to a reduction of the total transmit power. Optimal parameter values of the opportunistic transmission protocol are examined according to three types of beamforming and different antenna configurations, in terms of maximizing the cognitive transmission capacity. All the beamforming, decentralized power allocation, and opportunistic transmission protocol are performed by the secondary users in a decentralized manner, thus resulting in an easy implementation in practice. PMID:28076402
Lin, Huifa; Shin, Won-Yong
2017-01-01
We study secondary random access in multi-input multi-output cognitive radio networks, where a slotted ALOHA-type protocol and successive interference cancellation are used. We first introduce three types of transmit beamforming performed by secondary users, where multiple antennas are used to suppress the interference at the primary base station and/or to increase the received signal power at the secondary base station. Then, we show a simple decentralized power allocation along with the equivalent single-antenna conversion. To exploit the multiuser diversity gain, an opportunistic transmission protocol is proposed, where the secondary users generating less interference are opportunistically selected, resulting in a further reduction of the interference temperature. The proposed methods are validated via computer simulations. Numerical results show that increasing the number of transmit antennas can greatly reduce the interference temperature, while increasing the number of receive antennas leads to a reduction of the total transmit power. Optimal parameter values of the opportunistic transmission protocol are examined according to three types of beamforming and different antenna configurations, in terms of maximizing the cognitive transmission capacity. All the beamforming, decentralized power allocation, and opportunistic transmission protocol are performed by the secondary users in a decentralized manner, thus resulting in an easy implementation in practice.
NASA Astrophysics Data System (ADS)
Zhou, Zheng; Liu, Chen; Shen, Wensheng; Dong, Zhen; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan; Kang, Jinfeng
2017-04-01
A binary spike-time-dependent plasticity (STDP) protocol based on one resistive-switching random access memory (RRAM) device was proposed and experimentally demonstrated in the fabricated RRAM array. Based on the STDP protocol, a novel unsupervised online pattern recognition system including RRAM synapses and CMOS neurons is developed. Our simulations show that the system can efficiently compete the handwritten digits recognition task, which indicates the feasibility of using the RRAM-based binary STDP protocol in neuromorphic computing systems to obtain good performance.
High Speed Oblivious Random Access Memory (HS-ORAM)
2015-09-01
Bryan Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers”, 30th International Cryptology Conference, pp. 465...holder or any other person or corporation; or convey any rights or permission to manufacture , use, or sell any patented invention that may relate to...secure outsourced data access protocols. HS-ORAM deploys a number of server- side software components running inside tamper-proof secure coprocessors
Zhang, Sheng; Liang, Fei; Li, Wenfeng
2017-11-01
The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.
Complementarity between entanglement-assisted and quantum distributed random access code
NASA Astrophysics Data System (ADS)
Hameedi, Alley; Saha, Debashis; Mironowicz, Piotr; Pawłowski, Marcin; Bourennane, Mohamed
2017-05-01
Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific cases where one outperforms the other. In this article, we study a family of 3 →1 distributed RACs [J. Bowles, N. Brunner, and M. Pawłowski, Phys. Rev. A 92, 022351 (2015), 10.1103/PhysRevA.92.022351] and present its general construction of both the QRAC and the EARAC. We demonstrate that, depending on the function of inputs that is sought, if QRAC achieves the maximal success probability then EARAC fails to do so and vice versa. Moreover, a tripartite Bell-type inequality associated with the EARAC variants reveals the genuine multipartite nonlocality exhibited by our protocol. We conclude with an experimental realization of the 3 →1 distributed QRAC that achieves higher success probabilities than the maximum possible with EARACs for a number of tasks.
Repeated Transmissions In Mobile/Satellite Communications
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Clare, Loren P.
1988-01-01
Repetition increases throughput and decreases delay. Paper discusses theoretical performance of communication system for land-mobile stations with satellite relay using ALOHA random-access protocol modified for repeated transimssions. Methods and conclusions contribute to general understanding of packet communications in fading channels.
CSMA/RN: A universal protocol for gigabit networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.
Kypri, Kypros; Wilson, Amanda
2012-01-01
Background Internet research may raise older ethical issues in new forms or pose new issues. It has been recommended that debriefing information online be kept very short, with further information including study results made available if requested by participants. There are no empirical studies that compare possible alternative methods of debriefing in online studies. Objective To undertake a randomized controlled trial evaluating how to implement the recommended approach by assessing the effects of two different approaches on accessing of additional information. Methods All 11,943 participants in the Effects of Study Design and Allocation (ESDA) study, which employed deception, were randomly assigned to one of two methods of debriefing: Group A received the debriefing information in the body of an email with links to protocol and results pages; Group B was presented with these links after clicking on an initial link in the body of the email to view the debriefing information on a website. Outcomes assessed were the proportions clicking on the links to the protocol and results summary and the time spent on these pages by those accessing them. Results The group who were presented with no debriefing information in the body of the email and went to a website for this information (Group B) were approximately twice as likely to subsequently access the protocol and the results summary. These differences between the two groups were highly statistically significant. Although these differences are clear, the overall proportions accessing such information were low, and there were no differences in mean time spent reading these pages. Only one quarter of Group B actually accessed debriefing information. Conclusions In circumstances where the uptake of fuller information on study design, methods, and findings is deemed important, debriefing information may be better provided via a link and not included in the body of an email. Doing so may, however, reduce the extent of receiving any debriefing information at all. There is a wider need for high quality empirical studies to inform ethical evaluations. Trial Registration Australian New Zealand Clinical Trials Registry, ACTRN12610000846022 (http://www.anzctr.org.au/) PMID:23160103
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J
2010-11-01
Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.
NASA Technical Reports Server (NTRS)
Clare, L. P.; Yan, T.-Y.
1985-01-01
The analysis of the ALOHA random access protocol for communications channels with fading is presented. The protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. A general two state model is used for the channel error process to account for the channel fading memory. It is shown that greater throughput and smaller delay may be achieved using repetitions. The model is applied to the analysis of the delay-throughput performance in a fading mobile communications environment. Numerical results are given for NASA's Mobile Satellite Experiment.
Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J
2015-09-14
Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.
Protocol for Communication Networking for Formation Flying
NASA Technical Reports Server (NTRS)
Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren
2009-01-01
An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.
Performance analysis of replication ALOHA for fading mobile communications channels
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Clare, Loren P.
1986-01-01
This paper describes an ALOHA random access protocol for fading communications channels. A two-state Markov model is used for the channel error process to account for the channel fading memory. The ALOHA protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. The analysis is applicable to fading environments where the channel memory is short compared to the propagation delay. It is shown that smaller delay may be achieved using replications and, in noisy conditions, can also improve throughput.
Sciahbasi, Alessandro; Calabrò, Paolo; Sarandrea, Alessandro; Rigattieri, Stefano; Tomassini, Francesco; Sardella, Gennaro; Zavalloni, Dennis; Cortese, Bernardo; Limbruno, Ugo; Tebaldi, Matteo; Gagnor, Andrea; Rubartelli, Paolo; Zingarelli, Antonio; Valgimigli, Marco
2014-06-01
Radiation absorbed by interventional cardiologists is a frequently under-evaluated important issue. Aim is to compare radiation dose absorbed by interventional cardiologists during percutaneous coronary procedures for acute coronary syndromes comparing transradial and transfemoral access. The randomized multicentre MATRIX (Minimizing Adverse Haemorrhagic Events by TRansradial Access Site and Systemic Implementation of angioX) trial has been designed to compare the clinical outcome of patients with acute coronary syndromes treated invasively according to the access site (transfemoral vs. transradial) and to the anticoagulant therapy (bivalirudin vs. heparin). Selected experienced interventional cardiologists involved in this study have been equipped with dedicated thermoluminescent dosimeters to evaluate the radiation dose absorbed during transfemoral or right transradial or left transradial access. For each access we evaluate the radiation dose absorbed at wrist, at thorax and at eye level. Consequently the operator is equipped with three sets (transfemoral, right transradial or left transradial access) of three different dosimeters (wrist, thorax and eye dosimeter). Primary end-point of the study is the procedural radiation dose absorbed by operators at thorax. An important secondary end-point is the procedural radiation dose absorbed by operators comparing the right or left radial approach. Patient randomization is performed according to the MATRIX protocol for the femoral or radial approach. A further randomization for the radial approach is performed to compare right and left transradial access. The RAD-MATRIX study will probably consent to clarify the radiation issue for interventional cardiologist comparing transradial and transfemoral access in the setting of acute coronary syndromes. Copyright © 2014 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Patel, Mitesh; Bagary, Manny; McCorry, Dougall
2015-01-01
Convulsive Status Epilepticus (CSE) is a common neurological emergency with patients presenting with prolonged epileptic activity. Sub-optimal management is coupled with high morbidity and mortality. Continuous electroencephalogram (EEG) monitoring is considered essential by the National Institute for Health and Care Excellence (NICE) in the management of Convulsive Refractory Status Epilepticus (CRSE). The aim of this research was to determine current clinical practice in the management of CRSE amongst adults in intensive care units (ICU) in the UK and establish if the use of a standardised protocol requires re-enforcement within trusts. 75 randomly selected UK NHS Trusts were contacted and asked to complete a questionnaire in addition to providing their protocol for CRSE management in ICU. 55 (73%) trusts responded. While 31 (56% of responders) had a protocol available in ICU for early stages of CSE, just 21 (38%) trusts had specific guidelines if CRSE occurred. Only 23 (42%) trusts involved neurologists at any stage of management and just 18 (33%) have access to continuous EEG monitoring. This study identifies significant inconsistency in the management of CSE in ICU's across the UK. A minority of ICU units have a protocol for CRSE or access to continuous EEG monitoring despite it being considered fundamental for management and supported by NICE guidance. Copyright © 2014 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.
Williams, Christopher; McClay, Carrie-Anne; Martinez, Rebeca; Morrison, Jill; Haig, Caroline; Jones, Ray; Farrand, Paul
2016-04-27
Low mood is a common mental health problem with significant health consequences. Studies have shown that cognitive behavioural therapy (CBT) is an effective treatment for low mood and anxiety when delivered one-to-one by an expert practitioner. However, access to this talking therapy is often limited and waiting lists can be long, although a range of low-intensity interventions that can increase access to services are available. These include guided self-help materials delivered via books, classes and online packages. This project aims to pilot a randomized controlled trial of an online CBT-based life skills course with community-based individuals experiencing low mood and anxiety. Individuals with elevated symptoms of depression will be recruited directly from the community via online and newspaper advertisements. Participants will be remotely randomized to receive either immediate access or delayed access to the Living Life to the Full guided online CBT-based life skills package, with telephone or email support provided whilst they use the online intervention. The primary end point will be at 3 months post-randomization, at which point the delayed-access group will be offered the intervention. Levels of depression, anxiety, social functioning and satisfaction will be assessed. This pilot study will test the trial design, and ability to recruit and deliver the intervention. Drop-out rates will be assessed and the completion and acceptability of the package will be investigated. The study will also inform a sample size power calculation for a subsequent substantive randomized controlled trial. ISRCTN ISRCTN12890709.
VSAT communications networks - An overview
NASA Astrophysics Data System (ADS)
Chakraborty, D.
1988-05-01
The very-small-aperture-terminal (VSAT) fixed satellite communication network is a star network in which many dispersed micro terminals attempt to send data in a packet form through a random access/time-division multiple-access (RA/TDMA) satellite channel with transmission delay. The basic concept of the VSAT and its service potential are discussed. Two classes of traffic are addressed, namely, business-oriented low-rate-data traffic and bulk data traffic of corporate networks. Satellite access, throughput, and delay are considered. The size of the network population that can be served in an RA/TDMA environment is calculated. User protocols are examined. A typical VSAT business scenario is described.
Pothier, Kristell; Soriano, G; Lussier, M; Naudin, A; Costa, N; Guyonnet, S; Piau, A; Ousset, P J; Nourhashemi, F; Vellas, B; de Souto Barreto, P
2018-01-24
Multidomain interventions composed of nutritional counseling, exercise and cognitive trainings have shown encouraging results as effective preventive strategies delaying age-related declines. However, these interventions are time- and resource-consuming. The use of Information and Communication Technologies (ICT) might facilitate the translation from research into real-world practice and reach a massive number of people. This article describes the protocol of the eMIND study, a randomized controlled trial (RCT) using a web-based multidomain intervention for older adults. One hundred and twenty older adults (≥ 65 years), with a spontaneous memory complaint, will be randomly assigned to a six-month web-based multidomain (nutritional counseling, physical and cognitive trainings) intervention group with a connected accelerometer (number of steps, energy expenditure), or to a control group with access to general information on healthy aging plus the accelerometer, but no access to the multidomain intervention. The main outcome is the feasibility/acceptability of the web-based intervention. Secondary clinical outcomes include: cognitive functions, physical performance, nutritional status and cost-effectiveness. We expect a high amount of adherers (ie, > 75% compliance to the protocol) to reflect the feasibility. Acceptability, assessed through interviews, should allow us to understand motivators and barriers to this ICT intervention. We also expect to provide data on its effects on various clinical outcomes and efficiency. The eMIND study will provide crucial information to help developing a future and larger web-based multidomain lifestyle RCT, which should facilitate the translation of this ICT intervention from the research world into real-life clinical practice for the healthcare of older adults.
Shorey, Shefaly; Ng, Yvonne Peng Mei; Danbjørg, Dorthe Boe; Dennis, Cindy-Lee; Morelius, Evalotte
2017-01-01
The aim of this study was to describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. The development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial to new parents. However, there is a scarcity of theory-based educational programmes that have incorporated technology such as a mobile health application in the early postpartum period. A randomized controlled trial with a two-group pre-test and post-test design. The data will be collected from 118 couples. Eligible parents will be randomly allocated to either a control group (receiving routine care) or an intervention group (routine care plus access to the 'Home-but not Alone' mobile health application. Outcome measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. This will be an empirical study that evaluates a theory-based educational programme delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression. © 2016 John Wiley & Sons Ltd.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Morrison, Deborah; Wyke, Sally; Thomson, Neil C; McConnachie, Alex; Agur, Karolina; Saunderson, Kathryn; Chaudhuri, Rekha; Mair, Frances S
2014-05-24
The financial costs associated with asthma care continue to increase while care remains suboptimal. Promoting optimal self-management, including the use of asthma action plans, along with regular health professional review has been shown to be an effective strategy and is recommended in asthma guidelines internationally. Despite evidence of benefit, guided self-management remains underused, however the potential for online resources to promote self-management behaviors is gaining increasing recognition. The aim of this paper is to describe the protocol for a pilot evaluation of a website 'Living well with asthma' which has been developed with the aim of promoting self-management behaviors shown to improve outcomes. The study is a parallel randomized controlled trial, where adults with asthma are randomly assigned to either access to the website for 12 weeks, or usual asthma care for 12 weeks (followed by access to the website if desired). Individuals are included if they are over 16-years-old, have a diagnosis of asthma with an Asthma Control Questionnaire (ACQ) score of greater than, or equal to 1, and have access to the internet. Primary outcomes for this evaluation include recruitment and retention rates, changes at 12 weeks from baseline for both ACQ and Asthma Quality of Life Questionnaire (AQLQ) scores, and quantitative data describing website usage (number of times logged on, length of time logged on, number of times individual pages looked at, and for how long). Secondary outcomes include clinical outcomes (medication use, health services use, lung function) and patient reported outcomes (including adherence, patient activation measures, and health status). Piloting of complex interventions is considered best practice and will maximise the potential of any future large-scale randomized controlled trial to successfully recruit and be able to report on necessary outcomes. Here we will provide results across a range of outcomes which will provide estimates of efficacy to inform the design of a future full-scale randomized controlled trial of the 'Living well with asthma' website. This trial is registered with Current Controlled Trials ISRCTN78556552 on 18/06/13.
McGrath, Patrick J; Sourander, Andre; Lingley-Pottie, Patricia; Ristkari, Terja; Cunningham, Charles; Huttunen, Jukka; Filbert, Katharine; Aromaa, Minna; Corkum, Penny; Hinkka-Yli-Salomäki, Susanna; Kinnunen, Malin; Lampi, Katja; Penttinen, Anne; Sinokki, Atte; Unruh, Anita; Vuorio, Jenni; Watters, Carolyn
2013-10-21
Oppositional Defiant Disorder (ODD) is characterized by angry and noncompliant behaviour. It is the most common disruptive behaviour disorder (DBD), with prevalence estimates of 6-9% for preschoolers and is closely linked to several long-term difficulties, including disorders of conduct, mood, anxiety, impulse-control, and substance abuse. ODD in children is related to parental depression, family dysfunction, and impairments in parental work performance. Children displaying early DBDs exhibit more symptoms of greater severity, more frequent offences, and commit more serious crimes later in life. The goal of the Strongest Families Finland Canada (SFFC) Smart Website intervention research program is to develop and evaluate an affordable, accessible, effective secondary prevention parent training program for disruptive behaviour in preschoolers to prevent the negative sequelae of ODD. Strongest Families is an 11-session program with two booster sessions that focuses on teaching skills to: strengthen parent-child relationships; reinforce positive behaviour; reduce conflict; manage daily transitions; plan for potentially problematic situations; promote emotional regulation and pro-social behaviour and decrease antisocial behaviour. This protocol paper describes an ongoing population-based randomized controlled trial (RCT) of high-risk 4 year-olds attending well-child clinics in Turku, Finland and environs to examine the effectiveness of the Strongest Families Smart Website intervention compared to an Education Control condition. Randomization consists of a 1:1 ratio for intervention versus the education group, stratified by the child's sex. The participants randomized to the intervention group receive access to the Strongest Families Smart Website and weekly telephone coaching sessions. The participants randomized to the Education Control condition receive access to a static website with parenting tips. Children are followed using parental and daycare teacher measures at 6 and 12 months after randomization. The Strongest Families Smart Website intervention is hypothesized to improve parenting skills, reduce child disruptive behaviour, reduce parental distress and improve family functioning. These results will likely inform subsequent investigations, public policy, and early treatment of childhood disruptive behaviour problems. ClinicalTrials.gov # NCT01750996.
2013-01-01
Background Oppositional Defiant Disorder (ODD) is characterized by angry and noncompliant behaviour. It is the most common disruptive behaviour disorder (DBD), with prevalence estimates of 6-9% for preschoolers and is closely linked to several long-term difficulties, including disorders of conduct, mood, anxiety, impulse-control, and substance abuse. ODD in children is related to parental depression, family dysfunction, and impairments in parental work performance. Children displaying early DBDs exhibit more symptoms of greater severity, more frequent offences, and commit more serious crimes later in life. The goal of the Strongest Families™ Finland Canada (SFFC) Smart Website intervention research program is to develop and evaluate an affordable, accessible, effective secondary prevention parent training program for disruptive behaviour in preschoolers to prevent the negative sequelae of ODD. Strongest Families is an 11-session program with two booster sessions that focuses on teaching skills to: strengthen parent–child relationships; reinforce positive behaviour; reduce conflict; manage daily transitions; plan for potentially problematic situations; promote emotional regulation and pro-social behaviour and decrease antisocial behaviour. Methods/design This protocol paper describes an ongoing population-based randomized controlled trial (RCT) of high-risk 4 year-olds attending well-child clinics in Turku, Finland and environs to examine the effectiveness of the Strongest Families Smart Website intervention compared to an Education Control condition. Randomization consists of a 1:1 ratio for intervention versus the education group, stratified by the child’s sex. The participants randomized to the intervention group receive access to the Strongest Families Smart Website and weekly telephone coaching sessions. The participants randomized to the Education Control condition receive access to a static website with parenting tips. Children are followed using parental and daycare teacher measures at 6 and 12 months after randomization. Discussion The Strongest Families Smart Website intervention is hypothesized to improve parenting skills, reduce child disruptive behaviour, reduce parental distress and improve family functioning. These results will likely inform subsequent investigations, public policy, and early treatment of childhood disruptive behaviour problems. Trial registration ClinicalTrials.gov # NCT01750996 PMID:24139323
Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks
Ranganathan, Radha; Kannan, Kathiravan
2015-01-01
IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066
Al-Khalifah, Nasser S; Shanavaskhan, A E
2017-01-01
Ambiguity in the total number of date palm cultivars across the world is pointing toward the necessity for an enumerative study using standard morphological and molecular markers. Among molecular markers, DNA markers are more suitable and ubiquitous to most applications. They are highly polymorphic in nature, frequently occurring in genomes, easy to access, and highly reproducible. Various molecular markers such as restriction fragment length polymorphism (RFLP), amplified fragment length polymorphism (AFLP), simple sequence repeats (SSR), inter-simple sequence repeats (ISSR), and random amplified polymorphic DNA (RAPD) markers have been successfully used as efficient tools for analysis of genetic variation in date palm. This chapter explains a stepwise protocol for extracting total genomic DNA from date palm leaves. A user-friendly protocol for RAPD analysis and a table showing the primers used in different molecular techniques that produce polymorphisms in date palm are also provided.
Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun
2017-10-01
A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.
Hróbjartsson, Asbjørn; Pildal, Julie; Chan, An-Wen; Haahr, Mette T; Altman, Douglas G; Gøtzsche, Peter C
2009-09-01
To compare the reporting on blinding in protocols and articles describing randomized controlled trials. We studied 73 protocols of trials approved by the scientific/ethical committees for Copenhagen and Frederiksberg, 1994 and 1995, and their corresponding publications. Three out of 73 trials (4%) reported blinding in the protocol that contradicted that in the publication (e.g., "open" vs. "double blind"). The proportion of "double-blind" trials with a clear description of the blinding of participants increased from 11 out of 58 (19%) when based on publications alone to 39 (67%) when adding the information in the protocol. The similar proportions for the blinding of health care providers were 2 (3%) and 22 (38%); and for the blinding of data collectors, they were 8 (14%) and 14 (24%). In 52 of 58 publications (90%), it was unclear whether all patients, health care providers, and data collectors had been blinded. In 4 of the 52 trials (7%), the protocols clarified that all three key trial persons had been blinded. The reporting on blinding in both trial protocols and publications is often inadequate. We suggest developing international guidelines for the reporting of trial protocols and public access to protocols.
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Kaj, Ingemar
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information for the network users. Hundreds or thousands of small embedded units, which operate under low-energy supply and with limited access to central network control, rely on interconnecting protocols to coordinate data aggregation and transmission. Energy efficiency is crucial and it has been proposed that cluster based and distributed architectures such as LEACH are particularly suitable. We analyse the random cluster hierarchy in this protocol and provide a solution for low-energy and limited-loss optimization. Moreover, we extend these results to a multi-level version of LEACH, where clusters of nodes again self-organize to form clusters of clusters, and so on.
Eight microprocessor-based instrument data systems in the Galileo Orbiter spacecraft
NASA Technical Reports Server (NTRS)
Barry, R. C.
1980-01-01
Instrument data systems consist of a microprocessor, 3K bytes of Read Only Memory and 3K bytes of Random Access Memory. It interfaces with the spacecraft data bus through an isolated user interface with a direct memory access bus adaptor, and/or parallel data from instrument devices such as registers, buffers, analog to digital converters, multiplexers, and solid state sensors. These data systems support the spacecraft hardware and software communication protocol, decode and process instrument commands, generate continuous instrument operating modes, control the instrument mechanisms, acquire, process, format, and output instrument science data.
Analysis of practical backoff protocols for contention resolution with multiple servers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goldberg, L.A.; MacKenzie, P.D.
Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less
Stigma and Barriers to Care Caring for Those Exposed to War, Disaster and Terrorism
2012-03-06
behaviors, and injury. There is a paucity of qualitative study of the narratives of injured soldiers who successfully negotiated barriers to care...Develop qualitative methods to examine the narratives of successful treat- ment across the trajectories of accessing care. • Examine technologies... study and randomize them." Thirty patients consented to this protocol. It is the application of ethnographic methods . It is clinical ethnography . We
Raghav, Kanwal Pratap Singh; Mahajan, Sminil; Yao, James C.; Hobbs, Brian P.; Berry, Donald A.; Pentz, Rebecca D.; Tam, Alda; Hong, Waun K.; Ellis, Lee M.; Abbruzzese, James; Overman, Michael J.
2015-01-01
Purpose The decision by journals to append protocols to published reports of randomized trials was a landmark event in clinical trial reporting. However, limited information is available on how this initiative effected transparency and selective reporting of clinical trial data. Methods We analyzed 74 oncology-based randomized trials published in Journal of Clinical Oncology, the New England Journal of Medicine, and The Lancet in 2012. To ascertain integrity of reporting, we compared published reports with their respective appended protocols with regard to primary end points, nonprimary end points, unplanned end points, and unplanned analyses. Results A total of 86 primary end points were reported in 74 randomized trials; nine trials had greater than one primary end point. Nine trials (12.2%) had some discrepancy between their planned and published primary end points. A total of 579 nonprimary end points (median, seven per trial) were planned, of which 373 (64.4%; median, five per trial) were reported. A significant positive correlation was found between the number of planned and nonreported nonprimary end points (Spearman r = 0.66; P < .001). Twenty-eight studies (37.8%) reported a total of 65 unplanned end points; 52 (80.0%) of which were not identified as unplanned. Thirty-one (41.9%) and 19 (25.7%) of 74 trials reported a total of 52 unplanned analyses involving primary end points and 33 unplanned analyses involving nonprimary end points, respectively. Studies reported positive unplanned end points and unplanned analyses more frequently than negative outcomes in abstracts (unplanned end points odds ratio, 6.8; P = .002; unplanned analyses odd ratio, 8.4; P = .007). Conclusion Despite public and reviewer access to protocols, selective outcome reporting persists and is a major concern in the reporting of randomized clinical trials. To foster credible evidence-based medicine, additional initiatives are needed to minimize selective reporting. PMID:26304898
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
Risica, Patricia M; Gorham, Gemma; Dionne, Laura; Nardi, William; Ng, Doug; Middler, Reese; Mello, Jennifer; Akpolat, Rahmet; Gettens, Katelyn; Gans, Kim M
2018-02-01
Fruit and vegetable (F&V) consumption is an important contributor to chronic disease prevention. However, most Americans do not eat adequate amounts. The worksite is an advantageous setting to reach large, diverse segments of the population with interventions to increase F&V intake, but research gaps exist. No studies have evaluated the implementation of mobile F&V markets at worksites nor compared the effectiveness of such markets with or without nutrition education. This paper describes the protocol for Good to Go (GTG), a cluster randomized trial to evaluate F&V intake change in employees from worksites randomized into three experimental arms: discount, fresh F&V markets (Access Only arm); markets plus educational components including campaigns, cooking demonstrations, videos, newsletters, and a web site (Access Plus arm); and an attention placebo comparison intervention on physical activity and stress reduction (Comparison). Secondary aims include: 1) Process evaluation to determine costs, reach, fidelity, and dose as well as the relationship of these variables with changes in F&V intake; 2) Applying a mediating variable framework to examine relationships of psychosocial factors/determinants with changes in F&V consumption; and 3) Cost effectiveness analysis of the different intervention arms. The GTG study will fill important research gaps in the field by implementing a rigorous cluster randomized trial to evaluate the efficacy of an innovative environmental intervention providing access and availability to F&V at the worksite and whether this access intervention is further enhanced by accompanying educational interventions. GTG will provide an important contribution to public health research and practice. Trial registration number NCT02729675, ClinicalTrials.gov. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.
Risica, Patricia M.; Gorham, Gemma; Dionne, Laura; Nardi, William; Ng, Doug; Middler, Reese; Mello, Jennifer; Akpolat, Rahmet; Gettens, Katelyn; Gans, Kim M.
2018-01-01
Background Fruit and vegetable (F&V) consumption is an important contributor to chronic disease prevention. However, most Americans do not eat adequate amounts. The worksite is an advantageous setting to reach large, diverse segments of the population with interventions to increase F&V intake, but research gaps exist. No studies have evaluated the implementation of mobile F&V markets at worksites nor compared the effectiveness of such markets with or without nutrition education. Methods This paper describes the protocol for Good to Go (GTG), a cluster randomized trial to evaluate F&V intake change in employees from worksites randomized into three experimental arms: discount, fresh F&V markets (Access Only arm); markets plus educational components including campaigns, cooking demonstrations, videos, newsletters, and a web site (Access Plus arm); and an attention placebo comparison intervention on physical activity and stress reduction (Comparison). Secondary aims include: 1) Process evaluation to determine costs, reach, fidelity, and dose as well as the relationship of these variables with changes in F&V intake; 2) Applying a mediating variable framework to examine relationships of psychosocial factors/determinants with changes in F&V consumption; and 3) Cost effectiveness analysis of the different intervention arms. Discussion The GTG study will fill important research gaps in the field by implementing a rigorous cluster randomized trial to evaluate the efficacy of an innovative environmental intervention providing access and availability to F&V at the worksite and whether this access intervention is further enhanced by accompanying educational interventions. GTG will provide an important contribution to public health research and practice. Trial registration number NCT02729675, ClinicalTrials.gov PMID:29242108
Peltan, Ithan D.; Shiga, Takashi; Gordon, James A.; Currier, Paul F.
2015-01-01
Background Simulation training may improve proficiency at and reduces complications from central venous catheter (CVC) placement, but the scope of simulation’s effect remains unclear. This randomized controlled trial evaluated the effects of a pragmatic CVC simulation program on procedural protocol adherence, technical skill, and patient outcomes. Methods Internal medicine interns were randomized to standard training for CVC insertion or standard training plus simulation-based mastery training. Standard training involved a lecture, a video-based online module, and instruction by the supervising physician during actual CVC insertions. Intervention-group subjects additionally underwent supervised training on a venous access simulator until they demonstrated procedural competence. Raters evaluated interns’ performance during internal jugular CVC placement on actual patients in the medical intensive care unit. Generalized estimating equations were used to account for outcome clustering within trainees. Results We observed 52 interns place 87 CVCs. Simulation-trained interns exhibited better adherence to prescribed procedural technique than interns who received only standard training (p=0.024). There were no significant differences detected in first-attempt or overall cannulation success rates, mean needle passes, global assessment scores or complication rates. Conclusions Simulation training added to standard training improved protocol adherence during CVC insertion by novice practitioners. This study may have been too small to detect meaningful differences in venous cannulation proficiency and other clinical outcomes, highlighting the difficulty of patient-centered simulation research in settings where poor outcomes are rare. For high-performing systems, where protocol deviations may provide an important proxy for rare procedural complications, simulation may improve CVC insertion quality and safety. PMID:26154250
Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen
2012-12-27
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.
Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels
Son, In Keun; Mao, Shiwen; Hur, Seung Min
2009-01-01
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556
Visser, Kirsten; Greaves-Lord, Kirstin; Tick, Nouchka T; Verhulst, Frank C; Maras, Athanasios; van der Vegt, Esther J M
2015-08-28
Previous research shows that adolescents with autism spectrum disorder (ASD) run several risks in their psychosexual development and that these adolescents can have limited access to reliable information on puberty and sexuality, emphasizing the need for specific guidance of adolescents with ASD in their psychosexual development. Few studies have investigated the effects of psychosexual training programs for adolescents with ASD and to date no randomized controlled trials are available to study the effects of psychosexual interventions for this target group. The randomized controlled trial (RCT) described in this study protocol aims to investigate the effects of the Tackling Teenage Training (TTT) program on the psychosexual development of adolescents with ASD. This parallel clinical trial, conducted in the South-West of the Netherlands, has a simple equal randomization design with an intervention and a waiting-list control condition. Two hundred adolescents and their parents participate in this study. We assess the participants in both conditions using self-report as well as parent-report questionnaires at three time points during 1 year: at baseline (T1), post-treatment (T2), and for follow-up (T3). To our knowledge, the current study is the first that uses a randomized controlled design to study the effects of a psychosexual training program for adolescents with ASD. It has a number of methodological strengths, namely a large sample size, a wide range of functionally relevant outcome measures, the use of multiple informants, and a standardized research and intervention protocol. Also some limitations of the described study are identified, for instance not making a comparison between two treatment conditions, and no use of blinded observational measures to investigate the ecological validity of the research results. Dutch Trial Register NTR2860. Registered on 20 April 2011.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Central venous access in children: indications, devices, and risks.
Ares, Guillermo; Hunter, Catherine J
2017-06-01
Central venous catheters (CVCs) have a prominent role in the diagnostic and therapy of neonates and children. Herein, we describe the multiple indications for CVC use and the different devices available for central venous access. Given the prevalent use of CVCs, healthcare systems are focused on reducing complications from their use, particularly central line-associated bloodstream infections (CLABSIs). The most up-to-date information available sheds light on best practices and future areas of investigation. Large systematic reviews of randomized trials suggest that ultrasound guidance for placement of CVCs in children is safer than using blind technique, at least for internal jugular vein access. Appropriate catheter tip placement is associated with decreased complications. Furthermore, the prophylactic use of ethanol lock between cycles of parenteral nutrition administration has reduced the rates of CLABSI. A recent randomized trial in pediatric CVCs showed a benefit with antibiotic-coated CVCs. Based on the available evidence, multiple techniques for CVC placement are still valid, including the landmark technique based on practitioner experience, but ultrasound guidance has been shown to decrease complications from line placement. Adherence to CVC care protocols is essential in reducing infectious complications.
Fairchild, Alysa; Weber, Damien C; Bar-Deroma, Raquel; Gulyban, Akos; Fenton, Paul A; Stupp, Roger; Baumert, Brigitta G
2012-06-01
The phase III EORTC 22033-26033/NCIC CE5 intergroup trial compares 50.4 Gy radiotherapy with up-front temozolomide in previously untreated low-grade glioma. We describe the digital EORTC individual case review (ICR) performed to evaluate protocol radiotherapy (RT) compliance. Fifty-eight institutions were asked to submit 1-2 randomly selected cases. Digital ICR datasets were uploaded to the EORTC server and accessed by three central reviewers. Twenty-seven parameters were analysed including volume delineation, treatment planning, organ at risk (OAR) dosimetry and verification. Consensus reviews were collated and summary statistics calculated. Fifty-seven of seventy-two requested datasets from forty-eight institutions were technically usable. 31/57 received a major deviation for at least one section. Relocation accuracy was according to protocol in 45. Just over 30% had acceptable target volumes. OAR contours were missing in an average of 25% of cases. Up to one-third of those present were incorrectly drawn while dosimetry was largely protocol compliant. Beam energy was acceptable in 97% and 48 patients had per protocol beam arrangements. Digital RT plan submission and review within the EORTC 22033-26033 ICR provide a solid foundation for future quality assurance procedures. Strict evaluation resulted in overall grades of minor and major deviation for 37% and 32%, respectively. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Giosan, Cezar; Cobeanu, Oana; Mogoaşe, Cristina; Szentagotai, Aurora; Mureşan, Vlad; Boian, Rareș
2017-05-12
Depression has become one of the leading contributors to the global disease burden. Evidence-based treatments for depression are available, but access to them is still limited in some instances. As technology has become more integrated into mental health care, computerized cognitive behavioral therapy (CBT) protocols have become available and have been recently transposed to mobile environments (e.g., smartphones) in the form of "apps." Preliminary research on some depression apps has shown promising results in reducing subthreshold or mild to moderate depressive symptoms. However, this small number of studies reports a low statistical power and they have not yet been replicated. Moreover, none of them included an active placebo comparison group. This is problematic, as a "digital placebo effect" may explain some of the positive effects documented until now. The aim of this study is to test a newly developed mobile app firmly grounded in the CBT theory of depression to determine whether this app is clinically useful in decreasing moderate depressive symptoms when compared with an active placebo. Additionally, we are interested in the app's effect on emotional wellbeing and depressogenic cognitions. Romanian-speaking adults (18 years and older) with access to a computer and the Internet and owning a smartphone are included in the study. A randomized, three-arm clinical trial is being conducted (i.e., active intervention, placebo intervention and delayed intervention). Two hundred and twenty participants with moderate depressive symptoms (i.e., obtaining scores >9 and ≤16 on the Patient Health Questionnaire, PHQ-9) will be randomized to the three conditions. Participants undergoing therapy, presenting serious mental health problems, or legal or health issues that would prevent them from using the app, as well as participants reporting suicidal ideation are excluded. Participants randomized to the active and placebo interventions will use the smartphone app for 6 weeks. A short therapist check-in via phone will take place every week. Participants in the delayed-intervention condition will be given access to the app after 6 weeks from randomization. The primary outcome is the level of depressive symptomatology. The intervention delivered through the app to the active condition includes psychoeducational materials and exercises based on CBT for depression, while the placebo intervention uses a sham version of the app (i.e., similar structure of courses and exercises). To our knowledge, this study protocol is the first to test the efficacy of a smartphone app for depressive symptomatology in the form of a randomized controlled trial (RCT) that includes an active placebo condition. As such, this can substantially add to the body of evidence supporting the use of apps designed to decrease depression. ClinicalTrials.gov, identifier: NCT03060200 . Registered on 1 February 2017. The first participant was enrolled on 17 February 2017.
Skruibis, Paulius; Eimontas, Jonas; Dovydaitiene, Migle; Mazulyte, Egle; Zelviene, Paulina; Kazlauskas, Evaldas
2016-07-26
Adjustment disorder is one of the most common mental health diagnoses. Still it receives relatively little attention from researchers trying to establish best interventions to treat it. With high prevalence of stressful life events, which might be leading to adjustment disorder, and limited resources of mental health service providers, online interventions could be a very practical way of helping people who have these disorders or are in the risk to develop them. The proposed study protocol is aimed to describe a randomized controlled trial of an internet-based modular intervention for adjustment disorder as it is defined in a proposal for the ICD-11. This study is a two-armed Randomized Controlled Trial (RCT) to examine the effectiveness of a web-based intervention BADI (Brief Adjustment Disorder Intervention) for adjustment disorder symptoms. BADI has four modules: Relaxation, Time management, Mindfulness and Strengthening relationships. It is based on stress and coping research and integrates evidence-based treatment approaches such as Cognitive Behavioural therapy (CBT), mindfulness and body-mind practices, as well as exercises for enhancing social support. Primary outcome of the study are symptoms of adjustment disorder and well-being. Engagement into the program and motivation for change is a secondary outcome. All participants after completing the baseline assessment are randomly assigned to one of the two groups: either to the one in which participant will instantly gain access to the BADI intervention or a group in which participants will be given access to the BADI program after waiting one month. Participants of BADI can choose exercises of the program flexibly. There is no particular order in which the exercises should be completed. Study will provide new insights of modular internet-based interventions efficacy for adjustment disorders. The study will also provide information about the role of motivation and expectancies on engagement in modular internet-based interventions. In case this RCT supports effectiveness of fully automated version of BADI, it could be used very broadly. It could become a cost-effective and accessible intervention for adjustment disorder. The study was retrospectively registered with the Australian and New Zealand Clinical Trials Registry with the registration number ACTRN12616000883415 . Registered 5 July, 2016.
2012-01-01
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486
A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
Charrier, Nathanael; Zarca, Kevin; Durand-Zaleski, Isabelle; Calinaud, Christine
2016-02-08
With the development of information and communication technologies, telemedicine has been proposed as a way to improve patient management by facilitating access to appropriate diagnosis and treatment. The Paris Ile de France Regional Health Agency is currently funding a comprehensive program of telemedicine experiments. This article describes the protocols for the evaluation of the implementation of telemedicine in the Paris region. Over 2,500 patients have been included in eight studies addressing the use of telemedicine in the context of specific diseases or settings. Two projects are randomized controlled trials, while the six other projects are based on before-after designs (differences in differences studies). Based on the MAST model and the French national framework, we identified endpoints to assess the impact of telemedicine on five dimensions: clinical effectiveness, cost-effectiveness, security of the application, patient satisfaction and quality of life and perception of professionals. Telemedicine encompasses a wide range of services and stakeholders, and thus study protocols must be tailored to the specific constraints and interests of the users. NCT02110433 (03/07/2014), NCT02157740 (05/27/2014), NCT02374697 (02/05/2015), NCT02157727 (05/27/2014), NCT02229279 (08/28/2014), NCT02368769 (02/05/2015), NCT02164747 (NCT02164747), NCT02309905 (11/27/2014).
NASA Astrophysics Data System (ADS)
Coggins, Porter E.
2015-04-01
The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.
Cunningham, John A; Hodgins, David C; Keough, Matthew; Hendershot, Christian S; Bennett, Kylie; Bennett, Anthony; Godinho, Alexandra
2018-05-25
The current randomized controlled trial seeks to evaluate whether providing access to an Internet intervention for problem drinking in addition to an Internet intervention for problem gambling is beneficial for participants with gambling problems who do or do not have co-occurring problem drinking. Potential participants will be recruited online via a comprehensive advertisement strategy, if they meet the criteria for problem gambling. As part of the baseline measures, problem drinking will also be assessed. Eligible participants (N = 280) who agree to partake in the study and to be followed up for 6 months will be randomized into one of two versions of an Internet intervention for gamblers: an intervention that targets only gambling issues (G-only) and one that combines a gambling intervention with an intervention for problem drinking (G + A). For problem gamblers who exhibit co-occurring problem drinking, it is predicted that participants who are provided access to the G + A intervention will demonstrate a significantly greater level of reduction in gambling outcomes at 6 months compared to those provided access to the G-only intervention. This trial will expand upon the current research on Internet interventions for addictions and inform the development of treatments for those with co-occurring problem drinking and gambling. ClinicalTrials.gov, NCT03323606 . Registered on 24 October 2017.
Watson, Dennis P; Ray, Bradley; Robison, Lisa; Xu, Huiping; Edwards, Rhiannon; Salyers, Michelle P; Hill, James; Shue, Sarah
2017-01-01
There is a lack of evidence-based substance use disorder treatment and services targeting returning inmates. Substance Use Programming for Person-Oriented Recovery and Treatment (SUPPORT) is a community-driven, recovery-oriented approach to substance abuse care which has the potential to address this service gap. SUPPORT is modeled after Indiana's Access to Recovery program, which was closed due to lack of federal support despite positive improvements in clients' recovery outcomes. SUPPORT builds on noted limitations of Indiana's Access to Recovery program. The ultimate goal of this project is to establish SUPPORT as an effective and scalable recovery-oriented system of care. A necessary step we must take before launching a large clinical trial is pilot testing the SUPPORT intervention. The pilot will take place at Public Advocates in Community Re-Entry (PACE), nonprofit serving individuals with felony convictions who are located in Marion County, Indiana (Indianapolis). The pilot will follow a basic parallel randomized design to compare clients receiving SUPPORT with clients receiving standard services. A total of 80 clients within 3 months of prison release will be recruited to participate and randomly assigned to one of the two intervention arms. Quantitative measures will be collected at multiple time points to understand SUPPORT's impact on recovery capital and outcomes. We will also collect qualitative data from SUPPORT clients to better understand their program and post-discharge experiences. Successful completion of this pilot will prepare us to conduct a multi-site clinical trial. The ultimate goal of this future work is to develop an evidence-based and scalable approach to treating substance use disorder among persons returning to society after incarceration. ClinicalTrials.gov (Clinical Trials ID: NCT03132753 and Protocol Number: 1511731907). Registered 28 April 2017.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... Connection testing [using current Nasdaq access protocols] during the normal operating hours of the NTF; No Charge--For Idle Connection testing [using current Nasdaq access protocols]; $333/hour--For Active Connection testing [using current Nasdaq access protocols] at all times other than the normal operating hours...
Practical State Machine Replication with Confidentiality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Zhang, Haibin
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less
Patel, Manesh R; Schardt, Connie M; Sanders, Linda L; Keitz, Sheri A
2006-10-01
The paper compares the speed, validity, and applicability of two different protocols for searching the primary medical literature. A randomized trial involving medicine residents was performed. An inpatient general medicine rotation was used. Thirty-two internal medicine residents were block randomized into four groups of eight. Success rate of each search protocol was measured by perceived search time, number of questions answered, and proportion of articles that were applicable and valid. Residents randomized to the MEDLINE-first (protocol A) group searched 120 questions, and residents randomized to the MEDLINE-last (protocol B) searched 133 questions. In protocol A, 104 answers (86.7%) and, in protocol B, 117 answers (88%) were found to clinical questions. In protocol A, residents reported that 26 (25.2%) of the answers were obtained quickly or rated as "fast" (<5 minutes) as opposed to 55 (51.9%) in protocol B, (P = 0.0004). A subset of questions and articles (n = 79) were reviewed by faculty who found that both protocols identified similar numbers of answer articles that addressed the questions and were felt to be valid using critical appraisal criteria. For resident-generated clinical questions, both protocols produced a similarly high percentage of applicable and valid articles. The MEDLINE-last search protocol was perceived to be faster. However, in the MEDLINE-last protocol, a significant portion of questions (23%) still required searching MEDLINE to find an answer.
FD/DAMA Scheme For Mobile/Satellite Communications
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.
1992-01-01
Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.
A study of topologies and protocols for fiber optic local area network
NASA Technical Reports Server (NTRS)
Yeh, C.; Gerla, M.; Rodrigues, P.
1985-01-01
The emergence of new applications requiring high data traffic necessitates the development of high speed local area networks. Optical fiber is selected as the transmission medium due to its inherent advantages over other possible media and the dual optical bus architecture is shown to be the most suitable topology. Asynchronous access protocols, including token, random, hybrid random/token, and virtual token schemes, are developed and analyzed. Exact expressions for insertion delay and utilization at light and heavy load are derived, and intermediate load behavior is investigated by simulation. A new tokenless adaptive scheme whose control depends only on the detection of activity on the channel is shown to outperform round-robin schemes under uneven loads and multipacket traffic and to perform optimally at light load. An approximate solution to the queueing delay for an oscillating polling scheme under chaining is obtained and results are compared with simulation. Solutions to the problem of building systems with a large number of stations are presented, including maximization of the number of optical couplers, and the use of passive star/bus topologies, bridges and gateways.
Hazell, Cassie M; Hayward, Mark; Cavanagh, Kate; Jones, Anna-Marie; Strauss, Clara
2016-07-26
Cognitive behavior therapy for psychosis (CBTp) is an effective intervention for people who hear distressing voices (auditory hallucinations). However, there continues to be a problem of poor access to CBTp. Constraints on health care funding require this problem to be addressed without a substantial increase in funding. One solution is to develop guided self-help forms of CBTp to improve access, and a symptom-specific focus on, for example, distressing voices (auditory verbal hallucinations) has the potential to enhance effectiveness. We term this cognitive behavior therapy for distressing voices (CBTv). This trial is an external pilot randomized controlled trial comparing the effects of 12-week guided self-help CBTv (with eight therapist support sessions) with a wait list control condition. Informed consent will be obtained from each participant. Half of the 30 participants will be randomized to receive guided self-help CBTv immediately; the remaining half will receive the intervention after a 12-week delay. All participants will continue with their usual treatment throughout the study. Outcomes will be assessed using questionnaires completed at baseline and 12 weeks postrandomization. Interviews will be offered to all those who receive therapy immediately to explore their experiences with the intervention. The outcomes of this trial, both quantitative and qualitative, will inform the design of a definitive randomized controlled trial of guided self-help CBTv. If this intervention is effective, it could help to increase access to CBT for those who hear distressing voices. ISRCTN registration number ISRCTN77762753 . Registered on 23 July 2015.
Packet communications in satellites with multiple-beam antennas and signal processing
NASA Technical Reports Server (NTRS)
Davies, R.; Chethik, F.; Penick, M.
1980-01-01
A communication satellite with a multiple-beam antenna and onboard signal processing is considered for use in a 'message-switched' data relay system. The signal processor may incorporate demodulation, routing, storage, and remodulation of the data. A system user model is established and key functional elements for the signal processing are identified. With the throughput and delay requirements as the controlled variables, the hardware complexity, operational discipline, occupied bandwidth, and overall user end-to-end cost are estimated for (1) random-access packet switching; and (2) reservation-access packet switching. Other aspects of this network (eg, the adaptability to channel switched traffic requirements) are examined. For the given requirements and constraints, the reservation system appears to be the most attractive protocol.
Beiwinkel, Till; Hey, Stefan; Bock, Olaf; Rössler, Wulf
2017-01-01
Mobile health (mHealth) could be widely used in the population to improve access to psychological treatment. In this paper, we describe the development of a mHealth intervention on the basis of supportive self-monitoring and describe the protocol for a randomized controlled trial to evaluate its effectiveness among smartphone users with psychological distress. Based on power analysis, a representative quota sample of N = 186 smartphone users will be recruited, with an over-sampling of persons with moderate to high distress. Over a 4-week period, the intervention will be compared to a self-monitoring without intervention group and a passive control group. Telephone interviews will be conducted at baseline, post-intervention (4 weeks), and 12-week follow-up to assess study outcomes. The primary outcome will be improvement of mental health. Secondary outcomes will include well-being, intentions toward help-seeking and help-seeking behavior, user activation, attitudes toward mental-health services, perceived stigmatization, smartphone app quality, user satisfaction, engagement, and adherence with the intervention. Additionally, data from the user’s daily life as collected during self-monitoring will be used to investigate risk and protective factors of mental health in real-world settings. Therefore, this study will allow us to demonstrate the effectiveness of a smartphone application as a widely accessible and low-cost intervention to improve mental health on a population level. It also allows to identify new assessment approaches in the field of psychiatric epidemiology. PMID:28983477
Beiwinkel, Till; Hey, Stefan; Bock, Olaf; Rössler, Wulf
2017-01-01
Mobile health (mHealth) could be widely used in the population to improve access to psychological treatment. In this paper, we describe the development of a mHealth intervention on the basis of supportive self-monitoring and describe the protocol for a randomized controlled trial to evaluate its effectiveness among smartphone users with psychological distress. Based on power analysis, a representative quota sample of N = 186 smartphone users will be recruited, with an over-sampling of persons with moderate to high distress. Over a 4-week period, the intervention will be compared to a self-monitoring without intervention group and a passive control group. Telephone interviews will be conducted at baseline, post-intervention (4 weeks), and 12-week follow-up to assess study outcomes. The primary outcome will be improvement of mental health. Secondary outcomes will include well-being, intentions toward help-seeking and help-seeking behavior, user activation, attitudes toward mental-health services, perceived stigmatization, smartphone app quality, user satisfaction, engagement, and adherence with the intervention. Additionally, data from the user's daily life as collected during self-monitoring will be used to investigate risk and protective factors of mental health in real-world settings. Therefore, this study will allow us to demonstrate the effectiveness of a smartphone application as a widely accessible and low-cost intervention to improve mental health on a population level. It also allows to identify new assessment approaches in the field of psychiatric epidemiology.
On Ramps: Options and Issues in Accessing the Internet.
ERIC Educational Resources Information Center
Bocher, Bob
1995-01-01
Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…
González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina
2015-10-31
Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.
Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect
Landrine, Hope; Klonoff, Elizabeth A.
2003-01-01
Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Interoperability in the Planetary Science Archive (PSA)
NASA Astrophysics Data System (ADS)
Rios Diaz, C.
2017-09-01
The protocols and standards currently being supported by the recently released new version of the Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet- Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. We explore these protocols in more detail providing scientifically useful examples of their usage within the PSA.
Experiences with http/WebDAV protocols for data access in high throughput computing
NASA Astrophysics Data System (ADS)
Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier
2011-12-01
In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.
Solution-Processed Carbon Nanotube True Random Number Generator.
Gaviria Rojas, William A; McMorrow, Julian J; Geier, Michael L; Tang, Qianying; Kim, Chris H; Marks, Tobin J; Hersam, Mark C
2017-08-09
With the growing adoption of interconnected electronic devices in consumer and industrial applications, there is an increasing demand for robust security protocols when transmitting and receiving sensitive data. Toward this end, hardware true random number generators (TRNGs), commonly used to create encryption keys, offer significant advantages over software pseudorandom number generators. However, the vast network of devices and sensors envisioned for the "Internet of Things" will require small, low-cost, and mechanically flexible TRNGs with low computational complexity. These rigorous constraints position solution-processed semiconducting single-walled carbon nanotubes (SWCNTs) as leading candidates for next-generation security devices. Here, we demonstrate the first TRNG using static random access memory (SRAM) cells based on solution-processed SWCNTs that digitize thermal noise to generate random bits. This bit generation strategy can be readily implemented in hardware with minimal transistor and computational overhead, resulting in an output stream that passes standardized statistical tests for randomness. By using solution-processed semiconducting SWCNTs in a low-power, complementary architecture to achieve TRNG, we demonstrate a promising approach for improving the security of printable and flexible electronics.
Chart Card: Feasibility of a Tool for Improving Emergency Department Care in Sickle Cell Disease
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C.; Paulukonis, Susan; Vichinsky, Elliott P.; Treadwell, Marsha J.
2016-01-01
Background Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card–sized Chart Card was designed. Objective To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. Methods One-half of 44 adults (aged ~18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Results Fifty-two percent of patients were female (mean age, 18.8 ± 15.6); 61% had SCD SS. Adults visited an emergency department 4.2 ± 4.0 times in the year prior to enrollment vs 2.7 ± 3.7 (p = .06) visits for children, most commonly for pain. Patient emergency department care ratings of very good or excellent increased from 47% to 66% (p < .05), and ratings of staff knowledge improved. Qualitative data reflected positive comments about patient and staff experiences with the Chart Card. Conclusion Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings. PMID:21141289
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, ChangLi; Complex and Intelligent System Research Center, East China University of Science and Technology, Shanghai 200237; Wang, XueJun
2016-05-15
The switching characteristic of the poly(vinylidene fluoride-trifluoroethlene) (P(VDF-TrFE)) films have been studied at different ranges of applied electric field. It is suggest that the increase of the switching speed upon nucleation protocol and the deceleration of switching could be related to the presence of a non-ferroelectric layer. Remarkably, a capacitor and resistor (RC) links model plays significant roles in the polarization switching dynamics of the thin films. For P(VDF-TrFE) ultrathin films with electroactive interlayer, it is found that the switching dynamic characteristics are strongly affected by the contributions of resistor and non-ferroelectric (non-FE) interface factors. A corresponding experiment is designedmore » using poly(3,4-ethylene dioxythiophene):poly(styrene sulfonic) (PEDOT-PSSH) as interlayer with different proton concentrations, and the testing results show that the robust switching is determined by the proton concentration in interlayer and lower leakage current in circuit to reliable applications of such polymer films. These findings provide a new feasible method to enhance the polarization switching for the ferroelectric random access memory.« less
Vascular Access Outcomes Reported in Maintenance Hemodialysis Trials: A Systematic Review.
Viecelli, Andrea K; O'Lone, Emma; Sautenet, Benedicte; Craig, Jonathan C; Tong, Allison; Chemla, Eric; Hooi, Lai-Seong; Lee, Timmy; Lok, Charmaine; Polkinghorne, Kevan R; Quinn, Robert R; Vachharajani, Tushar; Vanholder, Raymond; Zuo, Li; Irish, Ashley B; Mori, Trevor A; Pascoe, Elaine M; Johnson, David W; Hawley, Carmel M
2018-03-01
Many randomized controlled trials have been performed with the goal of improving outcomes related to hemodialysis vascular access. If the reported outcomes are relevant and measured consistently to allow comparison of interventions across trials, such trials can inform decision making. This study aimed to assess the scope and consistency of vascular access outcomes reported in contemporary hemodialysis trials. Systematic review. Adults requiring maintenance hemodialysis. All randomized controlled trials and trial protocols reporting vascular access outcomes identified from ClinicalTrials.gov, Embase, MEDLINE, and the Cochrane Kidney and Transplant Specialized Register from January 2011 to June 2016. Any hemodialysis-related intervention. The frequency and characteristics of vascular access outcome measures were analyzed and classified. From 168 relevant trials, 1,426 access-related outcome measures were extracted and classified into 23 different outcomes. The 3 most common outcomes were function (136 [81%] trials), infection (63 [38%]), and maturation (31 [18%]). Function was measured in 489 different ways, but most frequently reported as "mean access blood flow (mL/min)" (37 [27%] trials) and "number of thromboses" (30 [22%]). Infection was assessed in 136 different ways, with "number of access-related infections" being the most common measure. Maturation was assessed in 44 different ways at 15 different time points and most commonly characterized by vein diameter and blood flow. Patient-reported outcomes, including pain (19 [11%]) and quality of life (5 [3%]), were reported infrequently. Only a minority of trials used previously standardized outcome definitions. Restricted sampling frame for feasibility and focus on contemporary trials. The reporting of access outcomes in hemodialysis trials is very heterogeneous, with limited patient-reported outcomes and infrequent use of standardized outcome measures. Efforts to standardize outcome reporting for vascular access are critical to optimizing the comparability, reliability, and value of trial evidence to improve outcomes for patients requiring hemodialysis. Copyright © 2017 National Kidney Foundation, Inc. All rights reserved.
On Searching Available Channels with Asynchronous MAC-Layer Spectrum Sensing
NASA Astrophysics Data System (ADS)
Jiang, Chunxiao; Ma, Xin; Chen, Canfeng; Ma, Jian; Ren, Yong
Dynamic spectrum access has become a focal issue recently, in which identifying the available spectrum plays a rather important role. Lots of work has been done concerning secondary user (SU) synchronously accessing primary user's (PU's) network. However, on one hand, SU may have no idea about PU's communication protocols; on the other, it is possible that communications among PU are not based on synchronous scheme at all. In order to address such problems, this paper advances a strategy for SU to search available spectrums with asynchronous MAC-layer sensing. With this method, SUs need not know the communication mechanisms in PU's network when dynamically accessing. We will focus on four aspects: 1) strategy for searching available channels; 2) vacating strategy when PUs come back; 3) estimation of channel parameters; 4) impact of SUs' interference on PU's data rate. The simulations show that our search strategy not only can achieve nearly 50% less interference probability than equal allocation of total search time, but also well adapts to time-varying channels. Moreover, access by our strategies can attain 150% more access time than random access. The moment matching estimator shows good performance in estimating and tracing time-varying channels.
Chan Osilla, Karen; Watkins, Katherine E; Kulesza, Magdalena; Flórez, Karen; Lara-Greenberg, Marielena; Miles, Jeremy N V
2016-03-31
Driving under the influence (DUI) of alcohol is a major public health concern, and many individuals continue to drink and drive even after being convicted of a DUI offense. Latinos, in particular, are disproportionately likely to be arrested for a DUI, have higher rates of recidivism, and are more likely to die in alcohol-related accidents than non-Latino Whites. Latinos also experience significant disparities in accessing alcohol-related treatment. This study protocol paper describes a randomized trial of cognitive behavioral therapy (CBT) compared to usual care in DUI programs for individuals with a first-time offense and at-risk drinking. We will utilize a two-group randomized design where individuals enrolled in a DUI program with a first-time conviction will be randomized to CBT (n = 150) or usual care (n = 150). Participants will be assessed at baseline, immediately post-treatment, and 6-months post-treatment. Recidivism data will be collected using administrative data within 2 years post-treatment. This project has the potential to benefit a large population of vulnerable individuals who are at risk of DUI recidivism. It also develops a new model of care by providing treatment in DUI programs to reduce disparities associated with poor treatment access. Trial registration NCT02588703.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
Vedula, S Swaroop; Li, Tianjing; Dickersin, Kay
2013-01-01
Details about the type of analysis (e.g., intent to treat [ITT]) and definitions (i.e., criteria for including participants in the analysis) are necessary for interpreting a clinical trial's findings. Our objective was to compare the description of types of analyses and criteria for including participants in the publication (i.e., what was reported) with descriptions in the corresponding internal company documents (i.e., what was planned and what was done). Trials were for off-label uses of gabapentin sponsored by Pfizer and Parke-Davis, and documents were obtained through litigation. For each trial, we compared internal company documents (protocols, statistical analysis plans, and research reports, all unpublished), with publications. One author extracted data and another verified, with a third person verifying discordant items and a sample of the rest. Extracted data included the number of participants randomized and analyzed for efficacy, and types of analyses for efficacy and safety and their definitions (i.e., criteria for including participants in each type of analysis). We identified 21 trials, 11 of which were published randomized controlled trials, and that provided the documents needed for planned comparisons. For three trials, there was disagreement on the number of randomized participants between the research report and publication. Seven types of efficacy analyses were described in the protocols, statistical analysis plans, and publications, including ITT and six others. The protocol or publication described ITT using six different definitions, resulting in frequent disagreements between the two documents (i.e., different numbers of participants were included in the analyses). Descriptions of analyses conducted did not agree between internal company documents and what was publicly reported. Internal company documents provide extensive documentation of methods planned and used, and trial findings, and should be publicly accessible. Reporting standards for randomized controlled trials should recommend transparent descriptions and definitions of analyses performed and which study participants are excluded.
NASA Astrophysics Data System (ADS)
Civera Lorenzo, Tamara
2017-10-01
Brief presentation about the J-PLUS EDR data access web portal (http://archive.cefca.es/catalogues/jplus-edr) where the different services available to retrieve images and catalogues data have been presented.J-PLUS Early Data Release (EDR) archive includes two types of data: images and dual and single catalogue data which include parameters measured from images. J-PLUS web portal offers catalogue data and images through several different online data access tools or services each suited to a particular need. The different services offered are: Coverage map Sky navigator Object visualization Image search Cone search Object list search Virtual observatory services: Simple Cone Search Simple Image Access Protocol Simple Spectral Access Protocol Table Access Protocol
Private randomness expansion with untrusted devices
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2011-03-01
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
Effect of various practical warm-up protocols on acute lower-body power.
Buttifant, David; Hrysomallis, Con
2015-03-01
The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.
Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin
2018-01-11
The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.
Koblin, Beryl; Hirshfield, Sabina; Chiasson, Mary Ann; Wilton, Leo; Usher, DaShawn; Nandi, Vijay; Hoover, Donald R; Frye, Victoria
2017-12-19
HIV testing is a critical component of HIV prevention and care. Interventions to increase HIV testing rates among young black men who have sex with men (MSM) and black transgender women (transwomen) are needed. Personalized recommendations for an individual's optimal HIV testing approach may increase testing. This randomized trial tests the hypothesis that a personalized recommendation of an optimal HIV testing approach will increase HIV testing more than standard HIV testing information. A randomized trial among 236 young black men and transwomen who have sex with men or transwomen is being conducted. Participants complete a computerized baseline assessment and are randomized to electronically receive a personalized HIV testing recommendation or standard HIV testing information. Follow-up surveys are conducted online at 3 and 6 months after baseline. The All About Me randomized trial was launched in June 2016. Enrollment is completed and 3-month retention is 92.4% (218/236) and has exceeded study target goals. The All About Me intervention is an innovative approach to increase HIV testing by providing a personalized recommendation of a person's optimal HIV testing approach. If successful, optimizing this intervention for mobile devices will widen access to large numbers of individuals. ClinicalTrial.gov NCT02834572; https://clinicaltrials.gov/ct2/show/NCT02834572 (Archived by WebCite at http://www.webcitation.org/6vLJWOS1B). ©Beryl Koblin, Sabina Hirshfield, Mary Ann Chiasson, Leo Wilton, DaShawn Usher, Vijay Nandi, Donald R Hoover, Victoria Frye. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 19.12.2017.
Shorey, Shefaly; Ng, Yvonne Peng Mei; Siew, An Ling; Yoong, Joanne; Mörelius, Evalotte
2018-01-10
Supportive educational programs during the perinatal period are scarce in Singapore. There is no continuity of care available in terms of support from community care nurses in Singapore. Parents are left on their own most of the time, which results in a stressful transition to parenthood. There is a need for easily accessible technology-based educational programs that can support parents during this crucial perinatal period. The aim of this study was to describe the study protocol of a randomized controlled trial on a technology-based supportive educational parenting program. A randomized controlled two-group pretest and repeated posttest experimental design will be used. The study will recruit 118 parents (59 couples) from the antenatal clinics of a tertiary public hospital in Singapore. Eligible parents will be randomly allocated to receive either the supportive educational parenting program or routine perinatal care from the hospital. Outcome measures include parenting self-efficacy, parental bonding, postnatal depression, social support, parenting satisfaction, and cost evaluation. Data will be collected at the antenatal period, immediate postnatal period, and at 1 month and 3 months post childbirth. Recruitment of the study participants commenced in December 2016 and is still ongoing. Data collection is projected to finish within 12 months, by December 2017. This study will identify a potentially clinically useful, effective, and cost-effective supportive educational parenting program to improve parental self-efficacy and bonding in newborn care, which will then improve parents' social support-seeking behaviors, emotional well-being, and satisfaction with parenting. It is hoped that better supported and satisfied parents will consider having more children, which may in turn influence Singapore's ailing birth rate. International Standard Randomized Controlled Trial Number (ISRCTN): 48536064; https://www.isrctn.com/ISRCTN48536064 (Archived by WebCite at http://www.webcitation.org/6wMuEysiO). ©Shefaly Shorey, Yvonne Peng Mei Ng, An Ling Siew, Joanne Yoong, Evalotte Mörelius. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 10.01.2018.
RACOON: a multiuser QoS design for mobile wireless body area networks.
Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen
2011-10-01
In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.
Genetic and epigenetic stability of cryopreserved and cold-stored hops (Humulus lupulus L.).
Peredo, Elena L; Arroyo-García, Rosa; Reed, Barbara M; Revilla, M Angeles
2008-12-01
Conventional cold storage and cryopreservation methods for hops (Humulus lupulus L.) are available but, to our knowledge, the genetic and epigenetic stability of the recovered plants have not been tested. This study analyzed 51 accessions of hop using the molecular techniques, Random Amplified DNA Polymorphism (RAPD) and Amplified Fragment Length Polymorphism (AFLP), revealing no genetic variation among greenhouse-grown controls and cold stored or cryopreserved plants. Epigenetic stability was evaluated using Methylation Sensitive Amplified Polymorphism (MSAP). Over 36% of the loci were polymorphic when the cold and cryo-treated plants were compared to greenhouse plants. The main changes were demethylation events and they were common to the cryopreserved and cold stored plants indicating the possible effect of the in vitro establishment process, an essential step in both protocols. Protocol-specific methylation patterns were also detected indicating that both methods produced epigenetic changes in plants following cold storage and cryopreservation.
Choi, Bryan; Asselin, Nicholas; Pettit, Catherine C; Dannecker, Max; Machan, Jason T; Merck, Derek L; Merck, Lisa H; Suner, Selim; Williams, Kenneth A; Jay, Gregory D; Kobayashi, Leo
2016-12-01
Effective resuscitation of out-of-hospital cardiac arrest (OHCA) patients is challenging. Alternative resuscitative approaches using electromechanical adjuncts may improve provider performance. Investigators applied simulation to study the effect of an experimental automation-assisted, goal-directed OHCA management protocol on EMS providers' resuscitation performance relative to standard protocols and equipment. Two-provider (emergency medical technicians (EMT)-B and EMT-I/C/P) teams were randomized to control or experimental group. Each team engaged in 3 simulations: baseline simulation (standard roles); repeat simulation (standard roles); and abbreviated repeat simulation (reversed roles, i.e., basic life support provider performing ALS tasks). Control teams used standard OHCA protocols and equipment (with high-performance cardiopulmonary resuscitation training intervention); for second and third simulations, experimental teams performed chest compression, defibrillation, airway, pulmonary ventilation, vascular access, medication, and transport tasks with goal-directed protocol and resuscitation-automating devices. Videorecorders and simulator logs collected resuscitation data. Ten control and 10 experimental teams comprised 20 EMT-B's; 1 EMT-I, 8 EMT-C's, and 11 EMT-P's; study groups were not fully matched. Both groups suboptimally performed chest compressions and ventilations at baseline. For their second simulations, control teams performed similarly except for reduced on-scene time, and experimental teams improved their chest compressions (P=0.03), pulmonary ventilations (P<0.01), and medication administration (P=0.02); changes in their performance of chest compression, defibrillation, airway, and transport tasks did not attain significance against control teams' changes. Experimental teams maintained performance improvements during reversed-role simulations. Simulation-based investigation into OHCA resuscitation revealed considerable variability and improvable deficiencies in small EMS teams. Goal-directed, automation-assisted OHCA management augmented select resuscitation bundle element performance without comprehensive improvement.
Hodgins, David C; Fick, Gordon H; Murray, Robert; Cunningham, John A
2013-01-08
Gambling disorders affect about one percent of adults. Effective treatments are available but only a small proportion of affected individuals will choose to attend formal treatment. As a result, self-directed treatments have also been developed and found effective. Self-directed treatments provide individuals with information and support to initiate a recovery program without attending formal treatment. In previous research we developed an telephone-based intervention package that helps people to be motivated to tackle their gambling problem and to use basic behavioral and cognitive change strategies. The present study will investigate the efficacy of this self-directed intervention offered as a free online resource. The Internet is an excellent modality in which to offer self-directed treatment for gambling problems. The Internet is increasingly accessible to members of the public and is frequently used to access health-related information. Online gambling sites are also becoming more popular gambling platforms. A randomized clinical trial (N=180) will be conducted in which individuals with gambling problems who are not interested in attending formal treatment are randomly assigned to have access to an online self-directed intervention or to a comparison condition. The comparison condition will be an alternative website that offers a self-assessment of gambling involvement and gambling-related problems. The participant's use of the resources and their gambling involvement (days of gambling, dollars loss) and their gambling problems will be tracked for a twelve month follow-up period. The results of this research will be important for informing policy-makers who are developing treatment systems. ISRCTN06220098.
Yoga for generalized anxiety disorder: design of a randomized controlled clinical trial.
Hofmann, Stefan G; Curtiss, Joshua; Khalsa, Sat Bir S; Hoge, Elizabeth; Rosenfield, David; Bui, Eric; Keshaviah, Aparna; Simon, Naomi
2015-09-01
Generalized anxiety disorder (GAD) is a common disorder associated with significant distress and interference. Although cognitive behavioral therapy (CBT) has been shown to be the most effective form of psychotherapy, few patients receive or have access to this intervention. Yoga therapy offers another promising, yet under-researched, intervention that is gaining increasing popularity in the general public, as an anxiety reduction intervention. The purpose of this innovative clinical trial protocol is to investigate the efficacy of a Kundalini Yoga intervention, relative to CBT and a control condition. Kundalini yoga and CBT are compared with each other in a noninferiority test and both treatments are compared to stress education training, an attention control intervention, in superiority tests. The sample will consist of 230 individuals with a primary DSM-5 diagnosis of GAD. This randomized controlled trial will compare yoga (N=95) to both CBT for GAD (N=95) and stress education (N=40), a commonly used control condition. All three treatments will be administered by two instructors in a group format over 12 weekly sessions with four to six patients per group. Groups will be randomized using permuted block randomization, which will be stratified by site. Treatment outcome will be evaluated bi-weekly and at 6month follow-up. Furthermore, potential mediators of treatment outcome will be investigated. Given the individual and economic burden associated with GAD, identifying accessible alternative behavioral treatments will have substantive public health implications. Copyright © 2015 Elsevier Inc. All rights reserved.
Yoga for Generalized Anxiety Disorder: Design of a Randomized Controlled Clinical Trial
Hofmann, Stefan G.; Curtiss, Joshua; Khalsa, Sat Bir S.; Hoge, Elizabeth; Rosenfield, David; Bui, Eric; Keshaviah, Aparna; Simon, Naomi
2015-01-01
Generalized anxiety disorder (GAD) is a common disorder associated with significant distress and interference. Although cognitive behavioral therapy (CBT) has been shown to the most effective form of psychotherapy, few patients receive or have access to this intervention. Yoga therapy offers another promising, yet under-researched, intervention that is gaining increasing popularity in the general public, as an anxiety reduction intervention. The purpose of this innovative clinical trial protocol is to investigate the efficacy of a Kundalini Yoga intervention, relative to CBT and a control condition. Kundalini yoga and CBT are compared with each other in a noninferiority test and both treatments are compared to stress education training, an attention control intervention, in superiority tests. The sample will consist of 230 individuals with a primary DSM-5 diagnosis of GAD. This randomized controlled trial will compare yoga (N = 95) to both CBT for GAD (N=95) and stress education (N = 40), a commonly used control condition. All three treatments will be administered by two instructors in a group format over 12 weekly sessions with four to six patients per group. Groups will be randomized using permuted block randomization, which will be stratified by site. Treatment outcome will be evaluated bi-weekly and at 6 month follow-up. Furthermore, potential mediators of treatment outcome will be investigated. Given the individual and economic burden associated with GAD, identifying accessible alternative behavioral treatments will have substantive public health implications. PMID:26255236
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
Structural barriers in access to medical marijuana in the USA-a systematic review protocol.
Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia
2017-08-07
There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... month.[the following charges: $285/hour--For Active Connection testing using current Exchange access... using current Exchange access protocols; $333/hour--For Active Connection testing using current Exchange... a fee of $285 per hour for active connection testing using current BX access protocols during the...
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Research on a Queue Scheduling Algorithm in Wireless Communications Network
NASA Astrophysics Data System (ADS)
Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai
This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
ERIC Educational Resources Information Center
Pinsoneault, Terry B.
2007-01-01
The ability of the Minnesota Multiphasic Personality Inventory-2 (MMPI-2; J. N. Butcher et al., 2001) validity scales to detect random, partially random, and nonrandom MMPI-2 protocols was investigated. Investigations included the Variable Response Inconsistency scale (VRIN), F, several potentially useful new F and VRIN subscales, and F-sub(b) - F…
On the routing protocol influence on the resilience of wireless sensor networks to jamming attacks.
Del-Valle-Soto, Carolina; Mex-Perera, Carlos; Monroy, Raul; Nolazco-Flores, Juan Arturo
2015-03-27
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.
NASA Astrophysics Data System (ADS)
Brask, Jonatan Bohr; Martin, Anthony; Esposito, William; Houlmann, Raphael; Bowles, Joseph; Zbinden, Hugo; Brunner, Nicolas
2017-05-01
An approach to quantum random number generation based on unambiguous quantum state discrimination is developed. We consider a prepare-and-measure protocol, where two nonorthogonal quantum states can be prepared, and a measurement device aims at unambiguously discriminating between them. Because the states are nonorthogonal, this necessarily leads to a minimal rate of inconclusive events whose occurrence must be genuinely random and which provide the randomness source that we exploit. Our protocol is semi-device-independent in the sense that the output entropy can be lower bounded based on experimental data and a few general assumptions about the setup alone. It is also practically relevant, which we demonstrate by realizing a simple optical implementation, achieving rates of 16.5 Mbits /s . Combining ease of implementation, a high rate, and a real-time entropy estimation, our protocol represents a promising approach intermediate between fully device-independent protocols and commercial quantum random number generators.
Importance of Standardized DXA Protocol for Assessing Physique Changes in Athletes.
Nana, Alisa; Slater, Gary J; Hopkins, Will G; Halson, Shona L; Martin, David T; West, Nicholas P; Burke, Louise M
2016-06-01
The implications of undertaking DXA scans using best practice protocols (subjects fasted and rested) or a less precise but more practical protocol in assessing chronic changes in body composition following training and a specialized recovery technique were investigated. Twenty-one male cyclists completed an overload training program, in which they were randomized to four sessions per week of either cold water immersion therapy or control groups. Whole-body DXA scans were undertaken with best practice protocol (Best) or random activity protocol (Random) at baseline, after 3 weeks of overload training, and after a 2-week taper. Magnitudes of changes in total, lean and fat mass from baseline-overload, overload-taper and baseline-taper were assessed by standardization (Δmean/SD). The standard deviations of change scores for total and fat-free soft tissue mass (FFST) from Random scans (2-3%) were approximately double those observed in the Best (1-2%), owing to extra random errors associated with Random scans at baseline. There was little difference in change scores for fat mass. The effect of cold water immersion therapy on baseline-taper changes in FFST was possibly harmful (-0.7%; 90% confidence limits ±1.2%) with Best scans but unclear with Random scans (0.9%; ±2.0%). Both protocols gave similar possibly harmful effects of cold water immersion therapy on changes in fat mass (6.9%; ±13.5% and 5.5%; ±14.3%, respectively). An interesting effect of cold water immersion therapy on training-induced changes in body composition might have been missed with a less precise scanning protocol. DXA scans should be undertaken with Best.
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
NASA Astrophysics Data System (ADS)
Moriyama, Daisuke; Okamoto, Tatsuaki
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
Mashamba-Thompson, T P; Drain, P K; Sartorius, B
2016-01-01
Introduction Poor healthcare access is a major barrier to receiving antenatal care and a cause of high maternal mortality in South Africa (SA). ‘Point-of-care’ (POC) diagnostics is a powerful emerging healthcare approach to improve healthcare access. This study focuses on evaluating the accessibility and utility of POC diagnostics for maternal health in rural SA primary healthcare (PHC) clinics in order to generate a model framework of implementation of POC diagnostics in rural South African clinics. Method and analyses We will use several research methods, including a systematic review, quasi-experiments, survey, key informant interviews and audits. We will conduct a systematic review and experimental study to determine the impact of POC diagnostics on maternal health. We will perform a cross-sectional case study of 100 randomly selected rural primary healthcare clinics in KwaZulu-Natal to measure the context and patterns of POC diagnostics access and usage by maternal health providers and patients. We will conduct interviews with relevant key stakeholders to determine the reasons for POC deficiencies regarding accessibility and utility of HIV-related POC diagnostics for maternal health. We will also conduct a vertical audit to investigate all the quality aspects of POC diagnostic services including diagnostic accuracy in a select number of clinics. On the basis of information gathered, we will propose a model framework for improved implementation of POC diagnostics in rural South African public healthcare clinics. Statistical (Stata-13) and thematic (NVIVO) data analysis will be used in this study. Ethics and dissemination The study protocol was approved by the Ethics Committee of the University of KwaZulu-Natal (BE 484/14) and the KwaZulu-Natal Department of Health based on the Helsinki Declaration (HRKM 40/15). Findings of this study will be disseminated electronically and in print. They will be presented to conferences related to HIV/AIDS, diagnostics, maternal health and strengthening of health systems. PMID:27354074
Open access publishing, article downloads, and citations: randomised controlled trial
Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L
2008-01-01
Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565
An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.
Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y
2017-10-01
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.
Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.
Chhor, Chloe M; Mercado, Cecilia L
2017-02-01
The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.
Xrootd in dCache - design and experiences
NASA Astrophysics Data System (ADS)
Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas
2011-12-01
dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.
Design of the frame structure for a multiservice interactive system using ATM-PON
NASA Astrophysics Data System (ADS)
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
Realistic noise-tolerant randomness amplification using finite number of devices.
Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-21
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
Realistic noise-tolerant randomness amplification using finite number of devices
NASA Astrophysics Data System (ADS)
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
Realistic noise-tolerant randomness amplification using finite number of devices
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-01-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302
McNally, Dayre; Amrein, Karin; O'Hearn, Katharine; Fergusson, Dean; Geier, Pavel; Henderson, Matt; Khamessan, Ali; Lawson, Margaret L; McIntyre, Lauralyn; Redpath, Stephanie; Weiler, Hope A; Menon, Kusum
2017-01-01
Clinical research has recently demonstrated that vitamin D deficiency (VDD) is highly prevalent in the pediatric intensive care unit (PICU) and associated with worse clinical course. Multiple adult ICU trials have suggested that optimization of vitamin D status through high-dose supplementation may reduce mortality and improve other clinically relevant outcomes; however, there have been no trials of rapid normalization in the PICU setting. The objective of this study is to evaluate the safety and efficacy of an enteral weight-based cholecalciferol loading dose regimen in critically ill children with VDD. The VITdAL-PICU pilot study is designed as a multicenter placebo-controlled phase II dose evaluation pilot randomized controlled trial. We aim to randomize 67 VDD critically ill children using a 2:1 randomization schema to receive loading dose enteral cholecalciferol (10,000 IU/kg, maximum of 400,000 IU) or a placebo solution. Participants, caregivers and outcome assessors will be blinded to allocation. Eligibility criteria include ICU patient, aged 37 weeks to 18 years, expected ICU length of stay more than 48 h, anticipated access to bloodwork at 7 days, and VDD (blood total 25 hydroxyvitamin D < 50 nmol/L). The primary objective is to determine whether the dosing protocol normalizes vitamin D status, defined as a blood total 25(OH)D concentration above 75 nmol/L. Secondary objectives include an examination of the safety of the dosing regimen (e.g. hypercalcemia, hypercalciuria, nephrocalcinosis), measures of vitamin D axis function (e.g. calcitriol levels, immune function), and protocol feasibility (eligibility criteria, protocol deviations, blinding). Despite significant observational literature suggesting VDD to be a modifiable risk factor in the PICU setting, there is no robust clinical trial evidence evaluating the benefits of rapid normalization. This phase II clinical trial will evaluate an innovative weight-based dosing regimen intended to rapidly and safely normalize vitamin D levels in critically ill children. Study findings will be used to inform the design of a multicenter phase III trial evaluating the clinical and economic benefits to rapid normalization. Recruitment for this trial was initiated in January 2016 and is expected to continue until November 30, 2017. Clinicaltrials.gov NCT02452762.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
Zwerenz, Rüdiger; Gerzymisch, Katharina; Edinger, Jens; Holme, Martin; Knickenberg, Rudolf J; Spörl-Dönch, Sieglinde; Kiwus, Ulrich; Beutel, Manfred E
2013-01-25
Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202).
2013-01-01
Background Mental disorders are the main reasons for rising proportions of premature pension in most high-income countries. Although inpatient medical rehabilitation has increasingly targeted work-related stress, there is still a lack of studies on the transfer of work-specific interventions into work contexts. Therefore, we plan to evaluate an online aftercare program aiming to improve vocational reintegration after medical rehabilitation. Methods Vocationally strained patients (n = 800) aged between 18 and 59 years with private internet access are recruited in psychosomatic, orthopedic and cardiovascular rehabilitation clinics in Germany. During inpatient rehabilitation, participants in stress management group training are cluster-randomized to the intervention or control group. The intervention group (n = 400) is offered an internet-based aftercare with weekly writing tasks and therapeutic feedback, a patient forum, a self-test and relaxation exercises. The control group (n = 400) obtains regular e-mail reminders with links to publicly accessible information about stress management and coping. Assessments are conducted at the beginning of inpatient rehabilitation, the end of inpatient rehabilitation, the end of aftercare, and 9 months later. The primary outcome is a risk score for premature pension, measured by a screening questionnaire at follow-up. Secondary outcome measures include level of vocational stress, physical and mental health, and work capacity at follow-up. Discussion We expect the intervention group to stabilize the improvements achieved during inpatient rehabilitation concerning stress management and coping, resulting in an improved vocational reintegration. The study protocol demonstrates the features of internet-based aftercare in rehabilitation. Trial registration International Standard Randomised Controlled Trial Number Register (ISRCTN:ISRCTN33957202) PMID:23351836
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Redactions in protocols for drug trials: what industry sponsors concealed.
Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C
2018-04-01
Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.
Ojo-Fati, Olamide; Joseph, Anne M; Ig-Izevbekhai, Jed; Thomas, Janet L; Everson-Rose, Susan A; Pratt, Rebekah; Raymond, Nancy; Cooney, Ned L; Luo, Xianghua; Okuyemi, Kolawole S
2017-07-05
There is a critical need for objective data to guide effective health promotion and care for homeless populations. However, many investigators exclude homeless populations from clinical trials due to practical concerns about conducting research with this population. This report is based on our experience and lessons learned while conducting two large NIH-funded randomized controlled trials targeting smoking cessation among persons who are homeless. The current report also addresses challenges when conducting clinical trials among homeless populations and offers potential solutions. Homeless individuals face several challenges including the need to negotiate daily access to food, clothing, and shelter. Some of the critical issues investigators encounter include recruitment and retention obstacles; cognitive impairment, mental health and substance abuse disorders; transportation and scheduling challenges; issues pertaining to adequate study compensation; the need for safety protocols for study staff; and issues related to protecting the wellbeing of these potentially vulnerable adults. Anticipating realistic conditions in which to conduct studies with participants who are homeless will help investigators to design efficient protocols and may improve the feasibility of conducting clinical trials involving homeless populations and the quality of the data collected by the researchers. ClinicalTrials.gov, ID: NCT00786149 . Registered on 5 November 2008; ClinicalTrials.gov, ID: NCT01932996 . Registered on 20 November 2014.
Christensen, Kurt D; Uhlmann, Wendy R; Roberts, J Scott; Linnenbringer, Erin; Whitehouse, Peter J; Royal, Charmaine D M; Obisesan, Thomas O; Cupples, L Adrienne; Butson, Melissa B; Fasaye, Grace-Ann; Hiraki, Susan; Chen, Clara A; Siebert, Uwe; Cook-Deegan, Robert; Green, Robert C
2018-01-01
PurposeTelephone disclosure of genetic test results can improve access to services. To date, studies of its impact have focused on return of Mendelian risk information, principally hereditary cancer syndromes.MethodsIn a multisite trial of Alzheimer disease genetic risk disclosure, asymptomatic adults were randomized to receive test results in person or via telephone. Primary analyses examined patient outcomes 12 months after disclosure.ResultsData from 257 participants showed that telephone disclosure occurred 7.4 days sooner and was 30% shorter, on average, than in-person disclosure (both P < 0.001). Anxiety and depression scores were well below cutoffs for clinical concern across protocols. Comparing telephone and in-person disclosure protocols, 99% confidence intervals of mean differences were within noninferiority margins on scales assessing anxiety, depression, and test-related distress, but inconclusive about positive impact. No differences were observed on measures of recall and subjective impact. Subanalyses supported noninferiority on all outcomes among apolipoprotein E (APOE) ɛ4-negative participants. Subanalyses were inconclusive for APOE ɛ4-positive participants, although mean anxiety and depression scores were still well below cutoffs for clinical concern.ConclusionTelephone disclosure of APOE results and risk for Alzheimer disease is generally safe and helps providers meet demands for services, even when results identify an increased risk for disease.
Boutin, A
2017-01-01
Abstract BACKGROUND: Febrile neonates are at high risk of morbidity and mortality from infectious causes. This risk further increases if antibiotics are not received in a timely manner. Current guidelines recommend early initiation (less than 1 hour) of antibiotics for patients with severe sepsis. Time-to-antibiotic administration (TAA) should also be targeted as a quality-of-care (QOC) measure for febrile neonates. A previous evaluation showed that most of these patients were not receiving antibiotics in the first hour at our emergency department (ED). OBJECTIVES: We evaluated whether a simple quality improvement protocol would improve the proportion of febrile neonates receiving antibiotics within 60 minutes of arrival to the ED. DESIGN/METHODS: This was a pre-post intervention study conducted in the ED of an academic pediatric tertiary care hospital with an annual volume of approximately 83,000 patients in 2014-2016. Participants were a random sample of all children younger than 28 days old visiting the ED for a febrile illness. The new protocol, which consisted for the nurses, after triage, to place the patients directly in the resuscitation room for immediate assessment by a physician, was implemented in February 2016. Previously, these children were triaged level 2 on the Canadian Triage and Acuity Scale (CTAS), flagged and placed in a regular examination room waiting for the physician assessment. With the new protocol, IV access, blood culture, urine analysis and culture were immediately obtained by the nurse in charge with the concomitant assessment by the attending physician. Forty charts prior to and 50 charts after protocol initiation were reviewed by an archivist using a standardized form between 2014-2015 and 2016, respectively. The primary outcome was TAA. This was defined as the time from initial ED registration to the beginning of antibiotics infusion. As a secondary outcome, all cases were reviewed individually to determine barriers to rapid antibiotic administration (day, evening, or night shifts, other treatments or investigations, number of attempts for intravenous access) and to elicit new quality improvement strategies. RESULTS: During the study periods a total of 178 (pre) and 135 (post) patients fulfilled the inclusion criteria. Among the random samples, 6/50 (12%) of patients received their antibiotics within 60 minutes in the post-intervention period compared to 0/40 (0%) in the pre-implementation period (difference 12%; 95 CI: 1-24%). Within 90 minutes, the proportion improved from 1/40 (2.5%) to 29/50 (58%) (difference 56%; 95 CI: 38-68%). Median TAA in febrile neonates decreased from 182 minutes (interquartile range, 147-219 minutes) in the pre-implementation period to 85 minutes (interquartile range, 73-115 minutes) in the post-implementation period. The main obstacle to the goal of 60 minutes for TAA was the difficulty to get IV access as well as antibiotic availability. CONCLUSION: In this study, a new protocol mandating the immediate transfer of febrile neonate from triage to the resuscitation room improved proportion of febrile neonates receiving antibiotics in less than 60 minutes in our ED. Our results suggest that simple interventions can reduce TAA in a selected group of patients presenting to the ED.
DiLuigi, Andrea J; Engmann, Lawrence; Schmidt, David W; Benadiva, Claudio A; Nulsen, John C
2011-06-30
We performed a randomized trial to compare IVF outcomes in 54 poor responder patients undergoing a microdose leuprolide acetate (LA) protocol or a GnRH antagonist protocol incorporating a luteal phase E(2) patch and GnRH antagonist in the preceding menstrual cycle. Cancellation rates, number of oocytes retrieved, clinical pregnancy rates (PR), and ongoing PRs were similar between the two groups. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
DeVoe, Jennifer E; Marino, Miguel; Angier, Heather; O'Malley, Jean P; Crawford, Courtney; Nelson, Christine; Tillotson, Carrie J; Bailey, Steffani R; Gallia, Charles; Gold, Rachel
2015-01-01
In the United States, health insurance is not universal. Observational studies show an association between uninsured parents and children. This association persisted even after expansions in child-only public health insurance. Oregon's randomized Medicaid expansion for adults, known as the Oregon Experiment, created a rare opportunity to assess causality between parent and child coverage. To estimate the effect on a child's health insurance coverage status when (1) a parent randomly gains access to health insurance and (2) a parent obtains coverage. Oregon Experiment randomized natural experiment assessing the results of Oregon's 2008 Medicaid expansion. We used generalized estimating equation models to examine the longitudinal effect of a parent randomly selected to apply for Medicaid on their child's Medicaid or Children's Health Insurance Program (CHIP) coverage (intent-to-treat analyses). We used per-protocol analyses to understand the impact on children's coverage when a parent was randomly selected to apply for and obtained Medicaid. Participants included 14409 children aged 2 to 18 years whose parents participated in the Oregon Experiment. For intent-to-treat analyses, the date a parent was selected to apply for Medicaid was considered the date the child was exposed to the intervention. In per-protocol analyses, exposure was defined as whether a selected parent obtained Medicaid. Children's Medicaid or CHIP coverage, assessed monthly and in 6-month intervals relative to their parent's selection date. In the immediate period after selection, children whose parents were selected to apply significantly increased from 3830 (61.4%) to 4152 (66.6%) compared with a nonsignificant change from 5049 (61.8%) to 5044 (61.7%) for children whose parents were not selected to apply. Children whose parents were randomly selected to apply for Medicaid had 18% higher odds of being covered in the first 6 months after parent's selection compared with children whose parents were not selected (adjusted odds ratio [AOR]=1.18; 95% CI, 1.10-1.27). The effect remained significant during months 7 to 12 (AOR=1.11; 95% CI, 1.03-1.19); months 13 to 18 showed a positive but not significant effect (AOR=1.07; 95% CI, 0.99-1.14). Children whose parents were selected and obtained coverage had more than double the odds of having coverage compared with children whose parents were not selected and did not gain coverage (AOR=2.37; 95% CI, 2.14-2.64). Children's odds of having Medicaid or CHIP coverage increased when their parents were randomly selected to apply for Medicaid. Children whose parents were selected and subsequently obtained coverage benefited most. This study demonstrates a causal link between parents' access to Medicaid coverage and their children's coverage.
Vedula, S. Swaroop; Li, Tianjing; Dickersin, Kay
2013-01-01
Background Details about the type of analysis (e.g., intent to treat [ITT]) and definitions (i.e., criteria for including participants in the analysis) are necessary for interpreting a clinical trial's findings. Our objective was to compare the description of types of analyses and criteria for including participants in the publication (i.e., what was reported) with descriptions in the corresponding internal company documents (i.e., what was planned and what was done). Trials were for off-label uses of gabapentin sponsored by Pfizer and Parke-Davis, and documents were obtained through litigation. Methods and Findings For each trial, we compared internal company documents (protocols, statistical analysis plans, and research reports, all unpublished), with publications. One author extracted data and another verified, with a third person verifying discordant items and a sample of the rest. Extracted data included the number of participants randomized and analyzed for efficacy, and types of analyses for efficacy and safety and their definitions (i.e., criteria for including participants in each type of analysis). We identified 21 trials, 11 of which were published randomized controlled trials, and that provided the documents needed for planned comparisons. For three trials, there was disagreement on the number of randomized participants between the research report and publication. Seven types of efficacy analyses were described in the protocols, statistical analysis plans, and publications, including ITT and six others. The protocol or publication described ITT using six different definitions, resulting in frequent disagreements between the two documents (i.e., different numbers of participants were included in the analyses). Conclusions Descriptions of analyses conducted did not agree between internal company documents and what was publicly reported. Internal company documents provide extensive documentation of methods planned and used, and trial findings, and should be publicly accessible. Reporting standards for randomized controlled trials should recommend transparent descriptions and definitions of analyses performed and which study participants are excluded. Please see later in the article for the Editors' Summary PMID:23382656
Quantum enigma cipher as a generalization of the quantum stream cipher
NASA Astrophysics Data System (ADS)
Kato, Kentaro
2016-09-01
Various types of randomizations for the quantum stream cipher by Y00 protocol have been developed so far. In particular, it must be noted that the analysis of immunity against correlation attacks with a new type of randomization by Hirota and Kurosawa prompted a new look at the quantum stream cipher by Y00 protocol (Quant. Inform. Process. 6(2) 2007). From the preceding study on the quantum stream cipher, we recognized that the quantum stream cipher by Y00 protocol would be able to be generalized to a new type of physical cipher that has potential to exceed the Shannon limit by installing additional randomization mechanisms, in accordance with the law of quantum mechanics. We call this new type of physical random cipher the quantum enigma cipher. In this article, we introduce the recent developments for the quantum stream cipher by Y00 protocol and future plans toward the quantum enigma cipher.
A universal data access and protocol integration mechanism for smart home
NASA Astrophysics Data System (ADS)
Shao, Pengfei; Yang, Qi; Zhang, Xuan
2013-03-01
With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.
Nagai, Kaori; Saito, Akiko M; Saito, Toshiki I; Kaneko, Noriyo
2017-12-28
To allow for correct evaluation of clinical trial results, readers require comprehensive, clear, and highly transparent information on the methodology used and the results obtained. This study aimed to evaluate the quality of reporting in articles on randomized controlled trials (RCTs) of antiretroviral therapy (ART) in the field of HIV/AIDS. We searched for original articles on RCTs of ART developed in the field of HIV/AIDS in PubMed database by 5 April 2016. Searched articles were divided into three groups based on the revision year in which the Consolidated Standards of Reporting Trials (CONSORT) guidelines were published: Period 1 (1996-2001); Period 2 (2002-2010); and Period 3 (2011-2016). We evaluated the articles using the reporting rates of the 37 items in the CONSORT 2010 checklist, five items in the protocol deviation, and the three items in the ethics. Fifty-two articles were extracted and included in this study. Many of the reporting rates calculated using the CONSORT 2010 checklist showed a significantly increasing trend over the successive periods (65% in Period 1, 67% in Period 2, 79% in Period 3; p < 0.0001). The items with reporting rates < 50% were "the presence or absence of a protocol change and the reason for such a change," "randomization and blinding," and "where the full trial protocol can be accessed." Reporting rates of deviations were as low as < 30%, while the reporting rates for patient compliance were the highest (>80% in Period 3) among the five items. The reporting rates for obtaining informed consent and approval by the ethics committee or institutional review board were high (>88%), regardless of the time period assessed. In terms of representative RCT articles in the field of HIV/AIDS, the reporting rate of the items defined by CONSORT was approximately 70%, improving over the successive CONSORT statement revision periods.
van Rosmalen-Nooijens, Karin A W L; Prins, Judith B; Vergeer, Marianne; Wong, Sylvie H Lo Fo; Lagro-Janssen, Antoine L M
2013-03-15
Violence in families affects children. Exposure to violence is seen as child abuse. Figures show that about one third of children exposed to violence become victim or perpetrator in their adult life: known as intergenerational transmission. Violence also affects sexual and reproductive health. To prevent problems in adult life, children need help and support. However, while trying to protect their parents, children often do not seek help, or perceive the threshold as too high. Since almost all children of the current generation have access to the internet, an online intervention will make help better available for this target group. In 2011, an internet-based self-support method for children, adolescents and young adults exposed to family violence was developed in the Netherlands: "Feel the ViBe". The intervention was developed in close collaboration with the target group. This article describes the protocol of the RCT to study the effectiveness of this intervention. This study is a randomized controlled trial using the method of minimization to randomize the participants in two parallel groups with a 1:1 allocation ratio, being an intervention group, having access to "Feel the ViBe" and usual care (UC), and a control group, having access to minimally enhanced usual care (mEUC) followed by access to the intervention after twelve weeks. Outcomes are measured with questionnaires on PTSD symptoms, mental health and sexual and reproductive health. Routine Outcome Measurement (ROM) will be used to measure a direct effect of participating in the intervention. Data from a web evaluation questionnaire (WEQ), user statistics and qualitative analysis of online data will be used to support the findings. To compare results Cohen's d effect sizes will be used. A RCT and process evaluation will test effectiveness and provide information of how the effects can be explained, how the intervention meets the expectation of participants and which possible barriers and facilitators for implementation exist. A qualitative analysis of the data will add information to interpret the quantitative data. This makes "Feel the ViBe" unique in its field. The Netherlands National Trial Register (NTR), trial ID NTR3692.
2013-01-01
Background Violence in families affects children. Exposure to violence is seen as child abuse. Figures show that about one third of children exposed to violence become victim or perpetrator in their adult life: known as intergenerational transmission. Violence also affects sexual and reproductive health. To prevent problems in adult life, children need help and support. However, while trying to protect their parents, children often do not seek help, or perceive the threshold as too high. Since almost all children of the current generation have access to the internet, an online intervention will make help better available for this target group. In 2011, an internet-based self-support method for children, adolescents and young adults exposed to family violence was developed in the Netherlands: “Feel the ViBe”. The intervention was developed in close collaboration with the target group. This article describes the protocol of the RCT to study the effectiveness of this intervention. Methods/design This study is a randomized controlled trial using the method of minimization to randomize the participants in two parallel groups with a 1:1 allocation ratio, being an intervention group, having access to “Feel the ViBe” and usual care (UC), and a control group, having access to minimally enhanced usual care (mEUC) followed by access to the intervention after twelve weeks. Outcomes are measured with questionnaires on PTSD symptoms, mental health and sexual and reproductive health. Routine Outcome Measurement (ROM) will be used to measure a direct effect of participating in the intervention. Data from a web evaluation questionnaire (WEQ), user statistics and qualitative analysis of online data will be used to support the findings. To compare results Cohen’s d effect sizes will be used. Discussion A RCT and process evaluation will test effectiveness and provide information of how the effects can be explained, how the intervention meets the expectation of participants and which possible barriers and facilitators for implementation exist. A qualitative analysis of the data will add information to interpret the quantitative data. This makes “Feel the ViBe” unique in its field. Trial registration The Netherlands National Trial Register (NTR), trial ID NTR3692. PMID:23497359
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Research of Ad Hoc Networks Access Algorithm
NASA Astrophysics Data System (ADS)
Xiang, Ma
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
NASA Astrophysics Data System (ADS)
Lahinta, A.; Haris, I.; Abdillah, T.
2017-03-01
The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.
Gill, Dawn P; Blunt, Wendy; Bartol, Cassandra; Pulford, Roseanne W; De Cruz, Ashleigh; Simmavong, P Karen; Gavarkovs, Adam; Newhouse, Ian; Pearson, Erin; Ostenfeldt, Bayley; Law, Barbi; Karvinen, Kristina; Moffit, Pertice; Jones, Gareth; Watson, Cori; Zou, Guangyong; Petrella, Robert J
2017-02-07
Physical inactivity is one of the leading causes of chronic disease in Canadian adults. With less than 50% of Canadian adults reaching the recommended amount of daily physical activity, there is an urgent need for effective programs targeting this risk factor. HealtheSteps™ is a healthy lifestyle prescription program, developed from an extensive research base to address risk factors for chronic disease such as physical inactivity, sedentary behaviour and poor eating habits. HealtheSteps™ participants are provided with in-person lifestyle coaching and access to eHealth technologies delivered in community-based primary care clinics and health care organizations. To determine the effectiveness of Healthesteps™, we will conduct a 6-month pragmatic randomized controlled trial with integrated process and economic evaluations of HealtheSteps™ in 5 clinic settings in Southwestern Ontario. 110 participants will be individually randomized (1:1; stratified by site) to either the intervention (HealtheSteps™ program) or comparator (Wait-list control). There are 3 phases of the HealtheSteps™ program, lasting 6 months each. The active phase consists of bi-monthly in-person coaching with access to a full suite of eHealth technology supports. During the maintenance phase I, the in-person coaching will be removed, but participants will still have access to the full suite of eHealth technology supports. In the final stage, maintenance phase II, access to the full suite of eHealth technology supports is removed and participants only have access to publicly available resources and tools. This trial aims to determine the effectiveness of the program in increasing physical activity levels and improving other health behaviours and indicators, the acceptability of the HealtheSteps™ program, and the direct cost for each person participating in the program as well as the costs associated with delivering the program at the different community sites. These results will inform future optimization and scaling up of the program into additional community-based primary care sites. NCT02413385 (Clinicaltrials.gov). Date Registered: April 6, 2015.
Browsing for the Best Internet Access Provider?
ERIC Educational Resources Information Center
Weil, Marty
1996-01-01
Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…
Direct data access protocols benchmarking on DPM
NASA Astrophysics Data System (ADS)
Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina
2015-12-01
The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... INTERNATIONAL TRADE COMMISSION [DN 2859] Certain Dynamic Random Access Memory Devices, and.... International Trade Commission has received a complaint entitled In Re Certain Dynamic Random Access Memory... certain dynamic random access memory devices, and products containing same. The complaint names Elpida...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-01
... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...
Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis.
Ali, Ather; Kahn, Janet; Rosenberger, Lisa; Perlman, Adam I
2012-10-04
Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists' clinical judgment and maintaining consistency with a prior pilot study. The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Clinicaltrials.gov NCT00970008 (18 August 2009).
Are essential medicines in Malaysia accessible, affordable and available?
Saleh, Kamaruzaman; Ibrahim, Mohamed I M
2005-12-01
To assess the pharmaceutical sector to know whether people have access to essential medicines. The study was conducted in 20 public health clinics, five public district drug stores and 20 private retail pharmacies selected randomly in five different areas randomly selected (four states and a federal territory). The methodology used was adopted from the World Health Organization study protocol. The degree of attainment of the strategic pharmaceutical objectives of improved access is measured by a list of tested indicators. Access is measured in terms of the availability and affordability of essential medicines, especially to the poor and in the public sector. The first survey in the public health clinics and public district drug stores gathered information about current availability of essential medicines, prevalence of stock-outs and affordability of treatment (except drug stores). The second survey assessed affordability of treatment in public health clinics and private retail pharmacies. Availability, stock-out duration, percent of medicines dispensed, accessibility and affordability of key medicines. The average availability of key medicines in the public health clinics for the country was 95.4%. The average stock-out duration of key medicines was 6.5 days. However, average availability of key medicines in the public district drug stores was 89.2%; with an average stock-out duration of 32.4 days. Medicines prescribed were 100% dispensed to the patients. Average affordability for public health clinics was 1.5 weeks salary and for the private pharmacies, 3.7 weeks salary. The present pharmaceutical situation in the context of essential medicines list implementation reflected that the majority of the population in Malaysia had access to affordable essential medicines. If medicines need to be obtained from the private sector, they are hardly affordable. Although the average availability of essential medicines in Malaysia was high being more than 95.0%, in certain areas in Sabah availability was less than 80.0% and still a problem.
2013-01-01
Background Recent studies in North American contexts have suggested that the Housing First model is a promising strategy for providing effective services to homeless people with mental illness. In the context of the highly generous French national health and social care system, which is easily accessible and does not require out-of-pocket payment, the French Health Ministry insists on rigorous techniques, including randomized protocols, to evaluate the impact of Housing First approaches in France. Method and design A prospective randomized trial was designed to assess the impact of a Housing First intervention on health outcomes and costs over a period of 24 months on homeless people with severe mental illness, compared to Treatment-As-Usual. The study is being conducted in four cities in France: Lille, Marseille, Paris and Toulouse. The inclusion criteria are as follows: over 18 years of age, absolutely homeless or in precarious housing, and possessing a ‘high’ level of need: diagnosis of schizophrenia or bipolar disorder and moderate to severe disability according to the Multnomah Community Ability Scale (score ≤ 62) and at least one of the following three criteria: 1) having been hospitalized for mental illness two or more times in any one year during the preceding five years; 2) co-morbid alcohol or substance use; and 3) having been recently arrested or incarcerated. Participants will be randomized to receiving the Housing First intervention or Treatment-As-Usual. The Housing First intervention provides immediate access to independent housing and community care. The primary outcome criterion is the use of high-cost health services (that is,, number of hospital admissions and number of emergency department visits) during the 24-month follow-up period. Secondary outcome measures include health outcomes, social functioning, housing stability and contact with police services. An evaluation of the cost-effectiveness and cost-utility of Housing First will also be conducted. A total of 300 individuals per group will be included. Discussion This is the first study to examine the impact of a Housing First intervention compared to Treatment-As-Usual in France. It should provide key information to policymakers concerning the cost-effectiveness and health outcomes of the Housing First model in the French context. Trial registration The current clinical trial number is NCT01570712 PMID:24063556
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
McLean, Carmen P; Rauch, Sheila A M; Foa, Edna B; Sripada, Rebecca K; Tannahill, Hallie S; Mintz, Jim; Yarvis, Jeffrey; Young-McCaughan, Stacey; Dondanville, Katherine A; Hall-Clark, Brittany N; Fina, Brooke A; Keane, Terence M; Peterson, Alan L
2018-01-01
Improved accessibility of effective and efficient evidence-based treatments (EBTs) for military personnel suffering with posttraumatic stress disorder (PTSD) is an urgent need to meet the growing demand for timely care. In addition, a better understanding of the mechanism of action of behavioral therapy can inform the delivery of care to meet accessibility demands. Effective EBTs for PTSD are available, but logistical and stigma-related barriers to accessing behavioral healthcare can deter military personnel from receiving these treatments. Web-based treatments represent an innovative way to overcome these barriers. The efficacy of previously developed web-based treatments for PTSD appears promising; however, they were not developed based on treatment protocols with strong empirical support for their efficacy. No study to date has examined web-based treatment of PTSD using a well-established evidence-based treatment, nor delineated the biological mechanisms through which a web-based treatment exerts its effects. This paper describes the rationale and methods of a randomized controlled trial comparing the efficacy and potential biological mediators of 10 sessions of a web-version of Prolonged Exposure (PE), "Web-PE," delivered over 8weeks compared to 10 sessions of in-person Present-Centered Therapy (PCT) delivered over 8weeks by a therapist in 120 active duty military personnel and veterans with PTSD. Copyright © 2017 Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-821] Certain Dynamic Random Access Memory... importation, and the sale within the United States after importation of certain dynamic random access memory... certain dynamic random access memory devices, and products containing same that infringe one or more of...
Jansen, Femke; Cnossen, Ingrid C; Eerenstein, Simone E J; Coupé, Veerle M H; Witte, Birgit I; van Uden-Kraan, Cornelia F; Doornaert, Patricia; Braunius, Weibel W; De Bree, Remco; Hardillo, José A U; Honings, Jimmie; Halmos, György B; Leemans, C René; Verdonck-de Leeuw, Irma M
2016-08-02
Total laryngectomy with or without adjuvant (chemo)radiation often induces speech, swallowing and neck and shoulder problems. Speech, swallowing and shoulder exercises may prevent or diminish these problems. The aim of the present paper is to describe the study, which is designed to investigate the effectiveness and cost-utility of a guided self-help exercise program built into the application "In Tune without Cords" among patients treated with total laryngectomy. Patients, up to 5 years earlier treated with total laryngectomy with or without (chemo)radiation will be recruited for participation in this study. Patients willing to participate will be randomized to the intervention or control group (1:1). Patients in the intervention group will be provided access to a guided self-help exercise program and a self-care education program built into the application "In Tune without Cords". Patients in the control group will only be provided access to the self-care education program. The primary outcome is the difference in swallowing quality (SWAL-QOL) between the intervention and control group. Secondary outcome measures address speech problems (SHI), shoulder disability (SDQ), quality of life (EORTC QLQ-C30, QLQ-H&N35 and EQ-5D), direct and indirect costs (adjusted iMCQ and iPCQ measures) and self-management (PAM). Patients will be asked to complete these outcome measures at baseline, immediately after the intervention or control period (i.e. at 3 months follow-up) and at 6 months follow-up. This randomized controlled trial will provide knowledge on the effectiveness of a guided self-help exercise program for patients treated with total laryngectomy. In addition, information on the value for money of such an exercise program will be provided. If this guided self-help program is (cost)effective for patients treated with total laryngectomy, the next step will be to implement this exercise program in current clinical practice. NTR5255 Protocol version 4 date September 2015.
Lee, Ju Seok; Chen, Junghuei; Deaton, Russell; Kim, Jin-Woo
2014-01-01
Genetic material extracted from in situ microbial communities has high promise as an indicator of biological system status. However, the challenge is to access genomic information from all organisms at the population or community scale to monitor the biosystem's state. Hence, there is a need for a better diagnostic tool that provides a holistic view of a biosystem's genomic status. Here, we introduce an in vitro methodology for genomic pattern classification of biological samples that taps large amounts of genetic information from all genes present and uses that information to detect changes in genomic patterns and classify them. We developed a biosensing protocol, termed Biological Memory, that has in vitro computational capabilities to "learn" and "store" genomic sequence information directly from genomic samples without knowledge of their explicit sequences, and that discovers differences in vitro between previously unknown inputs and learned memory molecules. The Memory protocol was designed and optimized based upon (1) common in vitro recombinant DNA operations using 20-base random probes, including polymerization, nuclease digestion, and magnetic bead separation, to capture a snapshot of the genomic state of a biological sample as a DNA memory and (2) the thermal stability of DNA duplexes between new input and the memory to detect similarities and differences. For efficient read out, a microarray was used as an output method. When the microarray-based Memory protocol was implemented to test its capability and sensitivity using genomic DNA from two model bacterial strains, i.e., Escherichia coli K12 and Bacillus subtilis, results indicate that the Memory protocol can "learn" input DNA, "recall" similar DNA, differentiate between dissimilar DNA, and detect relatively small concentration differences in samples. This study demonstrated not only the in vitro information processing capabilities of DNA, but also its promise as a genomic pattern classifier that could access information from all organisms in a biological system without explicit genomic information. The Memory protocol has high potential for many applications, including in situ biomonitoring of ecosystems, screening for diseases, biosensing of pathological features in water and food supplies, and non-biological information processing of memory devices, among many.
Miller, Kate; Tan, Xianghong; Hobson, Andrew Dillon; Khan, Asaduzzaman; Ziviani, Jenny; OʼBrien, Eavan; Barua, Kim; McBride, Craig A; Kimble, Roy M
2016-07-01
Intravenous (IV) cannulation is commonly performed in pediatric emergency departments (EDs). The busy ED environment is often not conducive to conventional nonpharmacological pain management. This study assessed the use of Ditto (Diversionary Therapy Technologies, Brisbane, Australia), a handheld electronic device which provides procedural preparation and distraction, as a means of managing pain and distress during IV cannulation performed in the pediatric ED. A randomized controlled trial with 98 participants, aged 3 to 12 years, was conducted in a pediatric ED. Participants were recruited and randomized into 5 intervention groups as follows: (1) Standard Distraction, (2) PlayStation Portable Distraction, (3) Ditto Distraction, (4) Ditto Procedural Preparation, and (5) Ditto Preparation and Distraction. Children's pain and distress levels were assessed via self-reports and observational reports by caregivers and nursing staff across the following 3 time points: (1) before, (2) during, and (3) after IV cannulation. Caregivers and nursing staff reported significantly reduced pain and distress levels in children accessing the combined preparation and distraction Ditto protocol, as compared to standard distraction (P ≤ 0.01). This intervention also saw the greatest reduction in pain and distress as reported by the child. Caregiver reports indicate that using the combined Ditto protocol was most effective in reducing children's pain experiences while undergoing IV cannulation in the ED. The use of Ditto offers a promising opportunity to negotiate barriers to the provision of nonpharmacological approaches encountered in the busy ED environment, and provide nonpharmacological pain-management interventions in pediatric EDs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
The Intersystem - Internetworking for space systems
NASA Astrophysics Data System (ADS)
Landauer, C.
This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Hirshfield, Sabina; Downing, Martin J; Parsons, Jeffrey T; Grov, Christian; Gordon, Rachel J; Houang, Steven T; Scheinmann, Roberta; Sullivan, Patrick S; Yoon, Irene S; Anderson, Ian; Chiasson, Mary Ann
2016-06-17
Gay, bisexual, and other men who have sex with men (GBMSM) accounted for 67% of new US human immunodeficiency virus (HIV) infections in 2012; however, less than 40% of HIV-positive GBMSM are virally suppressed. Preventing transmission from virally unsuppressed men who have condomless anal sex (CAS) with serodiscordant partners is a public health imperative. New HIV infections in GBMSM are attributed in part to online access to sex partners; therefore, low-cost eHealth interventions are a unique opportunity to reach men where they meet partners. To describe the protocol of a randomized controlled trial evaluating whether video-based messaging delivered online may lead to reductions in serodiscordant CAS and increased HIV disclosure. Sex Positive!([+]) is a two-arm, phase III, video-based randomized controlled trial delivered online to GBMSM living with HIV. Participants in the intervention arm receive 10 video vignettes grounded in social learning and social cognitive theories that are designed to elicit critical thinking around issues of HIV transmission and disclosure. Participants in the attention control arm receive 10 video vignettes that focus on healthy living. All videos are optimized for mobile viewing. The study protocol includes five online assessments conducted over a 1-year period among 1500 US white, black, or Hispanic/Latino GBMSM living with HIV who report suboptimal antiretroviral therapy (ART) adherence or a detectable viral load in the past 12 months and recent CAS (past 6 months) with HIV-negative or unknown status male partners. Compared to the control arm, we hypothesize that men who watch the intervention videos will report at 12-month follow-up significantly fewer serodiscordant CAS partners, increased HIV disclosure, and improved social cognition (eg, condom use self-efficacy, perceived responsibility). Participant recruitment began in June 2015 and ended in December 2015. This protocol describes the underlying theoretical framework and measures, study design, recruitment challenges, and antifraud measures for an online, video-based randomized controlled trial that has the potential to decrease HIV transmission risk behaviors among HIV-positive GBMSM who struggle with ART adherence. The Sex Positive!([+]) intervention allows for participation through multiple Internet-based mediums and has the potential to reach and engage a broader population of HIV-positive GBMSM who are virally unsuppressed. ClinicalTrials.gov NCT02023580; https://clinicaltrials.gov/ct2/show/NCT02023580 (Archived by WebCite at http://www.webcitation.org/6iHzA8wRG).
Downing Jr, Martin J; Parsons, Jeffrey T; Grov, Christian; Gordon, Rachel J; Houang, Steven T; Scheinmann, Roberta; Sullivan, Patrick S; Yoon, Irene S; Anderson, Ian; Chiasson, Mary Ann
2016-01-01
Background Gay, bisexual, and other men who have sex with men (GBMSM) accounted for 67% of new US human immunodeficiency virus (HIV) infections in 2012; however, less than 40% of HIV-positive GBMSM are virally suppressed. Preventing transmission from virally unsuppressed men who have condomless anal sex (CAS) with serodiscordant partners is a public health imperative. New HIV infections in GBMSM are attributed in part to online access to sex partners; therefore, low-cost eHealth interventions are a unique opportunity to reach men where they meet partners. Objective To describe the protocol of a randomized controlled trial evaluating whether video-based messaging delivered online may lead to reductions in serodiscordant CAS and increased HIV disclosure. Methods Sex Positive![+] is a two-arm, phase III, video-based randomized controlled trial delivered online to GBMSM living with HIV. Participants in the intervention arm receive 10 video vignettes grounded in social learning and social cognitive theories that are designed to elicit critical thinking around issues of HIV transmission and disclosure. Participants in the attention control arm receive 10 video vignettes that focus on healthy living. All videos are optimized for mobile viewing. The study protocol includes five online assessments conducted over a 1-year period among 1500 US white, black, or Hispanic/Latino GBMSM living with HIV who report suboptimal antiretroviral therapy (ART) adherence or a detectable viral load in the past 12 months and recent CAS (past 6 months) with HIV-negative or unknown status male partners. Compared to the control arm, we hypothesize that men who watch the intervention videos will report at 12-month follow-up significantly fewer serodiscordant CAS partners, increased HIV disclosure, and improved social cognition (eg, condom use self-efficacy, perceived responsibility). Results Participant recruitment began in June 2015 and ended in December 2015. Conclusions This protocol describes the underlying theoretical framework and measures, study design, recruitment challenges, and antifraud measures for an online, video-based randomized controlled trial that has the potential to decrease HIV transmission risk behaviors among HIV-positive GBMSM who struggle with ART adherence. The Sex Positive![+] intervention allows for participation through multiple Internet-based mediums and has the potential to reach and engage a broader population of HIV-positive GBMSM who are virally unsuppressed. ClinicalTrial ClinicalTrials.gov NCT02023580; https://clinicaltrials.gov/ct2/show/NCT02023580 (Archived by WebCite at http://www.webcitation.org/6iHzA8wRG) PMID:27315764
Nelson, Mark; Bourke, Michael; Crossley, Kay; Russell, Trevor
2017-03-02
Total hip replacement (THR) is the gold standard treatment for severe hip osteoarthritis. Effectiveness of physical rehabilitation for THR patients following discharge from hospital is supported by evidence; however, barriers such as geographical location and transport can limit access to appropriate health care. One solution to this issue is using an alternative model of care using telerehabilitation technology to deliver rehabilitation programs directly into patients' homes. A telerehabilitation model may also have potential health care cost savings for health care providers. This study aims to determine if a telerehabilitation model of care delivered remotely is as effective as face-to-face rehabilitation in the THR population and cost effective for health care providers and patients. A total of 70 people undergoing THR will be recruited to participate in a randomized, single-blind, controlled noninferiority clinical trial. The trial will compare a technology-based THR rehabilitation program to in-person care. On discharge from hospital, participants randomized to the in-person group will receive usual care, defined as a paper home exercise program (HEP) targeting strengthening exercises for quadriceps, hip abductors, extensors, and flexors; they will be advised to perform their HEP 3 times per day. At 2, 4, and 6 weeks postoperatively, they will receive a 30-minute in-person physiotherapy session with a focus on gait retraining and reviewing and progressing their HEP. The telerehabilitation protocol will involve a program similar in content to the in-person rehabilitation program, except delivery will be directly into the homes of the participants via telerehabilitation technology on an iPad. Outcomes will be evaluated preoperatively, day of discharge from in-patient physiotherapy, 6 weeks and 6 months postoperatively. The primary outcome will be the quality of life subscale of the hip disability and osteoarthritis outcome score, measured at 6 weeks. Both intention-to-treat and per-protocol analyses as recommended in the extension of the Consolidated Standards for Reporting Trials (CONSORT) guideline for noninferiority trials will be performed. Recruitment commenced in September 2015 and is expected to be completed by June 2017. Data collection will be completed by December 2017. It is anticipated the results from this trial will be published by July 2018. Previous research investigating telerehabilitation in postoperative orthopedic conditions has yielded promising results. If shown to be as effective as in-person care, telerehabilitation after THR could be helpful in addressing access issues in this population. Furthermore, it may help reduce the cost of health care provision by enabling patients to take a more independent approach to their rehabilitation. Australian New Zealand Clinical Trials Registry ACTRN12615000824561; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=364010 (Archived by WebCite at http://www.webcitation.org/6oWXweVfI). ©Mark Nelson, Michael Bourke, Kay Crossley, Trevor Russell. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 02.03.2017.
Razaque, Abdul; Elleithy, Khaled
2015-01-01
Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes. PMID:26153768
Razaque, Abdul; Elleithy, Khaled
2015-07-06
Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
[PROtocol-based MObilizaTION on intensive care units : Design of a cluster randomized pilot study].
Nydahl, P; Diers, A; Günther, U; Haastert, B; Hesse, S; Kerschensteiner, C; Klarmann, S; Köpke, S
2017-10-12
Despite convincing evidence for early mobilization of patients on intensive care units (ICU), implementation in practice is limited. Protocols for early mobilization, including in- and exclusion criteria, assessments, safety criteria, and step schemes may increase the rate of implementation and mobilization. Patients (population) on ICUs with a protocol for early mobilization (intervention), compared to patients on ICUs without protocol (control), will be more frequently mobilized (outcome). A multicenter, stepped-wedge, cluster-randomized pilot study is presented. Five ICUs will receive an adapted, interprofessional protocol for early mobilization in randomized order. Before and after implementation, mobilization of ICU patients will be evaluated by randomized monthly one-day point prevalence surveys. Primary outcome is the percentage of patients mobilized out of bed, operationalized as a score of ≥3 on the ICU Mobility Scale. Secondary outcome parameters will be presence and/or length of mechanical ventilation, delirium, stay on ICU and in hospital, barriers to early mobilization, adverse events, and process parameters as identified barriers, used strategies, and adaptions to local conditions. Exploratory evaluation of study feasibility and estimation of effect sizes as the basis for a future explanatory study.
Rosa, Carmen; Campbell, Aimee; Kleppinger, Cynthia; Sampson, Royce; Tyson, Clare; Mamay-Gentilin, Stephanie
2009-04-01
Quality assurance (QA) of clinical trials is essential to protect the welfare of trial participants and the integrity of the data collected. However, there is little detailed information available on specific procedures and outcomes of QA monitoring for clinical trials. This article describes the experience of the National Institute on Drug Abuse's (NIDA) National Drug Abuse Treatment Clinical Trials Network (CTN) in devising and implementing a three-tiered QA model for rigorous multi-site randomized clinical trials implemented in community-based substance abuse treatment programs. The CTN QA model combined local and national resources and was developed to address the unique needs of clinical trial sites with limited research experience. The authors reviewed internal records maintained by the sponsor, a coordinating site (Lead Nodes), and a local site detailing procedural development, training sessions, protocol violation monitoring, and site visit reporting. Between January 2001 and September 2005, the CTN implemented 21 protocols, of which 18 were randomized clinical trials, one was a quality improvement study and two were surveys. Approximately 160 community-based treatment programs participated in the 19 studies that were monitored, with a total of 6560 participants randomized across the sites. During this time 1937 QA site visits were reported across the three tiers of monitoring and the cost depended on the location of the sites and the salaries of the staff involved. One study reported 109 protocol violations (M = 15.6). Examples are presented to highlight training, protocol violation monitoring, site visit frequency and intensity and cost considerations. : QA data from the entire network were not easily available for review as much of the data were not electronically accessible. The authors reviewed and discussed a representative sample of internal data from the studies and participating sites. The lessons learned from the CTN's experience include the need for balancing thoroughness with efficiency, monitoring early, assessing research staff abilities in order to judge the need for proactive, focused attention, providing targeted training sessions, and developing flexible tools. The CTN model can work for sponsors overseeing studies at sites with limited research experience that require more frequent, in-depth monitoring. We recommend that sponsors not develop a rigid monitoring approach, but work with the study principal investigators to determine the intensity of monitoring needed depending on trial complexity, the risks of the intervention(s), and the experience of the staff with clinical research. After careful evaluation, sponsors should then determine the best approach to site monitoring and what resources will be needed.
Rosa, Carmen; Campbell, Aimee; Kleppinger, Cynthia; Sampson, Royce; Tyson, Clare; Mamay-Gentilin, Stephanie
2009-01-01
Background: Quality assurance (QA) of clinical trials is essential to protect the welfare of trial participants and the integrity of the data collected. However, there is little detailed information available on specific procedures and outcomes of QA monitoring for clinical trials. Purpose: This article describes the experience of the National Institute on Drug Abuse's (NIDA) National Drug Abuse Treatment Clinical Trials Network (CTN) in devising and implementing a three-tiered QA model for rigorous multi-site randomized clinical trials implemented in community-based substance abuse treatment programs. The CTN QA model combined local and national resources and was developed to address the unique needs of clinical trial sites with limited research experience. Methods: The authors reviewed internal records maintained by the sponsor, a coordinating site (Lead Nodes), and a local site detailing procedural development, training sessions, protocol violation monitoring, and site visit reporting. Results: Between January 2001 and September 2005, the CTN implemented 21 protocols, of which 18 were randomized clinical trials, one was a quality improvement study and two were surveys. Approximately 160 community-based treatment programs participated in the 19 studies that were monitored, with a total of 6560 participants randomized across the sites. During this time 1937 QA site visits were reported across the three tiers of monitoring and the cost depended on the location of the sites and the salaries of the staff involved. One study reported 109 protocol violations (M = 15.6). Examples are presented to highlight training, protocol violation monitoring, site visit frequency and intensity and cost considerations. Limitations: QA data from the entire network were not easily available for review as much of the data were not electronically accessible. The authors reviewed and discussed a representative sample of internal data from the studies and participating sites. Conclusions: The lessons learned from the CTN's experience include the need for balancing thoroughness with efficiency, monitoring early, assessing research staff abilities in order to judge the need for proactive, focused attention, providing targeted training sessions, and developing flexible tools. The CTN model can work for sponsors overseeing studies at sites with limited research experience that require more frequent, in-depth monitoring. We recommend that sponsors not develop a rigid monitoring approach, but work with the study principal investigators to determine the intensity of monitoring needed depending on trial complexity, the risks of the intervention(s), and the experience of the staff with clinical research. After careful evaluation, sponsors should then determine the best approach to site monitoring and what resources will be needed. PMID:19342468
Lee, Christina S.; Colby, Suzanne M.; Magill, Molly; Almeida, Joanna; Tavares, Tonya; Rohsenow, Damaris J.
2016-01-01
Background The NIH Strategic Plan prioritizes health disparities research for socially disadvantaged Hispanics, to reduce the disproportionate burden of alcohol-related negative consequences compared to other racial/ethnic groups. Cultural adaptation of evidence-based treatments, such as motivational interviewing (MI), can improve access and response to alcohol treatment. However, the lack of rigorous clinical trials designed to test the efficacy and theoretical underpinnings of cultural adaptation has made proof of concept difficult. Objective The CAMI2 (Culturally Adapted Motivational Interviewing) study design and its theoretical model, is described to illustrate how MI adapted to social and cultural factors (CAMI) can be discriminated against non-adapted MI. Methods and Design CAMI2, a large, 12 month randomized prospective trial, examines the efficacy of CAMI and MI among heavy drinking Hispanics recruited from the community (n=257). Outcomes are reductions in heavy drinking days (Time Line Follow-Back) and negative consequences of drinking among Hispanics (Drinkers Inventory of Consequences). A second aim examines perceived acculturation stress as a moderator of treatment outcomes in the CAMI condition. Summary The CAMI2 study design protocol is presented and the theory of adaptation is presented. Findings from the trial described may yield important recommendations on the science of cultural adaptation and improve MI dissemination to Hispanics with alcohol risk. PMID:27565832
Christensen, Kurt D.; Uhlmann, Wendy R.; Roberts, J. Scott; Linnenbringer, Erin; Whitehouse, Peter J.; Royal, Charmaine D. M.; Obisesan, Thomas O.; Cupples, L. Adrienne; Butson, Melissa B.; Fasaye, Grace-Ann; Hiraki, Susan; Chen, Clara A.; Siebert, Uwe; Cook-Deegan, Robert; Green, Robert C.
2018-01-01
Purpose Telephone disclosure of genetic test results can improve access to services. To date, studies of its impact have focused on return of Mendelian risk information, principally hereditary cancer syndromes. Methods In a multisite trial of Alzheimer’s disease genetic risk disclosure, asymptomatic adults were randomized to receive test results in-person or via telephone. Primary analyses examined patient outcomes 12 months after disclosure. Results Data from 257 participants showed that telephone disclosure occurred 7.4 days sooner and were 30% shorter, on average, than in-person disclosure (both p<0.001). Anxiety and depression scores were well below cutoffs for clinical concern across protocols. Comparing telephone and in-person disclosure protocols, 99% CIs of mean differences were within non-inferiority margins on scales assessing anxiety, depression, and test-related distress, but inconclusive about positive impact. No differences were observed on measures of recall and subjective impact. Sub-analyses supported non-inferiority on all outcomes among APOE ε4-negative participants. Sub-analyses were inconclusive for APOE ε4-positive participants, although mean anxiety and depression scores were still well below cutoffs for clinical concern. Conclusion Telephone disclosure of APOE results and risk for Alzheimer’s disease is generally safe and helps providers meet demands for services, even when results identify an increased risk for disease. PMID:28726810
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Simple Spectral Lines Data Model Version 1.0
NASA Astrophysics Data System (ADS)
Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Dubernet, Marie-Lise; Roueff, Evelyne; Osuna, Pedro; Salgado, Jesus
2010-12-01
This document presents a Data Model to describe Spectral Line Transitions in the context of the Simple Line Access Protocol defined by the IVOA (c.f. Ref[13] IVOA Simple Line Access protocol) The main objective of the model is to integrate with and support the Simple Line Access Protocol, with which it forms a compact unit. This integration allows seamless access to Spectral Line Transitions available worldwide in the VO context. This model does not provide a complete description of Atomic and Molecular Physics, which scope is outside of this document. In the astrophysical sense, a line is considered as the result of a transition between two energy levels. Under the basis of this assumption, a whole set of objects and attributes have been derived to define properly the necessary information to describe lines appearing in astrophysical contexts. The document has been written taking into account available information from many different Line data providers (see acknowledgments section).
Optimizing the NASA Technical Report Server
NASA Technical Reports Server (NTRS)
Nelson, Michael L.; Maa, Ming-Hokng
1996-01-01
The NASA Technical Report Server (NTRS), a World Wide Web report distribution NASA technical publications service, is modified for performance enhancement, greater protocol support, and human interface optimization. Results include: Parallel database queries, significantly decreasing user access times by an average factor of 2.3; access from clients behind firewalls and/ or proxies which truncate excessively long Uniform Resource Locators (URLs); access to non-Wide Area Information Server (WAIS) databases and compatibility with the 239-50.3 protocol; and a streamlined user interface.
USDA-ARS?s Scientific Manuscript database
The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...
McCombs, J S; Nichol, M B
1993-02-01
To evaluate whether a pharmacy-enforced treatment protocol successfully limited the use of a high-cost medication to high-risk patients. A case study cost-effectiveness analysis was conducted to evaluate a treatment protocol for cefaclor. Episodes of care were defined, healthcare expenditures for all services were aggregated, and demographic data were retrieved from a five percent random sample of California Medicaid (Medi-Cal) recipients. Data were available for episodes occurring before cefaclor was made available under Medi-Cal. Medi-Cal added cefaclor to its formulary, limiting its use to patients over 50 years of age with lower respiratory tract infections (LRTIs). The unit of analysis was an episode of outpatient antibiotic treatment. Confirmed LRTI episodes and unconfirmed LRTI cefaclor episodes were analyzed, including multiple episodes of treatment for individual patients. A total of 7855 non-cefaclor LRTI episodes and 2556 cefaclor episodes were analyzed. The primary outcome measures were healthcare expenditures three months after the initiation of antibiotic therapy, differentiated by type of service. Physicians directed cefaclor toward higher-risk patients over age 50 years, even in unconfirmed LRTI episodes. Cefaclor use was estimated to reduce posttreatment costs by $388 per patient (p < 0.001), primarily because of reduced hospital expenditures of $366 (p < 0.001). Pharmacy-enforced outpatient drug treatment protocols may be a viable alternative to restrictive formularies and prior authorization. In the case of cefaclor, the Medi-Cal treatment protocol appeared to allow high-risk patients better access to a high-cost medication while reducing total posttreatment costs.
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
NASA Astrophysics Data System (ADS)
Ramanathan, Ravishankar; Brandão, Fernando G. S. L.; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Wojewódka, Hanna
2016-12-01
Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two nonsignaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries. Our main innovation is the proof that even the partial randomness certified by the two-party Bell test [a single input-output pair (u* , x* ) for which the conditional probability P (x*|u*) is bounded away from 1 for all no-signaling strategies that optimally violate the Bell inequality] can be used for amplification. We introduce the methodology of a partial tomographic procedure on the empirical statistics obtained in the Bell test that ensures that the outputs constitute a linear min-entropy source of randomness. As a technical novelty that may be of independent interest, we prove that the Santha-Vazirani source satisfies an exponential concentration property given by a recently discovered generalized Chernoff bound.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Data aggregation in wireless sensor networks using the SOAP protocol
NASA Astrophysics Data System (ADS)
Al-Yasiri, A.; Sunley, A.
2007-07-01
Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.
Effect of Expanding Medicaid for Parents on Children’s Health Insurance Coverage
DeVoe, Jennifer E.; Marino, Miguel; Angier, Heather; O’Malley, Jean P.; Crawford, Courtney; Nelson, Christine; Tillotson, Carrie J.; Bailey, Steffani R.; Gallia, Charles; Gold, Rachel
2016-01-01
IMPORTANCE In the United States, health insurance is not universal. Observational studies show an association between uninsured parents and children. This association persisted even after expansions in child-only public health insurance. Oregon’s randomized Medicaid expansion for adults, known as the Oregon Experiment, created a rare opportunity to assess causality between parent and child coverage. OBJECTIVE To estimate the effect on a child’s health insurance coverage status when (1) a parent randomly gains access to health insurance and (2) a parent obtains coverage. DESIGN, SETTING, AND PARTICIPANTS Oregon Experiment randomized natural experiment assessing the results of Oregon’s 2008 Medicaid expansion. We used generalized estimating equation models to examine the longitudinal effect of a parent randomly selected to apply for Medicaid on their child’s Medicaid or Children’s Health Insurance Program (CHIP) coverage (intent-to-treat analyses). We used per-protocol analyses to understand the impact on children’s coverage when a parent was randomly selected to apply for and obtained Medicaid. Participants included 14 409 children aged 2 to 18 years whose parents participated in the Oregon Experiment. EXPOSURES For intent-to-treat analyses, the date a parent was selected to apply for Medicaid was considered the date the child was exposed to the intervention. In per-protocol analyses, exposure was defined as whether a selected parent obtained Medicaid. MAIN OUTCOMES AND MEASURES Children’s Medicaid or CHIP coverage, assessed monthly and in 6-month intervals relative to their parent’s selection date. RESULTS In the immediate period after selection, children whose parents were selected to apply significantly increased from 3830 (61.4%) to 4152 (66.6%) compared with a nonsignificant change from 5049 (61.8%) to 5044 (61.7%) for children whose parents were not selected to apply. Children whose parents were randomly selected to apply for Medicaid had 18% higher odds of being covered in the first 6 months after parent’s selection compared with children whose parents were not selected (adjusted odds ratio [AOR] = 1.18; 95% CI, 1.10–1.27). The effect remained significant during months 7 to 12 (AOR = 1.11; 95% CI, 1.03–1.19); months 13 to 18 showed a positive but not significant effect (AOR = 1.07; 95% CI, 0.99–1.14). Children whose parents were selected and obtained coverage had more than double the odds of having coverage compared with children whose parents were not selected and did not gain coverage (AOR = 2.37; 95% CI, 2.14–2.64). CONCLUSIONS AND RELEVANCE Children’s odds of having Medicaid or CHIP coverage increased when their parents were randomly selected to apply for Medicaid. Children whose parents were selected and subsequently obtained coverage benefited most. This study demonstrates a causal link between parents’ access to Medicaid coverage and their children’s coverage. PMID:25561041
Dynamic spectrum management: an impact on EW systems
NASA Astrophysics Data System (ADS)
Gajewski, P.; Łopatka, J.; Suchanski, M.
2017-04-01
Rapid evolution of wireless systems caused an enormous growth of data streams transmitted through the networks and, as a consequence, an accompanying demand concerning spectrum resources (SR). An avoidance of advisable disturbances is one of the main demands in military communications. To solve the interference problems, dynamic spectrum management (DSM) techniques can be used. Two main techniques are possible: centralized Coordinated Dynamic Spectrum Access (CDSA) and distributed Opportunistic Spectrum Access (OSA). CDSA enables the wireless networks planning automation, and systems dynamic reaction to random changes of Radio Environment (RE). For OSA, cognitive radio (CR) is the most promising technology that enables avoidance of interference with the other spectrum users due to CR's transmission parameters adaptation to the current radio situation, according to predefined Radio Policies rules. If DSM techniques are used, the inherent changes in EW systems are also needed. On one hand, new techniques of jamming should be elaborated, on the other hand, the rules and protocols of cooperation between communication network and EW systems should be developed.
Schacht Hansen, M; Dørup, J
2001-01-01
The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.
Hansen, Michael Schacht
2001-01-01
Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946
Exponential gain of randomness certified by quantum contextuality
NASA Astrophysics Data System (ADS)
Um, Mark; Zhang, Junhua; Wang, Ye; Wang, Pengfei; Kim, Kihwan
2017-04-01
We demonstrate the protocol of exponential gain of randomness certified by quantum contextuality in a trapped ion system. The genuine randomness can be produced by quantum principle and certified by quantum inequalities. Recently, randomness expansion protocols based on inequality of Bell-text and Kochen-Specker (KS) theorem, have been demonstrated. These schemes have been theoretically innovated to exponentially expand the randomness and amplify the randomness from weak initial random seed. Here, we report the experimental evidence of such exponential expansion of randomness. In the experiment, we use three states of a 138Ba + ion between a ground state and two quadrupole states. In the 138Ba + ion system, we do not have detection loophole and we apply a methods to rule out certain hidden variable models that obey a kind of extended noncontextuality.
Wireless Distribution Systems To Support Medical Response to Disasters
Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.
2005-01-01
We discuss the design of multi-hop access networks with multiple gateways that supports medical response to disasters. We examine and implement protocols to ensure high bandwidth, robust, self-healing and secure wireless multi-hop access networks for extreme conditions. Address management, path setup, gateway discovery and selection protocols are described. Future directions and plans are also considered. PMID:16779171
Green, Robert C; Christensen, Kurt D; Cupples, L Adrienne; Relkin, Norman R; Whitehouse, Peter J; Royal, Charmaine D M; Obisesan, Thomas O; Cook-Deegan, Robert; Linnenbringer, Erin; Butson, Melissa Barber; Fasaye, Grace-Ann; Levinson, Elana; Roberts, J Scott
2015-10-01
Conventional multisession genetic counseling is currently recommended when disclosing apolipoprotein E (APOE) genotype for the risk of Alzheimer's disease (AD) in cognitively normal individuals. The objective of this study was to evaluate the safety of brief disclosure protocols for disclosing APOE genotype for the risk of AD. A randomized, multicenter noninferiority trial was conducted at four sites. Participants were asymptomatic adults having a first-degree relative with AD. A standard disclosure protocol by genetic counselors (SP-GC) was compared with condensed protocols, with disclosures by genetic counselors (CP-GC) and by physicians (CP-MD). Preplanned co-primary outcomes were anxiety and depression scales 12 months after disclosure. Three hundred and forty-three adults (mean age 58.3, range 33-86 years, 71% female, 23% African American) were randomly assigned to the SP-GC protocol (n = 115), CP-GC protocol (n = 116), or CP-MD protocol (n = 112). Mean postdisclosure scores on all outcomes were well below cut-offs for clinical concern across protocols. Comparing CP-GC with SP-GC, the 97.5% upper confidence limits at 12 months after disclosure on co-primary outcomes of anxiety and depression ranged from a difference of 1.2 to 2.0 in means (all P < .001 on noninferiority tests), establishing noninferiority for condensed protocols. Results were similar between European Americans and African Americans. These data support the safety of condensed protocols for APOE disclosure for those free of severe anxiety or depression who are actively seeking such information. Copyright © 2015 The Alzheimer's Association. Published by Elsevier Inc. All rights reserved.
Ferber, Reed; Bolgla, Lori; Earl-Boehm, Jennifer E.; Emery, Carolyn; Hamstra-Wright, Karrie
2015-01-01
Context: Patellofemoral pain (PFP) is the most common injury in running and jumping athletes. Randomized controlled trials suggest that incorporating hip and core strengthening (HIP) with knee-focused rehabilitation (KNEE) improves PFP outcomes. However, no randomized controlled trials have, to our knowledge, directly compared HIP and KNEE programs. Objective: To compare PFP pain, function, hip- and knee-muscle strength, and core endurance between KNEE and HIP protocols after 6 weeks of rehabilitation. We hypothesized greater improvements in (1) pain and function, (2) hip strength and core endurance for patients with PFP involved in the HIP protocol, and (3) knee strength for patients involved in the KNEE protocol. Design: Randomized controlled clinical trial. Setting: Four clinical research laboratories in Calgary, Alberta; Chicago, Illinois; Milwaukee, Wisconsin; and Augusta, Georgia. Patients or Other Participants: Of 721 patients with PFP screened, 199 (27.6%) met the inclusion criteria (66 men [31.2%], 133 women [66.8%], age = 29.0 ± 7.1 years, height = 170.4 ± 9.4 cm, weight = 67.6 ± 13.5 kg). Intervention(s): Patients with PFP were randomly assigned to a 6-week KNEE or HIP protocol. Main Outcome Measure(s): Primary variables were self-reported visual analog scale and Anterior Knee Pain Scale measures, which were conducted weekly. Secondary variables were muscle strength and core endurance measured at baseline and at 6 weeks. Results: Compared with baseline, both the visual analog scale and the Anterior Knee Pain Scale improved for patients with PFP in both the HIP and KNEE protocols (P < .001), but the visual analog scale scores for those in the HIP protocol were reduced 1 week earlier than in the KNEE group. Both groups increased in strength (P < .001), but those in the HIP protocol gained more in hip-abductor (P = .01) and -extensor (P = .01) strength and posterior core endurance (P = .05) compared with the KNEE group. Conclusions: Both the HIP and KNEE rehabilitation protocols produced improvements in PFP, function, and strength over 6 weeks. Although outcomes were similar, the HIP protocol resulted in earlier resolution of pain and greater overall gains in strength compared with the KNEE protocol. PMID:25365133
Zwerenz, Rüdiger; Becker, Jan; Knickenberg, Rudolf J; Hagen, Karin; Dreier, Michael; Wölfling, Klaus; Beutel, Manfred E
2015-03-17
Depression is one of the most debilitating and costly mental disorders. There is increasing evidence for the efficacy of online self-help in alleviating depression. Knowledge regarding the options of combining online self-help with inpatient psychotherapy is still limited. Therefore, we plan to evaluate an evidence-based self-help program (deprexis®; Gaia AG, Hamburg, Germany) to improve the efficacy of inpatient psychotherapy and to maintain treatment effects in the aftercare period. Depressed patients (n = 240) with private internet access aged between 18 and 65 are recruited during psychosomatic inpatient treatment. Participants are randomized to an intervention or control group at the beginning of inpatient treatment. The intervention group (n = 120) is offered an online self-help program with 12 weekly tasks, beginning during the inpatient treatment. The control group (n = 120) obtains access to an online platform with weekly updated information on depression for the same duration. Assessments are conducted at the beginning (T0) and the end of inpatient treatment (T1), at the end of intervention (T2) and 6 months after randomization (T3). The primary outcome is the depression score measured by the Beck Depression Inventory-II at T2. Secondary outcome measures include anxiety, self-esteem, quality of life, dysfunctional cognitions and work ability. We expect the intervention group to benefit from additional online self-help during inpatient psychotherapy and to maintain the benefits during follow-up. This could be an important approach to develop future concepts of inpatient psychotherapy. ClinicalTrials.gov Identifier: NCT02196896 (registered on 16 July 2014).
Karády, Júlia; Panajotu, Alexisz; Kolossváry, Márton; Szilveszter, Bálint; Jermendy, Ádám L; Bartykowszki, Andrea; Károlyi, Mihály; Celeng, Csilla; Merkely, Béla; Maurovich-Horvat, Pál
2017-11-01
Contrast media (CM) extravasation is a well-known complication of CT angiography (CTA). Our prospective randomized control study aimed to assess whether a four-phasic CM administration protocol reduces the risk of extravasation compared to the routinely used three-phasic protocol in coronary CTA. Patients referred to coronary CTA due to suspected coronary artery disease were included in the study. All patients received 400 mg/ml iomeprol CM injected with dual-syringe automated injector. Patients were randomized into a three-phasic injection-protocol group, with a CM bolus of 85 ml followed by 40 ml of 75%:25% saline/CM mixture and 30 ml saline chaser bolus; and a four-phasic injection-protocol group, with a saline pacer bolus of 10 ml injected at a lower flow rate before the three-phasic protocol. 2,445 consecutive patients were enrolled (mean age 60.6 ± 12.1 years; females 43.6%). Overall rate of extravasation was 0.9% (23/2,445): 1.4% (17/1,229) in the three-phasic group and 0.5% (6/1,216) in the four-phasic group (p = 0.034). Four-phasic CM administration protocol is easy to implement in the clinical routine at no extra cost. The extravasation rate is reduced by 65% with the application of the four-phasic protocol compared to the three-phasic protocol in coronary CTA. • Four-phasic CM injection-protocol reduces extravasation rate by 65% compared to three-phasic. • The saline pacer bolus substantially reduces the risk of CM extravasation. • The implementation of four-phasic injection-protocol is at no cost.
Utz, Bettina; Assarag, Bouchra; Essolbi, Amina; Barkat, Amina; El Ansari, Nawal; Fakhir, Bouchra; Delamou, Alexandre; De Brouwere, Vincent
2017-06-19
Morocco is facing a growing prevalence of diabetes and according to latest figures of the World Health Organization, already 12.4% of the population are affected. A similar prevalence has been reported for gestational diabetes (GDM) and although it is not yet high on the national agenda, immediate and long-term complications threaten the health of mothers and future generations. A situational analysis on GDM conducted in 2015 revealed difficulties in access to screening and delays in receiving appropriate care. This implementation study has as objective to evaluate a decentralized GDM detection and management approach through the primary level of care and assess its potential for scaling up. We will conduct a hybrid effectiveness-implementation research using a cluster randomized controlled trial design in two districts of Morocco. Using the health center as unit of randomization we randomly selected 20 health centers with 10 serving as intervention and 10 as control facilities. In the intervention arm, providers will screen pregnant women attending antenatal care for GDM by capillary glucose testing during antenatal care. Women tested positive will receive nutritional counselling and will be followed up through the health center. In the control facilities, screening and initial management of GDM will follow standard practice. Primary outcome will be birthweight with weight gain during pregnancy, average glucose levels and pregnancy outcomes including mode of delivery, presence or absence of obstetric or newborn complications and the prevalence of GDM at health center level as secondary outcomes. Furthermore we will assess the quality of life /care experienced by the women in both arms. Qualitative methods will be applied to evaluate the feasibility of the intervention at primary level and its adoption by the health care providers. In Morocco, gestational diabetes screening and its initial management is fragmented and coupled with difficulties in access and treatment delays. Implementation of a strategy that enables detection, management and follow-up of affected women at primary health care level is expected to positively impact on access to care and medical outcomes. The trial has been registered on clininicaltrials.gov ; identifier NCT02979756 ; retrospectively registered 22 November 2016.
Sarkar, Bidyut K; Shahab, Lion; Arora, Monika; Lorencatto, Fabiana; Reddy, K Srinath; West, Robert
2014-03-01
India has 275 million adult tobacco users and tobacco use is estimated to contribute to more than a million deaths in the country each year. There is an urgent need to develop and evaluate affordable, practicable and scalable interventions to promote cessation of tobacco use. Because tobacco use is so harmful, an increase of as little as 1 percentage point in long-term quit success rates can have an important public health impact. This protocol paper describes the rationale and methods of a large randomized controlled trial which aims to evaluate the effectiveness of a brief scalable smoking cessation intervention delivered by trained health professionals as an outreach programme in poor urban communities in India. This is a pragmatic, two-arm, community-based cluster randomized controlled trial focused on tobacco users in low-income communities. The treatment arm is a brief intervention comprising brief advice including training in craving control using simple yogic breathing exercises (BA-YBA) and the control arm is very brief advice (VBA). Of a total of 32 clusters, 16 will be allocated to the intervention arm and 16 to the control arm. Each cluster will have 31 participants, making a total of 992 participants. The primary outcome measure will follow the Russell Standard: self-report of sustained abstinence for at least 6 months following the intervention confirmed at the final follow-up by salivary cotinine. This trial will inform national and international policy on delivery of scalable and affordable brief outreach interventions to promote tobacco use cessation in low resource settings where tobacco users have limited access to physicians and medications. © 2014 Society for the Study of Addiction.
Strigo, Tara S; Ephraim, Patti L; Pounds, Iris; Hill-Briggs, Felicia; Darrell, Linda; Ellis, Matthew; Sudan, Debra; Rabb, Hamid; Segev, Dorry; Wang, Nae-Yuh; Kaiser, Mary; Falkovic, Margaret; Lebov, Jill F; Boulware, L Ebony
2015-10-09
Live donor kidney transplantation (LDKT), an optimal therapy for many patients with end-stage kidney disease, is underutilized, particularly by African Americans. Potential recipient difficulties initiating and sustaining conversations about LDKT, identifying willing and medically eligible donors, and potential donors' logistical and financial hurdles have been cited as potential contributors to race disparities in LDKT. Few interventions specifically targeting these factors have been tested. We report the protocol of the Talking about Living Kidney Donation Support (TALKS) study, a study designed to evaluate the effectiveness of behavioral, educational and financial assistance interventions to improve access to LDKT among African Americans on the deceased donor kidney transplant recipient waiting list. We adapted a previously tested educational and social worker intervention shown to improve consideration and pursuit of LDKT among patients and their family members for its use among patients on the kidney transplant waiting list. We also developed a financial assistance intervention to help potential donors overcome logistical and financial challenges they might face during the pursuit of live kidney donation. We will evaluate the effectiveness of these interventions by conducting a randomized controlled trial in which patients on the deceased donor waiting list receive 1) usual care while on the transplant waiting list, 2) the educational and social worker intervention, or 3) the educational and social worker intervention plus the option of participating in the financial assistance program. The primary outcome of the randomized controlled trial will measure potential recipients' live kidney donor activation (a composite rate of live donor inquiries, completed new live donor evaluations, or live kidney donation) at 1 year. The TALKS study will rigorously assess the effectiveness of promising interventions to reduce race disparities in LDKT. NCT02369354.
Protocolized fluid therapy in brain-dead donors: The multi-center randomized MOnIToR trial
Al-Khafaji, Ali; Elder, Michele; Lebovitz, Daniel J; Murugan, Raghavan; Souter, Michael; Stuart, Susan; Wahed, Abdus S.; Keebler, Ben; Dils, Dorrie; Mitchell, Stephanie; Shutterly, Kurt; Wilkerson, Dawn; Pearse, Rupert; Kellum, John A
2015-01-01
BACKGROUND Critical shortages of organs for transplantation jeopardize many lives. Observational data suggest that better fluid management for deceased organ donors could increase organ recovery. We conducted the first large multi-center randomized trial in brain-dead donors to determine whether protocolized fluid therapy increases organs transplanted. METHODS We randomly assigned donors to either protocolized or usual care in eight organ procurement organizations. A “protocol-guided fluid therapy” algorithm targeting cardiac index, mean arterial pressure and pulse pressure variation was used. Our primary outcome was the number of organs transplanted per donor and our primary analysis was intention-to-treat. Secondary analyses included: 1) modified intention-to-treat where only subjects able to receive the intervention were included, and 2) twelve-month survival in transplant recipients. The study was stopped early. RESULTS We enrolled 556 donors; 279 protocolized care, 277 usual care. Groups had similar characteristics at baseline. The study protocol could be implemented in 76% of subjects randomized to the intervention. There was no significant difference in mean number of organs transplanted per donor: 3.39 organs per donor, (95%CI: 3.14-3.63) with protocolized care, compared to usual care 3.29 (95%CI: 3.04-3.54) (mean difference, 0.1, 95%CI: -0.25 to 0.45; p=0.56). In modified intention-to-treat analysis the mean number of organs increased (3.52 organs per donor, 95%CI: 3.23-3.8) but was not statistically significant (mean difference, 0.23, 95%CI: -0.15-0.61; p=0.23). Among the 1430 recipients of organs from study subjects, with data available, 56 deaths (7.8%) occurred in the protocolized care arm and 56 (7.9%) in the usual care arm in the first year (Hazard Ratio: 0.97, p=0.86). CONCLUSIONS In brain-dead organ donors, protocol-guided fluid therapy compared to usual care may not increase the number of organs transplanted per donor. PMID:25583616
Controlled breathing protocols probe human autonomic cardiovascular rhythms
NASA Technical Reports Server (NTRS)
Cooke, W. H.; Cox, J. F.; Diedrich, A. M.; Taylor, J. A.; Beightol, L. A.; Ames, J. E. 4th; Hoag, J. B.; Seidel, H.; Eckberg, D. L.
1998-01-01
The purpose of this study was to determine how breathing protocols requiring varying degrees of control affect cardiovascular dynamics. We measured inspiratory volume, end-tidal CO2, R-R interval, and arterial pressure spectral power in 10 volunteers who followed the following 5 breathing protocols: 1) uncontrolled breathing for 5 min; 2) stepwise frequency breathing (at 0.3, 0.25, 0.2, 0.15, 0.1, and 0.05 Hz for 2 min each); 3) stepwise frequency breathing as above, but with prescribed tidal volumes; 4) random-frequency breathing (approximately 0.5-0.05 Hz) for 6 min; and 5) fixed-frequency breathing (0.25 Hz) for 5 min. During stepwise breathing, R-R interval and arterial pressure spectral power increased as breathing frequency decreased. Control of inspired volume reduced R-R interval spectral power during 0.1 Hz breathing (P < 0.05). Stepwise and random-breathing protocols yielded comparable coherence and transfer functions between respiration and R-R intervals and systolic pressure and R-R intervals. Random- and fixed-frequency breathing reduced end-tidal CO2 modestly (P < 0.05). Our data suggest that stringent tidal volume control attenuates low-frequency R-R interval oscillations and that fixed- and random-rate breathing may decrease CO2 chemoreceptor stimulation. We conclude that autonomic rhythms measured during different breathing protocols have much in common but that a stepwise protocol without stringent control of inspired volume may allow for the most efficient assessment of short-term respiratory-mediated autonomic oscillations.
Ghoncheh, Rezvan; Kerkhof, Ad J F M; Koot, Hans M
2014-02-08
Providing e-learning modules can be an effective strategy for enhancing gatekeepers' knowledge, self-confidence and skills in adolescent suicide prevention. The aim of this study was to test the effectiveness of an online training program called Mental Health Online which consists of eight short e-learning modules, each capturing an important aspect of the process of recognition, guidance and referral of suicidal adolescents (12-20 years). The primary outcomes of this study are participant's ratings on perceived knowledge, perceived self-confidence, and actual knowledge regarding adolescent suicidality. A randomized controlled trial will be carried out among 154 gatekeepers. After completing the first assessment (pre-test), participants will be randomly assigned to either the experimental group or the waitlist control group. One week after completing the first assessment the experimental group will have access to the website Mental Health Online containing the eight e-learning modules and additional information on adolescent suicide prevention. Participants in both conditions will be assessed 4 weeks after completing the first assessment (post-test), and 12 weeks after completing the post-test (follow-up). At post-test, participants from the experimental group are asked to complete an evaluation questionnaire on the modules. The waitlist control group will have access to the modules and additional information on the website after completing the follow-up assessment. Gatekeepers can benefit from e-learning modules on adolescent suicide prevention. This approach allows them to learn about this sensitive subject at their own pace and from any given location, as long as they have access to the Internet. Given the flexible nature of the program, each participant can compose his/her own training creating an instant customized course with the required steps in adolescent suicide prevention. Netherlands Trial Register NTR3625.
Grünzig, Sasha-Denise; Baumeister, Harald; Bengel, Jürgen; Ebert, David; Krämer, Lena
2018-05-22
Due to limited resources, waiting periods for psychotherapy are often long and burdening for those in need of treatment and the health care system. In order to bridge the gap between initial contact and the beginning of psychotherapy, web-based interventions can be applied. The implementation of a web-based depression intervention during waiting periods has the potential to reduce depressive symptoms and enhance well-being in depressive individuals waiting for psychotherapy. In a two-arm randomized controlled trial, effectiveness and acceptance of a guided web-based intervention for depressive individuals on a waitlist for psychotherapy are evaluated. Participants are recruited in several German outpatient clinics. All those contacting the outpatient clinics with the wish to enter psychotherapy receive study information and a depression screening. Those adults (age ≥ 18) with depressive symptoms above cut-off (CES-D scale > 22) and internet access are randomized to either intervention condition (treatment as usual and immediate access to the web-based intervention) or waiting control condition (treatment as usual and delayed access to the web-based intervention). At three points of assessment (baseline, post-treatment, 3-months-follow-up) depressive symptoms and secondary outcomes, such as quality of life, attitudes towards psychotherapy and web-based interventions and adverse events are assessed. Additionally, participants' acceptance of the web-based intervention is evaluated, using measures of intervention adherence and satisfaction. This study investigates a relevant setting for the implementation of web-based interventions, potentially improving the provision of psychological health care. The results of this study contribute to the evaluation of innovative and resource-preserving health care models for outpatient psychological treatment. This trial has been registered on 13 February 2017 in the German clinical trials register (DRKS); registration number DRKS00010282 .
2011-01-01
Background Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education) randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. Methods A randomized controlled trial (RCT) with three arms; 1) PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention), 2) REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention), and 3) CONTROL (pedometer only, but no intervention will be conducted). A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary), immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. Discussion If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral sciences and mHealth. Trial Registration ClinicalTrials.gov#:NCTO1280812 PMID:22168267
Fukuoka, Yoshimi; Komatsu, Judith; Suarez, Larry; Vittinghoff, Eric; Haskell, William; Noorishad, Tina; Pham, Kristin
2011-12-14
Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education) randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. A randomized controlled trial (RCT) with three arms; 1) PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention), 2) REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention), and 3) CONTROL (pedometer only, but no intervention will be conducted). A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary), immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral sciences and mHealth. ClinicalTrials.gov#:NCTO1280812.
Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow
2017-01-01
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...
Development and validation of a remote home safety protocol.
Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon
2018-02-01
Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.
Schmitz, Christoph; Császár, Nikolaus B. M.; Milz, Stefan; Schieker, Matthias; Maffulli, Nicola; Rompe, Jan-Dirk; Furia, John P.
2015-01-01
Background Extracorporeal shock wave therapy (ESWT) is an effective and safe non-invasive treatment option for tendon and other pathologies of the musculoskeletal system. Sources of data This systematic review used data derived from the Physiotherapy Evidence Database (PEDro; www.pedro.org.au, 23 October 2015, date last accessed). Areas of agreement ESWT is effective and safe. An optimum treatment protocol for ESWT appears to be three treatment sessions at 1-week intervals, with 2000 impulses per session and the highest energy flux density the patient can tolerate. Areas of controversy The distinction between radial ESWT as ‘low-energy ESWT’ and focused ESWT as ‘high-energy ESWT’ is not correct and should be abandoned. Growing points There is no scientific evidence in favour of either radial ESWT or focused ESWT with respect to treatment outcome. Areas timely for developing research Future randomized controlled trials should primarily address systematic tests of the aforementioned optimum treatment protocol and direct comparisons between radial and focused ESWT. PMID:26585999
On the security of semi-device-independent QKD protocols
NASA Astrophysics Data System (ADS)
Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin
2018-06-01
While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
Analyzing the effect of routing protocols on media access control protocols in radio networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C. L.; Drozda, M.; Marathe, A.
2002-01-01
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less
ProMC: Input-output data format for HEP applications using varint encoding
NASA Astrophysics Data System (ADS)
Chekanov, S. V.; May, E.; Strand, K.; Van Gemmeren, P.
2014-10-01
A new data format for Monte Carlo (MC) events, or any structural data, including experimental data, is discussed. The format is designed to store data in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the PROMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features of the proposed format are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in PROMC files can be written, read and manipulated in a number of programming languages, such C++, JAVA, FORTRAN and PYTHON.
2013-01-01
Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. Methods/Design The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. Discussion This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the execution of the program and the resultant threats to the study, we discuss our analytical plan and intentions for endline data collection. Trials registration Current Controlled Trials ISRCTN76061874 PMID:23953975
Zeron Mullins, Melinda; Trouton, Konia M
2015-07-26
Bacterial vaginosis is associated with increased transmission of sexually transmitted infections, preterm labor, post-surgical infections, and endometritis. Current treatment for symptomatic bacterial vaginosis includes antibiotics, such as metronidazole, which are 70-80 % effective at one month after treatment and result in high recurrence rates and secondary candida infections. Intravaginal boric acid has been used for over a hundred years to treat vaginal infections, such as bacterial vaginosis. Boric acid is inexpensive, accessible, and has shown to be an effective treatment for other infections, such as vaginal candidiasis. To date, there has been no clinical trial evaluation of boric acid effectiveness to treat bacterial vaginosis. The BASIC (Boric Acid, Alternate Solution for Intravaginal Colonization) trial is a randomized, double-blinded, multicenter study. The study will enroll a minimum of 240 women of 16-50 years of age who are symptomatic with bacterial vaginosis. Eligible participants will have Amsel and Nugent scores confirming bacterial vaginosis. Women who are pregnant or menopausal or have other active co-infections will be excluded. Consenting participants who meet exclusion and inclusion criteria will be randomly assigned to one of three treatment groups: boric acid, metronidazole, or an inert placebo. Self-administration of treatment intravaginally for 10 days will be followed by clinical assessment at 7 and 30 days (days 17 and 40, respectively) after the end of the treatment phase. Primary outcome is a non-inferiority, per-protocol comparison of the effectiveness of boric acid with that of metronidazole at day 17, as measured by the Nugent score in 16-50 year olds. Secondary outcomes include: non-inferiority, intention-to-treat comparison of effectiveness of boric acid with that of metronidazole at day 17, analysis for both per-protocol and intention-to-treat at day 40, and safety considerations, including adverse effects requiring patient discontinuation of treatment. This study will be the first to determine whether intravaginal boric acid is non-inferior to metronidazole in the treatment of bacterial vaginosis in symptomatic women. ClinicalTrials.gov NCT00799214, registered online Nov 10, 2008.
Pradhan, Menno; Brinkman, Sally A; Beatty, Amanda; Maika, Amelia; Satriawan, Elan; de Ree, Joppe; Hasan, Amer
2013-08-16
This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the execution of the program and the resultant threats to the study, we discuss our analytical plan and intentions for endline data collection. Current Controlled Trials ISRCTN76061874.
Kist, Stefan; Kollmuss, Maximilian; Jung, Jette; Schubert, Sören; Hickel, Reinhard; Huth, Karin Christine
2017-05-01
In this single-blinded, prospective, randomized, controlled clinical trial, the effectiveness of an ozone gas or NaOCl/CHX disinfection protocol was compared within the root canal treatment of apical periodontitis. Sixty permanent teeth were randomly allocated to one technique. The clinical/radiographic assessment criteria included clinical symptoms, periapical index (PAI), and size of the apical lesion. In both groups, the root canal was mechanically cleaned and irrigated with NaCl and EDTA. Ozone gas (32 g m -3 ) or NaOCl (3 %) was applied followed by a 1-week inter-appointment dressing (Ca(OH) 2 ). As final disinfection, ozone gas (ozone group) or CHX 2 % (NaOCl group) was applied. Microbial samples were taken after preparing the access cavity, after chemo-mechanical treatment and after inter-appointment dressing by sterile paper points. Microbial identification was performed by mass spectroscopy (MALDI-TOF-MS) and 16S-rRNA gene sequencing. The treated teeth were blindly re-evaluated after 6/12 months. Success rates, the decrease in PAI, the size of apical lesions and bacterial reduction were compared between groups (Fischer's exact test, Mann-Whitney U test). There were no significant differences between the success rates (ozone group: 96.2/95.5 % after 6/12 months; NaOCl group: 95.5/95.2 % after 6/12 months). The differences in the decreases in PAI values and apical lesion sizes were also insignificant after 6 and 12 months. The bacterial reduction showed no significant differences between groups after chemo-mechanical treatment and after inter-appointment dressing. The most commonly found bacterial genera were Streptococcus spp., Parvimonas spp. and Prevotella spp. The here used ozone gas and NaOCl/CHX protocols showed no difference in bacterial reduction in the sampled areas of the root canals. Within the limitations of the study, ozone gas seems to be a possible alternative disinfection agent within the root canal treatment of apical periodontitis.
Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-01-01
ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341
McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-08-15
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.
A Mobile Satellite Experiment (MSAT-X) network definition
NASA Technical Reports Server (NTRS)
Wang, Charles C.; Yan, Tsun-Yee
1990-01-01
The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.
Distributed reservation-based code division multiple access
NASA Astrophysics Data System (ADS)
Wieselthier, J. E.; Ephremides, A.
1984-11-01
The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-13
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-792] Certain Static Random Access Memories and Products Containing Same; Commission Determination Affirming a Final Initial Determination..., and the sale within the United States after importation of certain static random access memories and...
Early cessation of triptorelin in in vitro fertilization: a double-blind, randomized study.
Simons, Arnold H M; Roelofs, Henny J M; Schmoutziguer, Alex P E; Roozenburg, Brigitte J; van't Hof-van den Brink, Eefje P; Schoonderwoerd, Simon A
2005-04-01
To compare the efficacy of two early cessation protocols of triptorelin treatment in controlled ovarian hyperstimulation with the conventional long protocol in in vitro fertilization/intracytoplasmic sperm injection. A double-blind, randomized, multicenter study. Three Dutch hospitals. One hundred seventy-eight women randomized to one of three treatment groups at the start of stimulation. Midluteally started triptorelin administration was continued until the first day of hMG treatment (group S), or up to and including the fourth day of hMG treatment (group M) or the day of hCG injection (group L). Occurrence of a premature LH surge. One premature LH surge was observed in group M but not in groups S and L. Both early cessation protocols (S and M) are at least as effective as the long protocol (L) with regard to the number of oocytes (11.1 and 10.3 vs. 9.3), number of embryos (7.3 and 6.5 vs. 5.5), and ongoing pregnancy rate (28% and 24% vs. 21%). Early cessation of triptorelin on day 1 of hMG treatment in a midluteally started IVF protocol is as effective as the traditional long protocol in preventing a premature LH surge and results in similar fertility effects.
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations
NASA Astrophysics Data System (ADS)
Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin
2011-12-01
The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.
McKenna, S; Wallis, M; Brannelly, A; Cawood, J
2001-02-01
Intensive care unit (ICU) patients frequently suffer problems associated with both diarrhoea and constipation. Strategies to optimise the management of these conditions need to focus on improving the communication between staff and ensuring effective treatment is implemented. The team involved in this study developed a Bowel Management Protocol (BMP). The effect of this BMP on the documentation of assessment and management of diarrhoea and constipation was evaluated using a quasi-experimental research design. Data were collected via a retrospective audit of medical records. Two groups of patient records were randomly sampled. The records of 60 patients who were admitted to ICU in the 6 months before the introduction of the BMP were accessed together with the records of 60 patients admitted in the 6 months following the introduction of the BMP. Data were collected regarding patient demographics and the assessment and management of bowel function before and after BMP introduction. The results indicated that a BMP improved documentation of the assessment of bowel function. In addition, there was an improvement in the documentation of nursing intervention in the presence of constipation and diarrhoea. These results have to be interpreted with caution because, despite random sampling over two 6 month periods, there were statistically significant differences in age, length of stay, method of feeding and medical diagnosis between the two groups. Further research into the effectiveness of using a BMP is recommended.
Giesbrecht, Edward M; Miller, William C; Eng, Janice J; Mitchell, Ian M; Woodgate, Roberta L; Goldsmith, Charles H
2013-10-24
Many older adults rely on a manual wheelchair for mobility but typically receive little, if any, training on how to use their wheelchair effectively and independently. Standardized skill training is an effective intervention, but limited access to clinician trainers is a substantive barrier. Enhancing Participation in the Community by Improving Wheelchair Skills (EPIC Wheels) is a 1-month monitored home training program for improving mobility skills in older novice manual wheelchair users, integrating principles from andragogy and social cognitive theory. The purpose of this study is to determine whether feasibility indicators and primary clinical outcome measures of the EPIC Wheels program are sufficiently robust to justify conducting a subsequent multi-site randomized controlled trial. A 2 × 2 factorial randomized controlled trial at two sites will compare improvement in wheelchair mobility skills between an EPIC Wheels treatment group and a computer-game control group, with additional wheelchair use introduced as a second factor. A total of 40 community-dwelling manual wheelchair users at least 55 years old and living in two Canadian metropolitan cities (n = 20 × 2) will be recruited. Feasibility indicators related to study process, resources, management, and treatment issues will be collected during data collection and at the end of the study period, and evaluated against proposed criteria. Clinical outcome measures will be collected at baseline (pre-randomization) and post-intervention. The primary clinical outcome measure is wheelchair skill capacity, as determined by the Wheelchair Skills Test, version 4.1. Secondary clinical outcome measures include wheelchair skill safety, satisfaction with performance, wheelchair confidence, life-space mobility, divided-attention, and health-related quality of life. The EPIC Wheels training program offers several innovative features. The convenient, portable, economical, and adaptable tablet-based, home program model for wheelchair skills training has great potential for clinical uptake and opportunity for future enhancements. Theory-driven design can foster learning and adherence for older adults. Establishing the feasibility of the study protocol and estimating effect size for the primary clinical outcome measure will be used to develop a multi-site randomized controlled trial to test the guiding hypotheses. Clinical Trials NCT01740635.
Shawyer, Frances; Enticott, Joanne C; Brophy, Lisa; Bruxner, Annie; Fossey, Ellie; Inder, Brett; Julian, John; Kakuma, Ritsuko; Weller, Penelope; Wilson-Evered, Elisabeth; Edan, Vrinda; Slade, Mike; Meadows, Graham N
2017-05-08
Recovery features strongly in Australian mental health policy; however, evidence is limited for the efficacy of recovery-oriented practice at the service level. This paper describes the Principles Unite Local Services Assisting Recovery (PULSAR) Specialist Care trial protocol for a recovery-oriented practice training intervention delivered to specialist mental health services staff. The primary aim is to evaluate whether adult consumers accessing services where staff have received the intervention report superior recovery outcomes compared to adult consumers accessing services where staff have not yet received the intervention. A qualitative sub-study aims to examine staff and consumer views on implementing recovery-oriented practice. A process evaluation sub-study aims to articulate important explanatory variables affecting the interventions rollout and outcomes. The mixed methods design incorporates a two-step stepped-wedge cluster randomized controlled trial (cRCT) examining cross-sectional data from three phases, and nested qualitative and process evaluation sub-studies. Participating specialist mental health care services in Melbourne, Victoria are divided into 14 clusters with half randomly allocated to receive the staff training in year one and half in year two. Research participants are consumers aged 18-75 years who attended the cluster within a previous three-month period either at baseline, 12 (step 1) or 24 months (step 2). In the two nested sub-studies, participation extends to cluster staff. The primary outcome is the Questionnaire about the Process of Recovery collected from 756 consumers (252 each at baseline, step 1, step 2). Secondary and other outcomes measuring well-being, service satisfaction and health economic impact are collected from a subset of 252 consumers (63 at baseline; 126 at step 1; 63 at step 2) via interviews. Interview-based longitudinal data are also collected 12 months apart from 88 consumers with a psychotic disorder diagnosis (44 at baseline, step 1; 44 at step 1, step 2). cRCT data will be analyzed using multilevel mixed-effects modelling to account for clustering and some repeated measures, supplemented by thematic analysis of qualitative interview data. The process evaluation will draw on qualitative, quantitative and documentary data. Findings will provide an evidence-base for the continued transformation of Australian mental health service frameworks toward recovery. Australian and New Zealand Clinical Trial Registry: ACTRN12614000957695 . Date registered: 8 September 2014.
Improved Writing-Conductor Designs For Magnetic Memory
NASA Technical Reports Server (NTRS)
Wu, Jiin-Chuan; Stadler, Henry L.; Katti, Romney R.
1994-01-01
Writing currents reduced to practical levels. Improved conceptual designs for writing conductors in micromagnet/Hall-effect random-access integrated-circuit memory reduces electrical current needed to magnetize micromagnet in each memory cell. Basic concept of micromagnet/Hall-effect random-access memory presented in "Magnetic Analog Random-Access Memory" (NPO-17999).
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-792] Certain Static Random Access Memories and Products Containing Same; Commission Determination To Review in Part a Final Initial... States after importation of certain static random access memories and products containing the same by...
Bucci, Sandra; Barrowclough, Christine; Ainsworth, John; Morris, Rohan; Berry, Katherine; Machin, Matthew; Emsley, Richard; Lewis, Shon; Edge, Dawn; Buchan, Iain; Haddock, Gillian
2015-09-10
Cognitive behaviour therapy (CBT) is recommended for the treatment of psychosis; however, only a small proportion of service users have access to this intervention. Smartphone technology using software applications (apps) could increase access to psychological approaches for psychosis. This paper reports the protocol development for a clinical trial of smartphone-based CBT. We present a study protocol that describes a single-blind randomised controlled trial comparing a cognitive behaviour therapy-informed software application (Actissist) plus Treatment As Usual (TAU) with a symptom monitoring software application (ClinTouch) plus TAU in early psychosis. The study consists of a 12-week intervention period. We aim to recruit and randomly assign 36 participants registered with early intervention services (EIS) across the North West of England, UK in a 2:1 ratio to each arm of the trial. Our primary objective is to determine whether in people with early psychosis the Actissist app is feasible to deliver and acceptable to use. Secondary aims are to determine whether Actissist impacts on predictors of first episode psychosis (FEP) relapse and enhances user empowerment, functioning and quality of life. Assessments will take place at baseline, 12 weeks (post-treatment) and 22-weeks (10 weeks post-treatment) by assessors blind to treatment condition. The trial will report on the feasibility and acceptability of Actissist and compare outcomes between the randomised arms. The study also incorporates semi-structured interviews about the experience of participating in the Actissist trial that will be qualitatively analysed to inform future developments of the Actissist protocol and app. To our knowledge, this is the first controlled trial to test the feasibility, acceptability, uptake, attrition and potential efficacy of a CBT-informed smartphone app for early psychosis. Mobile applications designed to deliver a psychologically-informed intervention offer new possibilities to extend the reach of traditional mental health service delivery across a range of serious mental health problems and provide choice about available care. ISRCTN34966555. Date of first registration: 12 June 2014.
Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory
NASA Astrophysics Data System (ADS)
Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.
2014-01-01
Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an operational data cube service to be delivered in mid-2014. An associated user-installable VO data service framework will provide the capabilities required to publish VO-compatible multi-dimensional images or data cubes.
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
NASA Technical Reports Server (NTRS)
Israel, David J.
2005-01-01
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.
Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom
2014-08-01
This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.
Application of an access technology delivery protocol to two children with cerebral palsy.
Mumford, Leslie; Chau, Tom
2015-07-14
This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.
Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti
2008-11-06
At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm
Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.
2014-01-01
The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339
Nubia's mother: being pregnant in the time of experimental vaccines and therapeutics for Ebola.
Caluwaerts, Séverine
2017-12-14
During the 2014-2016 Ebola epidemic, Médecins Sans Frontières (MSF) treated Ebola-positive pregnant women in its Ebola Treatment Centers (ETCs). For pregnant women with confirmed Ebola virus disease, inclusion in clinical vaccine/drug/therapeutic trials was complicated. Despite their extremely high Ebola-related mortality in previous epidemics (89-93%) and a neonatal mortality of 100%, theoretical concerns about safety of vaccines and therapeutics in pregnancy were invoked, limiting pregnant women's access to an experimental live attenuated vaccine and brincidofovir, an experimental antiviral. Favipiravir, another experimental antiviral, was made available to pregnant women only after extensive negotiations and under a 'Monitored Emergency Use of Unregistered and Experimental Interventions' (MEURI) protocol. This paper describes the case of a pregnant woman who presented to the ETCs near the end of the Ebola epidemic in Guinea. The pregnant patient was admitted with confirmed Ebola disease. She was previously denied access to potentially protective vaccination due to pregnancy, and access to experimental ZMapp was only possible through a randomized clinical trial (presenting a 50% chance of not receiving ZMapp). She received favipiravir, but died of Ebola-related complications. The infant, born in the ETC, tested positive for Ebola at birth. The infant received ZMapp (under MEURI access outside of the clinical trial), an experimental drug GS5734, and a buffy coat of an Ebola survivor, and survived. Though the infant did have access to experimental therapeutics within 24 h of birth, access to other experimental compounds for her mother was denied, raising serious ethical concerns.
Random access with adaptive packet aggregation in LTE/LTE-A.
Zhou, Kaijie; Nikaein, Navid
While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.
Machado, Michely Ediani; Tomazoni, Fernanda; Casarin, Maísa; Ardenghi, Thiago M; Zanatta, Fabricio Batistin
2017-10-01
To compare the performance of partial-mouth periodontal examination (PMPE) protocols with different cut-off points to the full-mouth examination (FME) in the assessment of the prevalence and extent of gingival bleeding in adolescents. A cross-sectional study was conducted involving 12-year-old adolescents. Following a systematic two-stage cluster sampling process, 1134 individuals were evaluated. Different PMPE protocols were compared to the FME with six sites per tooth. Sensitivity, specificity, area under the ROC curve (AUC), intraclass correlation coefficient (ICC), relative and absolute biases and the inflation factor were assessed for each PMPE protocol with different cut-off points for the severity of gingival bleeding. The highest AUC values were found for the six-site two-diagonal quadrant (2-4) (0.97), six-site random half-mouth (0.95) and Community Periodontal Index (0.95) protocols. The assessment of three sites [mesiobuccal (MB), buccal (B) and distolingual (DL)] in two diagonal quadrants and the random half-mouth protocol had higher sensitivity and lower specificity than the same protocols with distobuccal (DB) sites. However, the use of DB sites led to better specificity and improved the balance between sensitivity and specificity, except for the two-diagonal quadrant (1-3) protocol. The ≥1 cut-off point led to the most discrepant results from the FME. Six-site two-diagonal quadrant (2-4) and random half-mouth assessments perform better in the evaluation of gingival bleeding in adolescents. However, when a faster protocol is needed, a two-diagonal quadrant assessment using only MB, B and DL sites can be used with no important loss of information. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-13
... DEPARTMENT OF COMMERCE International Trade Administration [C-580-851] Dynamic Random Access Memory... administrative review of the countervailing duty order on dynamic random access memory semiconductors from the... following events have occurred since the publication of the preliminary results of this review. See Dynamic...
ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog
NASA Technical Reports Server (NTRS)
Gray, F. P., Jr. (Editor)
1979-01-01
A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.
47 CFR 79.109 - Activating accessibility features.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...
ERIC Educational Resources Information Center
Packer, Jaclyn; Reuschel, William
2018-01-01
Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…
Comparison of two MAC protocols based on LEO satellite networks
NASA Astrophysics Data System (ADS)
Guan, Mingxiang; Wang, Ruichun
2009-12-01
With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
Protocolized fluid therapy in brain-dead donors: the multicenter randomized MOnIToR trial.
Al-Khafaji, Ali; Elder, Michele; Lebovitz, Daniel J; Murugan, Raghavan; Souter, Michael; Stuart, Susan; Wahed, Abdus S; Keebler, Ben; Dils, Dorrie; Mitchell, Stephanie; Shutterly, Kurt; Wilkerson, Dawn; Pearse, Rupert; Kellum, John A
2015-03-01
Critical shortages of organs for transplantation jeopardize many lives. Observational data suggest that better fluid management for deceased organ donors could increase organ recovery. We conducted the first large multicenter randomized trial in brain-dead donors to determine whether protocolized fluid therapy increases the number of organs transplanted. We randomly assigned donors to either protocolized or usual care in eight organ procurement organizations. A "protocol-guided fluid therapy" algorithm targeting the cardiac index, mean arterial pressure and pulse pressure variation was used. Our primary outcome was the number of organs transplanted per donor, and our primary analysis was intention to treat. Secondary analyses included: (1) modified intention to treat where only subjects able to receive the intervention were included and (2) 12-month survival in transplant recipients. The study was stopped early. We enrolled 556 donors: 279 protocolized care and 277 usual care. Groups had similar characteristics at baseline. The study protocol could be implemented in 76 % of subjects randomized to the intervention. There was no significant difference in mean number of organs transplanted per donor: 3.39 organs per donor (95 % CI 3.14-3.63) with protocolized care compared to 3.29 usual care (95 % CI 3.04-3.54; mean difference, 0.1, 95 % CI -0.25 to 0.45; p = 0.56). In modified intention-to-treat analysis the mean number of organs increased (3.52 organs per donor, 95 % CI 3.23-3.8), but not statistically significantly (mean difference, 0.23, 95 % CI -0.15 to 0.61; p = 0.23). Among the 1,430 recipients of organs from study subjects with data available, 56 deaths (7.8 %) occurred in the protocolized care arm and 56 (7.9 %) in the usual care arm in the first year (hazard ratio: 0.97, p = 0.86). In brain-dead organ donors, protocol-guided fluid therapy compared to usual care may not increase the number of organs transplanted per donor.
Efficacy of Chinese auriculotherapy for stress in nursing staff: a randomized clinical trial
Kurebayashi, Leonice Fumiko Sato; da Silva, Maria Júlia Paes
2014-01-01
Objective this randomized single blind clinical study aimed to evaluate the efficacy of auriculotherapy with and without a protocol for reducing stress levels among nursing staff. Method a total of 175 nursing professionals with medium and high scores according to Vasconcelos' Stress Symptoms List were divided into 3 groups: Control (58), Group with protocol (58), Group with no protocol (59). They were assessed at the baseline, after 12 sessions, and at the follow-up (30 days). Results in the analysis of variance, statistically significant differences between the Control and Intervention groups were found in the two evaluations (p<0.05) with greater size of effect indices (Cohen) for the No protocol group. The Yang Liver 1 and 2, Kidney, Brain Stem and Shen Men were the points most used. Conclusion individualized auriculotherapy, with no protocol, could expand the scope of the technique for stress reduction compared with auriculotherapy with a protocol. NCT: 01420835 PMID:25029046
Ip, David
2015-12-01
The current study evaluates whether the addition of low-level laser therapy into standard conventional physical therapy in elderly with bilateral symptomatic tri-compartmental knee arthritis can successfully postpone the need for joint replacement surgery. A prospective randomized cohort study of 100 consecutive unselected elderly patients with bilateral symptomatic knee arthritis with each knee randomized to receive either treatment protocol A consisting of conventional physical therapy or protocol B which is the same as protocol A with added low-level laser therapy. The mean follow-up was 6 years. Treatment failure was defined as breakthrough pain which necessitated joint replacement surgery. After a follow-up of 6 years, patients clearly benefited from treatment with protocol B as only one knee needed joint replacement surgery, while nine patients treated with protocol A needed surgery (p < 0.05). We conclude low-level laser therapy should be incorporated into standard conservative treatment protocol for symptomatic knee arthritis.
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
González-Ortega, Itxaso; Ugarte, Amaia; Ruiz de Azúa, Sonia; Núñez, Nuria; Zubia, Marta; Ponce, Sara; Casla, Patricia; Llano, Josu Xabier; Faria, Ángel; González-Pinto, Ana
2016-12-22
Bipolar disorder patients frequently present recurrent episodes and often experience subsyndromal symptoms, cognitive impairment and difficulties in functioning, with a low quality of life, illness relapses and recurrent hospitalization. Early diagnosis and appropriate intervention may play a role in preventing neuroprogression in this disorder. New technologies represent an opportunity to develop standardized psychological treatments using internet-based tools that overcome some of the limitations of face-to-face treatments, in that they are readily accessible and the timing of therapy can be tailored to user needs and availability. However, although many psychological programs are offered through the web and mobile devices for bipolar disorder, there is a lack of high quality evidence concerning their efficacy and effectiveness due to the great variability in measures and methodology used. This clinical trial is a simple-blind randomized trial within a European project to compare an internet-based intervention with treatment as usual. Bipolar disorder patients are to be included and randomly assigned to one of two groups: 1) the experimental group (tele-care support) and 2) the control group. Participants in both groups will be evaluated at baseline (pre-treatment) and post-treatment. This study describes the design of a clinical trial based on psychoeducation intervention that may have a significant impact on both prognosis and treatment in bipolar disorder. Specifically, bringing different services together (service aggregation), it is hoped that the approach proposed will significantly increase the impact of information and communication technologies on access and adherence to treatment, quality of the service, patient safety, patient and professional satisfaction, and quality of life of patients. NCT02924415 . Retrospectively registered 27 September 2016.
Rosso, Isabelle M; Killgore, William D S; Olson, Elizabeth A; Webb, Christian A; Fukunaga, Rena; Auerbach, Randy P; Gogel, Hannah; Buchholz, Jennifer L; Rauch, Scott L
2017-03-01
Prior research has shown that the Sadness Program, a technician-assisted Internet-based cognitive behavioral therapy (iCBT) intervention developed in Australia, is effective for treating major depressive disorder (MDD). The current study aimed to expand this work by adapting the protocol for an American population and testing the Sadness Program with an attention control group. In this parallel-group, randomized controlled trial, adult MDD participants (18-45 years) were randomized to a 10-week period of iCBT (n = 37) or monitored attention control (MAC; n = 40). Participants in the iCBT group completed six online therapy lessons, which included access to content summaries and homework assignments. During the 10-week trial, iCBT and MAC participants logged into the web-based system six times to complete self-report symptom scales, and a nonclinician technician contacted participants weekly to provide encouragement and support. The primary outcome was the Hamilton Rating Scale for Depression (HRSD), and the secondary outcomes were the Patient Health Questionnaire-9 and Kessler-10. Intent-to-treat analyses revealed significantly greater reductions in depressive symptoms in iCBT compared with MAC participants, using both the self-report measures and the clinician-rated HRSD (d = -0.80). Importantly, iCBT participants also showed significantly higher rates of clinical response and remission. Exploratory analyses did not support illness severity as a moderator of treatment outcome. The Sadness Program led to significant reductions in depression and distress symptoms. With its potential to be delivered in a scalable, cost-efficient manner, iCBT is a promising strategy to enhance access to effective care. © 2016 Wiley Periodicals, Inc.
Mobile Phone Apps for Smoking Cessation: Quality and Usability Among Smokers With Psychosis.
Ferron, Joelle C; Brunette, Mary F; Geiger, Pamela; Marsch, Lisa A; Adachi-Mejia, Anna M; Bartels, Stephen J
2017-03-03
Smoking is one of the top preventable causes of mortality in people with psychotic disorders such as schizophrenia. Cessation treatment improves abstinence outcomes, but access is a barrier. Mobile phone apps are one way to increase access to cessation treatment; however, whether they are usable by people with psychotic disorders, who often have special learning needs, is not known. Researchers reviewed 100 randomly selected apps for smoking cessation to rate them based on US guidelines for nicotine addiction treatment and to categorize them based on app functions. We aimed to test the usability and usefulness of the top-rated apps in 21 smokers with psychotic disorders. We identified 766 smoking cessation apps and randomly selected 100 for review. Two independent reviewers rated each app with the Adherence Index to US Clinical Practice Guideline for Treating Tobacco Use and Dependence. Then, smokers with psychotic disorders evaluated the top 9 apps within a usability testing protocol. We analyzed quantitative results using descriptive statistics and t tests. Qualitative data were open-coded and analyzed for themes. Regarding adherence to practice guidelines, most of the randomly sampled smoking cessation apps scored poorly-66% rated lower than 10 out of 100 on the Adherence Index (Mean 11.47, SD 11.8). Regarding usability, three common usability problems emerged: text-dense content, abstract symbols on the homepage, and subtle directions to edit features. In order for apps to be effective and usable for this population, developers should utilize a balance of text and simple design that facilitate ease of navigation and content comprehension that will help people learn quit smoking skills. ©Joelle C Ferron, Mary F Brunette, Pamela Geiger, Lisa A Marsch, Anna M Adachi-Mejia, Stephen J Bartels. Originally published in JMIR Human Factors (http://humanfactors.jmir.org), 03.03.2017.
Mobile Phone Apps for Smoking Cessation: Quality and Usability Among Smokers With Psychosis
Brunette, Mary F; Geiger, Pamela; Marsch, Lisa A; Adachi-Mejia, Anna M; Bartels, Stephen J
2017-01-01
Background Smoking is one of the top preventable causes of mortality in people with psychotic disorders such as schizophrenia. Cessation treatment improves abstinence outcomes, but access is a barrier. Mobile phone apps are one way to increase access to cessation treatment; however, whether they are usable by people with psychotic disorders, who often have special learning needs, is not known. Objective Researchers reviewed 100 randomly selected apps for smoking cessation to rate them based on US guidelines for nicotine addiction treatment and to categorize them based on app functions. We aimed to test the usability and usefulness of the top-rated apps in 21 smokers with psychotic disorders. Methods We identified 766 smoking cessation apps and randomly selected 100 for review. Two independent reviewers rated each app with the Adherence Index to US Clinical Practice Guideline for Treating Tobacco Use and Dependence. Then, smokers with psychotic disorders evaluated the top 9 apps within a usability testing protocol. We analyzed quantitative results using descriptive statistics and t tests. Qualitative data were open-coded and analyzed for themes. Results Regarding adherence to practice guidelines, most of the randomly sampled smoking cessation apps scored poorly—66% rated lower than 10 out of 100 on the Adherence Index (Mean 11.47, SD 11.8). Regarding usability, three common usability problems emerged: text-dense content, abstract symbols on the homepage, and subtle directions to edit features. Conclusions In order for apps to be effective and usable for this population, developers should utilize a balance of text and simple design that facilitate ease of navigation and content comprehension that will help people learn quit smoking skills. PMID:28258047
de Ruijter, D; Smit, E S; de Vries, H; Hoving, C
2016-05-01
Dutch practice nurses sub-optimally adhere to evidence-based smoking cessation guidelines. Web-based computer-tailoring could be effective in improving their guideline adherence. Therefore, this paper aims to describe the development of a web-based computer-tailored program and the design of a randomized controlled trial testing its (cost-)effectiveness. Theoretically grounded in the I-Change Model and Self-Determination Theory, and based on the results of a qualitative needs assessment among practice nurses, a web-based computer-tailored program was developed including three modules with tailored advice, an online forum, modules with up-to-date information about smoking cessation, Frequently Asked Questions (FAQs) and project information, and a counseling checklist. The program's effects are assessed by comparing an intervention group (access to all modules) with a control group (access to FAQs, project information and counseling checklist only). Smoking cessation guideline adherence and behavioral predictors (i.e. intention, knowledge, attitude, self-efficacy, social influence, action and coping planning) are measured at baseline and at 6- and 12-month follow-up. Additionally, the program's indirect effects on smokers' quit rates and the number of quit attempts are assessed after 6 and 12months. This paper describes the development of a web-based computer-tailored adherence support program for practice nurses and the study design of a randomized controlled trial testing its (cost-)effectiveness. This program potentially contributes to improving the quality of smoking cessation care in Dutch general practices. If proven effective, the program could be adapted for use by other healthcare professionals, increasing the public health benefits of improved smoking cessation counseling for smokers. Copyright © 2016 Elsevier Inc. All rights reserved.
Lamontagne, Marie-Eve; Perreault, Kadija; Gagnon, Marie-Pierre
2014-04-10
Despite growing interest in the importance of, and challenges associated with the involvement of patient and population (IPP) in the process of developing and adapting clinical practice guidelines (CPGs), there is a lack of knowledge about the best method to use. This is especially problematic in the field of rehabilitation, where individuals with disabilities might face many barriers to their involvement in the guideline development and adaptation process. The goal of this pilot trial is to document the acceptability, feasibility and effectiveness of two methods of involving patients with a disability (traumatic brain injury) in CPG development. A single-blind, randomized, crossover pragmatic trial will be performed with 20 patients with traumatic brain injury (TBI). They will be randomized into two groups, and each will try two alternative methods of producing recommendations; a discussion group (control intervention) and a Wiki, a webpage that can be modified by those who have access to it (experimental intervention). The participants will rate the acceptability of the two methods, and feasibility will be assessed using indicators such as the number of participants who accessed and completed the two methods, and the number of support interventions required. Twenty experts, blinded to the method of producing the recommendations, will independently rate the recommendations produced by the participants for clarity, accuracy, appropriateness and usefulness. Our trial will allow for the use of optimal IPP methods in a larger project of adapting guidelines for the rehabilitation of individuals with TBI. Ultimately the results will inform the science of CPG development and contribute to the growing knowledge about IPP in rehabilitation settings. Clinical trial KT Canada 87776.
Mitchell, Marc; Hedt, Bethany L; Eshun-Wilson, Ingrid; Fraser, Hamish; John, Melanie-Anne; Menezes, Colin; Grobusch, Martin P; Jackson, Jonathan; Taljaard, Jantjie; Lesh, Neal
2012-03-01
The shortage of doctors and nurses, along with future expansion into rural clinics, will require that the majority of clinic visits by HIV infected patients on antiretroviral therapy (ART) are managed by non-doctors. The goal of this study was to develop and evaluate a screening protocol to determine which patients needed a full clinical assessment and which patients were stable enough to receive their medications without a doctor's consultation. For this study, we developed an electronic, handheld tool to guide non-physician counselors through screening questions. Patients visiting two ART clinics in South Africa for routine follow-up visits between March 2007 and April 2008 were included in our study. Each patient was screened by non-physician counselors using the handheld device and then received a full clinical assessment. Clinicians' report on whether full clinical assessment had been necessary was used as the gold standard for determining "required referral". Observations were randomly divided into two datasets--989 for developing a referral protocol and 200 for validating protocol performance. A third of patients had at least one physical complaint, and 16% had five or more physical complaints. 38% of patients required referral for full clinical assessment. We identify a subset of questions which are 87% sensitive and 47% specific for recommended patient referral. The final screening protocol is highly sensitive and could reduce burden on ART clinicians by 30%. The uptake and acceptance of the handheld tool to support implementation of the protocol was high. Further examination of the data reveals several important questions to include in future referral algorithms to improve sensitivity and specificity. Based on these results, we identify a refined algorithm to explore in future evaluations. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Review and publication of protocol submissions to Trials - what have we learned in 10 years?
Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G
2016-12-16
Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.
Kashiwagi, Kenji; Tsukahara, Shigeo
2014-01-15
Glaucoma is one of the leading causes of blindness. Reduction of intraocular pressure is the only proven way to prevent progression of glaucomatous optic neuropathy. The majority of glaucoma patients need to use antiglaucoma ophthalmic solutions over the course of their life. Thus, good adherence and persistency of glaucoma treatment are important factors for better glaucoma care. The purpose of this study was to investigate the impact of an Internet-based glaucoma care support system on glaucoma medication use. Patients were randomly divided into two groups. The non-Internet access (NIA) group consisted of patients who had access to the Internet-based glaucoma care support system during the 4-year period only when they were examined by ophthalmologists. The Internet access (IA) group consisted of patients who had the same Internet-based glaucoma care support system access as the NIA group for the first 2 years following enrollment but who were also given free access to the glaucoma care support system for the remaining 2 years. Changes in glaucoma medication use were investigated. In total, 81 patients in the IA group and 90 patients in the NIA group satisfied the study protocol. The number of antiglaucoma ophthalmic solutions used during the study period significantly increased in the NIA group (P<.03) but not in the IA group. The percentages of patients with unchanged, increased, and decreased antiglaucoma ophthalmic solution use during the study period were 61.1% (55/90), 17.8% (16/90), and 3.3% (3/90), respectively, in the NIA group, and 56.8% (46/81), 8.6% (7/81), and 13.6% (11/81), respectively, in the IA group (P<.001). Internet access significantly shifted from an increasing intraocular pressure trend to a decreasing trend in the IA group (P=.002) among the patients who did not have any medication changes. Allowing patients to browse their medical data may reduce the use and improve the effectiveness of glaucoma medication. UMIN-CTR Clinical Trial Number: UMIN000006982; https://upload.umin.ac.jp/cgi-open-bin/ctr/ctr.cgi?function=brows&action=brows&type=summary&recptno=R000008238&language=E (Archived by WebCite at http://www.webcitation.org/6MRPQeEAv).
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Kader Maideen, Siti Fatimah; Mohd-Sidik, Sherina; Rampal, Lekhraj; Mukhtar, Firdaus; Ibrahim, Normala; Phang, Cheng-Kar; Tan, Kit-Aun; Ahmad, Rozali
2016-06-21
Mental disorders are a major public health problem and are debilitating in many nations throughout the world. Many individuals either do not or are not able to access treatment. The Internet can be a medium to convey to the community accessible evidenced-based interventions to reduce these burdens. The objective of this study is to investigate the effectiveness of 4 weeks of a Web-based psychoeducational intervention program for depressive and anxiety symptoms in the community of Selangor, Malaysia. A two-arm randomized controlled trial of a single-blind study will be conducted to meet the objective of this study. We aim to recruit 84 participants each for the intervention and control groups. The recruitment will be from participants who participated in the first phase of this research. The primary outcomes of this study are depressive and anxiety scores, which will be assessed using the Patient Health Questionnaire 9 and Generalized Anxiety Disorder 7, respectively. The secondary outcome includes mental health literacy of the participants, which will be assessed using the self-developed and adapted Mental Health Literacy Questionnaire. The psychoeducational intervention program consists of four sessions, which will be accessed each week. The depressive and anxiety symptoms will be compared between participants who participated in the psychoeducational program compared with the control group. Depressive and anxiety scores and mental health literacy will be assessed at week 1 and at follow-ups at week 5 and week 12, respectively. The psychoeducational intervention program consists of four sessions, which will be accessed at each week. The depressive and anxiety symptoms will be compared between the intervention and control groups using a series of mixed ANOVAs. Depressive and anxiety scores and mental health literacy will be assessed at week 1 and at two follow-ups at week 5 and week 12, respectively. To our knowledge, this study will be the first randomized controlled trial of a Web-based psychoeducational intervention program for depression and anxiety in an adult community in Malaysia. The results from this study will determine the effectiveness of a psychoeducational intervention program in the management of depression and anxiety among adults in the community. If proven to be effective, the intervention can serve as a new modality to manage and reduce the burden of these disorders in the community. International Standard Randomized Controlled Trial Number (ISRCTN): 39656144; http://www.isrctn.com/ISRCTN39656144 (Archived by WebCite at http://www.webcitation.org/6hSVhV71K).
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-28
... Random Access Memory Semiconductors and Products Containing Same, Including Memory Modules; Notice of a... importation of certain dynamic random access memory semiconductors and products containing same, including memory modules, by reason of infringement of certain claims of U.S. Patent Nos. 5,480,051; 5,422,309; 5...
Demirol, Aygul; Gurgan, Timur
2009-08-01
To compare the efficacy of the microdose flare-up and multiple-dose antagonist protocols for poor-responder patients in intracytoplasmic sperm injection-ET cycles. A randomized, prospective study. Center for assisted reproductive technology in Turkey. Ninety patients with poor ovarian response in a minimum of two previous IVF cycles. All women were prospectively randomized into two groups by computer-assisted randomization. The patients in group 1 were stimulated according to the microdose flare-up protocol (n = 45), while the patients in group 2 were stimulated according to antagonist multiple-dose protocol (n = 45). The mean number of mature oocytes retrieved was the primary outcome measure, and fertilization rate, implantation rate per embryo, and clinical pregnancy rates were secondary outcome measures. The mean age of the women, the mean duration of infertility, basal FSH level, and the number of previous IVF cycles were similar in both groups. The total gonadotropin dose used was significantly higher in group 2, while the number of oocytes retrieved was significantly greater in group 1. Although the fertilization and clinical pregnancy rates were nonsignificantly higher in group 1 compared with group 2, the implantation rate was significantly higher in the microdose flare-up group than in the multiple-dose antagonist group (22% vs. 11%). The microdose flare-up protocol seems to have a better outcome in poor-responder patients, with a significantly higher mean number of mature oocytes retrieved and higher implantation rate.
A randomized trial of protocol-based care for early septic shock.
Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C
2014-05-01
In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).
Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)
2015-12-08
ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal
Zunza, Moleen; Cotton, Mark F; Mbuagbaw, Lawrence; Lester, Richard; Thabane, Lehana
2017-07-17
South Africa recently phased out access to free formula milk in the public sector in support of breastfeeding for women living with HIV. Few women living with HIV in South Africa choose breastfeeding and among those who do, many stop breastfeeding early. We sought to explore the feasibility of using mobile phone text messaging coupled with motivational interviewing to enhance adherence to breastfeeding practices. A randomized, parallel group, single-center pilot trial. Electronic sequence generation and random allocation will be done centrally. Women of low socioeconomic status, from Cape Town, South Africa will be randomly assigned within 24 h of giving birth at a primary healthcare clinic to a structured weekly text message plus motivational interviewing and usual standard of care, using a permutation of different block sizes. Criteria for feasibility success will include: five participants recruited per week (over 12 weeks), about 75% of all eligible participants consent for study participation, complete evaluation of outcomes in at least 70% of all recruited participants, breastfeeding adherence rates of at least 70% in the intervention group, six months after delivery. Participants will be evaluated soon after giving birth and post-delivery at weeks 2, 6, 10, and 24. Primary analysis will follow the "intention-to-treat" principle. Sub-group analysis will be used to assess sub-group effects. This pilot trial will evaluate the feasibility of conducting a larger trial on communication and support approaches to improve adherence to breastfeeding by HIV-infected women. Text messaging and motivational interviewing are simple interventions which may allow participants to access personalized adherence advice and support. ClinicalTrials.gov: NCT02949713 . Registered on 26 October 2016; Pan African Clinical Trial Registry PACTR201611001855404 . Registered on 8 November 2016.
Physical layer one-time-pad data encryption through synchronized semiconductor laser networks
NASA Astrophysics Data System (ADS)
Argyris, Apostolos; Pikasis, Evangelos; Syvridis, Dimitris
2016-02-01
Semiconductor lasers (SL) have been proven to be a key device in the generation of ultrafast true random bit streams. Their potential to emit chaotic signals under conditions with desirable statistics, establish them as a low cost solution to cover various needs, from large volume key generation to real-time encrypted communications. Usually, only undemanding post-processing is needed to convert the acquired analog timeseries to digital sequences that pass all established tests of randomness. A novel architecture that can generate and exploit these true random sequences is through a fiber network in which the nodes are semiconductor lasers that are coupled and synchronized to central hub laser. In this work we show experimentally that laser nodes in such a star network topology can synchronize with each other through complex broadband signals that are the seed to true random bit sequences (TRBS) generated at several Gb/s. The potential for each node to access real-time generated and synchronized with the rest of the nodes random bit streams, through the fiber optic network, allows to implement an one-time-pad encryption protocol that mixes the synchronized true random bit sequence with real data at Gb/s rates. Forward-error correction methods are used to reduce the errors in the TRBS and the final error rate at the data decoding level. An appropriate selection in the sampling methodology and properties, as well as in the physical properties of the chaotic seed signal through which network locks in synchronization, allows an error free performance.
Tejera-Falcón, Emma; Toledo-Martel, Nuria Del Carmen; Sosa-Medina, Francisco Manuel; Santana-González, Fátima; Quintana-de la Fe, Miriam Del Pino; Gallego-Izquierdo, Tomás; Pecos-Martín, Daniel
2017-09-18
Shoulder pain of musculoskeletal origin is the main cause of upper limb pain of non-traumatic origin. Despite being one of the most common reasons for consultation, there is no established protocol for treatment due to the complexity of its etiology. However, it has been shown that the presence of myofascial trigger points on the shoulder muscles is a common condition associated with patients suffering from shoulder pain. This protocol has been created which describes the design of a randomized controlled trial to evaluate the effectiveness of the inclusion of dry needling (DN) within a protocol of manual physiotherapy and therapeutic exercise in the treatment of chronic shoulder pain of unspecific origin. Thirty-six participants aged 18-65 years will be recruited having mechanical chronic shoulder pain on unspecific origin and meeting the inclusion criteria. These will be randomized to one of two interventions, (i) DN, manual physiotherapy and therapeutic exercise or (ii) sham DN, manual physiotherapy and therapeutic exercise. The protocol will cover 6 weeks of treatment, with a 6-month follow-up. Our main outcome measure will be the Visual Analogue Scale for pain. This is the first study to combine the use of DN, manual physiotherapy and an exercise program with a 6-month follow-up, thus becoming a new contribution to the treatment of chronic shoulder pain, while new lines of research may be established to help determine the effects of DN on chronic shoulder pain and the frequency and proper dosage. International Standard Randomized Controlled Trial Number Register: ISRCTN30604244 ( http://www.controlled-trials.com ) 29 June 2016.
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo
2017-01-01
Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, p<0.001. The novel protocol resulted in deeper chest compressions (mean (SD): 58 (12)mm vs. 52 (13)mm, p=0.02) and improved rate of correct hand position (61% vs. 36%, p=0.01) compared with the standard protocol. In both protocols hands-off time was short. The novel protocol improved motivation among rescuers compared with the standard protocol (p=0.002). Participants guided with a standard dispatch protocol performed high quality CPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Guidelines for Outsourcing Remote Access.
ERIC Educational Resources Information Center
Hassler, Ardoth; Neuman, Michael
1996-01-01
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva
2006-01-01
The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.
On the optimal identification of tag sets in time-constrained RFID configurations.
Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel
2011-01-01
In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags.
Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks
NASA Astrophysics Data System (ADS)
Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.
1996-12-01
In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.
The deployment of a large scale object store at the RAL Tier-1
NASA Astrophysics Data System (ADS)
Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.
2017-10-01
Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.
Increasing the Accessibility of Science for All Students
ERIC Educational Resources Information Center
Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.
2009-01-01
This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…
Ford-Gilboe, Marilyn; Varcoe, Colleen; Scott-Storey, Kelly; Wuest, Judith; Case, James; Currie, Leanne M; Glass, Nancy; Hodgins, Marilyn; MacMillan, Harriet; Perrin, Nancy; Wathen, C Nadine
2017-03-21
Intimate partner violence (IPV) threatens the safety and health of women worldwide. Safety planning is a widely recommended, evidence-based intervention for women experiencing IPV, yet fewer than 1 in 5 Canadian women access safety planning through domestic violence services. Rural, Indigenous, racialized, and immigrant women, those who prioritize their privacy, and/or women who have partners other than men, face unique safety risks and access barriers. Online IPV interventions tailored to the unique features of women's lives, and to maximize choice and control, have potential to reduce access barriers, and improve fit and inclusiveness, maximizing effectiveness of these interventions for diverse groups. In this double blind randomized controlled trial, 450 Canadian women who have experienced IPV in the previous 6 months will be randomized to either a tailored, interactive online safety and health intervention (iCAN Plan 4 Safety) or general online safety information (usual care). iCAN engages women in activities designed to increase their awareness of safety risks, reflect on their plans for their relationships and priorities, and create a personalize action plan of strategies and resources for addressing their safety and health concerns. Self-reported outcome measures will be collected at baseline and 3, 6, and 12 months post-baseline. Primary outcomes are depressive symptoms (Center for Epidemiological Studies Depression Scale, Revised) and PTSD Symptoms (PTSD Checklist, Civilian Version). Secondary outcomes include helpful safety actions, safety planning self-efficacy, mastery, and decisional conflict. In-depth qualitative interviews with approximately 60 women who have completed the trial and website utilization data will be used to explore women's engagement with the intervention and processes of change. This trial will contribute timely evidence about the effectiveness of online safety and health interventions appropriate for diverse life contexts. If effective, iCAN could be readily adopted by health and social services and/or accessed by women to work through options independently. This study will produce contextualized knowledge about how women engage with the intervention; its strengths and weaknesses; whether specific groups benefit more than others; and the processes explaining any positive outcomes. Such information is critical for effective scale up of any complex intervention. Clinicaltrials.gov ID NCT02258841 (Registered on Oct 2, 2014).
Zhang, Yan; Phy, Jennifer; Scott-Johnson, Chris; Garos, Sheila; Orlando, Jennie; Prien, Samuel; Huang, Jaou-Chen
2017-04-04
The variability of published acupuncture protocols for patients undergoing In-Vitro Fertilization (IVF) complicates the interpretation of data and hinders our understanding of acupuncture's impact. In 2012, an acupuncture treatment protocol developed by a Delphi consensus process was published to describe the parameters of best practice acupuncture for Assisted Reproductive Technology and future research. However, there has been no clinical trial utilizing this protocol to assess the effects of acupuncture. This study aims to assess the implementation of Dephi consensus acupuncture protocol and to examine the impact of acupuncture on stress and uterine and ovarian blood flow among women between ages 21-42 years seeking IVF. This study is a one site prospective, two-arm randomized controlled non-blind clinical trial conducted in a medical school-affiliated fertility center . Participants will be randomized 1:1 into either the acupuncture group or the standard of care (no acupuncture) group using computer generated tables. Both groups will have 3 regular clinical visits as their standard IVF care during an approximately 2 to 3 weeks window. Women who are randomized into the acupuncture group would receive three sessions based on the Delphi consensus acupuncture protocol in addition to the standard care. The first treatment will be administered between days 6 to 8 of the stimulated IVF cycle. The second session will be performed on the day of embryo transfer at least 1 h prior to the transfer. The third session will be performed within 48 h post-embryo transfer. Participants will be followed for their pregnancy test and pregnancy outcome when applicable. The outcomes stress and blood flow will be measured by a validated perceived stress scale and vasoactive molecules, respectively. Although recruitment and scheduling could be challenging at times, the Delphi consensus acupuncture protocol was implemented as planned and well-accepted by the patients. Because of the time-specified sessions around patients' IVF cycle, it is highly recommended to have on-site study acupuncturist(s) to accommodate the schedule. ClinicalTrials NCT02591186 registered on October 7, 2015.
Traffic placement policies for a multi-band network
NASA Technical Reports Server (NTRS)
Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael
1990-01-01
Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.
A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks
Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang
2015-01-01
Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596
Khan, Sikandar; Biju, Ashok; Wang, Sophia; Gao, Sujuan; Irfan, Omar; Harrawood, Amanda; Martinez, Stephanie; Brewer, Emily; Perkins, Anthony; Unverzagt, Frederick W; Lasiter, Sue; Zarzaur, Ben; Rahman, Omar; Boustani, Malaz; Khan, Babar
2018-02-07
Patients admitted to intensive care units (ICU) with acute respiratory failure (ARF) face chronic complications that can impede return to normal daily function. A mobile, collaborative critical care model may enhance the recovery of ARF survivors. The Mobile Critical Care Recovery Program (m-CCRP) study is a two arm, randomized clinical trial. We will randomize 620 patients admitted to the ICU with acute respiratory failure requiring mechanical ventilation in a 1:1 ratio to one of two arms (310 patients per arm) - m-CCRP intervention versus attention control. Those in the intervention group will meet with a care coordinator after hospital discharge in predetermined intervals to aid in the recovery process. Baseline assessments and personalized goal setting will be used to develop an individualized care plan for each patient after discussion with an interdisciplinary team. The attention control arm will receive printed material and telephone reminders emphasizing mobility and management of chronic conditions. Duration of the intervention and follow-up is 12 months post-randomization. Our primary aim is to assess the efficacy of m-CCRP in improving the quality of life of ARF survivors at 12 months. Secondary aims of the study are to evaluate the efficacy of m-CCRP in improving function (cognitive, physical, and psychological) of ARF survivors and to determine the efficacy of m-CCRP in reducing acute healthcare utilization. The proposed randomized controlled trial will evaluate the efficacy of a collaborative critical care recovery program in accomplishing the Institute of Healthcare Improvement's triple aims of better health, better care, at lower cost. We have developed a collaborative critical care model to promote ARF survivors' recovery from the physical, psychological, and cognitive impacts of critical illness. In contrast to a single disease focus and clinic-based access, m-CCRP represents a comprehensive, accessible, mobile, ahead of the curve intervention, focused on the multiple aspects of the unique recovery needs of ARF survivors. NCT03053245 , clinicaltrials.gov, registered February 1, 2017.
2012-01-01
Background Rapid access chest pain clinics have facilitated the early diagnosis and treatment of patients with coronary heart disease and angina. Despite this important service provision, coronary heart disease continues to be under-diagnosed and many patients are left untreated and at risk. Recent advances in imaging technology have now led to the widespread use of noninvasive computed tomography, which can be used to measure coronary artery calcium scores and perform coronary angiography in one examination. However, this technology has not been robustly evaluated in its application to the clinic. Methods/design The SCOT-HEART study is an open parallel group prospective multicentre randomized controlled trial of 4,138 patients attending the rapid access chest pain clinic for evaluation of suspected cardiac chest pain. Following clinical consultation, participants will be approached and randomized 1:1 to receive standard care or standard care plus ≥64-multidetector computed tomography coronary angiography and coronary calcium score. Randomization will be conducted using a web-based system to ensure allocation concealment and will incorporate minimization. The primary endpoint of the study will be the proportion of patients diagnosed with angina pectoris secondary to coronary heart disease at 6 weeks. Secondary endpoints will include the assessment of subsequent symptoms, diagnosis, investigation and treatment. In addition, long-term health outcomes, safety endpoints, such as radiation dose, and health economic endpoints will be assessed. Assuming a clinic rate of 27.0% for the diagnosis of angina pectoris due to coronary heart disease, we will need to recruit 2,069 patients per group to detect an absolute increase of 4.0% in the rate of diagnosis at 80% power and a two-sided P value of 0.05. The SCOT-HEART study is currently recruiting participants and expects to report in 2014. Discussion This is the first study to look at the implementation of computed tomography in the patient care pathway that is outcome focused. This study will have major implications for the management of patients with cardiovascular disease. Trial registration ClinicalTrials.gov Identifier: NCT01149590 PMID:23036114
Walsh, Fiona J; Bärnighausen, Till; Delva, Wim; Fleming, Yvette; Khumalo, Gavin; Lejeune, Charlotte L; Mazibuko, Sikhathele; Mlambo, Charmaine Khudzie; Reis, Ria; Spiegelman, Donna; Zwane, Mandisa; Okello, Velephi
2017-08-18
There is robust clinical evidence to support offering early access to antiretroviral treatment (ART) to all HIV-positive individuals, irrespective of disease stage, to both improve patient health outcomes and reduce HIV incidence. However, as the global treatment guidelines shift to meet this evidence, it is still largely unknown if early access to ART for all (also referred to as "treatment as prevention" or "universal test and treat") is a feasible intervention in the resource-limited countries where this approach could have the biggest impact on the course of the HIV epidemics. The MaxART Early Access to ART for All (EAAA) implementation study was designed to determine the feasibility, acceptability, clinical outcomes, affordability, and scalability of offering early antiretroviral treatment to all HIV-positive individuals in Swaziland's public sector health system. This is a three-year stepped-wedge randomized design with open enrollment for all adults aged 18 years and older across 14 government-managed health facilities in Swaziland's Hhohho Region. Primary endpoints are retention and viral suppression. Secondary endpoints include ART initiation, adherence, drug resistance, tuberculosis, HIV disease progression, patient satisfaction, and cost per patient per year. Sites are grouped to transition two at a time from the control (standard of care) to intervention (EAAA) stage at each four-month step. This design will result in approximately one half of the total observation time to accrue in the intervention arm and the other half in the control arm. Our estimated enrolment number, which is supported by conservative power calculations, is 4501 patients over the course of the 36-month study period. A multidisciplinary, mixed-methods approach will be adopted to supplement the randomized controlled trial and meet the study aims. Additional study components include implementation science, social science, economic evaluation, and predictive HIV incidence modeling. A stepped-wedge randomized design is a causally strong and robust approach to determine if providing antiretroviral treatment for all HIV-positive individuals is a feasible intervention in a resource-limited, public sector health system. We expect our study results to contribute to health policy decisions related to the HIV response in Swaziland and other countries in sub-Saharan Africa. ClinicalTrials.gov, NCT02909218 . Registered on 10 July 2016.
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
[The research protocol III. Study population].
Arias-Gómez, Jesús; Villasís-Keever, Miguel Ángel; Miranda-Novales, María Guadalupe
2016-01-01
The study population is defined as a set of cases, determined, limited, and accessible, that will constitute the subjects for the selection of the sample, and must fulfill several characteristics and distinct criteria. The objectives of this manuscript are focused on specifying each one of the elements required to make the selection of the participants of a research project, during the elaboration of the protocol, including the concepts of study population, sample, selection criteria and sampling methods. After delineating the study population, the researcher must specify the criteria that each participant has to comply. The criteria that include the specific characteristics are denominated selection or eligibility criteria. These criteria are inclusion, exclusion and elimination, and will delineate the eligible population. The sampling methods are divided in two large groups: 1) probabilistic or random sampling and 2) non-probabilistic sampling. The difference lies in the employment of statistical methods to select the subjects. In every research, it is necessary to establish at the beginning the specific number of participants to be included to achieve the objectives of the study. This number is the sample size, and can be calculated or estimated with mathematical formulas and statistic software.
Virtual reality and cognitive rehabilitation: a review of current outcome research.
Larson, Eric B; Feigon, Maia; Gagliardo, Pablo; Dvorkin, Assaf Y
2014-01-01
Recent advancement in the technology of virtual reality (VR) has allowed improved applications for cognitive rehabilitation. The aim of this review is to facilitate comparisons of therapeutic efficacy of different VR interventions. A systematic approach for the review of VR cognitive rehabilitation outcome research addressed the nature of each sample, treatment apparatus, experimental treatment protocol, control treatment protocol, statistical analysis and results. Using this approach, studies that provide valid evidence of efficacy of VR applications are summarized. Applications that have not yet undergone controlled outcome study but which have promise are introduced. Seventeen studies conducted over the past eight years are reviewed. The few randomized controlled trials that have been completed show that some applications are effective in treating cognitive deficits in people with neurological diagnoses although further study is needed. Innovations requiring further study include the use of enriched virtual environments that provide haptic sensory input in addition to visual and auditory inputs and the use of commercially available gaming systems to provide tele-rehabilitation services. Recommendations are offered to improve efficacy of rehabilitation, to improve scientific rigor of rehabilitation research and to broaden access to the evidence-based treatments that this research has identified.
NASA Tech Briefs, January 2004
NASA Technical Reports Server (NTRS)
2004-01-01
Topics covered include: Multisensor Instrument for Real-Time Biological Monitoring; Sensor for Monitoring Nanodevice-Fabrication Plasmas; Backed Bending Actuator; Compact Optoelectronic Compass; Micro Sun Sensor for Spacecraft; Passive IFF: Autonomous Nonintrusive Rapid Identification of Friendly Assets; Finned-Ladder Slow-Wave Circuit for a TWT; Directional Radio-Frequency Identification Tag Reader; Integrated Solar-Energy-Harvesting and -Storage Device; Event-Driven Random-Access-Windowing CCD Imaging System; Stroboscope Controller for Imaging Helicopter Rotors; Software for Checking State-charts; Program Predicts Broadband Noise from a Turbofan Engine; Protocol for a Delay-Tolerant Data-Communication Network; Software Implements a Space-Mission File-Transfer Protocol; Making Carbon-Nanotube Arrays Using Block Copolymers: Part 2; Modular Rake of Pitot Probes; Preloading To Accelerate Slow-Crack-Growth Testing; Miniature Blimps for Surveillance and Collection of Samples; Hybrid Automotive Engine Using Ethanol-Burning Miller Cycle; Fabricating Blazed Diffraction Gratings by X-Ray Lithography; Freeze-Tolerant Condensers; The StarLight Space Interferometer; Champagne Heat Pump; Controllable Sonar Lenses and Prisms Based on ERFs; Measuring Gravitation Using Polarization Spectroscopy; Serial-Turbo-Trellis-Coded Modulation with Rate-1 Inner Code; Enhanced Software for Scheduling Space-Shuttle Processing; Bayesian-Augmented Identification of Stars in a Narrow View; Spacecraft Orbits for Earth/Mars-Lander Radio Relay; and Self-Inflatable/Self-Rigidizable Reflectarray Antenna.
Tomkins-Lane, Christy C; Lafave, Lynne M Z; Parnell, Jill A; Krishnamurthy, Ashok; Rempel, Jocelyn; Macedo, Luciana G; Moriartey, Stephanie; Stuber, Kent J; Wilson, Philip M; Hu, Richard; Andreas, Yvette M
2013-11-14
Because of symptoms, people with lumbar spinal stenosis (LSS) are often inactive, and this sedentary behaviour implies risk for diseases including obesity. Research has identified body mass index as the most powerful predictor of function in LSS. This suggests that function may be improved by targeting weight as a modifiable factor. An e-health lifestyle intervention was developed aimed at reducing fat mass and increasing physical activity in people with LSS. The main components of this intervention include pedometer-based physical activity promotion and nutrition education. The Spinal Stenosis Pedometer and Nutrition Lifestyle INTERVENTION (SSPANLI) was developed and piloted with 10 individuals. The protocol for a randomized controlled trail comparing the SSPANLI intervention to usual non-surgical care follows. One hundred six (106) overweight or obese individuals with LSS will be recruited. Baseline and follow-up testing includes dual energy x-ray absorptiometry, blood draw, 3-day food record, 7-day accelerometry, questionnaire, maximal oxygen consumption, neurological exam, balance testing and a Self-Paced Walking Test. During Week 1, the intervention group will receive a pedometer, and a personalized consultation with both a Dietitian and an exercise specialist. For 12 weeks participants will log on to the e-health website to access personal step goals, walking maps, nutrition videos, and motivational quotes. Participants will also have access to in-person Coffee Talk meetings every 3 weeks, and meet with the Dietitian and exercise specialist at week 6. The control group will proceed with usual care for the 12-week period. Follow-up testing will occur at Weeks 13 and 24. This lifestyle intervention has the potential to provide a unique, non-surgical management option for people with LSS. Through decreased fat mass and increased function, we may reduce risk for obesity, chronic diseases of inactivity, and pain. The use of e-health interventions provides an opportunity for patients to become more involved in managing their own health. Behaviour changes including increased physical activity, and improved dietary habits promote overall health and quality of life, and may decrease future health care needs in this population. Clinicaltrials.gov, NCT01902979.
Using Internet Audio to Enhance Online Accessibility
ERIC Educational Resources Information Center
Schwartz, Linda Matula
2004-01-01
Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…
Mian, Adnan Noor; Fatima, Mehwish; Khan, Raees; Prakash, Ravi
2014-01-01
Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara
2018-02-07
Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.
Viecelli, Andrea K; Pascoe, Elaine M; Polkinghorne, Kevan R; Hawley, Carmel M; Paul-Brent, Peta-Anne; Badve, Sunil V; Cass, Alan; Johnson, David W; Kerr, Peter G; Mori, Trevor A; Scaria, Anish; Hooi, Seong L; Ong, Meng L; Irish, Ashley B
2016-03-01
The Fish oils and Aspirin in Vascular access OUtcomes in REnal Disease (FAVOURED) trial investigated whether 3 months of omega-3 polyunsaturated fatty acids, either alone or in combination with aspirin, will effectively reduce primary access failure of de novo arteriovenous fistulae. This report presents the baseline characteristics of all study participants, examines whether study protocol amendments successfully increased recruitment of a broader and more representative haemodialysis cohort, including patients already receiving aspirin, and contrasts Malaysian participants with those from Australia, New Zealand and the United Kingdom (UK). This international, randomized, double-blind, placebo-controlled trial included patients older than 19 years with stage 4 or 5 chronic kidney disease currently receiving, or planned within 12 months to receive haemodialysis. Participants (n = 568) were overweight (28.6 ± 7.3 kg/m(2) ), relatively young (54.8 ± 14.3 years), and predominantly male (63%) with a high prevalence of diabetes mellitus (46%) but low rate of ischaemic heart disease (8%). Sixty one percent were planned for lower arm arteriovenous fistula creation. Malaysian participants (n = 156) were younger (51.8 ± 13.6 years vs 57.1 ± 14.2 years, P < 0.001) with a higher prevalence of diabetes mellitus (65% vs 43%, P < 0.001), but less ischaemic heart disease (5% vs 14%, P < 0.01) compared with the combined Australian, New Zealand and UK cohort (n = 228). Protocol modifications allowing for inclusion of patients receiving aspirin increased the prevalence of co-morbidities compared with the original cohort. The FAVOURED study participants, while mostly similar to patients in contemporary national registry reports and comparable recent clinical trials, were on average younger and had less ischaemic heart disease. These differences were reduced as a consequence of including patients already receiving aspirin. © 2015 Asian Pacific Society of Nephrology.
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Padwal, Raj; McAlister, Finlay Aleck; Wood, Peter William; Boulanger, Pierre; Fradette, Miriam; Klarenbach, Scott; Edwards, Alun L; Holroyd-Leduc, Jayna M; Alagiakrishnan, Kannayiram; Rabi, Doreen; Majumdar, Sumit Ranjan
2016-06-24
Diabetes and hypertension are devastating, deadly, and costly conditions that are very common in seniors. Controlling hypertension in seniors with diabetes dramatically reduces hypertension-related complications. However, blood pressure (BP) must be lowered carefully because seniors are also susceptible to low BP and attendant harms. Achieving "optimal BP control" (ie, avoiding both undertreatment and overtreatment) is the ultimate therapeutic goal in such patients. Regular BP monitoring is required to achieve this goal. BP monitoring at home is cheap, convenient, widely used, and guideline endorsed. However, major barriers prevent proper use. These may be overcome through use of BP telemonitoring-the secure teletransmission of BP readings to a health portal, where BP data are summarized for provider and patient use, with or without protocolized case management. To examine the incremental effectiveness, safety, cost-effectiveness, usability, and acceptability of home BP telemonitoring, used with or without protocolized case management, compared with "enhanced usual care" in community-dwelling seniors with diabetes and hypertension. A 300-patient, 3-arm, pragmatic randomized controlled trial with blinded outcome ascertainment will be performed in seniors with diabetes and hypertension living independently in seniors' residences in greater Edmonton. Consenting patients will be randomized to usual care, home BP telemonitoring alone, or home BP telemonitoring plus protocolized pharmacist case management. Usual care subjects will receive a home BP monitor but neither they nor their providers will have access to teletransmitted data. In both telemonitored arms, providers will receive telemonitored BP data summaries. In the case management arm, pharmacist case managers will be responsible for reviewing teletransmitted data and initiating guideline-concordant and protocolized changes in BP management. Outcomes will be ascertained at 6 and 12 months. Within-study-arm change scores will be calculated and compared between study arms. These include: (1) clinical outcomes: proportion of subjects with a mean 24-hour ambulatory systolic BP in the optimal range (110-129 mmHg in patients 65-79 years and 110-139 mmHg in those ≥80 years: primary outcome); additional ambulatory and home BP outcomes; A1c and lipid profile; medications, cognition, health care use, cardiovascular events, and mortality. (2) Safety outcomes: number of serious episodes of hypotension, syncope, falls, and electrolyte disturbances (requiring third party assistance or medical attention). (3) Humanistic outcomes: quality of life, satisfaction, and medication adherence. (4) Economic outcomes: incremental costs, incremental cost-utility, and cost per mmHg change in BP of telemonitoring ± case management compared with usual care (health payor and societal perspectives). (5) Intervention usability and acceptability to patients and providers. The potential benefits of telemonitoring remain largely unstudied and unproven in seniors. This trial will comprehensively assess the impact of home BP telemonitoring across a range of outcomes. Results will inform the value of implementing home-based telemonitoring within supportive living residences in Canada. Clinicaltrials.gov NCT02721667; https://clinicaltrials.gov/ct2/show/NCT02721667 (Archived by Webcite at http://www.webcitation.org/6i8tB20Mc).
McAlister, Finlay Aleck; Wood, Peter William; Boulanger, Pierre; Fradette, Miriam; Klarenbach, Scott; Edwards, Alun L; Holroyd-Leduc, Jayna M; Alagiakrishnan, Kannayiram; Rabi, Doreen; Majumdar, Sumit Ranjan
2016-01-01
Background Diabetes and hypertension are devastating, deadly, and costly conditions that are very common in seniors. Controlling hypertension in seniors with diabetes dramatically reduces hypertension-related complications. However, blood pressure (BP) must be lowered carefully because seniors are also susceptible to low BP and attendant harms. Achieving “optimal BP control” (ie, avoiding both undertreatment and overtreatment) is the ultimate therapeutic goal in such patients. Regular BP monitoring is required to achieve this goal. BP monitoring at home is cheap, convenient, widely used, and guideline endorsed. However, major barriers prevent proper use. These may be overcome through use of BP telemonitoring—the secure teletransmission of BP readings to a health portal, where BP data are summarized for provider and patient use, with or without protocolized case management. Objective To examine the incremental effectiveness, safety, cost-effectiveness, usability, and acceptability of home BP telemonitoring, used with or without protocolized case management, compared with “enhanced usual care” in community-dwelling seniors with diabetes and hypertension. Methods A 300-patient, 3-arm, pragmatic randomized controlled trial with blinded outcome ascertainment will be performed in seniors with diabetes and hypertension living independently in seniors’ residences in greater Edmonton. Consenting patients will be randomized to usual care, home BP telemonitoring alone, or home BP telemonitoring plus protocolized pharmacist case management. Usual care subjects will receive a home BP monitor but neither they nor their providers will have access to teletransmitted data. In both telemonitored arms, providers will receive telemonitored BP data summaries. In the case management arm, pharmacist case managers will be responsible for reviewing teletransmitted data and initiating guideline-concordant and protocolized changes in BP management. Results Outcomes will be ascertained at 6 and 12 months. Within-study-arm change scores will be calculated and compared between study arms. These include: (1) clinical outcomes: proportion of subjects with a mean 24-hour ambulatory systolic BP in the optimal range (110-129 mmHg in patients 65-79 years and 110-139 mmHg in those ≥80 years: primary outcome); additional ambulatory and home BP outcomes; A1c and lipid profile; medications, cognition, health care use, cardiovascular events, and mortality. (2) Safety outcomes: number of serious episodes of hypotension, syncope, falls, and electrolyte disturbances (requiring third party assistance or medical attention). (3) Humanistic outcomes: quality of life, satisfaction, and medication adherence. (4) Economic outcomes: incremental costs, incremental cost-utility, and cost per mmHg change in BP of telemonitoring ± case management compared with usual care (health payor and societal perspectives). (5) Intervention usability and acceptability to patients and providers. Conclusion The potential benefits of telemonitoring remain largely unstudied and unproven in seniors. This trial will comprehensively assess the impact of home BP telemonitoring across a range of outcomes. Results will inform the value of implementing home-based telemonitoring within supportive living residences in Canada. Trial Registration Clinicaltrials.gov NCT02721667; https://clinicaltrials.gov/ct2/show/NCT02721667 (Archived by Webcite at http://www.webcitation.org/6i8tB20Mc) PMID:27343147
Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian
2008-04-24
Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.
Geospatial Brokering - Challenges and Future Directions
NASA Astrophysics Data System (ADS)
White, C. E.
2012-12-01
An important feature of many brokers is to facilitate straightforward human access to scientific data while maintaining programmatic access to it for system solutions. Standards-based protocols are critical for this, and there are a number of protocols to choose from. In this discussion, we will present a web application solution that leverages certain protocols - e.g., OGC CSW, REST, and OpenSearch - to provide programmatic as well as human access to geospatial resources. We will also discuss managing resources to reduce duplication yet increase discoverability, federated search solutions, and architectures that combine human-friendly interfaces with powerful underlying data management. The changing requirements witnessed in brokering solutions over time, our recent experience participating in the EarthCube brokering hack-a-thon, and evolving interoperability standards provide insight to future technological and philosophical directions planned for geospatial broker solutions. There has been much change over the past decade, but with the unprecedented data collaboration of recent years, in many ways the challenges and opportunities are just beginning.
Kaylor-Hughes, Catherine J; Rawsthorne, Mat; Coulson, Neil S; Simpson, Sandra; Simons, Lucy; Guo, Boliang; James, Marilyn; Moran, Paul; Simpson, Jayne; Hollis, Chris; Avery, Anthony J; Tata, Laila J; Williams, Laura; Morriss, Richard K
2017-12-18
Regardless of geography or income, effective help for depression and anxiety only reaches a small proportion of those who might benefit from it. The scale of the problem suggests a role for effective, safe, anonymized public health-driven Web-based services such as Big White Wall (BWW), which offer immediate peer support at low cost. Using Reach, Effectiveness, Adoption, Implementation and Maintenance (RE-AIM) methodology, the aim of this study was to determine the population reach, effectiveness, cost-effectiveness, and barriers and drivers to implementation of BWW compared with Web-based information compiled by UK's National Health Service (NHS, NHS Choices Moodzone) in people with probable mild to moderate depression and anxiety disorder. A pragmatic, parallel-group, single-blind randomized controlled trial (RCT) is being conducted using a fully automated trial website in which eligible participants are randomized to receive either 6 months access to BWW or signposted to the NHS Moodzone site. The recruitment of 2200 people to the study will be facilitated by a public health engagement campaign involving general marketing and social media, primary care clinical champions, health care staff, large employers, and third sector groups. People will refer themselves to the study and will be eligible if they are older than 16 years, have probable mild to moderate depression or anxiety disorders, and have access to the Internet. The primary outcome will be the Warwick-Edinburgh Mental Well-Being Scale at 6 weeks. We will also explore the reach, maintenance, cost-effectiveness, and barriers and drivers to implementation and possible mechanisms of actions using a range of qualitative and quantitative methods. This will be the first fully digital trial of a direct to public online peer support program for common mental disorders. The potential advantages of adding this to current NHS mental health services and the challenges of designing a public health campaign and RCT of two digital interventions using a fully automated digital enrollment and data collection process are considered for people with depression and anxiety. International Standard Randomized Controlled Trial Number (ISRCTN): 12673428; http://www.controlled-trials.com/ISRCTN12673428/12673428 (Archived by WebCite at http://www.webcitation.org/6uw6ZJk5a). ©Catherine J Kaylor-Hughes, Mat Rawsthorne, Neil S Coulson, Sandra Simpson, Lucy Simons, Boliang Guo, Marilyn James, Paul Moran, Jayne Simpson, Chris Hollis, Anthony J Avery, Laila J Tata, Laura Williams, REBOOT Notts Lived Experience Advisory Panel, Richard K Morriss. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.12.2017.
Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Abd Razak, Shukor
2014-01-01
Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications. PMID:24678277
Calvert, Melanie; Kyte, Derek; Duffy, Helen; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; Ives, Jonathan; Draper, Heather; Brundage, Michael; Blazeby, Jane; King, Madeleine
2014-01-01
Background Evidence suggests there are inconsistencies in patient-reported outcome (PRO) assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers. Methods and Findings We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013) for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts). 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3%) recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency. Conclusions PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information is routinely included in appropriate trial protocols, in order to facilitate rigorous collection/reporting of PRO data, to effectively inform patient care. PMID:25333995
Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
2015-09-01
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
ERIC Educational Resources Information Center
Nieuwenhuysen, Paul
1997-01-01
Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Miloff, Alexander; Lindner, Philip; Hamilton, William; Reuterskiöld, Lena; Andersson, Gerhard; Carlbring, Per
2016-02-02
Traditional one-session exposure therapy (OST) in which a patient is gradually exposed to feared stimuli for up to 3 h in a one-session format has been found effective for the treatment of specific phobias. However, many individuals with specific phobia are reluctant to seek help, and access to care is lacking due to logistic challenges of accessing, collecting, storing, and/or maintaining stimuli. Virtual reality (VR) exposure therapy may improve upon existing techniques by facilitating access, decreasing cost, and increasing acceptability and effectiveness. The aim of this study is to compare traditional OST with in vivo spiders and a human therapist with a newly developed single-session gamified VR exposure therapy application with modern VR hardware, virtual spiders, and a virtual therapist. Participants with specific phobia to spiders (N = 100) will be recruited from the general public, screened, and randomized to either VR exposure therapy (n = 50) or traditional OST (n = 50). A behavioral approach test using in vivo spiders will serve as the primary outcome measure. Secondary outcome measures will include spider phobia questionnaires and self-reported anxiety, depression, and quality of life. Outcomes will be assessed using a non-inferiority design at baseline and at 1, 12, and 52 weeks after treatment. VR exposure therapy has previously been evaluated as a treatment for specific phobias, but there has been a lack of high-quality randomized controlled trials. A new generation of modern, consumer-ready VR devices is being released that are advancing existing technology and have the potential to improve clinical availability and treatment effectiveness. The VR medium is also particularly suitable for taking advantage of recent phobia treatment research emphasizing engagement and new learning, as opposed to physiological habituation. This study compares a market-ready, gamified VR spider phobia exposure application, delivered using consumer VR hardware, with the current gold standard treatment. Implications are discussed. ClinicalTrials.gov identifier NCT02533310. Registered on 25 August 2015.
21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...
NASA Astrophysics Data System (ADS)
Macfarlane, A. J.; Docasal, R.; Rios, C.; Barbarisi, I.; Saiz, J.; Vallejo, F.; Besse, S.; Arviset, C.; Barthelemy, M.; De Marchi, G.; Fraga, D.; Grotheer, E.; Heather, D.; Lim, T.; Martinez, S.; Vallat, C.
2018-01-01
The Planetary Science Archive (PSA) is the European Space Agency's (ESA) repository of science data from all planetary science and exploration missions. The PSA provides access to scientific data sets through various interfaces at http://psa.esa.int. Mostly driven by the evolution of the PDS standards which all new ESA planetary missions shall follow and the need to update the interfaces to the archive, the PSA has undergone an important re-engineering. In order to maximise the scientific exploitation of ESA's planetary data holdings, significant improvements have been made by utilising the latest technologies and implementing widely recognised open standards. To facilitate users in handling and visualising the many products stored in the archive which have spatial data associated, the new PSA supports Geographical Information Systems (GIS) by implementing the standards approved by the Open Geospatial Consortium (OGC). The modernised PSA also attempts to increase interoperability with the international community by implementing recognised planetary science specific protocols such as the PDAP (Planetary Data Access Protocol) and EPN-TAP (EuroPlanet-Table Access Protocol). In this paper we describe some of the methods by which the archive may be accessed and present the challenges that are being faced in consolidating data sets of the older PDS3 version of the standards with the new PDS4 deliveries into a single data model mapping to ensure transparent access to the data for users and services whilst maintaining a high performance.
Semi-quantum Dialogue Based on Single Photons
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu; Ye, Chong-Qiang
2018-02-01
In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.
OAS :: Secretariat for Strengthening Democracy (SSD)
Structure Our Locations Contact Us Access to Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access to Information Access to Rights Actions against Corruption Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and
The Many Faces of the Economic Bulletin Board.
ERIC Educational Resources Information Center
Boettcher, Jennifer
1996-01-01
The Economic Bulletin Board (EBB), a one-stop site for economic statistics and government-sponsored business information, can be accessed on the World Wide Web, gopher, telnet, file transfer protocol, dial-up, and fax. Each access method has advantages and disadvantages related to connections, pricing, depth of access, retrieval, and system…
Heber, Elena; Ebert, David Daniel; Lehr, Dirk; Nobis, Stephanie; Berking, Matthias; Riper, Heleen
2013-07-15
Work-related stress is associated with a variety of mental and emotional problems and can lead to substantial economic costs due to lost productivity, absenteeism or the inability to work. There is a considerable amount of evidence on the effectiveness of traditional face-to-face stress-management interventions for employees; however, they are often costly, time-consuming, and characterized by a high access threshold. Web-based interventions may overcome some of these problems yet the evidence in this field is scarce. This paper describes the protocol for a study that will examine the efficacy and cost-effectiveness of a web-based guided stress-management training which is based on problem solving and emotion regulation and aimed at reducing stress in adult employees. The study will target stressed employees aged 18 and older. A randomized controlled trial (RCT) design will be applied. Based on a power calculation of d=.35 (1-β of 80%, α = .05), 264 participants will be recruited and randomly assigned to either the intervention group or a six-month waitlist control group. Inclusion criteria include an elevated stress level (Cohen's Perceived Stress Scale-10 ≥ 22) and current employment. Exclusion criteria include risk of suicide or previously diagnosed psychosis or dissociative symptoms. The primary outcome will be perceived stress, and secondary outcomes include depression and anxiety. Data will be collected at baseline and seven weeks and six months after randomization. An extended follow up at 12 months is planned for the intervention group. Moreover, a cost-effectiveness analysis will be conducted from a societal perspective and will include both direct and indirect health care costs. Data will be analyzed on an intention-to-treat basis and per protocol. The substantial negative consequences of work-related stress emphasize the necessity for effective stress-management trainings. If the proposed internet intervention proves to be (cost-) effective, a preventative, economical stress-management tool will be conceivable. The strengths and limitations of the present study are discussed. German Register of Clinical Studies (DRKS): DRKS00004749.
2017-01-01
Background Translation of knowledge and skills from classroom settings to clinical practice is a major challenge in healthcare training, especially for behavioral interventions. For example, screening, brief intervention, and referral to treatment (SBIRT) is a highly-promoted approach to identifying and treating individuals at risk for alcohol or drug problems, yet effective, routine use of SBIRT has lagged. Objective The objective of this paper is to describe the development, pilot testing, and trial protocol of a mobile app based on the theory of planned behavior (TPB) to promote SBIRT skill translation and application. Methods Intended for use after classroom training occurs, the mobile app has three primary functions designed to increase behavioral intent to deliver SBIRT: (1) review skills (ie, address knowledge and beliefs about SBIRT), (2) apply skills with patients (ie, build confidence and perceived behavioral control), and (3) report performance data (ie, increase accountability and social norms and/or influence). The app includes depression and anxiety screening tools due to high comorbidity with substance use. A randomized controlled trial (RCT) is in progress among health and social service learners (N=200) recruited from 3 universities and 6 different training programs in nursing, social work, internal medicine, psychiatry, and psychology. Participants are randomized to SBIRT classroom instruction alone or classroom instruction plus app access prior to beginning their field placement rotations. TPB-based data are collected via Qualtrics or via the mobile app pre-post and SBIRT utilization, weekly for 10 weeks. Key outcomes include the frequency of and self-reported confidence in delivery of SBIRT. Results Beta testing with advanced practice nursing students (N=22) indicated that the app and its associated assessment tools were acceptable and useful. The system usability scale (SUS) mean was 65.8 (n=19), which indicated that the SBIRT app was acceptable but could benefit from improvement. Indeed, modifications were implemented prior to starting the trial. Enrollment of trial participants began in September 2016. Results are expected by December 2017. Conclusions This report describes the process of TPB-based app development and testing, and the protocol for a RCT to determine the effectiveness of the app in enhancing skill translation. If effective, this approach could improve SBIRT implementation, fidelity, and clinical outcomes. PMID:28420604
Norman, Wendy V; Kaczorowski, Janusz; Soon, Judith A; Brant, Rollin; Bryan, Stirling; Trouton, Konia J; Dicus, Lyda
2011-06-14
We describe the rationale and protocol for a randomized controlled trial (RCT) to assess whether intrauterine contraception placed immediately after a second trimester abortion will result in fewer pregnancies than current recommended practice of intended placement at 4 weeks post-abortion. Decision analysis suggests the novel strategy could substantially reduce subsequent unintended pregnancies and abortions. This paper highlights considerations of design, implementation and evaluation of a trial expected to provide rigorous evidence for appropriate insertion timing and health economics of intrauterine contraception after second trimester abortion. Consenting women choosing to use intrauterine contraception after abortion for a pregnancy of 12 to 24 weeks will be randomized to insertion timing groups either immediately (experimental intervention) or four weeks (recommended care) post abortion. Primary outcome measure is pregnancy rate at one year. Secondary outcomes include: cumulative pregnancy rates over five year follow-up period, comprehensive health economic analyses comparing immediate and delayed insertion groups, and device retention rates, complication rates (infection, expulsion) and, contraceptive method satisfaction. Web-based Contraception Satisfaction Questionnaires, clinical records and British Columbia linked health databases will be used to assess primary and secondary outcomes. Enrolment at all clinics in the province performing second trimester abortions began in May 2010 and is expected to complete in late 2011. Data on one year outcomes will be available for analysis in 2014. The RCT design combined with access to clinical records at all provincial abortion clinics, and to information in provincial single-payer linked administrative health databases, birth registry and hospital records, offers a unique opportunity to evaluate such an approach by determining pregnancy rate at one through five years among enrolled women. We highlight considerations of design, implementation and evaluation of a trial expected to provide rigorous evidence for appropriate insertion timing and health economics of intrauterine contraception after second trimester abortion.
2011-01-01
Background We describe the rationale and protocol for a randomized controlled trial (RCT) to assess whether intrauterine contraception placed immediately after a second trimester abortion will result in fewer pregnancies than current recommended practice of intended placement at 4 weeks post-abortion. Decision analysis suggests the novel strategy could substantially reduce subsequent unintended pregnancies and abortions. This paper highlights considerations of design, implementation and evaluation of a trial expected to provide rigorous evidence for appropriate insertion timing and health economics of intrauterine contraception after second trimester abortion. Methods/Design Consenting women choosing to use intrauterine contraception after abortion for a pregnancy of 12 to 24 weeks will be randomized to insertion timing groups either immediately (experimental intervention) or four weeks (recommended care) post abortion. Primary outcome measure is pregnancy rate at one year. Secondary outcomes include: cumulative pregnancy rates over five year follow-up period, comprehensive health economic analyses comparing immediate and delayed insertion groups, and device retention rates, complication rates (infection, expulsion) and, contraceptive method satisfaction. Web-based Contraception Satisfaction Questionnaires, clinical records and British Columbia linked health databases will be used to assess primary and secondary outcomes. Enrolment at all clinics in the province performing second trimester abortions began in May 2010 and is expected to complete in late 2011. Data on one year outcomes will be available for analysis in 2014. Discussion The RCT design combined with access to clinical records at all provincial abortion clinics, and to information in provincial single-payer linked administrative health databases, birth registry and hospital records, offers a unique opportunity to evaluate such an approach by determining pregnancy rate at one through five years among enrolled women. We highlight considerations of design, implementation and evaluation of a trial expected to provide rigorous evidence for appropriate insertion timing and health economics of intrauterine contraception after second trimester abortion. Trial registration Current Controlled Trials ISRCTN19506752 PMID:21672213
Senft, Jonas D; Warschkow, Rene; Diener, Markus K; Tarantino, Ignazio; Steinemann, Daniel C; Lamm, Sebastian; Simon, Thomas; Zerz, Andreas; Müller-Stich, Beat P; Linke, Georg R
2014-11-20
Natural orifice transluminal endoscopic surgery (NOTES) is the consequence of further development of minimally invasive surgery to reduce abdominal incisions and surgical trauma. The potential benefits are expected to be less postoperative pain, faster convalescence, and reduced risk for incisional hernias and wound infections compared to conventional methods. Recent clinical studies have demonstrated the feasibility and safety of transvaginal NOTES, and transvaginal access is currently the most frequent clinically applied route for NOTES procedures. However, despite increasing clinical application, no firm clinical evidence is available for objective assessment of the potential benefits and risks of transvaginal NOTES compared to the current surgical standard. The TRANSVERSAL trial is designed as a randomized controlled trial to compare transvaginal hybrid NOTES and laparoscopic-assisted sigmoid resection. Female patients referred to elective sigmoid resection due to complicated or reoccurring diverticulitis of the sigmoid colon are considered eligible. The primary endpoint will be pain intensity during mobilization 24 hours postoperatively as measured by the blinded patient and blinded assessor on a visual analogue scale (VAS). Secondary outcomes include daily pain intensity and analgesic use, patient mobility, intraoperative complications, morbidity, length of stay, quality of life, and sexual function. Follow-up visits are scheduled 3, 12, and 36 months after surgery. A total sample size of 58 patients was determined for the analysis of the primary endpoint. The confirmatory analysis will be performed based on the intention-to-treat (ITT) principle. The TRANSVERSAL trial is the first study to compare transvaginal hybrid NOTES and conventionally assisted laparoscopic surgery for colonic resection in a randomized controlled setting. The results of the TRANSVERSAL trial will allow objective assessment of the potential benefits and risks of NOTES compared to the current surgical standard for sigmoid resection. The trial protocol was registered in the German Clinical Trials Register ( DRKS00005995) on March 27, 2014.
Qi, Bing
2006-09-15
We propose a new quantum key distribution protocol in which information is encoded on continuous variables of a single photon. In this protocol, Alice randomly encodes her information on either the central frequency of a narrowband single-photon pulse or the time delay of a broadband single-photon pulse, while Bob randomly chooses to do either frequency measurement or time measurement. The security of this protocol rests on the energy-time uncertainty relation, which prevents Eve from simultaneously determining both frequency and time information with arbitrarily high resolution. Since no interferometer is employed in this scheme, it is more robust against various channel noises, such as polarization and phase fluctuations.
A practical way to estimate retail tobacco sales violation rates more accurately.
Levinson, Arnold H; Patnaik, Jennifer L
2013-11-01
U.S. states annually estimate retailer propensity to sell adolescents cigarettes, which is a violation of law, by staging a single purchase attempt among a random sample of tobacco businesses. The accuracy of single-visit estimates is unknown. We examined this question using a novel test-retest protocol. Supervised minors attempted to purchase cigarettes at all retail tobacco businesses located in 3 Colorado counties. The attempts observed federal standards: Minors were aged 15-16 years, were nonsmokers, and were free of visible tattoos and piercings, and were allowed to enter stores alone or in pairs to purchase a small item while asking for cigarettes and to show or not show genuine identification (ID, e.g., driver's license). Unlike federal standards, stores received a second purchase attempt within a few days unless minors were firmly told not to return. Separate violation rates were calculated for first visits, second visits, and either visit. Eleven minors attempted to purchase cigarettes 1,079 times from 671 retail businesses. One sixth of first visits (16.8%) resulted in a violation; the rate was similar for second visits (15.7%). Considering either visit, 25.3% of businesses failed the test. Factors predictive of violation were whether clerks asked for ID, whether the clerks closely examined IDs, and whether minors included snacks or soft drinks in cigarette purchase attempts. A test-retest protocol for estimating underage cigarette sales detected half again as many businesses in violation as the federally approved one-test protocol. Federal policy makers should consider using the test-retest protocol to increase accuracy and awareness of widespread adolescent access to cigarettes through retail businesses.
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Sousa, Pedro; Fonseca, Helena; Gaspar, Pedro; Gaspar, Filomena
2014-04-01
This paper describes the design and rationale of a controlled trial that aims to determine the effectiveness of an intervention programme in which the internet is used. Adolescent obesity is a major health problem, there being urgency to find effective interventions that induce behavioural change. The inclusion of the internet in the intervention may improve adolescents' adherence to the weight management programme and lead to adoption of healthier lifestyles. A clinical trial with a control group (non-randomized). Participants are adolescents with appointments at a paediatric obesity clinic (Portugal). Sample size was calculated according to the power analysis. The experimental group will follow the standard treatment protocol and receive free access to the e-therapeutic platform. The control group will follow the standard treatment protocol and join a waiting list. Intervention length will be 36 weeks (24 weeks of direct intervention with a follow-up for 12 weeks). This study was approved by the Ethical Committee for Health (Lisbon, Portugal) in January 2012 and funded by the Foundation for Science and Technology (Portugal) in December 2012. The results of this research will promote reflection on new approaches directed to treat adolescent obesity and on the promotion of healthy behaviours. We expect to gather empirical evidence of the intervention programme effectiveness. The expectations lie on the population health gains, empowerment in decision-making and adoption of healthier lifestyles. © 2013 John Wiley & Sons Ltd.
A distance limited method for sampling downed coarse woody debris
Jeffrey H. Gove; Mark J. Ducey; Harry T. Valentine; Michael S. Williams
2012-01-01
A new sampling method for down coarse woody debris is proposed based on limiting the perpendicular distance from individual pieces to a randomly chosen sample point. Two approaches are presented that allow different protocols to be used to determine field measurements; estimators for each protocol are also developed. Both protocols are compared via simulation against...
Quantum cryptography without switching.
Weedbrook, Christian; Lance, Andrew M; Bowen, Warwick P; Symul, Thomas; Ralph, Timothy C; Lam, Ping Koy
2004-10-22
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.
Beus, Christopher; Safavi, Kamran; Stratton, Jeffrey; Kaufman, Blythe
2012-11-01
The purpose of this prospective, randomized clinical study was to compare the results of a nonactivated single-irrigation protocol (NAI) that used only 1% NaOCl with a passive ultrasonic multi-irrigation protocol (PUI) that used 1% NaOCl, 17% ethylenediaminetetraacetic acid, and 2% chlorhexidine in rendering canals bacteria free. In addition, the effect of a second-visit instrumentation after intra-appointment calcium hydroxide (CaOH(2)) was also evaluated in bacterial elimination. Fifty patients were recruited with a posterior tooth requiring primary endodontic treatment of apical periodontitis. Standard nonsurgical endodontic therapy was performed on both groups in a 2-visit approach by using calcium hydroxide intracanal medicament. Teeth were randomly treated with the NAI or PUI protocols in the first visit after complete instrumentation. Bacterial cultures were obtained at 4 periods during treatment from the canals: (1) before instrumentation, (2) after irrigation protocol, (3) after CaOH(2) medication, and (4) before obturation. Statistical analysis was performed on data by using the Fisher exact test and multivariate analysis. NAI and PUI rendered canals 80% and 84% bacteria free, respectively, at the end of the first visit. After CaOH(2) medication the total sample (NAI + PUI) had increased to 87% bacteria free, and the second-visit instrumentation resulted in a total of 91% bacteria free. These differences were not significant (P > .05). There was no statistical difference between irrigation methods. Each protocol resulted in a high frequency of negative cultures. This high frequency of negative cultures obtained in 1 visit is most likely related to an increased volume and depth of irrigation compared with previously reported protocols. Copyright © 2012 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
The multi-queue model applied to random access protocol
NASA Astrophysics Data System (ADS)
Fan, Xinlong
2013-03-01
The connection of everything in a sensory and an intelligent way is a pursuit in smart environment. This paper introduces the engineered cell-sensors into the multi-agent systems to realize the smart environment. The seamless interface with the natural environment and strong information-processing ability of cell with the achievements of synthetic biology make the construction of engineered cell-sensors possible. However, the engineered cell-sensors are only simple-functional and unreliable computational entities. Therefore how to combine engineered cell-sensors with digital device is a key problem in order to realize the smart environment. We give the abstract structure and interaction modes of the engineered cell-sensors in order to introduce engineered cell-sensors into multi-agent systems. We believe that the introduction of engineered cell-sensors will push forward the development of the smart environment.
Certifying an Irreducible 1024-Dimensional Photonic State Using Refined Dimension Witnesses.
Aguilar, Edgar A; Farkas, Máté; Martínez, Daniel; Alvarado, Matías; Cariñe, Jaime; Xavier, Guilherme B; Barra, Johanna F; Cañas, Gustavo; Pawłowski, Marcin; Lima, Gustavo
2018-06-08
We report on a new class of dimension witnesses, based on quantum random access codes, which are a function of the recorded statistics and that have different bounds for all possible decompositions of a high-dimensional physical system. Thus, it certifies the dimension of the system and has the new distinct feature of identifying whether the high-dimensional system is decomposable in terms of lower dimensional subsystems. To demonstrate the practicability of this technique, we used it to experimentally certify the generation of an irreducible 1024-dimensional photonic quantum state. Therefore, certifying that the state is not multipartite or encoded using noncoupled different degrees of freedom of a single photon. Our protocol should find applications in a broad class of modern quantum information experiments addressing the generation of high-dimensional quantum systems, where quantum tomography may become intractable.
Certifying an Irreducible 1024-Dimensional Photonic State Using Refined Dimension Witnesses
NASA Astrophysics Data System (ADS)
Aguilar, Edgar A.; Farkas, Máté; Martínez, Daniel; Alvarado, Matías; Cariñe, Jaime; Xavier, Guilherme B.; Barra, Johanna F.; Cañas, Gustavo; Pawłowski, Marcin; Lima, Gustavo
2018-06-01
We report on a new class of dimension witnesses, based on quantum random access codes, which are a function of the recorded statistics and that have different bounds for all possible decompositions of a high-dimensional physical system. Thus, it certifies the dimension of the system and has the new distinct feature of identifying whether the high-dimensional system is decomposable in terms of lower dimensional subsystems. To demonstrate the practicability of this technique, we used it to experimentally certify the generation of an irreducible 1024-dimensional photonic quantum state. Therefore, certifying that the state is not multipartite or encoded using noncoupled different degrees of freedom of a single photon. Our protocol should find applications in a broad class of modern quantum information experiments addressing the generation of high-dimensional quantum systems, where quantum tomography may become intractable.
Mechanical Characterization of Partially Crystallized Sphere Packings
NASA Astrophysics Data System (ADS)
Hanifpour, M.; Francois, N.; Vaez Allaei, S. M.; Senden, T.; Saadatfar, M.
2014-10-01
We study grain-scale mechanical and geometrical features of partially crystallized packings of frictional spheres, produced experimentally by a vibrational protocol. By combining x-ray computed tomography, 3D image analysis, and discrete element method simulations, we have access to the 3D structure of internal forces. We investigate how the network of mechanical contacts and intergranular forces change when the packing structure evolves from amorphous to near perfect crystalline arrangements. We compare the behavior of the geometrical neighbors (quasicontracts) of a grain to the evolution of the mechanical contacts. The mechanical coordination number Zm is a key parameter characterizing the crystallization onset. The high fluctuation level of Zm and of the force distribution in highly crystallized packings reveals that a geometrically ordered structure still possesses a highly random mechanical backbone similar to that of amorphous packings.
Antypas, Konstantinos; Wangberg, Silje C
2012-07-09
Cardiac rehabilitation is very important for the recovery and the secondary prevention of cardiovascular disease, and one of its main strategies is to increase the level of physical activity. Internet and mobile phone based interventions have been successfully used to help people to achieve this. One of the components that are related to the efficacy of these interventions is tailoring of content to the individual. This trial is studying the effect of a longitudinally tailored Internet and mobile phone based intervention that is based on models of health behaviour, on the level of physical activity and the adherence to the intervention, as an extension of a face-to-face cardiac rehabilitation stay. A parallel group, cluster randomized controlled trial. The study population is adult participants of a cardiac rehabilitation programme in Norway with home Internet access and mobile phone, who in monthly clusters are randomized to the control or the intervention condition. Participants have access to a website with information regarding cardiac rehabilitation, an online discussion forum and an online activity calendar. Those randomized to the intervention condition, receive in addition tailored content based on models of health behaviour, through the website and mobile text messages. The objective is to assess the effect of the intervention on maintenance of self-management behaviours after the rehabilitation stay. Main outcome is the level of physical activity one month, three months and one year after the end of the cardiac rehabilitation programme. The randomization of clusters is based on a true random number online service, and participants, investigators and outcome assessor are blinded to the condition of the clusters. The study suggests a theory-based intervention that combines models of health behaviour in an innovative way, in order to tailor the delivered content. The users have been actively involved in its design, and because of the use of Open-Source software, the intervention can easily and at low-cost be reproduced and expanded by others. Challenges are the recruitment in the elderly population and the possible underrepresentation of women in the study sample. Funding by Northern Norway Regional Health Authority. Trial registry http://www.clinicaltrials.gov: NCT01223170.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Papantoni-Kazakos, P.; Paterakis, M.
1988-07-01
For many communication applications with time constraints (e.g., transmission of packetized voice messages), a critical performance measure is the percentage of messages transmitted within a given amount of time after their generation at the transmitting station. This report presents a random-access algorithm (RAA) suitable for time-constrained applications. Performance analysis demonstrates that significant message-delay improvement is attained at the expense of minimal traffic loss. Also considered is the case of noisy channels. The noise effect appears at erroneously observed channel feedback. Error sensitivity analysis shows that the proposed random-access algorithm is insensitive to feedback channel errors. Window Random-Access Algorithms (RAAs) aremore » considered next. These algorithms constitute an important subclass of Multiple-Access Algorithms (MAAs); they are distributive, and they attain high throughput and low delays by controlling the number of simultaneously transmitting users.« less
Distribution of Information in Ad Hoc Networks
2007-09-01
2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little
Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks
2012-02-28
SNR) are employed by many protocols and processes in direct-sequence ( DS ) spread-spectrum packet radio networks, including soft-decision decoding...adaptive modulation protocols, and power adjustment protocols. For DS spread spectrum, we have introduced and evaluated SNR estimators that employ...obtained during demodulation in a binary CDMA receiver. We investigated several methods to apply the proposed metric to the demodulator’s soft-decision
NASA Astrophysics Data System (ADS)
Watson, Clifton L.; Biswas, Subir
2014-06-01
With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.
McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C
2014-09-01
Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737
Mansell, Warren; Tai, Sara; Clark, Alexandra; Akgonul, Savas; Dunn, Graham; Davies, Linda; Law, Heather; Morriss, Richard; Tinning, Neil; Morrison, Anthony P
2014-10-24
Existing psychological therapies for bipolar disorders have been found to have mixed results, with a consensus that they provide a significant, but modest, effect on clinical outcomes. Typically, these approaches have focused on promoting strategies to prevent future relapse. An alternative treatment approach, termed 'Think Effectively About Mood Swings' (TEAMS) addresses current symptoms, including subclinical hypomania, depression and anxiety, and promotes long-term recovery. Following the publication of a theoretical model, a range of research studies testing the model and a case series have demonstrated positive results. The current study reports the protocol of a feasibility randomized controlled trial to inform a future multi-centre trial. A target number of 84 patients with a diagnosis of bipolar I or II disorder, or bipolar disorder not-otherwise-specified are screened, allocated to a baseline assessment and randomized to either 16 sessions of TEAMS therapy plus treatment-as-usual (TAU) or TAU. Patients complete self-report inventories of depression, anxiety, recovery status and bipolar cognitions targeted by TEAMS. Assessments of diagnosis, bipolar symptoms, medication, access to services and quality of life are conducted by assessors blind to treatment condition at 3, 6, 12 and 18 months post-randomization. The main aim is to evaluate recruitment and retention of participants into both arms of the study, as well as adherence to therapy, to determine feasibility and acceptability. It is predicted that TEAMS plus TAU will reduce self-reported depression in comparison to TAU alone at six months post-randomization. The secondary hypotheses are that TEAMS will reduce the severity of hypomanic symptoms and anxiety, reduce bipolar cognitions, improve social functioning and promote recovery compared to TAU alone at post-treatment and follow-up. The study also incorporates semi-structured interviews about the experiences of previous treatment and the experience of TEAMS therapy that will be subject to qualitative analyses to inform future developments of the approach. The design will provide preliminary evidence of efficacy, feasibility, acceptability, uptake, attrition and barriers to treatment to design a definitive trial of this novel intervention compared to treatment as usual. This trial was registered with Current Controlled Trials (ISRCTN83928726) on registered 25 July 2014.
Stone, Gregg W; Teirstein, Paul S; Meredith, Ian T; Farah, Bruno; Dubois, Christophe L; Feldman, Robert L; Dens, Joseph; Hagiwara, Nobuhisa; Allocco, Dominic J; Dawkins, Keith D
2011-04-19
We sought to evaluate the clinical outcomes with a novel platinum chromium everolimus-eluting stent (PtCr-EES) compared with a predicate cobalt chromium everolimus-eluting stent (CoCr-EES) in patients undergoing percutaneous coronary intervention (PCI). Randomized trials have demonstrated an excellent safety and efficacy profile for the CoCr-EES. The PtCr-EES uses the identical antiproliferative agent and polymer but with a novel platinum chromium scaffold designed for enhanced deliverability, vessel conformability, side-branch access, radiopacity, radial strength, and fracture resistance. A total of 1,530 patients undergoing PCI of 1 or 2 de novo native lesions were randomized at 132 worldwide sites to CoCr-EES (n = 762) or PtCr-EES (n = 768). The primary endpoint was the 12-month rate of target lesion failure (TLF), the composite of target vessel-related cardiac death, target vessel-related myocardial infarction (MI), or ischemia-driven target lesion revascularization (TLR) in the per-protocol population (patients who received ≥1 assigned study stent), powered for noninferiority. The 12-month rate of TLF in the per-protocol population occurred in 2.9% versus 3.4% of patients assigned to CoCr-EES versus PtCr-EES, respectively (difference: 0.5%, 95% confidence interval: -1.3% to 2.3%, p(noninferiority) = 0.001, p(superiority) = 0.60). By intention-to-treat, there were no significant differences between CoCr-EES and PtCr-EES in the 12-month rates of TLF (3.2% vs. 3.5%, p = 0.72), cardiac death or MI (2.5% vs. 2.0%, p = 0.56), TLR (1.9% vs. 1.9%, p = 0.96), or Academic Research Consortium definite or probable stent thrombosis (0.4% vs. 0.4%, p = 1.00). In this large-scale, prospective, single-blind randomized trial, a novel PtCr-EES was noninferior to the predicate CoCr-EES for TLF, with nonsignificant differences in measures of safety and efficacy through 12-month follow-up after PCI. Copyright © 2011 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.
2013-01-01
Background Many older adults rely on a manual wheelchair for mobility but typically receive little, if any, training on how to use their wheelchair effectively and independently. Standardized skill training is an effective intervention, but limited access to clinician trainers is a substantive barrier. Enhancing Participation in the Community by Improving Wheelchair Skills (EPIC Wheels) is a 1-month monitored home training program for improving mobility skills in older novice manual wheelchair users, integrating principles from andragogy and social cognitive theory. The purpose of this study is to determine whether feasibility indicators and primary clinical outcome measures of the EPIC Wheels program are sufficiently robust to justify conducting a subsequent multi-site randomized controlled trial. Methods A 2 × 2 factorial randomized controlled trial at two sites will compare improvement in wheelchair mobility skills between an EPIC Wheels treatment group and a computer-game control group, with additional wheelchair use introduced as a second factor. A total of 40 community-dwelling manual wheelchair users at least 55 years old and living in two Canadian metropolitan cities (n = 20 × 2) will be recruited. Feasibility indicators related to study process, resources, management, and treatment issues will be collected during data collection and at the end of the study period, and evaluated against proposed criteria. Clinical outcome measures will be collected at baseline (pre-randomization) and post-intervention. The primary clinical outcome measure is wheelchair skill capacity, as determined by the Wheelchair Skills Test, version 4.1. Secondary clinical outcome measures include wheelchair skill safety, satisfaction with performance, wheelchair confidence, life-space mobility, divided-attention, and health-related quality of life. Discussion The EPIC Wheels training program offers several innovative features. The convenient, portable, economical, and adaptable tablet-based, home program model for wheelchair skills training has great potential for clinical uptake and opportunity for future enhancements. Theory-driven design can foster learning and adherence for older adults. Establishing the feasibility of the study protocol and estimating effect size for the primary clinical outcome measure will be used to develop a multi-site randomized controlled trial to test the guiding hypotheses. Trial registration Clinical Trials NCT01740635. PMID:24156396
Physical key-protected one-time pad
Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei
2013-01-01
We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925
Glass, Nancy; Clough, Amber; Case, James; Hanson, Ginger; Barnes-Hoyt, Jamie; Waterbury, Amy; Alhusen, Jeanne; Ehrensaft, Miriam; Grace, Karen Trister; Perrin, Nancy
2015-09-08
Research demonstrates high rates of physical and sexual victimization of women by intimate partners on college campuses (Black et al. 2001). College women in abusive relationships must weigh complex factors (health, academics, economics, and social stigma) during critical decision-making regarding the relationship. Rather than access formal support systems (e.g., campus security, administrators, counselors), research indicates abused college women most often turn to informal networks; specifically friends (Perspect Psychiatr Care 41:162-171, 2005), who often lack the knowledge or resources to provide effective support (Nurs Res 54(4):235-242, 2005). Decision aids have been shown to assist with health-related decisions by improving knowledge, creating realistic expectations, and resolving decisional conflict (Cochrane Database Syst Rev 1:1-332, 2014). This study is a randomized controlled trial testing the effectiveness of an interactive safety decision aid web-based and smartphone application (App) for abused college women and their friends. Three hundred female college students experiencing abuse and three hundred friends of female college students experiencing abuse will be recruited in Maryland and Oregon and randomized to either the intervention safety decision aid, accessible by website or smartphone App, or a usual safety planning control website/App. The intervention App allows users to enter information on: a) relationship health; b) safety priorities; and c) severity of violence/danger in relationship. The App uses this information to provide personalized safety planning information and resources. Self-reported outcome measures for abused college women on safety seeking behaviors, decisional conflict, IPV exposure and mental health will be collected at baseline, six, and 12-months post-baseline via the study App/website. Outcomes measured for friends are IPV awareness, confidence to intervene, supportive behaviors and decisional conflict. Protocols for safely recruiting, retaining and collecting data from abused women via web/App are discussed. This trial may provide important information on the impact of an App and web-based safety planning tool on college women's decisional conflict and safety behavior use when making difficult safety decisions. This study is the first, to our knowledge, to test an intervention that engages friends of abused college women. The trial may also inform researchers on the feasibility of safely conducting research with abused women using online recruitment and enrollment methods and collecting data via an App or website. Clinicaltrials.gov ID: NCT02236663.
Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo
2008-04-25
A random access memory (RAM) uses n bits to randomly address N=2(n) distinct memory cells. A quantum random access memory (QRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(logN) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust QRAM algorithm, as it in general requires entanglement among exponentially less gates, and leads to an exponential decrease in the power needed for addressing. A quantum optical implementation is presented.
User Procedures Standardization for Network Access. NBS Technical Note 799.
ERIC Educational Resources Information Center
Neumann, A. J.
User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…
Tools to Ease Your Internet Adventures: Part I.
ERIC Educational Resources Information Center
Descy, Don E.
1993-01-01
This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)
Code of Federal Regulations, 2010 CFR
2010-01-01
... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...
Wang, Xiaojie; Zheng, Hong; Shou, Tao; Tang, Chunming; Miao, Kun; Wang, Ping
2017-03-29
Osteosarcoma is the most common malignant bone tumour. Due to the high metastasis rate and drug resistance of this disease, multi-drug regimens are necessary to control tumour cells at various stages of the cell cycle, eliminate local or distant micrometastases, and reduce the emergence of drug-resistant cells. Many adjuvant chemotherapy protocols have shown different efficacies and controversial results. Therefore, we classified the types of drugs used for adjuvant chemotherapy and evaluated the differences between single- and multi-drug chemotherapy regimens using network meta-analysis. We searched electronic databases, including PubMed (MEDLINE), EmBase, and the Cochrane Library, through November 2016 using the keywords "osteosarcoma", "osteogenic sarcoma", "chemotherapy", and "random*" without language restrictions. The major outcome in the present analysis was progression-free survival (PFS), and the secondary outcome was overall survival (OS). We used a random effect network meta-analysis for mixed multiple treatment comparisons. We included 23 articles assessing a total of 5742 patients in the present systematic review. The analysis of PFS indicated that the T12 protocol (including adriamycin, bleomycin, cyclophosphamide, dactinomycin, methotrexate, cisplatin) plays a more critical role in osteosarcoma treatment (surface under the cumulative ranking (SUCRA) probability 76.9%), with a better effect on prolonging the PFS of patients when combined with ifosfamide (94.1%) or vincristine (81.9%). For the analysis of OS, we separated the regimens to two groups, reflecting the disconnection. The T12 protocol plus vincristine (94.7%) or the removal of cisplatinum (89.4%) is most likely the best regimen. We concluded that multi-drug regimens have a better effect on prolonging the PFS and OS of osteosarcoma patients, and the T12 protocol has a better effect on prolonging the PFS of osteosarcoma patients, particularly in combination with ifosfamide or vincristine. The OS analysis showed that the T12 protocol plus vincristine or the T12 protocol with the removal of cisplatinum might be a better regimen for improving the OS of patients. However, well-designed randomized controlled trials of chemotherapeutic protocols are still necessary.
Counterfactual Quantum Deterministic Key Distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wang, Jian; Tang, Chao-Jing
2013-01-01
We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.
Van Nuffelen, Gwen; Van den Steen, Leen; Vanderveken, Olivier; Specenier, Pol; Van Laer, Carl; Van Rompaey, Diane; Guns, Cindy; Mariën, Steven; Peeters, Marc; Van de Heyning, Paul; Vanderwegen, Jan; De Bodt, Marc
2015-09-04
Reduced tongue strength is an important factor contributing to early and late dysphagia in head and neck cancer patients previously treated with chemoradiotherapy. The evidence is growing that tongue strengthening exercises can improve tongue strength and swallowing function in both healthy and dysphagic subjects. However, little is known about the impact of specific features of an exercise protocol for tongue strength on the actual outcome (strength or swallowing function). Previous research originating in the fields of sports medicine and physical rehabilitation shows that the degree of exercise load is an influential factor for increasing muscle strength in the limb skeletal muscles. Since the tongue is considered a muscular hydrostat, it remains to be proven whether the same concepts will apply. This ongoing randomized controlled trial in chemoradiotherapy-treated patients with head and neck cancer investigates the effect of three tongue strengthening exercise protocols, with different degrees of exercise load, on tongue strength and swallowing. At enrollment, 51 patients whose dysphagia is primarily related to reduced tongue strength are randomly assigned to a training schedule of 60, 80, or 100% of their maximal tongue strength. Patients are treated three times a week for 8 weeks, executing 120 repetitions of the assigned exercise once per training day. Exercise load is progressively adjusted every 2 weeks. Patients are evaluated before, during and after treatment by means of tongue strength measurements, fiber-optic endoscopic evaluation of swallowing and quality-of-life questionnaires. This randomized controlled trial is the first to systematically investigate the effect of different exercise loads in tongue strengthening exercise protocols. The results will allow the development of more efficacious protocols. Current Controlled Trials ISRCTN14447678.
Device-independent randomness generation from several Bell estimators
NASA Astrophysics Data System (ADS)
Nieto-Silleras, Olmo; Bamps, Cédric; Silman, Jonathan; Pironio, Stefano
2018-02-01
Device-independent randomness generation and quantum key distribution protocols rely on a fundamental relation between the non-locality of quantum theory and its random character. This relation is usually expressed in terms of a trade-off between the probability of guessing correctly the outcomes of measurements performed on quantum systems and the amount of violation of a given Bell inequality. However, a more accurate assessment of the randomness produced in Bell experiments can be obtained if the value of several Bell expressions is simultaneously taken into account, or if the full set of probabilities characterizing the behavior of the device is considered. We introduce protocols for device-independent randomness generation secure against classical side information, that rely on the estimation of an arbitrary number of Bell expressions or even directly on the experimental frequencies of measurement outcomes. Asymptotically, this results in an optimal generation of randomness from experimental data (as measured by the min-entropy), without having to assume beforehand that the devices violate a specific Bell inequality.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... Access Memory Semiconductors and Products Containing Same, Including Memory Modules; Notice of... the sale within the United States after importation of certain dynamic random access memory semiconductors and products containing same, including memory modules, by reason of infringement of certain...
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
NASA Technical Reports Server (NTRS)
Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.
2013-01-01
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Mohsen, Iman Abdel; El Din, Rasha Ezz
2013-02-01
To compare the IVF outcomes of letrozole/antagonist and microdose GnRH agonist flare up protocols in poor ovarian responders undergoing intracytoplasmic sperm injection. A randomized controlled trial was performed in patients with one or more previous failed IVF cycles in which four or less oocytes were retrieved when the gonadotrophin starting dose was at least 300 IU/day. Sixty patients were randomized by computer-generated list to receive either letrozole/antagonist (mild stimulation) n = 30 or GnRH-a protocol (microdose flare) n = 30. Both groups were similar with respect to background and hormonal characteristics (age, duration of infertility, BMI, FSH, LH and E2). The clinical pregnancy rate per cycle was similar in both groups (13.3 vs. 16.6%; OR = 0.769; 95% CI = 0.185, 3.198). The doses of used gonadotropins and the number of stimulation days were significantly lower in the letrozole/antagonist protocol. The peak E2 level on the day of hCG, the endometrial thickness, the retrieved oocytes, the number of fertilized oocytes, the number of transferred embryos and the cancellation rate were statistically similar in both groups. The letrozole/antagonist protocol is a cost-effective and patient-friendly protocol that may be used in poor ovarian responders for IVF/ICSI.
Carleton, R Nicholas; Teale Sapach, Michelle J N; Oriet, Chris; LeBouthillier, Daniel M
2017-01-01
Social anxiety disorder (SAD) models posit vigilance for external social threat cues and exacerbated self-focused attention as key in disorder development and maintenance. Evidence indicates a modified dot-probe protocol may reduce symptoms of SAD; however, the efficacy when compared to a standard protocol and long-term maintenance of treatment gains remains unclear. Furthermore, the efficacy of such protocols on SAD-related constructs remains relatively unknown. The current investigation clarified these associations using a randomized control trial replicating and extending previous research. Participants with SAD (n = 113; 71% women) were randomized to complete a standard (i.e. control) or modified (i.e. active) dot-probe protocol consisting of 15-min sessions twice weekly for four weeks. Self-reported symptoms were measured at baseline, post-treatment, and 4-month and 8-month follow-ups. Hierarchical linear modeling indicated significant self-reported reductions in symptoms of social anxiety, fear of negative evaluation, trait anxiety, and depression, but no such reductions in fear of positive evaluation. Symptom changes did not differ based on condition and were maintained at 8-month follow-up. Attentional biases during the dot-probe task were not related to symptom change. Overall, our results replicate support for the efficacy of both protocols in reducing symptoms of SAD and specific related constructs, and suggest a role of exposure, expectancy, or practice effects, rather than attention modification, in effecting such reductions. The current results also support distinct relationships between fears of negative and positive evaluation and social anxiety. Further research focused on identifying the mechanisms of change in attention modification protocols appears warranted.
Lago, Alessandra Fabiane; de Oliveira, Anamaria Siriani; de Souza, Hugo Celso Dutra; da Silva, João Santana; Basile-Filho, Anibal; Gastaldi, Ada Clarice
2018-02-01
Septic shock is a potentially fatal organ dysfunction caused by an imbalance of the host response to infection. The changes in microcirculation during sepsis can be explained by the alterations in the endothelial barrier function. Endothelial progenitor cells (EPCs) are a potential recovery index of endothelial function and it an increase in response to neuromuscular electrical stimulation (NMES) was demonstrated. Therefore, the objective of this study is to investigate the effects of NMES in patients with septic shock. It is a study protocol for a randomized cross-over design in an intensive care unit of a tertiary University hospital. Thirty-one patients aged 18 to 65 years. The study will be divided in 2 phases: the phase one will be held in the first 72 hours of septic shock and the phase two after 3 days of first assessment. Patients will be randomly selected to the intervention protocol (decubitus position with the limbs raised and NMES) and control protocol (decubitus position with the limbs raised without NMES). After this procedure, the patients will be allocated in group 1 (intervention and control protocol) or group 2 (control and intervention protocol) with a wash-out period of 4 to 6 hours between them. The main outcome is mobilization of EPCs. The secondary outcome is metabolic and hemodynamic data. A linear mixed model will be used for analysis of dependent variables and estimated values of the mean of the differences of each effect.
Rao, Sunil V; Hess, Connie N; Barham, Britt; Aberle, Laura H; Anstrom, Kevin J; Patel, Tejan B; Jorgensen, Jesse P; Mazzaferri, Ernest L; Jolly, Sanjit S; Jacobs, Alice; Newby, L Kristin; Gibson, C Michael; Kong, David F; Mehran, Roxana; Waksman, Ron; Gilchrist, Ian C; McCourt, Brian J; Messenger, John C; Peterson, Eric D; Harrington, Robert A; Krucoff, Mitchell W
2014-08-01
This study sought to determine the effect of radial access on outcomes in women undergoing percutaneous coronary intervention (PCI) using a registry-based randomized trial. Women are at increased risk of bleeding and vascular complications after PCI. The role of radial access in women is unclear. Women undergoing cardiac catheterization or PCI were randomized to radial or femoral arterial access. Data from the CathPCI Registry and trial-specific data were merged into a final study database. The primary efficacy endpoint was Bleeding Academic Research Consortium type 2, 3, or 5 bleeding or vascular complications requiring intervention. The primary feasibility endpoint was access site crossover. The primary analysis cohort was the subgroup undergoing PCI; sensitivity analyses were conducted in the total randomized population. The trial was stopped early for a lower than expected event rate. A total of 1,787 women (691 undergoing PCI) were randomized at 60 sites. There was no significant difference in the primary efficacy endpoint between radial or femoral access among women undergoing PCI (radial 1.2% vs. 2.9% femoral, odds ratio [OR]: 0.39; 95% confidence interval [CI]: 0.12 to 1.27); among women undergoing cardiac catheterization or PCI, radial access significantly reduced bleeding and vascular complications (0.6% vs. 1.7%; OR: 0.32; 95% CI: 0.12 to 0.90). Access site crossover was significantly higher among women assigned to radial access (PCI cohort: 6.1% vs. 1.7%; OR: 3.65; 95% CI: 1.45 to 9.17); total randomized cohort: (6.7% vs. 1.9%; OR: 3.70; 95% CI: 2.14 to 6.40). More women preferred radial access. In this pragmatic trial, which was terminated early, the radial approach did not significantly reduce bleeding or vascular complications in women undergoing PCI. Access site crossover occurred more often in women assigned to radial access. (SAFE-PCI for Women; NCT01406236). Copyright © 2014 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.
A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS
NASA Astrophysics Data System (ADS)
Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.
2011-12-01
Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.
Recommendations for a service framework to access astronomical archives
NASA Technical Reports Server (NTRS)
Travisano, J. J.; Pollizzi, J.
1992-01-01
There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.
ERIC Educational Resources Information Center
Papadopoulos, Pantelis M.; Lagkas, Thomas D.; Demetriadis, Stavros N.
2012-01-01
This study provides field research evidence on the efficiency of a "free-selection" peer review assignment protocol as compared to the typically implemented "assigned-pair" protocol. The study employed 54 sophomore students who were randomly assigned into three groups: Assigned-Pair (AP) (the teacher assigns student works for review to student…
The Effects of Cognitive Jamming on Wireless Sensor Networks Used for Geolocation
2012-03-01
continuously sends out random bits to the channel without following any MAC-layer etiquette [31]. Normally, the underlying MAC protocol allows...23 UDP User Datagram Protocol . . . . . . . . . . . . . . . . . . . 30 MIMO Multiple Input Multiple Output . . . . . . . . . . . . . . . 70...information is packaged and distributed on the network layer, only the physical measurements are considered. This protocol is used to detect faulty nodes
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Internet Connections: Understanding Your Access Options.
ERIC Educational Resources Information Center
Notess, Greg R.
1994-01-01
Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…
Improved Compressive Sensing of Natural Scenes Using Localized Random Sampling
Barranca, Victor J.; Kovačič, Gregor; Zhou, Douglas; Cai, David
2016-01-01
Compressive sensing (CS) theory demonstrates that by using uniformly-random sampling, rather than uniformly-spaced sampling, higher quality image reconstructions are often achievable. Considering that the structure of sampling protocols has such a profound impact on the quality of image reconstructions, we formulate a new sampling scheme motivated by physiological receptive field structure, localized random sampling, which yields significantly improved CS image reconstructions. For each set of localized image measurements, our sampling method first randomly selects an image pixel and then measures its nearby pixels with probability depending on their distance from the initially selected pixel. We compare the uniformly-random and localized random sampling methods over a large space of sampling parameters, and show that, for the optimal parameter choices, higher quality image reconstructions can be consistently obtained by using localized random sampling. In addition, we argue that the localized random CS optimal parameter choice is stable with respect to diverse natural images, and scales with the number of samples used for reconstruction. We expect that the localized random sampling protocol helps to explain the evolutionarily advantageous nature of receptive field structure in visual systems and suggests several future research areas in CS theory and its application to brain imaging. PMID:27555464
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Adaptive Peer Sampling with Newscast
NASA Astrophysics Data System (ADS)
Tölgyesi, Norbert; Jelasity, Márk
The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, data aggregation and overlay topology management. Lightweight gossip-based implementations of the peer sampling service have been shown to provide good quality random sampling while also being extremely robust to many failure scenarios, including node churn and catastrophic failure. We identify two problems with these approaches. The first problem is related to message drop failures: if a node experiences a higher-than-average message drop rate then the probability of sampling this node in the network will decrease. The second problem is that the application layer at different nodes might request random samples at very different rates which can result in very poor random sampling especially at nodes with high request rates. We propose solutions for both problems. We focus on Newscast, a robust implementation of the peer sampling service. Our solution is based on simple extensions of the protocol and an adaptive self-control mechanism for its parameters, namely—without involving failure detectors—nodes passively monitor local protocol events using them as feedback for a local control loop for self-tuning the protocol parameters. The proposed solution is evaluated by simulation experiments.
Ruggiero, Kenneth J; Davidson, Tatiana M; McCauley, Jenna; Gros, Kirstin Stauffacher; Welsh, Kyleen; Price, Matthew; Resnick, Heidi S; Danielson, Carla Kmett; Soltis, Kathryn; Galea, Sandro; Kilpatrick, Dean G; Saunders, Benjamin E; Nissenboim, Josh; Muzzy, Wendy; Fleeman, Anna; Amstadter, Ananda B
2015-01-01
Disasters have far-reaching and potentially long-lasting effects on youth and families. Research has consistently shown a clear increase in the prevalence of several mental health disorders after disasters, including depression and posttraumatic stress disorder. Widely accessible evidence-based interventions are needed to address this unmet need for youth and families, who are underrepresented in disaster research. Rapid growth in Internet and Smartphone access, as well as several Web based evaluation studies with various adult populations has shown that Web-based interventions are likely to be feasible in this context and can improve clinical outcomes. Such interventions also are generally cost-effective, can be targeted or personalized, and can easily be integrated in a stepped care approach to screening and intervention delivery. This is a protocol paper that describes an innovative study design in which we evaluate a self-help Web-based resource, Bounce Back Now, with a population-based sample of disaster affected adolescents and families. The paper includes description and justification for sampling selection and procedures, selection of assessment measures and methods, design of the intervention, and statistical evaluation of critical outcomes. Unique features of this study design include the use of address-based sampling to recruit a population-based sample of disaster-affected adolescents and parents, telephone and Web-based assessments, and development and evaluation of a highly individualized Web intervention for adolescents. Challenges related to large-scale evaluation of technology-delivered interventions with high-risk samples in time-sensitive research are discussed, as well as implications for future research and practice. Published by Elsevier Inc.
Ruggiero, Kenneth J.; Davidson, Tatiana M.; McCauley, Jenna; Gros, Kirstin Stauffacher; Welsh, Kyleen; Price, Matthew; Resnick, Heidi S.; Danielson, Carla Kmett; Soltis, Kathryn; Galea, Sandro; Kilpatrick, Dean G.; Saunders, Benjamin E.; Nissenboim, Josh; Muzzy, Wendy; Fleeman, Anna; Amstadter, Ananda B.
2014-01-01
Disasters have far-reaching and potentially long-lasting effects on youth and families. Research has consistently shown a clear increase in the prevalence of several mental health disorders after disasters, including depression and posttraumatic stress disorder. Widely accessible evidence-based interventions are needed to address this unmet need for youth and families, who are underrepresented in disaster research. Rapid growth in Internet and Smartphone access, as well as several web based evaluation studies with various adult populations has shown that web-based interventions are likely to be feasible in this context and can improve clinical outcomes. Such interventions also are generally cost-effective, can be targeted or personalized, and can easily be integrated in a stepped care approach to screening and intervention delivery. This is a protocol paper that describes an innovative study design in which we evaluate a self-help web-based resource, Bounce Back Now, with a population-based sample of disaster affected adolescents and families. The paper includes description and justification for sampling selection and procedures, selection of assessment measures and methods, design of the intervention, and statistical evaluation of critical outcomes. Unique features of this study design include the use of address-based sampling to recruit a population-based sample of disaster-affected adolescents and parents, telephone and web-based assessments, and development and evaluation of a highly individualized web intervention for adolescents. Challenges related to large-scale evaluation of technology-delivered interventions with high-risk samples in time-sensitive research are discussed, as well as implications for future research and practice. PMID:25478956
Beukes, Eldré W; Baguley, David M; Allen, Peter M; Manchaiah, Vinaya; Andersson, Gerhard
2017-04-21
Innovative strategies are required to improve access to evidence-based tinnitus interventions. A guided Internet-based cognitive behavioural therapy (iCBT) intervention for tinnitus was therefore developed for a U.K. Initial clinical trials indicated efficacy of iCBT at reducing tinnitus severity and associated comorbidities such as insomnia and depression. The aim of this phase III randomised controlled trial is to compare this new iCBT intervention with an established intervention, namely face-to-face clinical care for tinnitus. This will be a multi-centre study undertaken across three hospitals in the East of England. The design is a randomised, two-arm, parallel-group, non-inferiority trial with a 2-month follow-up. The experimental group will receive the guided iCBT intervention, whereas the active control group will receive the usual face-to-face clinical care. An independent researcher will randomly assign participants, using a computer-generated randomisation schedule, after stratification for tinnitus severity. There will be 46 participants in each group. The primary assessment measure will be the Tinnitus Functional Index. Data analysis will establish whether non-inferiority is achieved using a pre-defined non-inferiority margin. This protocol outlines phase III of a clinical trial comparing a new iCBT with established face-to-face care for tinnitus. If guided iCBT for tinnitus proves to be as effective as the usual tinnitus care, it may be a viable additional management route for individuals with tinnitus. This could increase access to evidence-based effective tinnitus care and reduce the pressures on existing health care systems. ClinicalTrials.gov identifier: NCT02665975 . Registered on 22 January 2016.
Mallia, Madhava B; Shinto, Ajit Sugunan; Kameswaran, Mythili; Kamaleshwaran, Koramadai Karuppusamy; Kalarikal, Radhakrishnan; Aswathy, K K; Banerjee, Sharmila
2016-05-01
(188)Re-HEDP is an established radiopharmaceutical used for pain palliation in patients with osseous metastasis. Considering commercial availability of (188)W/(188)Re generator, the accessibility to a lyophilized kit would make preparation of this radiopharmaceutical feasible at the hospital radiopharmacy having access to a generator. A protocol for the preparation of a single-vial lyophilized hydroxyethane 1,1-diphosphonic acid (HEDP) kit was developed and its consistency was checked by preparing six batches. Each sterile lyophilized kit prepared as per the protocol contained 9 mg of HEDP, 3 mg of gentisic acid, and 4 mg of SnCl2.2H2O. Randomly selected kits from all six batches were subjected to thorough quality control tests that were passed by all batches. (188)Re-HEDP could be prepared by addition of 1 mL of freshly eluted Na(188)ReO4 (up to 3700 MBq) containing 1 μmol of carrier ReO4(-) (perrhenate) and heating at 100°C for 15 minutes. (188)Re-HEDP with >95% radiochemical purity could be consistently prepared using the lyophilized kits. Sterile (188)Re-HEDP prepared using the lyophilized kit was evaluated in patients with osseous metastasis. Post-therapy images of the patient were compared with (99m)Tc-MDP bone scan and found to be satisfactory. The bone-to-background as well as tumor-to-normal bone uptake ratio was found to be significant. All patients who received therapy reported significant pain relief within a week to 10 days post-administration of (188)Re-HEDP.
Li, Ning; Cao, Chao; Wang, Cong
2017-06-15
Supporting simultaneous access of machine-type devices is a critical challenge in machine-to-machine (M2M) communications. In this paper, we propose an optimal scheme to dynamically adjust the Access Class Barring (ACB) factor and the number of random access channel (RACH) resources for clustered machine-to-machine (M2M) communications, in which Delay-Sensitive (DS) devices coexist with Delay-Tolerant (DT) ones. In M2M communications, since delay-sensitive devices share random access resources with delay-tolerant devices, reducing the resources consumed by delay-sensitive devices means that there will be more resources available to delay-tolerant ones. Our goal is to optimize the random access scheme, which can not only satisfy the requirements of delay-sensitive devices, but also take the communication quality of delay-tolerant ones into consideration. We discuss this problem from the perspective of delay-sensitive services by adjusting the resource allocation and ACB scheme for these devices dynamically. Simulation results show that our proposed scheme realizes good performance in satisfying the delay-sensitive services as well as increasing the utilization rate of the random access resources allocated to them.
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Quantum-key-distribution protocol with pseudorandom bases
NASA Astrophysics Data System (ADS)
Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.
2018-01-01
Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.
Integrated semiconductor-magnetic random access memory system
NASA Technical Reports Server (NTRS)
Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)
2001-01-01
The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-20
... DEPARTMENT OF COMMERCE International Trade Administration [C-580-851] Dynamic Random Access Memory Semiconductors from the Republic of Korea: Extension of Time Limit for Preliminary Results of Countervailing Duty... access memory semiconductors from the Republic of Korea, covering the period January 1, 2008 through...
NASA Astrophysics Data System (ADS)
Argibay-Losada, Pablo Jesus; Sahin, Gokhan
2014-08-01
Random access memories (RAM) are fundamental in conventional electronic switches and routers to manage short-term congestion and to decrease data loss probabilities. Switches in all-optical networks (AONs), however, do not have access to optical RAM, and therefore are prone to much higher loss levels than their electronic counterparts. Fiber-delay-lines (FDLs), able to delay an optical data packet a fixed amount of time, have been proposed in the literature as a means to alleviate those high loss levels. However, they are extremely bulky to manage, so their usage introduces a trade-off between practicality and performance in the design and operation of the AON. In this paper we study the influence that FDLs have in the performance of flows crossing an all-optical switch that acts as their bottleneck. We show how extremely low numbers of FDLs (e.g., 1 or 2) can help in reducing losses by several orders of magnitude in several illustrative scenarios with high aggregation levels. Our results therefore suggest that FDLs can be a practical means of dealing with congestion in AONs in the absence of optical RAM buffers or of suitable data interchange protocols specifically designed for AONs.
An Educators' Guide to Information Access across the Internet.
ERIC Educational Resources Information Center
Hazari, Sunil
1994-01-01
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...
77 FR 6094 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
....-International Atomic Energy Agency Additional Protocol. Under the U.S.-International Atomic Energy Agency (IAEA...-related activities to the IAEA and potentially provide access to IAEA inspectors for verification purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from...
Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M
2009-01-01
Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qin Sujuan; Gao Fei; Wen Qiaoyan
2010-09-15
Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.
ERIC Educational Resources Information Center
Chen, Ching-chih
1996-01-01
Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)
Czaja, Sara J; Boot, Walter R; Charness, Neil; A Rogers, Wendy; Sharit, Joseph; Fisk, Arthur D; Lee, Chin Chin; Nair, Sankaran N
2015-01-01
Technology holds promise in terms of providing support to older adults. To date, there have been limited robust systematic efforts to evaluate the psychosocial benefits of technology for older people and identify factors that influence both the usability and uptake of technology systems. In response to these issues, we developed the Personal Reminder Information and Social Management System (PRISM), a software application designed for older adults to support social connectivity, memory, knowledge about topics, leisure activities and access to resources. This trail is evaluating the impact of access to the PRISM system on outcomes such as social isolation, social support and connectivity. This paper reports on the approach used to design the PRISM system, study design, methodology and baseline data for the trial. The trial is multi-site randomized field trial. PRISM is being compared to a Binder condition where participants received a binder that contained content similar to that found on PRISM. The sample includes 300 older adults, aged 65-98 years, who lived alone and at risk for being isolated. The primary outcome measures for the trial include indices of social isolation and support and well-being. Secondary outcomes measures include indices of computer proficiency, technology uptake and attitudes towards technology. Follow-up assessments occurred at 6 and 12 months post-randomization. The results of this study will yield important information about the potential value of technology for older adults. The study also demonstrates how a user-centered iterative design approach can be incorporated into the design and evaluation of an intervention protocol. Copyright © 2014 Elsevier Inc. All rights reserved.
Czaja, Sara J.; Boot, Walter R.; Charness, Neil; Rogers, Wendy; Sharit, Joseph; Fisk, Arthur D.; Lee, Chin Chin; Nair, Sankaran N.
2014-01-01
Technology holds promise in terms of providing support to older adults. To date there have been limited robust systematic efforts to evaluate the psychosocial benefits of technology for older people and identify factors that influence both the usability and uptake of technology systems. In response to these issues we developed the Personal Reminder Information and Social Management System (PRISM), a software application designed for older adults to support social connectivity, memory, knowledge about topics, leisure activities and access to resources. This trail is evaluating the impact of access to the PRISM system on outcomes such as social isolation, social support and connectivity. This paper reports on the approach used to design the PRISM system, study design, methodology and baseline data for the trial. The trial is multi-site randomized field trial. PRISM is being compared to a Binder condition where participants received a binder that contained content similar to that found on PRISM. The sample includes 300 older adults, aged 65 – 98 years, who lived alone and at risk for being isolated. The primary outcome measures for the trial include indices of social isolation and support and well-being. Secondary outcomes measures include indices of computer proficiency, technology uptake and attitudes towards technology. Follow-up assessments occurred at 6 and 12 months post-randomization. The results of this study will yield important information about the potential value of technology for older adults. The study also demonstrates how a user-centered iterative design approach can be incorporated into the design and evaluation of an intervention protocol. PMID:25460342
106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink
2017-07-31
Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit
Cheung, Leo Chin-Ting; Jones, Alice Yee-Men
2007-06-01
This study aims to investigate the effect of transcutaneous electrical nerve stimulation, applied at bilateral acupuncture points PC6 (Acu-TENS), on recovery heart rate (HR) in healthy subjects after treadmill running exercise. A single blinded, randomized controlled trial. Laboratory with healthy male subjects (n=28). Each subject participated in three separate protocols in random order. PROTOCOL A: The subject followed the Bruce protocol and ran on a treadmill until their HR reached 70% of their maximum (220-age). At this 'target' HR, the subject adopted the supine position and Acu-TENS to bilateral PC6 was commenced. PROTOCOL B: Identical to protocol A except that Acu-TENS was applied in the supine position for 45min prior to, but not after exercise. PROTOCOL C: Identical to protocol A except that placebo Acu-TENS was applied. Heart rate was recorded before and at 30s intervals after exercise until it returned to the pre-exercise baseline. The time for HR to return to baseline was compared for each protocol. Acu-TENS applied to bilateral PC6 resulted in a faster return to pre-exercise HR compared to placebo. Time required for HR to return to pre-exercise level in protocols A-C was 5.5+/-3.0; 4.8+/-3.3; 9.4+/-3.7 min, respectively (p<0.001). There was no statistical difference in HR recovery time between protocols A and B. Subjects expressed the lowest rate of perceived exertion score (RPE) at 70% maximum HR with protocol B. This study suggests that Acu-TENS applied to PC6 may facilitate HR recovery after high intensity treadmill exercise.
NASA Astrophysics Data System (ADS)
Chang, Liang-Shun; Lin, Chrong Jung; King, Ya-Chin
2014-01-01
The temperature dependent characteristics of the random telegraphic noise (RTN) on contact resistive random access memory (CRRAM) are studied in this work. In addition to the bi-level switching, the occurrences of the middle states in the RTN signal are investigated. Based on the unique its temperature dependent characteristics, a new temperature sensing scheme is proposed for applications in ultra-low power sensor modules.
Ryan, Alex; Baker, Andrea; Dark, Frances; Foley, Sharon; Gordon, Anne; Hatherill, Sean; Stathis, Stephen; Saha, Sukanta; Bruxner, George; Beckman, Martin; Richardson, Drew; Berk, Michael; Dean, Olivia; McGrath, John; Group, Cadence Working; Scott, James
2017-04-07
Psychotic disorders affect up to 3% of the population and are often chronic and disabling. Innovation in the pharmacological treatment of psychosis has remained stagnant in recent decades. In order to improve outcomes for those with psychotic disorders, we present a protocol for the trial of a common food preservative, sodium benzoate, as an adjunctive treatment in early psychosis. Persons experiencing early psychosis (n = 160) will be recruited through hospitals and community mental health services in Queensland, Australia. Patients will be randomized to receive either 12-week treatment with 1000 mg (500 mg twice daily (BD)) sodium benzoate or placebo. Patients will undergo fortnightly outcome assessments, in addition to weekly ongoing capacity to consent, drug compliance and safety assessments. The primary outcome measure is the Positive and Negative Syndrome Scale (PANSS) total score. Secondary outcomes are Global Assessment of Function (GAF), Assessment of Quality of Life Scale (AQOL), the Activity and Participation Questionnaire (APQ6), International Physical Activity Questionnaires (IPAQ), Simple Physical Activity Questionnaire (SIMPAQ), Physical Activity Questionnaire, Clinical Global Impression (CGI), Hamilton Depression rating Scale-17 items (HDRS), Opiate Treatment Index (OTI) and the Patients' Global Impression of Improvement (PGI-I). As a tertiary objective, changes from baseline to endpoint in to serum markers related to D-alanine, L-alanine, D-serine, L-serine, glycine and glutamate will be investigated. Consumers and clinicians are keen to help develop better treatments for those with psychosis. This study, part of the wider Cadence clinical trials platform will examine if a safe and accessible food preservative can help optimize outcomes in those with psychosis. Australian New Zealand Clinical Trials registry (ANZCTR), ACTRN12615000187549 . Registered on 26 February 2015.
Castellano Ortega, M A; Romero de Castilla, R J; Rus Mansilla, C; Cortez Quiroga, G A; Bayona Gómez, A J; Duran Torralba, M C
2011-01-01
The evaluation of an improvement cycle in patients suffering thoracic/chest pain in hospital emergencies, especially in those who could benefit from the early Bruce Treadmill Test. A multidisciplinary group care protocol was designed, which identified improvement opportunities and gave priority to the fact that «an early Bruce Treadmill Test was carried out on fewer occasions than recommended». Causes were analysed (Ishikawa diagram) and six quality criteria were defined. These criteria were evaluated in a random sample of 30 patients out of the total of 180 who used the ergometer at the Hospital in the first six months of 2007, as well as questionnaire for the doctors. Corrective measures were introduced: circulation, accessibility through intranet and explicit information for new employees (doctors). The second evaluation was carried out during the first six-months of 2008 using another random sample of 30 patients from a total of 120. In the first evaluation, the classification of the risk according to the protocol was very low (100% non-compliance) and patients whose admission to the Chest Pain Unit was recommended and an early Bruce Treadmill Test (74% criteria failure) were referred to cardiology clinics. After implementation of the corrective measures, we obtain a general improvement in all the criteria, but very significant from the previous ones, with non-compliances being reduced to 17% in classification and to the 23% in referrals. The structured cycle has helped resolve the priority problem in the short-term. The adopted measures have mainly been organisational, dependent on the professionals involved, and at a very low cost. Simple but organised methodological approaches should be taken into account before the incorporation of higher cost technologies. Copyright © 2010 SECA. Published by Elsevier Espana. All rights reserved.
Effects of horticultural therapy on elderly' health: protocol of a randomized controlled trial.
Chan, Hui Yu; Ho, Roger Chun-Man; Mahendran, Rathi; Ng, Kheng Siang; Tam, Wilson Wai-San; Rawtaer, Iris; Tan, Chay Hoon; Larbi, Anis; Feng, Lei; Sia, Angelia; Ng, Maxel Kian-Wee; Gan, Goh Lee; Kua, Ee Heok
2017-08-29
Due to a rapidly ageing population in the world, it is increasingly pertinent to promote successful ageing strategies which are cost-effective, easily accessible, and more likely to be acceptable to the elderly. Past research associates exposure to natural environments and horticultural therapy (HT) with positive psychological, social and physical health benefits. This Randomized Controlled Trial (RCT) is designed to evaluate the efficacy of HT in promoting Asian elderly' mental health, cognitive functioning and physical health. 70 elderly participants aged 60 to 85 years old will be randomized to participate in either the active horticultural therapy group or be in the waitlist control. Sessions will be weekly for 12 weeks, and monthly for 3 months. Mental health will be assessed through self-reports of depressive and anxiety symptomatology, life satisfaction, social connectedness and psychological well-being, collaborated with immunological markers. Outcome measures of cognitive functioning and physical health include neuropsychological tests of cognitive function and basic health screening. Outcomes will be assessed at baseline, 3 months and 6 months post-intervention. This RCT comprehensively investigates the efficacy of a non-invasive intervention, HT, in enhancing mental health, cognitive functioning and physical health. The results have tremendous potential for supporting future successful ageing programs and applicability to larger populations. ClinicalTrials.gov NCT02495194 . Trial registration date: July 13, 2015. Retrospectively registered.
ERIC Educational Resources Information Center
McGonagle, Katherine A.; Brown, Charles; Schoeni, Robert F.
2015-01-01
Recording interviews is a key feature of quality control protocols for most survey organizations. We examine the effects on interview length and data quality of a new protocol adopted by a national panel study. The protocol recorded a randomly chosen one-third of all interviews digitally, although all respondents were asked for permission to…
Rodrigues, Ana Maria; Gregório, Maria João; Gein, Pierre; Eusébio, Mónica; Santos, Maria José; de Sousa, Rute Dinis; Coelho, Pedro S; Mendes, Jorge M; Graça, Pedro; Oliveira, Pedro; Branco, Jaime C; Canhão, Helena
2017-03-13
The limited or uncertain access to adequate food in elderly people includes not only economic restrictions but also inability of food utilization due to functional or cognitive impairment, health problems, and illiteracy. The aim of this work is to present the protocol of the randomized controlled trial Saúde.Come Senior, an educational and motivational television (TV)-based intervention to promote healthy lifestyles and decrease food insecurity in elderly people. A randomized controlled study will be conducted in subjects aged 60 years and older with food insecurity, identified at 17 primary care centers in the Lisboa e Vale do Tejo health region in Lisbon, Portugal. The primary outcome will be the changes in participants' food insecurity score (evaluated by the Household Food Insecurity Scale) at 3 months. Change in other outcomes will be assessed (dietary habits, nutritional status, physical activity, health status, and clinical outcomes). Subjects will be followed over 6 months; the intervention will last 3 months. Data collection will be performed at 3 different time points (baseline, end of intervention at 3 months, and follow-up at 6 months). The intervention is based on an interactive TV app with an educational and motivational program specifically developed for the elderly that has weekly themes and includes daily content in video format: (1) nutrition and diet tips for healthy eating, (2) healthy, easy to cook and low-cost recipes, and (3) physical exercise programs. Furthermore, brief reminders on health behaviors will also be broadcasted through the TV app. The total duration of the study will be 6 months. The intervention is considered to be effective and meaningful if 50% of the individuals in the experimental group have a decrease of 1 point in the food insecurity score, all the remaining being unchanged. We expect to include and randomize 282 (141 experimental and 141 control) elderly with food insecurity. We will recruit a total of 1,128 subjects considering that 50% of the target individuals are food insecure (based on INFOFAMÍLIA Survey) (567) and about 50% of those will adhere to the study (282). The randomized controlled trial with the 12-week home-based intervention with a comprehensive program on healthy eating and physical activity delivery is planned to start recruiting participants at the end of 2017. This study will assess the efficacy of this innovative tool (Saúde.Come Senior) for disseminating relevant health information, modifying behaviors, and decreasing food insecurity in an easy, low-cost, and massive way. ©Ana Maria Rodrigues, Maria João Gregório, Pierre Gein, Mónica Eusébio, Maria José Santos, Rute Dinis de Sousa, Pedro S Coelho, Jorge M Mendes, Pedro Graça, Pedro Oliveira, Jaime C Branco, Helena Canhão. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 13.03.2017.
Easy Online Access to Helpful Internet Guides.
ERIC Educational Resources Information Center
Tuss, Joan
1993-01-01
Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
General immunity and superadditivity of two-way Gaussian quantum cryptography.
Ottaviani, Carlo; Pirandola, Stefano
2016-03-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.
General immunity and superadditivity of two-way Gaussian quantum cryptography
Ottaviani, Carlo; Pirandola, Stefano
2016-01-01
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. PMID:26928053
Multiple Access Schemes for Lunar Missions
NASA Technical Reports Server (NTRS)
Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.
2010-01-01
Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.
Establishing security of quantum key distribution without monitoring disturbance
NASA Astrophysics Data System (ADS)
Koashi, Masato
2015-10-01
In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.
RosettaScripts: a scripting language interface to the Rosetta macromolecular modeling suite.
Fleishman, Sarel J; Leaver-Fay, Andrew; Corn, Jacob E; Strauch, Eva-Maria; Khare, Sagar D; Koga, Nobuyasu; Ashworth, Justin; Murphy, Paul; Richter, Florian; Lemmon, Gordon; Meiler, Jens; Baker, David
2011-01-01
Macromolecular modeling and design are increasingly useful in basic research, biotechnology, and teaching. However, the absence of a user-friendly modeling framework that provides access to a wide range of modeling capabilities is hampering the wider adoption of computational methods by non-experts. RosettaScripts is an XML-like language for specifying modeling tasks in the Rosetta framework. RosettaScripts provides access to protocol-level functionalities, such as rigid-body docking and sequence redesign, and allows fast testing and deployment of complex protocols without need for modifying or recompiling the underlying C++ code. We illustrate these capabilities with RosettaScripts protocols for the stabilization of proteins, the generation of computationally constrained libraries for experimental selection of higher-affinity binding proteins, loop remodeling, small-molecule ligand docking, design of ligand-binding proteins, and specificity redesign in DNA-binding proteins.
Knowledge translation interventions for critically ill patients: a systematic review*.
Sinuff, Tasnim; Muscedere, John; Adhikari, Neill K J; Stelfox, Henry T; Dodek, Peter; Heyland, Daren K; Rubenfeld, Gordon D; Cook, Deborah J; Pinto, Ruxandra; Manoharan, Venika; Currie, Jan; Cahill, Naomi; Friedrich, Jan O; Amaral, Andre; Piquette, Dominique; Scales, Damon C; Dhanani, Sonny; Garland, Allan
2013-11-01
We systematically reviewed ICU-based knowledge translation studies to assess the impact of knowledge translation interventions on processes and outcomes of care. We searched electronic databases (to July, 2010) without language restrictions and hand-searched reference lists of relevant studies and reviews. Two reviewers independently identified randomized controlled trials and observational studies comparing any ICU-based knowledge translation intervention (e.g., protocols, guidelines, and audit and feedback) to management without a knowledge translation intervention. We focused on clinical topics that were addressed in greater than or equal to five studies. Pairs of reviewers abstracted data on the clinical topic, knowledge translation intervention(s), process of care measures, and patient outcomes. For each individual or combination of knowledge translation intervention(s) addressed in greater than or equal to three studies, we summarized each study using median risk ratio for dichotomous and standardized mean difference for continuous process measures. We used random-effects models. Anticipating a small number of randomized controlled trials, our primary meta-analyses included randomized controlled trials and observational studies. In separate sensitivity analyses, we excluded randomized controlled trials and collapsed protocols, guidelines, and bundles into one category of intervention. We conducted meta-analyses for clinical outcomes (ICU and hospital mortality, ventilator-associated pneumonia, duration of mechanical ventilation, and ICU length of stay) related to interventions that were associated with improvements in processes of care. From 11,742 publications, we included 119 investigations (seven randomized controlled trials, 112 observational studies) on nine clinical topics. Interventions that included protocols with or without education improved continuous process measures (seven observational studies and one randomized controlled trial; standardized mean difference [95% CI]: 0.26 [0.1, 0.42]; p = 0.001 and four observational studies and one randomized controlled trial; 0.83 [0.37, 1.29]; p = 0.0004, respectively). Heterogeneity among studies within topics ranged from low to extreme. The exclusion of randomized controlled trials did not change our results. Single-intervention and lower-quality studies had higher standardized mean differences compared to multiple-intervention and higher-quality studies (p = 0.013 and 0.016, respectively). There were no associated improvements in clinical outcomes. Knowledge translation interventions in the ICU that include protocols with or without education are associated with the greatest improvements in processes of critical care.
Integrated AUTODIN System Architecture Report. Part 2.
1979-03-01
Link Modes Protocols and end-to- end host protocols Codes ASCII, ITA#2 ASCII, Others (Trans- parent to network) Speeds 45 thru 4800 bps 110 bps thru 56K ...service facilities such as AMPEs, subscriber access lines, modems , multiplexers, concentrators, interface development to include software design and...Protocol) CODES - ASCII and ITA#2 (others transparent) SPEEDS - 45.5bps - 56K bps FORMATS - AUTODIN II Segment Formats, JANAP 128, ACP 126/127, DOI 103
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks
2007-01-01
Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR
The Historian and Electronic Research: File Transfer Protocol (FTP).
ERIC Educational Resources Information Center
McCarthy, Michael J.
1993-01-01
Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)
Migrating an Online Service to WAP - A Case Study.
ERIC Educational Resources Information Center
Klasen, Lars
2002-01-01
Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...
Gabarron, Elia; Serrano, J Artur; Fernandez-Luque, Luis; Wynn, Rolf; Schopf, Thomas
2015-04-08
Chlamydia is the most common reportable sexually transmitted disease (STD) in Norway, and its incidence in the two northernmost counties has been disclosed to be nearly the double of the Norwegian average. The latest publicly available rates showed that 85.6% of the new cases were diagnosed in people under 29 years old. The information and communication technologies are among the most powerful influences in the lives of young people. The Internet can potentially represent a way to educate on sexual health and encourage young people, and especially youth, to be tested for STDs. If hospital websites include an easy and anonymous system for scheduling appointments with the clinic, it is possible that this could lead to an increase in the number of people tested for STDs. The purpose of the study is to assess the impact of a game-based appointment system on the frequency of consultations at a venereology unit and on the use of an educational web app. An A/B testing methodology is used. Users from the city of Tromsø, in North Norway, will be randomized to one of the two versions of the game-style web app on sexual health at www.sjekkdeg.no. Group A will have access to educational content only, while group B will have, in addition, access to a game-based appointment system with automatic prioritization. After one year of the trial, it will be analyzed if the game-based appointment system increases the number of consultations at the venereology unit and if health professionals deem the system useful. This study will explore if facilitating the access to health services for youth through the use of a game-based appointment system integrated in a game-style web app on sexual health education can have an impact on appointment rates. The trial is registered at clinicaltrials.org under the identifier ClinicalTrials.gov NCT:02128620.
Eftekhar, Maryam; Mohammadian, Farnaz; Yousefnejad, Fariba; Khani, Parisa
2013-01-01
This study compares the microdose flare-up protocol to the ultrashort gonadotropinreleasing hormone (GnRH) agonist flare combined with the fixed multidose GnRH antagonist protocol in poor responders undergoing ovarian stimulation. In this randomized clinical trial, 120 women who were candidates for assisted reproductive techniques (ART) and had histories of one or more failed in vitro fertilization (IVF) cycles with three or fewer retrieved oocytes were prospectively randomized into two groups. Group I (60 patients) received the microdose flare-up regimen and group II (60 patients) received the ultrashort GnRH agonist combined with fixed GnRH antagonist. There were no significant differences between the groups in the number of used gonadotropin ampoules (p=0.591), duration of stimulation (p=0.610), number of retrieved oocytes (p=0.802), fertilization rate (p=0.456), and the number of transferred embryos (p=0.954). The clinical pregnancy rates were statistically similar in group I (10%) compared with group II (13.3%, p=0.389). According to our results, there is no significant difference between these protocols for improving the ART outcome in poor responders. Additional prospective, randomized studies with more patients is necessary to determine the best protocol (Registration Number: IRCT201105096420N1).
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-07
... Access Memory and Nand Flash Memory Devices and Products Containing Same; Notice of Institution of... importation, and the sale within the United States after importation of certain dynamic random access memory and NAND flash memory devices and products containing same by reason of infringement of certain claims...
Logan, Jennifer K; Tang, Chad; Liao, Zhongxing; Lee, J. Jack; Heymach, John V.; Swisher, Stephen G.; Welsh, James W.; Zhang, Jianjun; Lin, Steven H.; Gomez, Daniel R.
2018-01-01
Purpose Effective clinical trial enrollment can be difficult in a protocol designs that contain one treatment arm that is perceived as being more “aggressive” or “favorable.” There have been limited studies focusing on the barriers to enrollment and the efficacy of alternative study design to improve accrual. We analyzed barriers to enrollment, particularly the influence of timing, in context of three prospective randomized oncology trials where one arm was considered more aggressive. Methods and materials From June 2011 to March 2015, patients who were enrolled on three prospective institutional protocols (an oligometastatic non-small cell lung cancer (NSCLC) trial, and two proton vs. intensity-modulated radiation therapy (IMRT) trials in NSCLC and esophageal cancer) were screened for protocol eligibility. Eligible candidates were approached about trial participation, and patient characteristics (age, sex, T/N categorization) were recorded along with details surrounding trial presentation (appointment number). Fisher’s exact test, Student’s t tests, and multivariate analysis were performed to assess differences between enrolled and refusal patients. Results 309 eligible patients were approached about trial enrollment. The enrollment success rate (ESR) during this time span was 52% (n=160 patients). Enrolled patients were more likely to be presented trial information at an earlier appointment (oligomet protocol: 5 vs. 3 appointments (P<0.001), NSCLC protocol: 4 vs. 3 appointments (P = 0.0018), esophageal protocol: 3 vs. 2 appointments (P = 0.0086No other factors or patient characteristics significantly affected ESR. Conclusion Improvement in enrollment rates for randomized control trials is possible, even in difficult accrual settings. Earlier presentation of trial information to patients is the most influential factor for success, and may help overcome accrual barriers without compromising trial design. PMID:28244413
Pireau, Nathalie; Cordemans, Virginie; Banse, Xavier; Irda, Nadia; Lichtherte, Sébastien; Kaminski, Ludovic
2017-11-01
Spine surgery still remains a challenge for every spine surgeon, aware of the potential serious outcomes of misplaced instrumentation. Though many studies have highlighted that using intraoperative cone beam CT imaging and navigation systems provides higher accuracy than conventional freehand methods for placement of pedicle screws in spine surgery, few studies are concerned about how to reduce radiation exposure for patients with the use of such technology. One of the main focuses of this study is based on the ALARA principle (as low as reasonably achievable). A prospective randomized trial was conducted in the hybrid operating room between December 2015 and December 2016, including 50 patients operated on for posterior instrumented thoracic and/or lumbar spinal fusion. Patients were randomized to intraoperative 3D acquisition high-dose (standard dose) or low-dose protocol, and a total of 216 pedicle screws were analyzed in terms of screw position. Two different methods were used to measure ionizing radiation: the total skin dose (derived from the dose-area product) and the radiation dose evaluated by thermoluminescent dosimeters on the surgical field. According to Gertzbein and Heary classifications, low-dose protocol provided a significant higher accuracy of pedicle screw placement than the high-dose protocol (96.1 versus 92%, respectively). Seven screws (3.2%), all implanted with the high-dose protocol, needed to be revised intraoperatively. The use of low-dose acquisition protocols reduced patient exposure by a factor of five. This study emphasizes the paramount importance of using low-dose protocols for intraoperative cone beam CT imaging coupled with the navigation system, as it at least does not affect the accuracy of pedicle screw placement and irradiates drastically less.
Intensive outpatient comprehensive behavioral intervention for tics: A case series
Blount, Tabatha H; Lockhart, Ann-Louise T; Garcia, Rocio V; Raj, Jeslina J; Peterson, Alan L
2014-01-01
Recent randomized clinical trials have established the efficacy of Comprehensive Behavioral Intervention for Tics (CBIT) in treating children and adults with Tourette syndrome and persistent tic disorders. However, the standard CBIT protocol uses a weekly outpatient treatment format (i.e., 8 sessions over 10 wk), which may be inconvenient or impractical for some patients, particularly patients, who are required to travel long distances in order to receive care. In contrast, an intensive outpatient program may increase accessibility to evidence-based behavioral treatments for Tourette syndrome and other persistent tic disorders by eliminating the necessity of repeated travel. This case series evaluated the use of an intensive outpatient program CBIT (IOP CBIT) for the treatment of 2 preadolescent males (ages 10 and 14 years) with Tourette syndrome. The IOP CBIT treatment protocol included several hours of daily treatment over a 4-d period. Both children evidenced notable reductions in their tics and maintained treatment gains at follow-up. Moreover, both patients and their parents expressed treatment satisfaction with the IOP CBIT format. This case series addresses an important research gap in the behavioral treatment of tic disorders literature. The patients’ treatment outcomes indicate that IOP CBIT is a promising treatment that warrants more systematic investigation. PMID:25325069
Paul, Christine L; Boyes, Allison W; O'Brien, Lorna; Baker, Amanda L; Henskens, Frans A; Roos, Ian; Clinton-McHarg, Tara; Bellamy, Douglas; Colburn, Glenda; Rose, Shiho; Cox, Martine E; Fradgley, Elizabeth A; Baird, Hannah; Barker, Daniel
2016-10-26
Community-based services such as telephone support lines can provide valuable informational, emotional, and practical support for cancer patients via telephone- or Web-based (live chat or email) platforms. However, very little rigorous research has examined the efficacy of such services in improving patient outcomes. This study will determine whether: proactive telephone or Web-delivered support produces outcomes superior to printed information; and Web-delivered support produces outcomes comparable to telephone support. A consecutive sample of 501 lung cancer outpatients will be recruited from 50 Australian health services to participate in a patient-randomized controlled trial (RCT). Eligible individuals must: be 18 years or older; have received a lung cancer diagnosis (including mesothelioma) within the previous 4 months; have an approximate life expectancy of at least 6 months; and have Internet access. Participants will be randomly allocated to receive: (1) an information booklet, (2) proactive telephone support, or (3) proactive Web support, chat, and/or email. The primary patient outcomes will be measured by the General Health Questionnaire (GHQ-12) and Health Education and Impact Questionnaire (heiQ) at 3 and 6 months post recruitment. The acceptability of proactive recruitment strategies will also be assessed. It is hypothesized that participants receiving telephone or Web support will report reduced distress (GHQ-12 scores that are 0.3 standard deviations (SD) lower) and greater self-efficacy (heiQ scores that are 0.3 SDs higher) than participants receiving booklets. Individuals receiving Web support will report heiQ scores within 0.29 SDs of individuals receiving telephone support. If proven effective, electronic approaches such as live-chat and email have the potential to increase the accessibility and continuity of supportive care delivered by community-based services. This evidence may also inform the redesigning of helpline-style services to be effective and responsive to patient needs.
Xu, Lei; Fang, Wei-Yi; Zhu, Fu; Zhang, Hong-Guang; Liu, Kai
2017-05-25
Hypertension is a major risk factor for cardiovascular disease, and its control rate has remained low worldwide. Studies have found that telemonitoring blood pressure (BP) helped control hypertension in randomized controlled trials. However, little is known about its effect in a structured primary care model in which primary care physicians (PCPs) are partnering with cardiology specialists in electronic healthcare data sharing and medical interventions. This study aims to identify the effects of a coordinated PCP-cardiologist model that applies telemedicine tools to facilitate community hypertension control in China. Patients with hypertension receiving care at four community healthcare centers that are academically affiliated to Shanghai Chest Hospital, Shanghai JiaoTong University are eligible if they have had uncontrolled BP in the previous 3 months and access to mobile Internet. Study subjects are randomly assigned to three interventional groups: (1) usual care; (2) home-based BP telemonitor with embedded Global System for Mobile Communications (GSM) module and unlimited data plan, an app to access personal healthcare record and receive personalized lifestyle coaching contents, and proficiency training of their use; or (3) this plus coordinated PCP-cardiologist care in which PCPs and cardiologists share data via a secure CareLinker website to determine interventional approaches. The primary outcome is mean change in systolic blood pressure over a 12-month period. Secondary outcomes are changes of diastolic blood pressure, HbA1C, blood lipids, and medication adherence measured by the eight-item Morisky Medication Adherence Scale. This study will determine whether a coordinated PCP-Cardiologist Telemedicine Model that incorporates the latest telemedicine technologies will improve hypertension care. Success of the model would help streamline the present community healthcare processes and impact a greater number of patients with uncontrolled hypertension. ClinicalTrials.gov, NCT02919033 . Registered on 23 September 2016.
Politi, Mary C; Barker, Abigail R; Kaphingst, Kimberly A; McBride, Timothy; Shacham, Enbal; Kebodeaux, Carey S
2016-02-16
The implementation of the ACA has improved access to quality health insurance, a necessary first step to improving health outcomes. However, access must be supplemented by education to help individuals make informed choices for plans that meet their individual financial and health needs. Drawing on a model of information processing and on prior research, we developed a health insurance decision support tool called Show Me My Health Plans. Developed with extensive stakeholder input, the current tool (1) simplifies information through plain language and graphics in an educational component; (2) assesses and reviews knowledge interactively to ensure comprehension of key material; (3) incorporates individual and/or family health status to personalize out-of-pocket cost estimates; (4) assesses preferences for plan features; and (5) helps individuals weigh information appropriate to their interests and needs through a summary page with "good fit" plans generated from a tailored algorithm. The current study will evaluate whether the online decision support tool improves health insurance decisions compared to a usual care condition (the healthcare.gov marketplace website). The trial will include 362 individuals (181 in each group) from rural, suburban, and urban settings within a 90 mile radius around St. Louis. Eligibility criteria includes English-speaking individuals 18-64 years old who are eligible for the ACA marketplace plans. They will be computer randomized to view the intervention or usual care condition. Presenting individuals with options that they can understand tailored to their needs and preferences could help improve decision quality. By helping individuals narrow down the complexity of health insurance plan options, decision support tools such as this one could prepare individuals to better navigate enrollment in a plan that meets their individual needs. The randomized trial was registered in clinicaltrials.gov (NCT02522624) on August 6, 2015.
Chow, Chun Bong; Wong, Wilfred Hing-Sang; Leung, Wing Cheong; Tang, Mary Hoi-Yin; Chan, Ko Ling; Or, Calvin KL; Li, Tim MH; Ho, Frederick Ka Wing; Lo, Daniel
2016-01-01
Background Provision of anticipatory guidance for parents is recommended as an effective strategy to prevent injuries among young children. Technology-based anticipatory guidance has been suggested to reinforce the effectiveness of injury prevention and improve parents’ knowledge of child safety. Objective This study aims to examine the effectiveness of a technology-based injury prevention program with parental anticipatory guidance for enhancing mothers’ knowledge of child safety. Methods In this randomized controlled trial, 308 mothers will be recruited from the antenatal clinics and postnatal wards of two major public hospitals in Hong Kong. Participating mothers will be randomly assigned into intervention and control groups. Mothers in the intervention group will be given free access to a technology-based injury prevention program with anticipatory guidance, whereas mothers in the control group will be given a relevant booklet on parenting. The injury prevention program, available as a website or on a mobile app, includes behavioral components based on the Theory of Planned Behavior. The primary outcome measure will be the change in the mother’s knowledge of child safety. The secondary outcome measures will be age-appropriate domestic safety knowledge, attitudes, intentions, perceived behavioral control, and self-reported behavior related to home safety practice. We will also determine dose-response relationships between the outcome measures and the website and mobile app usage. Results Enrolment of participants will begin in October 2016. Results are expected by June 2018. Conclusions Parents will be able to easily access the domestic injury prevention website to find information regarding child injury prevention. It is anticipated that the technology-based intervention will help parents improve their knowledge of child safety and raise their awareness about the consequences of domestic injuries and the importance of prevention. Trial Registration Clinicaltrials.gov Clinicaltrials.gov NCT02835768; http://clinicaltrials.gov/ct2/show/NCT02835768 (Archived by WebCite at http://www.webcitation/6lbXYM6b9) PMID:27799138
Lohse, Keith R; Pathania, Anupriya; Wegman, Rebecca; Boyd, Lara A; Lang, Catherine E
2018-03-01
To use the Centralized Open-Access Rehabilitation database for Stroke to explore reporting of both experimental and control interventions in randomized controlled trials for stroke rehabilitation (including upper and lower extremity therapies). The Centralized Open-Access Rehabilitation database for Stroke was created from a search of MEDLINE, Embase, Cochrane Central Register of Controlled Trials, Cochrane Database of Systematic Reviews, and Cumulative Index of Nursing and Allied Health from the earliest available date to May 31, 2014. A total of 2892 titles were reduced to 514 that were screened by full text. This screening left 215 randomized controlled trials in the database (489 independent groups representing 12,847 patients). Using a mixture of qualitative and quantitative methods, we performed a text-based analysis of how the procedures of experimental and control therapies were described. Experimental and control groups were rated by 2 independent coders according to the Template for Intervention Description and Replication criteria. Linear mixed-effects regression with a random effect of study (groups nested within studies) showed that experimental groups had statistically more words in their procedures (mean, 271.8 words) than did control groups (mean, 154.8 words) (P<.001). Experimental groups had statistically more references in their procedures (mean, 1.60 references) than did control groups (mean, .82 references) (P<.001). Experimental groups also scored significantly higher on the total Template for Intervention Description and Replication checklist (mean score, 7.43 points) than did control groups (mean score, 5.23 points) (P<.001). Control treatments in stroke motor rehabilitation trials are underdescribed relative to experimental treatments. These poor descriptions are especially problematic for "conventional" therapy control groups. Poor reporting is a threat to the internal validity and generalizability of clinical trial results. We recommend authors use preregistered protocols and established reporting criteria to improve transparency. Copyright © 2018 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Achey, Meredith A; Beck, Christopher A; Beran, Denise B; Boyd, Cynthia M; Schmidt, Peter N; Willis, Allison W; Riggare, Sara S; Simone, Richard B; Biglan, Kevin M; Dorsey, E Ray
2014-11-27
Interest in improving care for the growing number of individuals with chronic conditions is rising. However, access to care is limited by distance, disability, and distribution of doctors. Small-scale studies in Parkinson disease, a prototypical chronic condition, have suggested that delivering care using video house calls is feasible, offers similar clinical outcomes to in-person care, and reduces travel burden. We are conducting a randomized comparative effectiveness study (Connect.Parkinson) comparing usual care in the community to usual care augmented by virtual house calls with a Parkinson disease specialist. Recruitment is completed centrally using online advertisements and emails and by contacting physicians, support groups, and allied health professionals. Efforts target areas with a high proportion of individuals not receiving care from neurologists. Approximately 200 individuals with Parkinson disease and their care partners will be enrolled at 20 centers throughout the United States and followed for one year. Participants receive educational materials, then are randomized in a 1:1 ratio to continue their usual care (control arm) or usual care and specialty care delivered virtually (intervention arm). Care partners are surveyed about their time and travel burden and their perceived caregiver burden. Participants are evaluated via electronic survey forms and videoconferencing with a blinded independent rater at baseline and at 12 months. All study activities are completed remotely.The primary outcomes are: (1) feasibility, as measured by the proportion of visits completed, and (2) quality of life, as measured by the 39-item Parkinson's Disease Questionnaire. Secondary outcomes include measures of clinical benefit, quality of care, time and travel burden, and caregiver burden. Connect.Parkinson will evaluate the feasibility and effectiveness of using technology to deliver care into the homes of individuals with Parkinson disease. The trial may serve as a model for increasing access and delivering patient-centered care at home for individuals with chronic conditions. This trial was registered on clinicaltrials.gov on January 8, 2014 [NCT02038959].
Brewer, LaPrincess C; Kaihoi, Brian; Zarling, Kathleen K; Squires, Ray W; Thomas, Randal; Kopecky, Stephen
2015-04-08
Despite proven benefits through the secondary prevention of cardiovascular disease (CVD) and reduction of mortality, cardiac rehabilitation (CR) remains underutilized in cardiac patients. Underserved populations most affected by CVD including rural residents, low socioeconomic status patients, and racial/ethnic minorities have the lowest participation rates due to access barriers. Internet-and mobile-based lifestyle interventions have emerged as potential modalities to complement and increase accessibility to CR. An outpatient CR program using virtual world technology may provide an effective alternative to conventional CR by overcoming patient access limitations such as geographics, work schedule constraints, and transportation. The objective of this paper is to describe the research protocol of a two-phased, pilot study that will assess the feasibility (Phase 1) and comparative effectiveness (Phase 2) of a virtual world-based (Second Life) CR program as an extension of a conventional CR program in achieving healthy behavioral change among post-acute coronary syndrome (ACS) and post-percutaneous coronary intervention (PCI) patients. We hypothesize that virtual world CR users will improve behaviors (physical activity, diet, and smoking) to a greater degree than conventional CR participants. In Phase 1, we will recruit at least 10 patients enrolled in outpatient CR who were recently hospitalized for an ACS (unstable angina, ST-segment elevation myocardial infarction, non-ST-segment elevation myocardial infarction) or who recently underwent elective PCI at Mayo Clinic Hospital, Rochester Campus in Rochester, MN with at least one modifiable, lifestyle risk factor target (sedentary lifestyle, unhealthy diet, and current smoking). Recruited patients will participate in a 12-week, virtual world health education program which will provide feedback on the feasibility, usability, and design of the intervention. During Phase 2, we will conduct a 2-arm, parallel group, single-center, randomized controlled trial (RCT). Patients will be randomized at a 1:1 ratio to adjunct virtual world-based CR with conventional CR or conventional CR only. The primary outcome is a composite including at least one of the following (1) at least 150 minutes of physical activity per week, (2) daily consumption of five or more fruits and vegetables, and (3) smoking cessation. Patients will be assessed at 3, 6, and 12 months. The Phase 1 feasibility study is currently open for recruitment which will be followed by the Phase 2 RCT. The anticipated completion date for the study is May 2016. While research on the use of virtual world technology in health programs is in its infancy, it offers unique advantages over current Web-based health interventions including social interactivity and active learning. It also increases accessibility to vulnerable populations who have higher burdens of CVD. This study will yield results on the effectiveness of a virtual world-based CR program as an innovative platform to influence healthy lifestyle behavior and self-efficacy.
An agenda-based routing protocol in delay tolerant mobile sensor networks.
Wang, Xiao-Min; Zhu, Jin-Qi; Liu, Ming; Gong, Hai-Gang
2010-01-01
Routing in delay tolerant mobile sensor networks (DTMSNs) is challenging due to the networks' intermittent connectivity. Most existing routing protocols for DTMSNs use simplistic random mobility models for algorithm design and performance evaluation. In the real world, however, due to the unique characteristics of human mobility, currently existing random mobility models may not work well in environments where mobile sensor units are carried (such as DTMSNs). Taking a person's social activities into consideration, in this paper, we seek to improve DTMSN routing in terms of social structure and propose an agenda based routing protocol (ARP). In ARP, humans are classified based on their agendas and data transmission is made according to sensor nodes' transmission rankings. The effectiveness of ARP is demonstrated through comprehensive simulation studies.
Efficient Measurement of Quantum Gate Error by Interleaved Randomized Benchmarking
NASA Astrophysics Data System (ADS)
Magesan, Easwar; Gambetta, Jay M.; Johnson, B. R.; Ryan, Colm A.; Chow, Jerry M.; Merkel, Seth T.; da Silva, Marcus P.; Keefe, George A.; Rothwell, Mary B.; Ohki, Thomas A.; Ketchen, Mark B.; Steffen, M.
2012-08-01
We describe a scalable experimental protocol for estimating the average error of individual quantum computational gates. This protocol consists of interleaving random Clifford gates between the gate of interest and provides an estimate as well as theoretical bounds for the average error of the gate under test, so long as the average noise variation over all Clifford gates is small. This technique takes into account both state preparation and measurement errors and is scalable in the number of qubits. We apply this protocol to a superconducting qubit system and find a bounded average error of 0.003 [0,0.016] for the single-qubit gates Xπ/2 and Yπ/2. These bounded values provide better estimates of the average error than those extracted via quantum process tomography.
Patella, Vincenzo; Florio, Giovanni; Giuliano, Ada; Oricchio, Carmine; Spadaro, Giuseppe; Marone, Gianni; Genovese, Arturo
2012-01-01
Background and Objective. Various venom immunotherapy (VIT) protocols are available for Hymenoptera allergy. Although adverse reactions (ADRs) to VIT are widely reported, controlled trials are still needed. We conducted a randomized prospective study to evaluate ADRs and the efficacy of three VIT regimens. Methods. 76 patients with Hymenoptera allergy, aged 16–76 years, were randomized to receive an ultrarush protocol (group A: 27 patients), a rush protocol (group B: 25), or a slow protocol (group C: 24). Aqueous venom extract was used in incremental phase and an adsorbed depot in maintenance phase. ADRs and accidental Hymenoptera stings during VIT were used to evaluate efficacy. Results. During incremental treatment, ADRs occurred in 1.99%, 3.7%, and 3.9% of patients in groups A, B, and C, and in 0.99%, 1.46%, and 2.7%, respectively, during maintenance. ADRs were significantly fewer in group A (incremental + maintenance phase) than in group C (1.29% versus 3.2%; P = 0.013). Reactions to accidental Hymenoptera stings did not differ among groups (1.1%, 1.2%, and 1.1%). Conclusion. Ultrarush was as effective as the rush and slow protocols and was associated with a low incidence of reactions to stings. This study indicates that ultrarush VIT is a valid therapeutic option for Hymenoptera allergy. PMID:22693521
2013-01-01
Background Dual sensory loss (DSL) has a negative impact on health and wellbeing and its prevalence is expected to increase due to demographic aging. However, specialized care or rehabilitation programs for DSL are scarce. Until now, low vision rehabilitation does not sufficiently target concurrent impairments in vision and hearing. This study aims to 1) develop a DSL protocol (for occupational therapists working in low vision rehabilitation) which focuses on optimal use of the senses and teaches DSL patients and their communication partners to use effective communication strategies, and 2) describe the multicenter parallel randomized controlled trial (RCT) designed to test the effectiveness and cost-effectiveness of the DSL protocol. Methods/design To develop a DSL protocol, literature was reviewed and content was discussed with professionals in eye/ear care (interviews/focus groups) and DSL patients (interviews). A pilot study was conducted to test and confirm the DSL protocol. In addition, a two-armed international multi-center RCT will evaluate the effectiveness and cost-effectiveness of the DSL protocol compared to waiting list controls, in 124 patients in low vision rehabilitation centers in the Netherlands and Belgium. Discussion This study provides a treatment protocol for rehabilitation of DSL within low vision rehabilitation, which aims to be a valuable addition to the general low vision rehabilitation care. Trial registration Netherlands Trial Register (NTR) identifier: NTR2843 PMID:23941667
Artificial Optogenetic TRN Stimulation of C. elegans
Rabinowitch, Ithai; Treinin, Millet; Bai, Jihong
2017-01-01
Optogenetics is a powerful tool for manipulating neuronal activity with high temporal and spatial precision. In the nematode C. elegans optogentics is especially useful and easy to apply. This is because C. elegans is translucent, so its neurons are highly accessible to optic stimulation. In addition, many of its neurons can be exclusively targeted using cell-specific promoters. We have recently taken advantage of optogentics to deliver artificial patterns of prolonged activation to a class of mechanosensory neurons, called touch receptor neurons (TRNs) in worms that lack touch sensation due to a genetic mutation. Our aim was to examine whether we can counteract the effects of sensory loss by artificially activating the sensory neurons. Here we describe in detail the various components of the protocol that we used. This consists of exposing worms expressing the light-sensitive ion channel Channelrohdopsin 2 (ChR2) in TRNs to long-term random flashes of light. PMID:29170746
Rapid mapping of polarization switching through complete information acquisition
NASA Astrophysics Data System (ADS)
Somnath, Suhas; Belianinov, Alex; Kalinin, Sergei V.; Jesse, Stephen
2016-12-01
Polarization switching in ferroelectric and multiferroic materials underpins a broad range of current and emergent applications, ranging from random access memories to field-effect transistors, and tunnelling devices. Switching in these materials is exquisitely sensitive to local defects and microstructure on the nanometre scale, necessitating spatially resolved high-resolution studies of these phenomena. Classical piezoresponse force microscopy and spectroscopy, although providing necessary spatial resolution, are fundamentally limited in data acquisition rates and energy resolution. This limitation stems from their two-tiered measurement protocol that combines slow (~1 s) switching and fast (~10 kHz-1 MHz) detection waveforms. Here we develop an approach for rapid probing of ferroelectric switching using direct strain detection of material response to probe bias. This approach, facilitated by high-sensitivity electronics and adaptive filtering, enables spectroscopic imaging at a rate 3,504 times faster the current state of the art, achieving high-veracity imaging of polarization dynamics in complex microstructures.
Effect of a feed/fast protocol on pH in the proximal equine stomach.
Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N
2009-09-01
Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.
Gaining Access to the Internet.
ERIC Educational Resources Information Center
Notess, Greg R.
1992-01-01
Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…
Adaptive consensus of scale-free multi-agent system by randomly selecting links
NASA Astrophysics Data System (ADS)
Mou, Jinping; Ge, Huafeng
2016-06-01
This paper investigates an adaptive consensus problem for distributed scale-free multi-agent systems (SFMASs) by randomly selecting links, where the degree of each node follows a power-law distribution. The randomly selecting links are based on the assumption that every agent decides to select links among its neighbours according to the received data with a certain probability. Accordingly, a novel consensus protocol with the range of the received data is developed, and each node updates its state according to the protocol. By the iterative method and Cauchy inequality, the theoretical analysis shows that all errors among agents converge to zero, and in the meanwhile, several criteria of consensus are obtained. One numerical example shows the reliability of the proposed methods.
Quantum CSMA/CD Synchronous Communication Protocol with Entanglement
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Zeng, Binyang; Gong, Lihua
By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
Magasi, Susan; Harniss, Mark; Heinemann, Allen W
2018-01-01
Principles of fairness in testing require that all test takers, including people with disabilities, have an equal opportunity to demonstrate their capacity on the construct being measured. Measurement design features and assessment protocols can pose barriers for people with disabilities. Fairness in testing is a fundamental validity issue at all phases in the design, administration, and interpretation of measurement instruments in clinical practice and research. There is limited guidance for instrument developers on how to develop and evaluate the accessibility and usability of measurement instruments. This article describes a 6-stage iterative process for developing accessible computer-administered measurement instruments grounded in the procedures implemented across several major measurement initiatives. A key component of this process is interdisciplinary teams of accessibility experts, content and measurement experts, information technology experts, and people with disabilities working together to ensure that measurement instruments are accessible and usable by a wide range of users. The development of accessible measurement instruments is not only an ethical requirement, it also ensures better science by minimizing measurement bias, missing data, and attrition due to mismatches between the target population and test administration platform and protocols. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
The Live Access Server Scientific Product Generation Through Workflow Orchestration
NASA Astrophysics Data System (ADS)
Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.
2006-12-01
The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google Earth layers using KML; generation of maps via WMS or ArcIMS protocols; and data manipulation with Unix utilities.
Li, Ingrid; Mackey, Martin G; Foley, Bridget; Pappas, Evangelos; Edwards, Kate; Chau, Josephine Y; Engelen, Lina; Voukelatos, Alexander; Whelan, Anna; Bauman, Adrian; Winkler, Elisabeth; Stamatakis, Emmanuel
2017-06-01
To examine the effects of different sit-stand protocols on work-time sitting and physical activity (PA) of office workers. Participants (n = 26, 77% women, mean age 42) were randomly allocated to usual sitting (control) or one of three sit-stand protocols (intervention) facilitated by height-adjustable workstations for a 4-week period between June and August 2015. Sitting, standing, and stepping time were assessed by inclinometry (activPAL); leisure-time physical activity (LTPA) by self-report. One-way analysis of covariance (ANCOVA) and post-hoc (Bonferroni) tests explored between-group differences. Compared with baseline, intervention groups reduced work sitting time by 113 minutes/8-hour workday (95% confidence interval [CI] [-147,-79]) and increased work standing time by 96 minutes/8-hour workday (95% CI [67,125]) without significantly impacting LTPA/sleep time. Sit-stand protocols facilitated by height-adjustable workstations appear to reduce office workers' sitting time without significant adverse effects on LTPA.
An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks.
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2016-03-17
In wireless sensor networks (WSNs), certain areas of the monitoring region may have coverage holes and serious coverage overlapping due to the random deployment of sensors. The failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes. Sensors may be dead due to exhaustion of battery power, which may cause the network to be uncovered and disconnected. Based on the deployment nature of the nodes in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly essential for the analysis, and therefore, the collaborative detection of coverage holes has strategic importance in WSNs. In this paper, distributed coverage hole detection algorithms are designed, where nodes can collaborate to detect the coverage holes autonomously. The performance evaluation of our protocols suggests that our protocols outperform in terms of hole detection time, limited power consumption and control packet overhead to detect holes as compared to other similar protocols.
Trillingsgaard, Tea; Maimburg, Rikke Damkjær; Simonsen, Marianne
2015-04-21
Inadequate parenting is an important public health problem with possible severe and long-term consequences related to child development. We have solid theoretical and political arguments in favor of efforts enhancing the quality of the early family environment in the population at large. However, little is known about effect of universal approaches to parenting support during the transition to parenthood. This protocol describes an experimental evaluation of group based parenting support, the Family Startup Program (FSP), currently implemented large scale in Denmark. Participants will be approximately 2500 pregnant women and partners. Inclusion criteria are parental age above 18 and the mother expecting first child. Families are recruited when attending routine pregnancy scans provided as a part of the publicly available prenatal care program at Aarhus University Hospital, Skejby. Families are randomized within four geographically defined strata to one of two conditions a) participation in FSP or b) Treatment As Usual (TAU). FSP aims to prepare new families for their roles as parents and enhance parental access to informal sources of support, i.e. social network and community resources. The program consists of twelve group sessions, with nine families in each group, continuing from pregnancy until the child is 15 months old. TAU is the publicly available pre- and postnatal care available to families in both conditions. Analyses will employ survey data, administrative data from health visitors, and administrative register based data from Statistics Denmark. All data sources will be linked via the unique Danish Civil Registration Register (CPR) identifier. Data will be obtained at four time points, during pregnancy, when the child is nine months, 18 months and seven years. The primary study outcome is measured by the Parenting Sense of Competence scale (PSOC) J Clin Child Psychol 18:167-75, 1989. Other outcomes include parenting and couple relationship quality, utility of primary sector service and child physical health, socio-emotional and cognitive development. The protocol describes an ambitious experimental evaluation of a universal group-based parenting support program; an evaluation that has not yet been made either in Denmark or internationally. ClinicalTrials.gov ID: NCT02294968. Registered November 14 2014.
Abduo, Jaafar; Chen, Chen; Le Breton, Eugene; Radu, Alexandra; Szeto, Josephine; Judge, Roy; Darby, Ivan
To compare the Encode impression protocol (Biomet 3i) with the conventional impression protocol in terms of treatment duration, clinical accuracy, and outcome up to the first postplacement review of single-implant crowns. A total of 45 implants were included in this study. The implants were randomly allocated to the Encode group (23 implants) or the conventional group (22 implants). At the time of surgery, all implants received two-piece Encode healing abutments. The implants were restored 3 months after insertion. In the conventional protocol, open-tray implant-level impressions were taken and the implants were restored with prefabricated abutments and porcelain-fused-to-metal (PFM) crowns. For the implants in the Encode group, closed-tray impressions of the healing abutments were taken. The generated casts were sent to the Biomet 3i scanning/milling center for custom abutment manufacturing on which PFM crowns were fabricated. Treatment duration (laboratory and clinical), clinical accuracy of occlusal and proximal contacts, and outcome (esthetics, patient satisfaction, and crown contour) were evaluated with the aid of a series of questionnaires. The Encode protocol required significantly less laboratory time (18 minutes) than the conventional protocol for adjustment of the abutments. The impression pour time, time for the laboratory to return the crown, time for crown insertion at the final appointment, and total clinical time for crown insertion did not differ significantly between the two protocols. Likewise, clinical accuracy, esthetics, and patient satisfaction were similar for the two protocols. The two protocols were clinically comparable. The Encode protocol is advantageous in reducing the laboratory time before crown fabrication.
Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics.
Keich, Uri; Kertesz-Farkas, Attila; Noble, William Stafford
2015-08-07
Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications.
Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics
2016-01-01
Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications. PMID:26152888
Ricci, Natalia Aquaroni; Aratani, Mayra Cristina; Caovilla, Heloísa Helena; Ganança, Fernando Freitas
2016-04-01
The aim of this study was to compare the effects of vestibular rehabilitation protocols on balance control in elderly with dizziness. This is a randomized clinical trial with 3-mo follow-up period. The sample was composed of 82 older individuals with chronic dizziness from vestibular disorders. The control group was treated according to the Conventional Cawthorne & Cooksey protocol (n = 40), and the experimental group was submitted to a Multimodal Cawthorne & Cooksey protocol (n = 42). Measures included Dynamic Gait Index, fall history, hand grip strength, Time Up-and-Go Test, sit-to-stand test, multidirectional reach, and static balance tests. With the exception of history of falls, Forward Functional Reach, Unipedal Right and Left Leg Eyes Closed, and Sensorial Romberg Eyes Open, all outcomes improved after treatments. Such results persisted at follow-up period, with the exception of the Tandem Eyes Open and the Timed Up-and-Go manual. The between-group differences for Sensorial Romberg Eyes Closed (4.27 secs) and Unipedal Left Leg Eyes Open (4.08 secs) were significant after treatment, favoring the Multimodal protocol. Both protocols resulted in improvement on elderly's balance control, which was maintained during a short-term period. The multimodal protocol presented better performance on specific static balance tests.
Obtaining i.v. fosfomycin through an expanded-access protocol.
Frederick, Corey M; Burnette, Jennifer; Aragon, Laura; Gauthier, Timothy P
2016-08-15
One hospital's experience with procuring i.v. fosfomycin via an expanded-access protocol to treat a panresistant infection is described. In mid-2014, a patient at a tertiary care institution had an infection caused by a gram-negative pathogen expressing notable drug resistance. Once it was determined by the infectious diseases (ID) attending physician that i.v. fosfomycin was a possible treatment for this patient, the ID pharmacist began the process of drug procurement. The research and ID pharmacists completed an investigational new drug (IND) application, which required patient-specific details and contributions from the ID physician. After obtaining approval of the IND, an Internet search identified a product vendor in the United Kingdom, who was then contacted to begin the drug purchasing and acquisition processes. Authorization of the transaction required signatures from key senior hospital administrators, including the chief financial officer and the chief operating officer. Approximately 6 days after beginning the acquisition process, the research pharmacist arranged for the wholesaler to expedite product delivery. The ID pharmacist contacted the wholesaler's shipping company at the U.S. Customs Office, providing relevant contact information to ensure that any unexpected circumstances could be quickly addressed. The product arrived at the U.S. Customs Office 8 days after beginning the acquisition process and was held in the U.S. Customs Office for 2 days. The patient received the first dose of i.v. fosfomycin 13 days after starting the expanded-access protocol process. I.V. fosfomycin was successfully procured through an FDA expanded-access protocol by coordinating efforts among ID physicians, pharmacists, and hospital executives. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.
Tailor, Vijay; Glaze, Selina; Unwin, Hilary; Bowman, Richard; Thompson, Graham; Dahlmann-Noor, Annegret
2016-10-01
Children and adults with neurological impairments are often not able to access conventional perimetry; however, information about the visual field is valuable. A new technology, saccadic vector optokinetic perimetry (SVOP), may have improved accessibility, but its accuracy has not been evaluated. We aimed to explore accessibility, testability and accuracy of SVOP in children with neurodisability or isolated visual pathway deficits. Cohort study; recruitment October 2013-May 2014, at children's eye clinics at a tertiary referral centre and a regional Child Development Centre; full orthoptic assessment, SVOP (central 30° of the visual field) and confrontation visual fields (CVF). Group 1: age 1-16 years, neurodisability (n=16), group 2: age 10-16 years, confirmed or suspected visual field defect (n=21); group 2 also completed Goldmann visual field testing (GVFT). Group 1: testability with a full 40-point test protocol is 12.5%; with reduced test protocols, testability is 100%, but plots may be clinically meaningless. Children (44%) and parents/carers (62.5%) find the test easy. SVOP and CVF agree in 50%. Group 2: testability is 62% for the 40-point protocol, and 90.5% for reduced protocols. Corneal changes in childhood glaucoma interfere with SVOP testing. All children and parents/carers find SVOP easy. Overall agreement with GVFT is 64.7%. While SVOP is highly accessible to children, many cannot complete a full 40-point test. Agreement with current standard tests is moderate to poor. Abnormal saccades cause an apparent non-specific visual field defect. In children with glaucoma or nystagmus SVOP calibration often fails. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
BCH codes for large IC random-access memory systems
NASA Technical Reports Server (NTRS)
Lin, S.; Costello, D. J., Jr.
1983-01-01
In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... Static Random Access Memories and Products Containing Same, DN 2816; the Commission is soliciting... importation of certain static random access memories and products containing same. The complaint names as...
Bonfill, Xavier; Ballesteros, Mónica; Gich, Ignasi; Serrano, María Antonia; García López, Fernando; Urrútia, Gerard
2013-01-01
Objective To describe the characteristics of randomized controlled clinical trials (RCT) on cancer drugs conducted in Spain between 1999 and 2003 based on their protocols. Methods We conducted an observational retrospective cohort study to identify the protocols of RCTs on cancer drugs authorized by the Agencia Española del Medicamento y Productos Sanitarios (AEMPS) (Spanish Agency for Medicines and Medical Devices) during 1999-2003. A descriptive analysis was completed and the association between variables based on the study setting and sponsorship were assessed. Results We identified a total of 303 protocols, which included 176,835 potentially eligible patients. Three-quarter of the studies were internationally-based, 61.7% were phase III, and 76.2% were sponsored by pharmaceutical companies. The most frequently assessed outcomes were response rate (24.7%), overall survival (20.7%), and progression-free survival (14.5%). Of all protocols, 10.6% intended to include more than 1000 patients (mean: 2442, SD: 2724). Compared with their national counterparts, internationally-based studies were significantly larger (p<0.001) and were more likely to implement centralized randomization (p<0.001), blinding of the intervention (p<0.001), and survival as primary outcome (p<0.001). Additionally, most internationally-based studies were sponsored by pharmaceutical companies (p<0.01). In a high percentage of protocols, the available information was not explicit enough to assess the validity of each trial. Compared to other European countries, the proportion of Spanish cancer drugs protocols registered at www.clinicaltrials.gov (7%) was lower. Conclusion RCTs on cancer drugs conducted in Spain between 1999 and 2003 were more likely to be promoted by pharmaceutical companies rather than by non-profit national groups. The former were more often part of international studies, which generally had better methodological quality than national ones. There are some worldwide on-going initiatives that aim to increase the transparency and quality of future research. PMID:24236154
NASA Technical Reports Server (NTRS)
Poole, L. R.
1974-01-01
A study was conducted of an alternate method for storage and use of bathymetry data in the Langley Research Center and Virginia Institute of Marine Science mid-Atlantic continental-shelf wave-refraction computer program. The regional bathymetry array was divided into 105 indexed modules which can be read individually into memory in a nonsequential manner from a peripheral file using special random-access subroutines. In running a sample refraction case, a 75-percent decrease in program field length was achieved by using the random-access storage method in comparison with the conventional method of total regional array storage. This field-length decrease was accompanied by a comparative 5-percent increase in central processing time and a 477-percent increase in the number of operating-system calls. A comparative Langley Research Center computer system cost savings of 68 percent was achieved by using the random-access storage method.
LTE-advanced random access mechanism for M2M communication: A review
NASA Astrophysics Data System (ADS)
Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil
2016-03-01
Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.
Spanier, Katja; Streibelt, Marco; Ünalan, Firat; Bethge, Matthias
2015-09-29
The German welfare system follows the principle "rehabilitation rather than pension," but more than the half of all disability pensioners did not utilize medical rehabilitation before their early retirement. A major barrier is the application procedure. Lack of information about the opportunity to utilize rehabilitation services restricts the chance to improve work ability and to prevent health-related early retirement by rehabilitation programs. The establishment of new access paths to medical rehabilitation services was, therefore, identified as a major challenge for rehabilitation research in a recent expertise. Thus, a web-based information guide was developed to support the application for a medical rehabilitation program. For this study, the development of a web-based information guide was based on the health action process approach. Four modules were established. Three modules support forming an intention by strengthening risk perception (module 1), positive outcome expectancies (module 2) and self-efficacy (module 3). A fourth module aims at the realization of actual behavior by offering instructions on how to plan and to push the application process. The study on the effectiveness of the web-based information guide will be performed as a randomized controlled trial. Persons aged 40 to 59 years with prior sick leave benefits during the preceding year will be included. A sample of 16,000 persons will be randomly drawn from the registers of 3 pension insurance agencies. These persons will receive a questionnaire to determine baseline characteristics. Respondents of this first survey will be randomly allocated either to the intervention or the control group. Both study groups will then receive letters with general information about rehabilitation. The intervention group will additionally receive a link to the web-based information guide. After 1 year, a second survey will be conducted. Additionally, administrative data will be used to determine if participants apply for rehabilitation and finally start a rehabilitation program. The primary outcomes are the proportion of applied and utilized medical rehabilitation services. Secondary outcomes are cognitions on rehabilitation, self-rated work ability, health-related quality of life and perceived disability, as well as days with sick leave benefits and days of regular employment. The randomized controlled trial will provide highest ranked evidence to clarify whether theory-driven web-based information supports access to rehabilitation services for people with prior sickness benefits. German Clinical Trials Register (Identifier: DRKS00005658 , 16 January 2014).
IP access networks with QoS support
NASA Astrophysics Data System (ADS)
Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique
2001-07-01
The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.
2015-09-01
the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on
Very High-Speed Report File System
1992-12-15
1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol
Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems
NASA Astrophysics Data System (ADS)
Kollár, Martin
2012-05-01
In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (
Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan
2016-08-22
India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be conducted. Qualitative and process documentation data will be used to explain how the intervention could have worked. By taking into consideration several health system building blocks and trying to understand how they interact, our study aims to generate evidence for health planners on how to optimise health services to improve access to medicines. Protocol registered on Clinical Trials Registry of India with registration identifier number CTRI/2015/03/005640 on 17(th) March 2015.
Henkelmann, Ralf; Schneider, Sebastian; Müller, Daniel; Gahr, Ralf; Josten, Christoph; Böhme, Jörg
2017-03-14
Partial or complete immobilization leads to different adjustment processes like higher risk of muscle atrophy or a decrease of general performance. The present study is designed to prove efficacy of the anti-gravity treadmill (alter G®) compared to a standard rehabilitation protocol in patients with tibial plateau (group 1)or ankle fractures (group 2) with six weeks of partial weight bearing of 20 kg. This prospective randomized study will include a total of 60 patients for each group according to predefined inclusion and exclusion criteria. 1:1 randomization will be performed centrally via fax supported by the Clinical Trial Centre Leipzig (ZKS Leipzig). Patients in the treatment arm will be treated with an anti-gravity treadmill (alter G®) instead of physiotherapy. The protocol is designed parallel to standard physiotherapy with a frequency of two to three times of training with the treadmill per week with duration of 20 min for six weeks. Up to date no published randomized controlled trial with an anti-gravity treadmill is available. The findings of this study can help to modify rehabilitation of patients with partial weight bearing due to their injury or postoperative protocol. It will deliver interesting results if an anti-gravity treadmill is useful in rehabilitation in those patients. Further ongoing studies will identify different indications for an anti-gravity treadmill. Thus, in connection with those studies, a more valid statement regarding safety and efficacy is possible. NCT02790229 registered on May 29, 2016.
Kacmarek, Robert M; Villar, Jesús; Sulemanji, Demet; Montiel, Raquel; Ferrando, Carlos; Blanco, Jesús; Koh, Younsuck; Soler, Juan Alfonso; Martínez, Domingo; Hernández, Marianela; Tucci, Mauro; Borges, Joao Batista; Lubillo, Santiago; Santos, Arnoldo; Araujo, Juan B; Amato, Marcelo B P; Suárez-Sipmann, Fernando
2016-01-01
The open lung approach is a mechanical ventilation strategy involving lung recruitment and a decremental positive end-expiratory pressure trial. We compared the Acute Respiratory Distress Syndrome network protocol using low levels of positive end-expiratory pressure with open lung approach resulting in moderate to high levels of positive end-expiratory pressure for the management of established moderate/severe acute respiratory distress syndrome. A prospective, multicenter, pilot, randomized controlled trial. A network of 20 multidisciplinary ICUs. Patients meeting the American-European Consensus Conference definition for acute respiratory distress syndrome were considered for the study. At 12-36 hours after acute respiratory distress syndrome onset, patients were assessed under standardized ventilator settings (FIO2≥0.5, positive end-expiratory pressure ≥10 cm H2O). If Pao2/FIO2 ratio remained less than or equal to 200 mm Hg, patients were randomized to open lung approach or Acute Respiratory Distress Syndrome network protocol. All patients were ventilated with a tidal volume of 4 to 8 ml/kg predicted body weight. From 1,874 screened patients with acute respiratory distress syndrome, 200 were randomized: 99 to open lung approach and 101 to Acute Respiratory Distress Syndrome network protocol. Main outcome measures were 60-day and ICU mortalities, and ventilator-free days. Mortality at day-60 (29% open lung approach vs. 33% Acute Respiratory Distress Syndrome Network protocol, p = 0.18, log rank test), ICU mortality (25% open lung approach vs. 30% Acute Respiratory Distress Syndrome network protocol, p = 0.53 Fisher's exact test), and ventilator-free days (8 [0-20] open lung approach vs. 7 [0-20] d Acute Respiratory Distress Syndrome network protocol, p = 0.53 Wilcoxon rank test) were not significantly different. Airway driving pressure (plateau pressure - positive end-expiratory pressure) and PaO2/FIO2 improved significantly at 24, 48 and 72 hours in patients in open lung approach compared with patients in Acute Respiratory Distress Syndrome network protocol. Barotrauma rate was similar in both groups. In patients with established acute respiratory distress syndrome, open lung approach improved oxygenation and driving pressure, without detrimental effects on mortality, ventilator-free days, or barotrauma. This pilot study supports the need for a large, multicenter trial using recruitment maneuvers and a decremental positive end-expiratory pressure trial in persistent acute respiratory distress syndrome.
NASA Astrophysics Data System (ADS)
Yun, Changho; Kim, Kiseon
2006-04-01
For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
NASA Astrophysics Data System (ADS)
Mateescu, Radu; Serwe, Wendelin
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.
Extremely high data-rate, reliable network systems research
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Mukkamala, R.; Murray, Nicholas D.; Overstreet, C. Michael
1990-01-01
Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described.
Automating individualized coaching and authentic role-play practice for brief intervention training.
Hayes-Roth, B; Saker, R; Amano, K
2010-01-01
Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
Land-mobile satellite communication system
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)
1993-01-01
A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.
Montgomery, Rhonda J V; Kwak, Jung; Kosloski, Karl; O'Connell Valuch, Katharine
2011-09-01
We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden-objective, relationship, and stress burdens; depression; and intention for nursing home placement. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes.
Kwak, Jung; Kosloski, Karl; O’Connell Valuch, Katharine
2011-01-01
Objectives. We examined the effects of a manualized care management protocol specifically designed for care managers working with caregivers, the Tailored Caregiver Assessment and Referral® (TCARE®) protocol, on caregiver identity discrepancy, burden, and depressive symptoms. Methods. Preliminary data from a longitudinal, randomized, controlled intervention study with 266 family caregivers served by 52 care managers in 4 states were analyzed using repeated measures random effects regression procedures. Caregivers in the intervention and control groups were repeatedly assessed for up to 9 months on caregiver identity discrepancy, 3 areas of caregiving burden—objective, relationship, and stress burdens; depression; and intention for nursing home placement. Results. We found significant group by time interaction effects for caregiver identity discrepancy, relationship burden, stress burden, depression, and intention for nursing home placement. Caregivers in the intervention group experienced significant improvement on these measures, whereas caregivers in the control group worsened on these measures over time. Discussion. The preliminary findings provide strong support for effectiveness of the TCARE® protocol on improving caregiver well-being and mental health outcomes. PMID:21840840
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo
2014-01-01
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814
Kute, Vivek B; Patel, Himanshu V; Shah, Pankaj R; Modi, Pranjal R; Shah, Veena R; Rizvi, Sayyed J; Pal, Bipin C; Modi, Manisha P; Shah, Priya S; Varyani, Umesh T; Wakhare, Pavan S; Shinde, Saiprasad G; Ghodela, Viajay A; Patel, Minaxi H; Trivedi, Varsha B; Trivedi, Hargovind L
2016-01-01
The combination of kidney paired donation (KPD) with desensitization represents a promising method of increasing the rate of living donor kidney transplantation (LDKT) in immunologically challenging patients. Patients who are difficult to match and desensitize due to strong donor specific antibody are may be transplanted by a combination of desensitization and KPD protocol with more immunologically favorable donor. We present our experience of combination of desensitization protocol with three-way KPD which contributed to successful LDKT in highly sensitized end stage renal disease patient. All recipients were discharged with normal and stable allograft function at 24 mo follow up. We believe that this is first report from India where three-way KPD exchange was performed with the combination of KPD and desensitization. The combination of desensitization protocol with KPD improves access and outcomes of LDKT. PMID:27803919
Mahrwald, R
2015-09-21
The aggressive and strong development of organocatalysis provides several protocols for the convenient utilization of the carbonyl function of unprotected carbohydrates in C-C-bond formation processes. These amine-catalyzed mechanisms enable multiple cascade-protocols for the synthesis of a wide range of carbohydrate-derived compound classes. Several, only slightly different protocols, have been developed for the application of 1,3-dicarbonyl compounds in the stereoselective chain-elongation of unprotected carbohydrates and the synthesis of highly functionalized C-glycosides of defined configuration. In addition, C-glycosides can also be accessed by amine-catalyzed reactions with methyl ketones. By a one-pot cascade reaction of isocyanides with unprotected aldoses and amino acids access to defined configured glycopeptide mimetics is achieved. Depending on the reaction conditions different origins to control the installation of configuration during the bond-formation process were observed.
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany; Onyoo, Pamela; Ho, Lara S; Manary, Mark; Briend, André; Opondo, Charles; Kerac, Marko
2018-04-24
Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings. This study is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM compared to the standard protocol, which is the national treatment protocol in each country. We will assess recovery rate as a primary outcome and coverage, defaulting, death, length of stay, average weekly weight gain and average weekly mid-upper arm circumference (MUAC) gain as secondary outcomes. Recovery rate is defined across both treatment arms as MUAC ≥125 mm and no oedema for two consecutive visits. Per-protocol and intention-to-treat analyses will be conducted. If the combined protocol is shown to be non-inferior to the standard protocol, updating guidelines to use the combined protocol would eliminate the need for separate products, resources and procedures for MAM treatment. This would likely be more cost-effective, increase availability of services, enable earlier case finding and treatment before deterioration of MAM into SAM, promote better continuity of care and improve community perceptions of the programme. ISRCTN, ISRCTN30393230 . Registered on 16 March 2017.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
NASA Astrophysics Data System (ADS)
Purnomo, A.; Widyawan; Najib, W.; Hartono, R.; Hartatik
2018-03-01
Mobile adhoc network (MANET) consists of nodes that are independent. A node can communicate each other without the presence of network infrastructure. A node can act as a transmitter and receiver as well as a router. This research has been variation in active route timeout and my route timeout on the performance of AODV-ETX protocol in MANET. The AODV-ETX protocol is the AODV protocol that uses the ETX metric. Performance testing is done on the static node topology with 5 m x 5 m node grid model where the distance between nodes is 100 m and node topology that consists of 25 nodes moves randomly with a moving speed of 1.38 m/s in an area of 1500 m x 300 m. From the test result, on the static node, AODV protocol-ETX shows optimal performance at a value MRT and ART of 10 s and 15 s, but showed a stable performance in the value of MRT and ART ≥60 s, while in randomly moved node topology shows stable performance in the value of MRT and ART ≥80 s.
Osma, Jorge; Suso-Ribera, Carlos; García-Palacios, Azucena; Crespo-Delgado, Elena; Robert-Flor, Cristina; Sánchez-Guerrero, Ana; Ferreres-Galan, Vanesa; Pérez-Ayerra, Luisa; Malea-Fernández, Amparo; Torres-Alfosea, Mª Ángeles
2018-03-12
Emotional disorders, which include both anxiety and depressive disorders, are the most prevalent psychological disorders according to recent epidemiological studies. Consequently, public costs associated with their treatment have become a matter of concern for public health systems, which face long waiting lists. Because of their high prevalence in the population, finding an effective treatment for emotional disorders has become a key goal of today's clinical psychology. The Unified Protocol for the Transdiagnostic Treatment of Emotional Disorders might serve the aforementioned purpose, as it can be applied to a variety of disorders simultaneously and it can be easily performed in a group format. The study is a multicenter, randomized, non-inferiority controlled clinical trial. Participants will be 220 individuals with emotional disorders, who are randomized to either a treatment as usual (individual cognitive behavioral therapy) or to a Unified Protocol condition in group format. Depression, anxiety, and diagnostic criteria are the primary outcome measures. Secondary measures include the assessment of positive and negative affect, anxiety control, personality traits, overall adjustment, and quality of life. An analysis of treatment satisfaction is also conducted. Assessment points include baseline, post-treatment, and three follow-ups at 3, 6, and 12 months. To control for missing data and possible biases, intention-to-treat and per-protocol analyses will be performed. This is the first randomized, controlled clinical trial to test the effectiveness of a transdiagnostic intervention in a group format for the treatment of emotional disorders in public settings in Spain. Results obtained from this study may have important clinical, social, and economic implications for public mental health settings in Spain. Retrospectively registered at https://clinicaltrials.gov/ . Trial NCT03064477 (March 10, 2017). The trial is active and recruitment is ongoing. Recruitment is expected to finish by January 2020.
Corkum, Penny V; Reid, Graham J; Hall, Wendy A; Godbout, Roger; Stremler, Robyn; Weiss, Shelly K; Gruber, Reut; Witmans, Manisha; Chambers, Christine T; Begum, Esmot Ara; Andreou, Pantelis; Rigney, Gabrielle
2018-03-26
Up to 25% of 1- to 10-year-old children experience insomnia (ie, resisting bedtime, trouble falling asleep, night awakenings, and waking too early in the morning). Insomnia can be associated with excessive daytime sleepiness and negative effects on daytime functioning across multiple domains (eg, behavior, mood, attention, and learning). Despite robust evidence supporting the effectiveness of behavioral treatments for insomnia in children, very few children with insomnia receive these treatments, primarily due to a shortage of available treatment resources. The Better Nights, Better Days (BNBD) internet-based program provides a readily accessible electronic health (eHealth) intervention to support parents in providing evidence-based care for insomnia in typically developing children. The purpose of the randomized controlled trial (RCT) is to evaluate the effectiveness of BNBD in treating insomnia in children aged between 1 and 10 years. BNBD is a fully automated program, developed based on evidence-based interventions previously tested by the investigators, as well as on the extant literature on this topic. We describe the 2-arm RCT in which participants (500 primary caregivers of children with insomnia residing in Canada) are assigned to intervention or usual care. The effects of this behavioral sleep eHealth intervention will be assessed at 4 and 8 months postrandomization. Assessment includes both sleep (actigraphy, sleep diary) and daytime functioning of the children and daytime functioning of their parents. Results will be reported using the standards set out in the Consolidated Standards of Reporting Trials statement. If the intervention is supported by the results of the RCT, we plan to commercialize this program so that it is sustainable and available at a low cost to all families with internet access. ClinicalTrials.gov NCT02243501; https://clinicaltrials.gov/show/NCT02243501 (Archived by WebCite at http://www.webcitation.org/6x8Z5pBui). ©Penny V Corkum, Graham J Reid, Wendy A Hall, Roger Godbout, Robyn Stremler, Shelly K Weiss, Reut Gruber, Manisha Witmans, Christine T Chambers, Esmot Ara Begum, Pantelis Andreou, Gabrielle Rigney. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.03.2018.
A performance study of WebDav access to storages within the Belle II collaboration
NASA Astrophysics Data System (ADS)
Pardi, S.; Russo, G.
2017-10-01
WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.
Providing Internet Access to High-Resolution Lunar Images
NASA Technical Reports Server (NTRS)
Plesea, Lucian
2008-01-01
The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.
Association Between In-Office And At-Home Tooth Bleaching: A Single Blind Randomized Clinical Trial.
Rodrigues, João Lima; Rocha, Patrícia Souza; Pardim, Silvia Letícia de Souza; Machado, Ana Cláudia Vieira; Faria-E-Silva, André Luis; Seraidarian, Paulo Isaías
2018-01-01
This controlled randomized clinical trial evaluated the effect of associating at-home and in-office bleaching procedures on tooth sensitivity (TS) and bleaching effectiveness. Forty patients subjected to on session of in-office bleaching with 38% peroxide hydrogen. Subsequently, the patients were randomly allocated to receive a second session of in-office bleaching or to use a tray containing 10% carbamide peroxide delivered during 7 consecutive days. The worst TS score reported during or after each bleaching procedure was recorded using a verbal rating scale and TS risk (score different from 0) was calculated. Color changes were measured 7 days after each in-office session (for patients receiving in-office procedures only) or after the end of at-home bleaching (for the combined protocol), and 6 months after the last procedure for both bleaching protocols. Color was assessed by a spectrophotometer and by color match with the Vita Classical and Bleach guide scales. Statistical analyses were carried out to assess possible differences between the protocols regarding the outcomes and to analyze the effect of time of assessment on color changes. The bleaching protocol did not affect the risk for and the maximum level of TS reported, irrespective of the time of assessment. In the color evaluation, the bleaching protocol also did not affect the ultimate tooth color. In conclusion, after one in-office bleaching session, there was no difference in bleaching effectiveness and TS between performing a second in-office session and associating it with 1-week at-home bleaching.
Tregnaghi, Miguel W; Sáez-Llorens, Xavier; López, Pio; Abate, Hector; Smith, Enrique; Pósleman, Adriana; Calvo, Arlene; Wong, Digna; Cortes-Barbosa, Carlos; Ceballos, Ana; Tregnaghi, Marcelo; Sierra, Alexandra; Rodriguez, Mirna; Troitiño, Marisol; Carabajal, Carlos; Falaschi, Andrea; Leandro, Ana; Castrejón, Maria Mercedes; Lepetic, Alejandro; Lommel, Patricia; Hausdorff, William P; Borys, Dorota; Ruiz Guiñazú, Javier; Ortega-Barría, Eduardo; Yarzábal, Juan P; Schuerman, Lode
2014-06-01
The relationship between pneumococcal conjugate vaccine-induced antibody responses and protection against community-acquired pneumonia (CAP) and acute otitis media (AOM) is unclear. This study assessed the impact of the ten-valent pneumococcal nontypable Haemophilus influenzae protein D conjugate vaccine (PHiD-CV) on these end points. The primary objective was to demonstrate vaccine efficacy (VE) in a per-protocol analysis against likely bacterial CAP (B-CAP: radiologically confirmed CAP with alveolar consolidation/pleural effusion on chest X-ray, or non-alveolar infiltrates and C-reactive protein ≥ 40 µg/ml); other protocol-specified outcomes were also assessed. This phase III double-blind randomized controlled study was conducted between 28 June 2007 and 28 July 2011 in Argentine, Panamanian, and Colombian populations with good access to health care. Approximately 24,000 infants received PHiD-CV or hepatitis control vaccine (hepatitis B for primary vaccination, hepatitis A at booster) at 2, 4, 6, and 15-18 mo of age. Interim analysis of the primary end point was planned when 535 first B-CAP episodes, occurring ≥2 wk after dose 3, were identified in the per-protocol cohort. After a mean follow-up of 23 mo (PHiD-CV, n = 10,295; control, n = 10,201), per-protocol VE was 22.0% (95% CI: 7.7, 34.2; one-sided p = 0.002) against B-CAP (conclusive for primary objective) and 25.7% (95% CI: 8.4%, 39.6%) against World Health Organization-defined consolidated CAP. Intent-to-treat VE was 18.2% (95% CI: 5.5%, 29.1%) against B-CAP and 23.4% (95% CI: 8.8%, 35.7%) against consolidated CAP. End-of-study per-protocol analyses were performed after a mean follow-up of 28-30 mo for CAP and invasive pneumococcal disease (IPD) (PHiD-CV, n = 10,211; control, n = 10,140) and AOM (n = 3,010 and 2,979, respectively). Per-protocol VE was 16.1% (95% CI: -1.1%, 30.4%; one-sided p = 0.032) against clinically confirmed AOM, 67.1% (95% CI: 17.0%, 86.9%) against vaccine serotype clinically confirmed AOM, 100% (95% CI: 74.3%, 100%) against vaccine serotype IPD, and 65.0% (95% CI: 11.1%, 86.2%) against any IPD. Results were consistent between intent-to-treat and per-protocol analyses. Serious adverse events were reported for 21.5% (95% CI: 20.7%, 22.2%) and 22.6% (95% CI: 21.9%, 23.4%) of PHiD-CV and control recipients, respectively. There were 19 deaths (n = 11,798; 0.16%) in the PHiD-CV group and 26 deaths (n = 11,799; 0.22%) in the control group. A significant study limitation was the lower than expected number of captured AOM cases. Efficacy was demonstrated against a broad range of pneumococcal diseases commonly encountered in young children in clinical practice. www.ClinicalTrials.gov NCT00466947.
South Dakota Department of Education Data Access Policy
ERIC Educational Resources Information Center
South Dakota Department of Education, 2015
2015-01-01
The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…
Scott, Christy K; Dennis, Michael L; Gustafson, David H
2017-08-10
Alcohol abuse, other substance use disorders, and risk behaviors associated with the human immunodeficiency virus (HIV) represent three of the top 10 modifiable causes of mortality in the US. Despite evidence that continuing care is effective in sustaining recovery from substance use disorders and associated behaviors, patients rarely receive it. Smartphone applications (apps) have been effective in delivering continuing care to patients almost anywhere and anytime. This study tests the effectiveness of two components of such apps: ongoing self-monitoring through Ecological Momentary Assessments (EMAs) and immediate recovery support through Ecological Momentary Interventions (EMIs). The target population, adults enrolled in substance use disorder treatment (n = 400), are being recruited from treatment centers in Chicago and randomly assigned to one of four conditions upon discharge in a 2 × 2 factorial design. Participants receive (1) EMAs only, (2) EMIs only, (3) combined EMAs + EMIs, or (4) a control condition without EMA or EMI for 6 months. People in the experimental conditions receive smartphones with the apps (EMA and/or EMI) specific to their condition. Phones alert participants in the EMA and EMA + EMI conditions at five random times per day and present participants with questions about people, places, activities, and feelings that they experienced in the past 30 min and whether these factors make them want to use substances, support their recovery, or have no impact. Those in the EMI and EMA + EMI conditions have continual access to a suite of support services. In the EMA + EMI condition, participants are prompted to use the EMI(s) when responses to the EMA(s) indicate risk. All groups have access to recovery support as usual. The primary outcome is days of abstinence from alcohol and other drugs. Secondary outcomes are number of HIV risk behaviors and whether abstinence mediates the effects of EMA, EMI, or EMA + EMI on HIV risk behaviors. This project will enable the field to learn more about the effects of EMAs and EMIs on substance use disorders and HIV risk behaviors, an understanding that could potentially make treatment and recovery more effective and more widely accessible. ClinicalTrials.gov, ID: NCT02132481 . Registered on 5 May 2014.
ERIC Educational Resources Information Center
Benner, Gregory J.; Nelson, J. Ron; Sanders, Elizabeth A.; Ralston, Nicole C.
2012-01-01
This article examined the efficacy of a primary-level, standard-protocol behavior intervention for students with externalizing behavioral disorders. Elementary schools were randomly assigned to treatment (behavior intervention) or control (business as usual) conditions, and K-3 students were screened for externalizing behavior risk status. The…
A MORE COST-EFFECTIVE EMAP-ESTUARIES BENTHIC MACROFAUNAL SAMPLING PROTOCOL
The standard benthic macrofaunal sampling protocol in the U.S. Environmental Protection Agency's Pacific Coast Environmental Monitoring and Assessment Program (EMAP) is to collect a minimum of 30 random benthic samples per reporting unit (e.g., estuary) using a 0.1 m2 grab and to...
A MORE COST-EFFECTIVE EMAP BENTHIC MACROFAUNAL SAMPLING PROTOCOL
Benthic macrofaunal sampling protocols in the U.S. Environmental Protection Agency's Environmental Monitoring and Assessment Program (EMAP) are to collect 30 to 50 random benthic macrofauna [defined as animals retained on a 0.5 mm (East and Gulf Coasts, USA) or a 1.0 mm mesh siev...
Dos Santos, Raquel Rodrigues; Niquini, Roberta Pereira; Bastos, Francisco Inácio; Domingues, Rosa Maria Soares Madeira
2017-01-01
The study aimed to assess conformity with Brazil's standard protocol for diagnostic and therapeutic practices in the management of congenital syphilis by pediatricians in public maternity hospitals. A cross-sectional study was conducted in 2015 with 41 pediatricians working in all the public maternity hospitals in Teresina, the capital of Piauí State, Northeast Brazil, through self-completed questionnaires. The study assessed the conformity of knowledge and practices according to the Brazilian Ministry of Health protocols. The study has made evident low access to training courses (54%) and insufficient knowledge of the case definition of congenital syphilis (42%) and rapid tests for syphilis (39%). Flaws were observed in the diagnostic workup and treatment of newborns. Requesting VDRL (88%) and correct treatment of neurosyphilis (88%) were the practices that showed the highest conformity with standard protocols. Low conformity with protocols leads to missed opportunities for identifying and adequately treating congenital syphilis. Based on the barriers identified in the study, better access to diagnostic and treatment protocols, improved recording on prenatal cards and hospital patient charts, availability of tests and medicines, and educational work with pregnant women should be urgently implemented, aiming to reverse the currently inadequate management of congenital syphilis and to curb its spread.
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.