Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality
ERIC Educational Resources Information Center
Schumacher, Gary; Grigsby, Bettye; Vesey, Winona
2011-01-01
This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…
A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
2016-06-01
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.
A Survey on Underwater Acoustic Sensor Network Routing Protocols.
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-03-22
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.
A Survey on Underwater Acoustic Sensor Network Routing Protocols
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-01-01
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.
Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C
Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Rosser, B R Simon; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-04-24
While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. This paper reports the challenges of survey validation inherent in a small Web-based health survey research. The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. ©James Dewitt, Benjamin Capistrant, Nidhi Kohli, B R Simon Rosser, Darryl Mitteldorf, Enyinnaya Merengwa, William West. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.04.2018.
Tersmette, Derek Gideon; Engberts, Dirk Peter
2017-01-01
The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.
Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole
2017-07-31
This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.
Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-05-18
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.
Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-01-01
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-01-01
Background While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. Objective This paper reports the challenges of survey validation inherent in a small Web-based health survey research. Methods The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Results Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Conclusions Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. PMID:29691203
Microbiological Research Under the Nagoya Protocol: Facts and Fiction.
Overmann, Jörg; Scholz, Amber Hartman
2017-02-01
The Nagoya Protocol is based on concepts of biological diversity that are hardly applicable to microorganisms. Because of this incongruence, the Nagoya Protocol threatens future microbial research, potentially defeating its original purpose. Countries with appropriate regulations can promote science and their bioeconomy through international collaboration and simultaneously gain a competitive advantage. Copyright © 2016 Elsevier Ltd. All rights reserved.
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
So you think you've designed an effective recruitment protocol?
Green, Cara; Vandall-Walker, Virginia
2017-03-22
Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.
Motor-based intervention protocols in treatment of childhood apraxia of speech (CAS)
Maas, Edwin; Gildersleeve-Neumann, Christina; Jakielski, Kathy J.; Stoeckel, Ruth
2014-01-01
This paper reviews current trends in treatment for childhood apraxia of speech (CAS), with a particular emphasis on motor-based intervention protocols. The paper first briefly discusses how CAS fits into the typology of speech sound disorders, followed by a discussion of the potential relevance of principles derived from the motor learning literature for CAS treatment. Next, different motor-based treatment protocols are reviewed, along with their evidence base. The paper concludes with a summary and discussion of future research needs. PMID:25313348
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks
NASA Astrophysics Data System (ADS)
Kim, Chayoung; Ahn, Jinho
In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.
A kind of universal quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol.
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-12
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
Quantum private query based on single-photon interference
NASA Astrophysics Data System (ADS)
Xu, Sheng-Wei; Sun, Ying; Lin, Song
2016-08-01
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
Instruments for Assessment of Instructional Practices in Standards-Based Teaching
NASA Astrophysics Data System (ADS)
Wainwright, Camille L.
2006-12-01
This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.
A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.
Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan
2017-11-01
Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.
García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime
2018-03-27
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.
2018-01-01
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen’s d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach. PMID:29584703
Multiparty Quantum Key Agreement Based on Quantum Search Algorithm
Cao, Hao; Ma, Wenping
2017-01-01
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610
A Transcription and Translation Protocol for Sensitive Cross-Cultural Team Research.
Clark, Lauren; Birkhead, Ana Sanchez; Fernandez, Cecilia; Egger, Marlene J
2017-10-01
Assurance of transcript accuracy and quality in interview-based qualitative research is foundational for data accuracy and study validity. Based on our experience in a cross-cultural ethnographic study of women's pelvic organ prolapse, we provide practical guidance to set up step-by-step interview transcription and translation protocols for team-based research on sensitive topics. Beginning with team decisions about level of detail in transcription, completeness, and accuracy, we operationalize the process of securing vendors to deliver the required quality of transcription and translation. We also share rubrics for assessing transcript quality and the team protocol for managing transcripts (assuring consistency of format, insertion of metadata, anonymization, and file labeling conventions) and procuring an acceptable initial translation of Spanish-language interviews. Accurate, complete, and systematically constructed transcripts in both source and target languages respond to the call for more transparency and reproducibility of scientific methods.
Martins Pereira, Sandra; de Sá Brandão, Patrícia Joana; Araújo, Joana; Carvalho, Ana Sofia
2017-01-01
Introduction Antimicrobial resistance (AMR) is a challenging global and public health issue, raising bioethical challenges, considerations and strategies. Objectives This research protocol presents a conceptual model leading to formulating an empirically based bioethics framework for antibiotic use, AMR and designing ethically robust strategies to protect human health. Methods Mixed methods research will be used and operationalized into five substudies. The bioethical framework will encompass and integrate two theoretical models: global bioethics and ethical decision-making. Results Being a study protocol, this article reports on planned and ongoing research. Conclusions Based on data collection, future findings and using a comprehensive, integrative, evidence-based approach, a step-by-step bioethical framework will be developed for (i) responsible use of antibiotics in healthcare and (ii) design of strategies to decrease AMR. This will entail the analysis and interpretation of approaches from several bioethical theories, including deontological and consequentialist approaches, and the implications of uncertainty to these approaches. PMID:28459355
Rosser, B. R. Simon; Kilian, Gunna; West, William G.
2012-01-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted. PMID:23565067
Rosser, B R Simon; Kilian, Gunna; West, William G
2013-03-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted.
Evaluating the Process of Generating a Clinical Trial Protocol
Franciosi, Lui G.; Butterfield, Noam N.; MacLeod, Bernard A.
2002-01-01
The research protocol is the principal document in the conduct of a clinical trial. Its generation requires knowledge about the research problem, the potential experimental confounders, and the relevant Good Clinical Practices for conducting the trial. However, such information is not always available to authors during the writing process. A checklist of over 80 items has been developed to better understand the considerations made by authors in generating a protocol. It is based on the most cited requirements for designing and implementing the randomised controlled trial. Items are categorised according to the trial's research question, experimental design, statistics, ethics, and standard operating procedures. This quality assessment tool evaluates the extent that a generated protocol deviates from the best-planned clinical trial.
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Goal-setting protocol in adherence to exercise by Italian adults.
Annesi, James J
2002-04-01
A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (p<.0001). Suggestions for increasing confidence in findings through further research and practical implications of using the protocol to improve exercise maintenance across settings were discussed.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.
Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan
2015-09-22
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.
Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T
2016-11-01
The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.
Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.
Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel
2006-02-01
Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.
Meyer, Markus; Donsa, Klaus; Truskaller, Thomas; Frohner, Matthias; Pohn, Birgit; Felfernig, Alexander; Sinner, Frank; Pieber, Thomas
2018-01-01
A fast and accurate data transmission from glucose meter to clinical decision support systems (CDSSs) is crucial for the management of type 2 diabetes mellitus since almost all therapeutic interventions are derived from glucose measurements. Aim was to develop a prototype of an automated glucose measurement transmission protocol based on the Continua Design Guidelines and to embed the protocol into a CDSS used by healthcare professionals. A literature and market research was performed to analyze the state-of-the-art and thereupon develop, integrate and validate an automated glucose measurement transmission protocol in an iterative process. Findings from literature and market research guided towards the development of a standardized glucose measurement transmission protocol using a middleware. The interface description to communicate with the glucose meter was illustrated and embedded into a CDSS. A prototype of an interoperable transmission of glucose measurements was developed and implemented in a CDSS presenting a promising way to reduce medication errors and improve user satisfaction.
Berger, Cezar; Freitas, Renato; Malafaia, Osvaldo; Pinto, José Simão de Paula; Mocellin, Marcos; Macedo, Evaldo; Fagundes, Marina Serrato Coelho
2012-01-01
Summary Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1) preparation of theoretical data bases; (2) creation of a master protocol using Integrated System of Electronic Protocol (SINPE©); and (3) elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty) were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty. PMID:25991979
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
NASA Technical Reports Server (NTRS)
Powell, John D.
2003-01-01
This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-01-01
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-06-17
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.
Rehfuess, Eva A; Durão, Solange; Kyamanywa, Patrick; Meerpohl, Joerg J; Young, Taryn; Rohwer, Anke
2016-04-01
To derive evidence-based and stakeholder-informed research priorities for implementation in African settings, the international research consortium Collaboration for Evidence-Based Healthcare and Public Health in Africa (CEBHA+) developed and applied a pragmatic approach. First, an online survey and face-to-face consultation between CEBHA+ partners and policy-makers generated priority research areas. Second, evidence maps for these priority research areas identified gaps and related priority research questions. Finally, study protocols were developed for inclusion within a grant proposal. Policy and practice representatives were involved throughout the process. Tuberculosis, diabetes, hypertension and road traffic injuries were selected as priority research areas. Evidence maps covered screening and models of care for diabetes and hypertension, population-level prevention of diabetes and hypertension and their risk factors, and prevention and management of road traffic injuries. Analysis of these maps yielded three priority research questions on hypertension and diabetes and one on road traffic injuries. The four resulting study protocols employ a broad range of primary and secondary research methods; a fifth promotes an integrated methodological approach across all research activities. The CEBHA+ approach, in particular evidence mapping, helped to formulate research questions and study protocols that would be owned by African partners, fill gaps in the evidence base, address policy and practice needs and be feasible given the existing research infrastructure and expertise. The consortium believes that the continuous involvement of decision-makers throughout the research process is an important means of ensuring that studies are relevant to the African context and that findings are rapidly implemented.
Using semantics for representing experimental protocols.
Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar
2017-11-13
An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .
van Lent, Marlies; Rongen, Gerard A; Out, Henk J
2014-12-10
Submission of study protocols to research ethics committees (RECs) constitutes one of the earliest stages at which planned trials are documented in detail. Previous studies have investigated the amendments requested from researchers by RECs, but the type of issues raised during REC review have not been compared by sponsor type. The objective of this study was to identify recurring shortcomings in protocols of drug trials based on REC comments and to assess whether these were more common among industry-sponsored or non-industry trials. Retrospective analysis of 226 protocols of drug trials approved in 2010-2011 by three RECs affiliated to academic medical centres in The Netherlands. For each protocol, information on sponsorship, number of participating centres, participating countries, study phase, registration status of the study drug, and type and number of subjects was retrieved. REC comments were extracted from decision letters sent to investigators after review and were classified using a predefined checklist that was based on legislation and guidelines on clinical drug research and previous literature. Most protocols received comments regarding participant information and consent forms (n = 182, 80.5%), methodology and statistical analyses (n = 160, 70.8%), and supporting documentation, including trial agreements and certificates of insurance (n = 154, 68.1%). Of the submitted protocols, 122 (54.0%) were non-industry and 104 (46.0%) were industry-sponsored trials. Non-industry trials more often received comments on subject selection (n = 44, 36.1%) than industry-sponsored trials (n = 18, 17.3%; RR, 1.58; 95% CI, 1.01 to 2.47), and on methodology and statistical analyses (n = 95, 77.9% versus n = 65, 62.5%, respectively; RR, 1.18; 95% CI, 1.01 to 1.37). Non-industry trials less often received comments on supporting documentation (n = 72, 59.0%) than industry-sponsored trials (n = 82, 78.8%; RR, 0.83; 95% CI, 0.72 to 0.95). RECs identified important ethical and methodological shortcomings in protocols of both industry-sponsored and non-industry drug trials. Investigators, especially of non-industry trials, should better prepare their research protocols in order to facilitate the ethical review process.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things
Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan
2015-01-01
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683
Two-party quantum key agreement protocols under collective noise channel
NASA Astrophysics Data System (ADS)
Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong
2018-06-01
Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.
ASCOT: a text mining-based web-service for efficient search and assisted creation of clinical trials
2012-01-01
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols. PMID:22595088
Korkontzelos, Ioannis; Mu, Tingting; Ananiadou, Sophia
2012-04-30
Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols.
The use of participant-observation protocol in an industrial engineering research.
Silveira e Silva, Renato da; Sznelwar, Laerte Idal; D'Afonseca e Silva, Victor
2012-01-01
Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.
NASA Astrophysics Data System (ADS)
Balcerzyk, Marcin; Fernández-López, Rosa; Parrado-Gallego, Ángel; Pachón-Garrudo, Víctor Manuel; Chavero-Royan, José; Hevilla, Juan; Jiménez-Ortega, Elisa; Leal, Antonio
2017-11-01
Tumour uptake value is a critical result in [18F]FDG-PET/CT ([18F]fluorodeoxyglucose) quantitative scans such as the dose prescription for radiotherapy and oncology. The quantification is highly dependent on the protocol of acquisition and reconstruction of the image, especially in low activity tumours. During adjusting acquisition and reconstruction protocols available in our Siemens Biograph mCT scanner for EARL (ResEARch 4 Life®) [18F]FDG-PET/CT accreditation requirements, we developed reconstruction protocols which will be used in PET based radiotherapy planning able to reduce inter-/intra-institute variability in Standard Uptake Value (SUV) results, and to bring Recovery Coefficient to 1 as close as possible for Image Quality NEMA 2007 phantom. Primary and secondary tumours from two patients were assessed by four independent evaluators. The influence of reconstruction protocols on tumour clinical assessment was presented. We proposed the improvement route for EARL accredited protocols so that they may be developed in classes to take advantage of scanner possibilities. The application of optimized reconstruction protocol eliminates the need of partial volume corrections.
Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi
2017-01-01
Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577
Afshari, Amirali; Uhde-Stone, Claudia; Lu, Biao
2015-03-13
Luciferase assay has become an increasingly important technique to monitor a wide range of biological processes. However, the mainstay protocols require a luminometer to acquire and process the data, therefore limiting its application to specialized research labs. To overcome this limitation, we have developed an alternative protocol that utilizes a commonly available cooled charge-coupled device (CCCD), instead of a luminometer for data acquiring and processing. By measuring activities of different luciferases, we characterized their substrate specificity, assay linearity, signal-to-noise levels, and fold-changes via CCCD. Next, we defined the assay parameters that are critical for appropriate use of CCCD for different luciferases. To demonstrate the usefulness in cultured mammalian cells, we conducted a case study to examine NFκB gene activation in response to inflammatory signals in human embryonic kidney cells (HEK293 cells). We found that data collected by CCCD camera was equivalent to those acquired by luminometer, thus validating the assay protocol. In comparison, The CCCD-based protocol is readily amenable to live-cell and high-throughput applications, offering fast simultaneous data acquisition and visual and quantitative data presentation. In conclusion, the CCCD-based protocol provides a useful alternative for monitoring luciferase reporters. The wide availability of CCCD will enable more researchers to use luciferases to monitor and quantify biological processes. Copyright © 2015 Elsevier Inc. All rights reserved.
Scalability enhancement of AODV using local link repairing
NASA Astrophysics Data System (ADS)
Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.
2014-09-01
Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.
Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.
Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang
2014-09-01
RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.
Debruyne, Philip R; Johnson, Philip J; Pottel, Lies; Daniels, Susanna; Greer, Rachel; Hodgkinson, Elizabeth; Kelly, Stephen; Lycke, Michelle; Samol, Jens; Mason, Julie; Kimber, Donna; Loucaides, Eileen; Parmar, Mahesh Kb; Harvey, Sally
2015-06-01
Clarity and accuracy of the pharmacy aspects of cancer clinical trial protocols is essential. Inconsistencies and ambiguities in such protocols have the potential to delay research and jeopardise both patient safety and collection of credible data. The Chemotherapy and Pharmacy Advisory Service was established by the UK National Cancer Research Network, currently known as National Institute for Health Research Clinical Research Network, to improve the quality of pharmacy-related content in cancer clinical research protocols. This article reports the scope of Chemotherapy and Pharmacy Advisory Service, its methodology of mandated protocol review and pharmacy-related guidance initiatives and its current impact. Over a 6-year period (2008-2013) since the inception of Chemotherapy and Pharmacy Advisory Service, cancer clinical trial protocols were reviewed by the service, prior to implementation at clinical trial sites. A customised Review Checklist was developed and used by a panel of experts to standardise the review process and report back queries and inconsistencies to chief investigators. Based on common queries, a Standard Protocol Template comprising specific guidance on drug-related content and a Pharmacy Manual Template were developed. In addition, a guidance framework was established to address 'ad hoc' pharmacy-related queries. The most common remarks made at protocol review have been summarised and categorised through retrospective analysis. In order to evaluate the impact of the service, chief investigators were asked to respond to queries made at protocol review and make appropriate changes to their protocols. Responses from chief investigators have been collated and acceptance rates determined. A total of 176 protocols were reviewed. The median number of remarks per protocol was 26, of which 20 were deemed clinically relevant and mainly concerned the drug regimen, support medication, frequency and type of monitoring and drug supply aspects. Further analysis revealed that 62% of chief investigators responded to the review. All responses were positive with an overall acceptance rate of 89% of the proposed protocol changes. Review of pharmacy content of cancer clinical trial protocols is feasible and exposes many undetected clinically relevant issues that could hinder efficient trial conduct. Our service audit revealed that the majority of suggestions were effectively incorporated in the final protocols. The refinement of existing and development of new pharmacy-related guidance documents by Chemotherapy and Pharmacy Advisory Service might aid in better and safer clinical research. © The Author(s) 2015.
ERIC Educational Resources Information Center
Birch & Davis Associates, Inc., Silver Spring, MD.
A substantial knowledge base exists on reduction of tobacco use by youth. Effective prevention in this area can have major health and economic benefits. Information from research and prevention practice, organized by means of the Prevention Enhancement Protocols System (PEPS), is provided in the form of guidelines and recommendations for planning…
Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"
NASA Astrophysics Data System (ADS)
Gu, Jun; Hwang, Tzonelih
2017-10-01
Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.
Stirman, Shannon Wiltsey; Gamarra, Jennifer; Bartlett, Brooke; Calloway, Amber; Gutner, Cassidy
2017-12-01
This review describes methods used to examine the modifications and adaptations to evidence-based psychological treatments (EBPTs), assesses what is known about the impact of modifications and adaptations to EBPTs, and makes recommendations for future research and clinical care. One hundred eight primary studies and three meta-analyses were identified. All studies examined planned adaptations, and many simultaneously investigated multiple types of adaptations. With the exception of studies on adding or removing specific EBPT elements, few studies compared adapted EBPTs to the original protocols. There was little evidence that adaptations in the studies were detrimental, but there was also limited consistent evidence that adapted protocols outperformed the original protocols, with the exception of adding components to EBPTs. Implications for EBPT delivery and future research are discussed.
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications
NASA Technical Reports Server (NTRS)
Carek, David A.
2005-01-01
This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.
EON: a component-based approach to automation of protocol-directed therapy.
Musen, M A; Tu, S W; Das, A K; Shahar, Y
1996-01-01
Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854
Method-centered digital communities on protocols.io for fast-paced scientific innovation.
Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L
2016-01-01
The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs. This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field. The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.
Organizational principles of cloud storage to support collaborative biomedical research.
Kanbar, Lara J; Shalish, Wissam; Robles-Rubio, Carlos A; Precup, Doina; Brown, Karen; Sant'Anna, Guilherme M; Kearney, Robert E
2015-08-01
This paper describes organizational guidelines and an anonymization protocol for the management of sensitive information in interdisciplinary, multi-institutional studies with multiple collaborators. This protocol is flexible, automated, and suitable for use in cloud-based projects as well as for publication of supplementary information in journal papers. A sample implementation of the anonymization protocol is illustrated for an ongoing study dealing with Automated Prediction of EXtubation readiness (APEX).
Practice guidelines for music interventions with hospitalized pediatric patients.
Stouffer, Janice W; Shirk, Beverly J; Polomano, Rosemary C
2007-12-01
Music therapy is an effective complementary approach that can achieve specific therapeutic outcomes in the clinical management of pediatric patients. Growing research on music interventions has generated scientific knowledge about how this modality benefits patients and has formed the basis for effective protocols that can be used in practice. Although it can be challenging to translate research-based protocols into routine clinical care at the bedside, it is essential that music therapy interventions be aligned with evidence-based information and that accepted standards be established by the music therapy discipline to achieve the greatest benefit. The importance of partnerships between nurses and music therapists is emphasized to enhance the success of music-based treatments. This discussion synthesizes research findings that can be used to design pediatric practice guidelines in the application of music therapy.
How to design and write a clinical research protocol in Cosmetic Dermatology*
Bagatin, Ediléia; Miot, Helio A.
2013-01-01
Cosmetic Dermatology is a growing subspecialty. High-quality basic science studies have been published; however, few double-blind, randomized controlled clinical trials, which are the major instrument for evidence-based medicine, have been conducted in this area. Clinical research is essential for the discovery of new knowledge, improvement of scientific basis, resolution of challenges, and good clinical practice. Some basic principles for a successful researcher include interest, availability, persistence, and honesty. It is essential to learn how to write a protocol research and to know the international and national regulatory rules. A complete clinical trial protocol should include question, background, objectives, methodology (design, variable description, sample size, randomization, inclusion and exclusion criteria, intervention, efficacy and safety measures, and statistical analysis), consent form, clinical research form, and references. Institutional ethical review board approval and financial support disclosure are necessary. Publication of positive or negative results should be an authors' commitment. PMID:23539006
Space Internet-Embedded Web Technologies Demonstration
NASA Technical Reports Server (NTRS)
Foltz, David A.
2001-01-01
The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.
Al Mamoon, Ishtiak; Muzahidul Islam, A K M; Baharun, Sabariah; Ahmed, Ashir; Komaki, Shozo
2016-08-01
Due to the rapid growth of wireless medical devices in near future, wireless healthcare services may face some inescapable issue such as medical spectrum scarcity, electromagnetic interference (EMI), bandwidth constraint, security and finally medical data communication model. To mitigate these issues, cognitive radio (CR) or opportunistic radio network enabled wireless technology is suitable for the upcoming wireless healthcare system. The up-to-date research on CR based healthcare has exposed some developments on EMI and spectrum problems. However, the investigation recommendation on system design and network model for CR enabled hospital is rare. Thus, this research designs a hierarchy based hybrid network architecture and network maintenance protocols for previously proposed CR hospital system, known as CogMed. In the previous study, the detail architecture of CogMed and its maintenance protocols were not present. The proposed architecture includes clustering concepts for cognitive base stations and non-medical devices. Two cluster head (CH selector equations are formulated based on priority of location, device, mobility rate of devices and number of accessible channels. In order to maintain the integrity of the proposed network model, node joining and node leaving protocols are also proposed. Finally, the simulation results show that the proposed network maintenance time is very low for emergency medical devices (average maintenance period 9.5 ms) and the re-clustering effects for different mobility enabled non-medical devices are also balanced.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Aristizabal, Paula; Singer, Jenelle; Cooper, Renee; Wells, Kristen J.; Nodora, Jesse; Milburn, Mehrzad; Gahagan, Sheila; Schiff, Deborah E.; Martinez, Maria Elena
2015-01-01
Background Survival rates in pediatric oncology have improved dramatically, in part due to high patient participation in clinical trials. Although racial/ethnic inequalities in clinical trial participation have been reported in adults, pediatric data and studies comparing participation rates by socio-demographic characteristics are scarce. The goal of this study was to assess differences in research protocol participation for childhood cancer by age, sex, race/ethnicity, parental language, cancer type and insurance status. Procedure Data on enrollment in any protocol, biospecimen, or therapeutic protocols were collected and analyzed for newly diagnosed pediatric patients with cancer from 2008–2012 at Rady Children’s Hospital. Results Among the 353 patients included in the analysis, 304 (86.1%) were enrolled in any protocol. Enrollment in biospecimen and therapeutic protocols was 84.2% (261/310) and 81.1% (206/254), respectively. Logistic regression analyses revealed significant enrollment underrepresentation in any protocol for Hispanics compared to Non-Hispanic whites (81% vs. 91%; Odds Ratio [OR], 0.43; 95% Confidence Interval [CI], 0.21–0.90; p=0.021) and among children of Spanish-speaking vs. English-speaking parents (78% vs. 89%; OR, 0.45; 95%CI, 0.23–0.87; p=0.016). Compared to patients aged 0–4 years, significant underrepresentation was also found among patients 15–21 years old (92% vs.72%; OR, 0.21; 95% CI, 0.09–0.48; p<0.001). Similar trends were observed when analyzing enrollment in biospecimen and therapeutic protocols separately. Conclusions There was significant underrepresentation in protocol participation for Hispanics, children of Spanish-speaking parents, and patients ages 15–21. Research is urgently needed to understand barriers to research participation among these groups underrepresented in pediatric oncology clinical trials. PMID:25755225
Schmidt, Olga; Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology - Indonesian Institute of Sciences (RCB-LIPI, Bogor).
Khan, Imtiaz A; Fraser, Adam; Bray, Mark-Anthony; Smith, Paul J; White, Nick S; Carpenter, Anne E; Errington, Rachel J
2014-12-01
Experimental reproducibility is fundamental to the progress of science. Irreproducible research decreases the efficiency of basic biological research and drug discovery and impedes experimental data reuse. A major contributing factor to irreproducibility is difficulty in interpreting complex experimental methodologies and designs from written text and in assessing variations among different experiments. Current bioinformatics initiatives either are focused on computational research reproducibility (i.e. data analysis) or laboratory information management systems. Here, we present a software tool, ProtocolNavigator, which addresses the largely overlooked challenges of interpretation and assessment. It provides a biologist-friendly open-source emulation-based tool for designing, documenting and reproducing biological experiments. ProtocolNavigator was implemented in Python 2.7, using the wx module to build the graphical user interface. It is a platform-independent software and freely available from http://protocolnavigator.org/index.html under the GPL v2 license. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Fussell, Holly E; Kunkel, Lynn E; McCarty, Dennis; Lewy, Colleen S
2011-09-01
Training research staff to implement clinical trials occurring in community-based addiction treatment programs presents unique challenges. Standardized patient walkthroughs of study procedures may enhance training and protocol implementation. Examine and discuss cross-site and cross-study challenges of participant screening and data collection procedures identified during standardized patient walkthroughs of multi-site clinical trials. Actors portrayed clients and "walked through" study procedures with protocol research staff. The study completed 57 walkthroughs during implementation of 4 clinical trials. Observers and walkthrough participants identified three areas of concern (consent procedures, screening and assessment processes, and protocol implementation) and made suggestions for resolving the concerns. Standardized patient walkthroughs capture issues with study procedures previously unidentified with didactic training or unscripted rehearsals. Clinical trials within the National Drug Abuse Treatment Clinical Trials Network are conducted in addiction treatment centers that vary on multiple dimensions. Based on walkthrough observations, the national protocol team and local site leadership modify standardized operating procedures and resolve cross-site problems prior to recruiting study participants. The standardized patient walkthrough improves consistency across study sites and reduces potential site variation in study outcomes.
Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.
Bista, Rabindra; Chang, Jae-Woo
2010-01-01
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.
SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised
NASA Technical Reports Server (NTRS)
Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.
2005-01-01
Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.
Abdel-Aal, Wafaa; Ghaffar, Esmat Abdel; El Shabrawy, Osama
2013-10-01
Globally, ethical issues in research are becoming of major importance, being well established in developed countries with little information about research ethics committees (RECs) in Africa to assess whether these committees are actually improving the protection of human research participants. To describe the establishment, structure, function, operations and outcome of the Medical Research Ethics Committee (MREC) of the National Research Center (NRC) of Egypt from 2003 to 2011. The committee established its regulatory rules for human and animal research ethics based on the Declaration of Helsinki 2000-2008 and WHO regulations 2000-2011. There were 974 protocols revised in the 7 years (2005-2011). The outcome of the committee discussions was to clear 262 of the protocols without conditions. A full 556 were cleared conditionally upon completion of modifications. Another 118 were deferred pending action and further consideration at a subsequent meeting. And 16 researchers did not reply, while 22 protocols were rejected. Since 2005, the MREC in NRC Egypt has built up considerable experience of evaluating the ethical issues arising within the field of medical research.
A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks.
Ogundile, Olayinka O; Alfa, Attahiru S
2017-05-10
Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks.
A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks
Ogundile, Olayinka O.; Alfa, Attahiru S.
2017-01-01
Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks. PMID:28489054
MR efficiency using automated MRI-desktop eProtocol
NASA Astrophysics Data System (ADS)
Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.
2017-03-01
MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis; Hylton, Alan; Ishac, Joseph
2012-01-01
Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.
Individualized music for dementia: Evolution and application of evidence-based protocol.
Gerdner, Linda A
2012-04-22
The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.
Individualized music for dementia: Evolution and application of evidence-based protocol
Gerdner, Linda A
2012-01-01
The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research. PMID:24175165
Privacy-Preserving Health Data Collection for Preschool Children
Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984
Privacy-preserving health data collection for preschool children.
Guan, Shaopeng; Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-06-05
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-01-01
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037
NASA Astrophysics Data System (ADS)
Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.
2017-06-01
Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.
Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Abstract Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology – Indonesian Institute of Sciences (RCB-LIPI, Bogor). PMID:29134041
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Nicholson, Emma; Murphy, Tara; Larkin, Philip; Normand, Charles; Guerin, Suzanne
2016-10-21
Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users. Preferred reporting items for systematic review and meta-analysis protocol guidelines will inform the search and analysis plan to ensure that the synthesis of the data is as rigorous as possible. An approach based on critical interpretative synthesis will be adapted to include a thematic synthesis for the identification of higher-order themes and messages from a body of dissemination products generated by the Palliative Care Research Network. The thematic synthesis outlined in the present protocol offers a novel method of synthesising data from a focused research network that employs a variety of dissemination materials as a means of identifying key themes and messages from a specific body of research. The high-level themes and messages will be identified from the thematic synthesis, widely disseminated and targeted towards a range of stakeholders and knowledge users such as carers, health and social care professionals, policy makers and researchers.
Experience with Delay-Tolerant Networking from Orbit
NASA Technical Reports Server (NTRS)
Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.
2010-01-01
We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol
A protocol of rope skipping exercise for primary school children: A pilot test
NASA Astrophysics Data System (ADS)
Radzi, A. N. M.; Rambely, A. S.; Chellapan, K.
2014-06-01
This paper aims to investigate the methods and sample used in rope skipping as an exercise approach. A systematic literature review was approached in identifying skipping performance in the related researches. The methods were compared to determine the best methodological approach for the targeted skipping based research measure. A pilot test was performed among seven students below 12 years old. As the outcome of the review, a skipping protocol design has been proposed for 10 years old primary school students. The proposed protocol design is to be submitted to PPUKM Ethical Committee for approval prior to its implementation in investigation memory enhancement in relation to designed skipping activities.
Sexing chick mRNA: A protocol based on quantitative real-time polymerase chain reaction.
Wan, Z; Lu, Y; Rui, L; Yu, X; Li, Z
2017-03-01
The accurate identification of sex in birds is important for research on avian sex determination and differentiation. Polymerase chain reaction (PCR)-based methods have been widely applied for the molecular sexing of birds. However, these methods have used genomic DNA. Here, we present the first sexing protocol for chick mRNA based on real-time quantitative PCR. We demonstrate that this method can accurately determine sex using mRNA from chick gonads and other tissues, such as heart, liver, spleen, lung, and muscle. The strategy of this protocol also may be suitable for other species in which sex is determined by the inheritance of sex chromosomes (ZZ male and ZW female). © 2016 Poultry Science Association Inc.
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-05-01
Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.
A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun
2014-04-01
Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-03-01
With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.
Research in DRM architecture based on watermarking and PKI
NASA Astrophysics Data System (ADS)
Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao
2005-02-01
Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.
2016-08-16
Force Research Laboratory Space Vehicles Directorate AFRL /RVSV 3550 Aberdeen Ave, SE 11. SPONSOR/MONITOR’S REPORT Kirtland AFB, NM 87117-5776 NUMBER...Ft Belvoir, VA 22060-6218 1 cy AFRL /RVIL Kirtland AFB, NM 87117-5776 2 cys Official Record Copy AFRL /RVSV/Richard S. Erwin 1 cy... AFRL -RV-PS- AFRL -RV-PS- TR-2016-0112 TR-2016-0112 SPECIFICATION, SYNTHESIS, AND VERIFICATION OF SOFTWARE-BASED CONTROL PROTOCOLS FOR FAULT-TOLERANT
ERIC Educational Resources Information Center
Arthanat, Sajay; Curtin, Christine; Kontak, David
2015-01-01
Mainstream technologies are widely being employed in inclusive and special education classrooms to accommodate the learning needs of students. As the evidence of their effectiveness evolves, educators and school-based therapists need tools and documentable strategies for their implementation. This research presents an evaluation protocol to guide…
ERIC Educational Resources Information Center
Wahid, Wazira Ali Abdul; Ahmed, Eqbal Sulaiman; Wahid, Muntaha Ali Abdul
2015-01-01
This issue expresses a research study based on the online interactions of English teaching specially conversation through utilizing VOIP (Voice over Internet Protocol) and cosmopolitan online theme. Data has been achieved by interviews. Simplifiers indicate how oral tasks require to be planned upon to facilitate engagement models propitious to…
Lin, Chinsu; Thomson, Gavin; Hung, Shih-Hsiang; Lin, Yu-Dung
2012-12-30
This study introduces a GIS-based protocol for the simulation and evaluation of thinning treatments in recreational forest management. The protocol was implemented in a research study based on an area of recreational forest in Alishan National Scenic Area, Taiwan. Ground survey data were mapped to a GIS database, to create a precise, yet flexible, GIS-based digital forest. The digital forest model was used to generate 18 different thinning scenario images and one image of the existing unthinned forest. A questionnaire was completed by 456 participants while simultaneously viewing the scenario images. The questionnaire was used to determine the scenic beauty preferences of the respondents. Statistical analysis of the data revealed that the respondents preferred low density, upper-storey thinning treatments and a dispersed retention pattern of the remaining trees. High density upper-storey treatments evoked a strongly negative reaction in the observers. The experiment demonstrated that the proposed protocol is suitable for selecting an appropriate thinning strategy for recreational forest and that the protocol has practical value in recreational forest management. Copyright © 2012 Elsevier Ltd. All rights reserved.
Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M.; Browning, David J.; Chalam, KV; Davis, Matthew; Ferris, Frederick L; Glassman, Adam; Maturi, Raj; Stockdale, Cynthia R.; Topping, Trexler
2011-01-01
Objective Describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Design Discussion of treatment protocol for DME. Participants Subjects with vision loss from DME involving the center of the macula. Methods The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser in eyes with vision loss from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes, compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. In order to share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Main Outcome Measures Clinical guidelines based on a DRCR.net protocol. Results The treatment protocol required real time feedback from a web-based data entry system for intravitreal injections, focal/grid laser, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month, or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Conclusions Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. PMID:22136692
Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M; Browning, David J; Chalam, K V; Davis, Matthew; Ferris, Frederick L; Glassman, Adam R; Maturi, Raj K; Stockdale, Cynthia R; Topping, Trexler M
2011-12-01
To describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Discussion of treatment protocol for DME. Subjects with vision loss resulting from DME involving the center of the macula. The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser treatment in eyes with vision loss resulting from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. To share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Clinical guidelines based on a DRCR.net protocol. The treatment protocol required real-time feedback from a web-based data entry system for intravitreal injections, focal/grid laser treatment, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. Proprietary or commercial disclosure may be found after the references. Copyright © 2011 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Magazzù, G.; Borgese, G.; Costantino, N.; Fanucci, L.; Incandela, J.; Saponara, S.
2013-02-01
In many research fields as high energy physics (HEP), astrophysics, nuclear medicine or space engineering with harsh operating conditions, the use of fast and flexible digital communication protocols is becoming more and more important. The possibility to have a smart and tested top-down design flow for the design of a new protocol for control/readout of front-end electronics is very useful. To this aim, and to reduce development time, costs and risks, this paper describes an innovative design/verification flow applied as example case study to a new communication protocol called FF-LYNX. After the description of the main FF-LYNX features, the paper presents: the definition of a parametric SystemC-based Integrated Simulation Environment (ISE) for high-level protocol definition and validation; the set up of figure of merits to drive the design space exploration; the use of ISE for early analysis of the achievable performances when adopting the new communication protocol and its interfaces for a new (or upgraded) physics experiment; the design of VHDL IP cores for the TX and RX protocol interfaces; their implementation on a FPGA-based emulator for functional verification and finally the modification of the FPGA-based emulator for testing the ASIC chipset which implements the rad-tolerant protocol interfaces. For every step, significant results will be shown to underline the usefulness of this design and verification approach that can be applied to any new digital protocol development for smart detectors in physics experiments.
2014-01-01
Background Next-generation DNA sequencing (NGS) technologies have made huge impacts in many fields of biological research, but especially in evolutionary biology. One area where NGS has shown potential is for high-throughput sequencing of complete mtDNA genomes (of humans and other animals). Despite the increasing use of NGS technologies and a better appreciation of their importance in answering biological questions, there remain significant obstacles to the successful implementation of NGS-based projects, especially for new users. Results Here we present an ‘A to Z’ protocol for obtaining complete human mitochondrial (mtDNA) genomes – from DNA extraction to consensus sequence. Although designed for use on humans, this protocol could also be used to sequence small, organellar genomes from other species, and also nuclear loci. This protocol includes DNA extraction, PCR amplification, fragmentation of PCR products, barcoding of fragments, sequencing using the 454 GS FLX platform, and a complete bioinformatics pipeline (primer removal, reference-based mapping, output of coverage plots and SNP calling). Conclusions All steps in this protocol are designed to be straightforward to implement, especially for researchers who are undertaking next-generation sequencing for the first time. The molecular steps are scalable to large numbers (hundreds) of individuals and all steps post-DNA extraction can be carried out in 96-well plate format. Also, the protocol has been assembled so that individual ‘modules’ can be swapped out to suit available resources. PMID:24460871
Calvert, Melanie; Kyte, Derek; Mercieca-Bebber, Rebecca; Slade, Anita; Chan, An-Wen; King, Madeleine T; Hunn, Amanda; Bottomley, Andrew; Regnault, Antoine; Chan, An-Wen; Ells, Carolyn; O'Connor, Daniel; Revicki, Dennis; Patrick, Donald; Altman, Doug; Basch, Ethan; Velikova, Galina; Price, Gary; Draper, Heather; Blazeby, Jane; Scott, Jane; Coast, Joanna; Norquist, Josephine; Brown, Julia; Haywood, Kirstie; Johnson, Laura Lee; Campbell, Lisa; Frank, Lori; von Hildebrand, Maria; Brundage, Michael; Palmer, Michael; Kluetz, Paul; Stephens, Richard; Golub, Robert M; Mitchell, Sandra; Groves, Trish
2018-02-06
Patient-reported outcome (PRO) data from clinical trials can provide valuable evidence to inform shared decision making, labeling claims, clinical guidelines, and health policy; however, the PRO content of clinical trial protocols is often suboptimal. The SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) statement was published in 2013 and aims to improve the completeness of trial protocols by providing evidence-based recommendations for the minimum set of items to be addressed, but it does not provide PRO-specific guidance. To develop international, consensus-based, PRO-specific protocol guidance (the SPIRIT-PRO Extension). The SPIRIT-PRO Extension was developed following the Enhancing Quality and Transparency of Health Research (EQUATOR) Network's methodological framework for guideline development. This included (1) a systematic review of existing PRO-specific protocol guidance to generate a list of potential PRO-specific protocol items (published in 2014); (2) refinements to the list and removal of duplicate items by the International Society for Quality of Life Research (ISOQOL) Protocol Checklist Taskforce; (3) an international stakeholder survey of clinical trial research personnel, PRO methodologists, health economists, psychometricians, patient advocates, funders, industry representatives, journal editors, policy makers, ethicists, and researchers responsible for evidence synthesis (distributed by 38 international partner organizations in October 2016); (4) an international Delphi exercise (n = 137 invited; October 2016 to February 2017); and (5) consensus meeting (n = 30 invited; May 2017). Prior to voting, consensus meeting participants were informed of the results of the Delphi exercise and given data from structured reviews evaluating the PRO protocol content of 3 defined samples of trial protocols. The systematic review identified 162 PRO-specific protocol recommendations from 54 sources. The ISOQOL Taskforce (n = 21) reduced this to 56 items, which were considered by 138 international stakeholder survey participants and 99 Delphi panelists. The final wording of the SPIRIT-PRO Extension was agreed on at a consensus meeting (n = 29 participants) and reviewed by external group of experts during a consultation period. Eleven extensions and 5 elaborations to the SPIRIT 2013 checklist were recommended for inclusion in clinical trial protocols in which PROs are a primary or key secondary outcome. Extension items focused on PRO-specific issues relating to the trial rationale, objectives, eligibility criteria, concepts used to evaluate the intervention, time points for assessment, PRO instrument selection and measurement properties, data collection plan, translation to other languages, proxy completion, strategies to minimize missing data, and whether PRO data will be monitored during the study to inform clinical care. The SPIRIT-PRO guidelines provide recommendations for items that should be addressed and included in clinical trial protocols in which PROs are a primary or key secondary outcome. Improved design of clinical trials including PROs could help ensure high-quality data that may inform patient-centered care.
Research on TCP/IP network communication based on Node.js
NASA Astrophysics Data System (ADS)
Huang, Jing; Cai, Lixiong
2018-04-01
In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
A Protocol for Advanced Psychometric Assessment of Surveys
Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.
2013-01-01
Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759
Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654
Brasil, Raquel Ferreira Gomes; Silva, Maria Josefina da; Moura, Escolástica Rejane Ferreira
2018-01-01
To evaluate the quality of a clinical protocol for family planning care for people living with HIV/AIDS. An evaluative study based on the six domains of the Appraisal of Guidelines for Research & Evaluation II and on Pearson's Coefficient of Variation. The protocol reached between 88.8% and 100.0% quality in the domains of the Appraisal of Guidelines for Research & Evaluation II and 93.3% in the overall evaluation. The obtained Pearson's coefficient of variation was between zero and 18.6. Considering that a minimum percentage of 70.0% was adopted for the quality attributed by the evaluators, quality has been achieved for all domains of the Appraisal of Guidelines for Research & Evaluation II. As a coefficient for all domains was less than 25%, we can infer that the scores attributed by the evaluators were linear or homogeneous, meaning high agreement between them. The protocol was evaluated as a quality instrument, recommended for use by health professionals who deal with family planning for people living with HIV/AIDS.
A Balanced Protocol for Return to School for Children and Youth Following Concussive Injury.
DeMatteo, Carol; Stazyk, Kathy; Giglia, Lucy; Mahoney, William; Singh, Sheila K; Hollenberg, Robert; Harper, Jessica A; Missiuna, Cheryl; Law, Mary; McCauley, Dayle; Randall, Sarah
2015-07-01
Few protocols exist for returning children/youth to school after concussion. Childhood concussion can significantly affect school performance, which is vital to social development, academic learning, and preparation for future roles. The goal of this knowledge translation research was to develop evidence based materials to inform physicians about pediatric concussion. The Return to School (RTS) concussion protocol was developed following the National Institute for Health and Care Excellence procedures. Based on a scoping review, and stakeholder opinions, an RTS protocol was developed for children/youth. This unique protocol focuses on school adaptation in 4 main areas: (a) timetable/attendance, (b) curriculum, (c) environmental modifications, and (d) activity modifications. A balance of cognitive rest and timely return to school need to be considered for returning any student to school after a concussion. Implementation of these new recommendations may be an important tool in prevention of prolonged absence from school and academic failure while supporting brain recovery. © The Author(s) 2015.
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
21 CFR 1301.18 - Research protocols.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...
Protocol-based care: the standardisation of decision-making?
Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra
2009-05-01
To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as protocols and guidelines will likely be dependant on approaches that facilitate the development of nurses' decision-making processes in parallel to paying attention to the influence of context.
ERIC Educational Resources Information Center
Parent, Beth A.; Marbach-Ad, Gili; Swanson, Karen V.; Smith, Ann C.
2010-01-01
Scientific literature was used to give a research oriented context to our immunology lab course. Immunology lab, a senior level course (60 students/year) was formerly taught in a traditional mode, with exercises aimed at learning lab protocols. To engage students in understanding we connected the protocols to their use as reported in research…
ERIC Educational Resources Information Center
Biggers, Mandy Sue
2013-01-01
Using a framework for variations of classroom inquiry (National Research Council [NRC], 2000, p. 29), this study explored 40 inservice elementary teachers' planning, modification, and enactment of kit-based science curriculum materials. As part of the study, a new observation protocol was modified from an existing protocol (Practices of…
Forni, Cristiana; Chiari, Paolo; Guarino, Lorenza; Tremosini, Morena; Trofa, Carmela; D'Alessandro, Fabio; Sabattini, Tania; Mini, Sandra; Zanotti, Enrichetta
2014-01-01
In Italy research conducted by non medical professions is scarce also for the lack of knowledge on methods. At Rizzoli hospital in Bologna in 2006 a Centre for research to educate and support health professionals was implemented. To assess the impact of the research centre on number of research articles and protocols produced by nurses. Interrupted time series. In the five years before and after the implementation of the centre data on the number of protocols approved by Ethical Committee with a nurse as principal investigator and on the number of articles published on impacted journals with a nurse as first author were collected. The number of nurses authors of the publications was also collected. For all the variables an increasing trend, starting from 2006 was observed, with statistically significant differences from 2008 for the number of research protocols presented (p=0.037), the number of nurses authors of scientific articles (p=0.027). Although the number of publications on impacted journals increased from 2006, differences were not statistically significant after 2008. An hospital based Centre for education and support to research for health professionals may facilitate the scientific and research production.
Evaluation of Patient Handoff Methods on an Inpatient Teaching Service
Craig, Steven R.; Smith, Hayden L.; Downen, A. Matthew; Yost, W. John
2012-01-01
Background The patient handoff process can be a highly variable and unstructured period at risk for communication errors. The morning sign-in process used by resident physicians at teaching hospitals typically involves less rigorous handoff protocols than the resident evening sign-out process. Little research has been conducted on best practices for handoffs during morning sign-in exchanges between resident physicians. Research must evaluate optimal protocols for the resident morning sign-in process. Methods Three morning handoff protocols consisting of written, electronic, and face-to-face methods were implemented over 3 study phases during an academic year. Study participants included all interns covering the internal medicine inpatient teaching service at a tertiary hospital. Study measures entailed intern survey-based interviews analyzed for failures in handoff protocols with or without missed pertinent information. Descriptive and comparative analyses examined study phase differences. Results A scheduled face-to-face handoff process had the fewest protocol deviations and demonstrated best communication of essential patient care information between cross-covering teams compared to written and electronic sign-in protocols. Conclusion Intern patient handoffs were more reliable when the sign-in protocol included scheduled face-to-face meetings. This method provided the best communication of patient care information and allowed for open exchanges of information. PMID:23267259
DCBRP: a deterministic chain-based routing protocol for wireless sensor networks.
Marhoon, Haydar Abdulameer; Mahmuddin, M; Nor, Shahrudin Awang
2016-01-01
Wireless sensor networks (WSNs) are a promising area for both researchers and industry because of their various applications The sensor node expends the majority of its energy on communication with other nodes. Therefore, the routing protocol plays an important role in delivering network data while minimizing energy consumption as much as possible. The chain-based routing approach is superior to other approaches. However, chain-based routing protocols still expend substantial energy in the Chain Head (CH) node. In addition, these protocols also have the bottleneck issues. A novel routing protocol which is Deterministic Chain-Based Routing Protocol (DCBRP). DCBRP consists of three mechanisms: Backbone Construction Mechanism, Chain Head Selection (CHS), and the Next Hop Connection Mechanism. The CHS mechanism is presented in detail, and it is evaluated through comparison with the CCM and TSCP using an ns-3 simulator. It show that DCBRP outperforms both CCM and TSCP in terms of end-to-end delay by 19.3 and 65%, respectively, CH energy consumption by 18.3 and 23.0%, respectively, overall energy consumption by 23.7 and 31.4%, respectively, network lifetime by 22 and 38%, respectively, and the energy*delay metric by 44.85 and 77.54%, respectively. DCBRP can be used in any deterministic node deployment applications, such as smart cities or smart agriculture, to reduce energy depletion and prolong the lifetimes of WSNs.
Tross, Susan; Campbell, Aimee N. C.; Calsyn, Donald A.; Metsch, Lisa R.; Sorensen, James L.; Shoptaw, Steven; Haynes, Louise; Woody, George E.; Malow, Robert M.; Brown, Lawrence S.; Feaster, Daniel J.; Booth, Robert E.; Mandler, Raul N.; Masson, Carmen; Holmes, Beverly W.; Colfax, Grant; Brooks, Audrey J.; Hien, Denise A.; Schackman, Bruce R.; Korthuis, P. Todd; Miele, Gloria M.
2012-01-01
Background/Objectives HIV continues to be a significant problem among substance users and their sexual partners in the United States. The National Drug Abuse Treatment Clinical Trials Network (CTN) offers a national platform for effectiveness trials of HIV interventions in community substance abuse treatment programs. This article presents the HIV activities of the CTN during its first 10 years. Results While emphasizing CTN HIV protocols, this article reviews the (1) HIV context for this work; (2) the collaborative process among providers, researchers, and National Institute on Drug Abuse CTN staff, on which CTN HIV work was based; (3) results of CTN HIV protocols and HIV secondary analyses in CTN non-HIV protocols; and (4) implications for future HIV intervention effectiveness research in community substance abuse treatment programs. Conclusion/Significance While the feasibility of engaging frontline providers in this research is highlighted, the limitations of small to medium effect sizes and weak adoption and sustainability in everyday practice are also discussed. PMID:21854270
Tross, Susan; Campbell, Aimee N C; Calsyn, Donald A; Metsch, Lisa R; Sorensen, James L; Shoptaw, Steven; Haynes, Louise; Woody, George E; Malow, Robert M; Brown, Lawrence S; Feaster, Daniel J; Booth, Robert E; Mandler, Raul N; Masson, Carmen; Holmes, Beverly W; Colfax, Grant; Brooks, Audrey J; Hien, Denise A; Schackman, Bruce R; Korthuis, P Todd; Miele, Gloria M
2011-09-01
HIV continues to be a significant problem among substance users and their sexual partners in the United States. The National Drug Abuse Treatment Clinical Trials Network (CTN) offers a national platform for effectiveness trials of HIV interventions in community substance abuse treatment programs. This article presents the HIV activities of the CTN during its first 10 years. While emphasizing CTN HIV protocols, this article reviews the (1) HIV context for this work; (2) the collaborative process among providers, researchers, and National Institute on Drug Abuse CTN staff, on which CTN HIV work was based; (3) results of CTN HIV protocols and HIV secondary analyses in CTN non-HIV protocols; and (4) implications for future HIV intervention effectiveness research in community substance abuse treatment programs. While the feasibility of engaging frontline providers in this research is highlighted, the limitations of small to medium effect sizes and weak adoption and sustainability in everyday practice are also discussed.
Gilmore, Brynne; Adams, Ben Jack; Bartoloni, Alex; Alhaydar, Bana; McAuliffe, Eilish; Raven, Joanna; Taegtmeyer, Miriam; Vallières, Frédérique
2016-01-01
Introduction Understanding what enhances the motivation and performance of community health workers (CHWs) in humanitarian emergencies represents a key research gap within the field of human resources for health. This paper presents the research protocol for the Performance ImprovEment of CHWs in Emergency Settings (PIECES) research programme. Enhancing Learning and Research in Humanitarian Action (ELRHA) funded the development of this protocol as part of their Health in Humanitarian Crises (R2HC) call (No.19839). PIECES aims to understand what factors improve the performance of CHWs in level III humanitarian emergencies. Methods and analysis The suggested protocol uses a realist evaluation with multiple cases across the 3 country sites: Turkey, Iraq and Lebanon. Working with International Medical Corps (IMC), an initial programme theory was elicited through literature and document reviews, semistructured interviews and focus groups with IMC programme managers and CHWs. Based on this initial theory, this protocol proposes a combination of semistructured interviews, life histories and critical incident narratives, surveys and latent variable modelling of key constructs to explain how contextual factors work to trigger mechanisms for specific outcomes relating to IMC's 300+ CHWs' performance. Participants will also include programme staff, CHWs and programme beneficiaries. Realist approaches will be used to better understand ‘what works, for whom and under what conditions’ for improving CHW performance within humanitarian contexts. Ethics and dissemination Trinity College Dublin's Health Policy and Management/Centre for Global Health Research Ethics Committee gave ethical approval for the protocol development phase. For the full research project, additional ethical approval will be sought from: Université St. Joseph (Lebanon), the Ethics Committee of the Ministry of Health in Baghdad (Iraq) and the Middle East Technical University (Turkey). Dissemination activities will involve a mixture of research feedback, policy briefs, guidelines and recommendations, as well as open source academic articles. PMID:27531730
Gilmore, Brynne; Adams, Ben Jack; Bartoloni, Alex; Alhaydar, Bana; McAuliffe, Eilish; Raven, Joanna; Taegtmeyer, Miriam; Vallières, Frédérique
2016-08-16
Understanding what enhances the motivation and performance of community health workers (CHWs) in humanitarian emergencies represents a key research gap within the field of human resources for health. This paper presents the research protocol for the Performance ImprovEment of CHWs in Emergency Settings (PIECES) research programme. Enhancing Learning and Research in Humanitarian Action (ELRHA) funded the development of this protocol as part of their Health in Humanitarian Crises (R2HC) call (No.19839). PIECES aims to understand what factors improve the performance of CHWs in level III humanitarian emergencies. The suggested protocol uses a realist evaluation with multiple cases across the 3 country sites: Turkey, Iraq and Lebanon. Working with International Medical Corps (IMC), an initial programme theory was elicited through literature and document reviews, semistructured interviews and focus groups with IMC programme managers and CHWs. Based on this initial theory, this protocol proposes a combination of semistructured interviews, life histories and critical incident narratives, surveys and latent variable modelling of key constructs to explain how contextual factors work to trigger mechanisms for specific outcomes relating to IMC's 300+ CHWs' performance. Participants will also include programme staff, CHWs and programme beneficiaries. Realist approaches will be used to better understand 'what works, for whom and under what conditions' for improving CHW performance within humanitarian contexts. Trinity College Dublin's Health Policy and Management/Centre for Global Health Research Ethics Committee gave ethical approval for the protocol development phase. For the full research project, additional ethical approval will be sought from: Université St. Joseph (Lebanon), the Ethics Committee of the Ministry of Health in Baghdad (Iraq) and the Middle East Technical University (Turkey). Dissemination activities will involve a mixture of research feedback, policy briefs, guidelines and recommendations, as well as open source academic articles. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols
1985-12-01
official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their
A realistic evaluation: the case of protocol-based care
2010-01-01
Background 'Protocol based care' was envisioned by policy makers as a mechanism for delivering on the service improvement agenda in England. Realistic evaluation is an increasingly popular approach, but few published examples exist, particularly in implementation research. To fill this gap, within this paper we describe the application of a realistic evaluation approach to the study of protocol-based care, whilst sharing findings of relevance about standardising care through the use of protocols, guidelines, and pathways. Methods Situated between positivism and relativism, realistic evaluation is concerned with the identification of underlying causal mechanisms, how they work, and under what conditions. Fundamentally it focuses attention on finding out what works, for whom, how, and in what circumstances. Results In this research, we were interested in understanding the relationships between the type and nature of particular approaches to protocol-based care (mechanisms), within different clinical settings (context), and what impacts this resulted in (outcomes). An evidence review using the principles of realist synthesis resulted in a number of propositions, i.e., context, mechanism, and outcome threads (CMOs). These propositions were then 'tested' through multiple case studies, using multiple methods including non-participant observation, interviews, and document analysis through an iterative analysis process. The initial propositions (conjectured CMOs) only partially corresponded to the findings that emerged during analysis. From the iterative analysis process of scrutinising mechanisms, context, and outcomes we were able to draw out some theoretically generalisable features about what works, for whom, how, and what circumstances in relation to the use of standardised care approaches (refined CMOs). Conclusions As one of the first studies to apply realistic evaluation in implementation research, it was a good fit, particularly given the growing emphasis on understanding how context influences evidence-based practice. The strengths and limitations of the approach are considered, including how to operationalise it and some of the challenges. This approach provided a useful interpretive framework with which to make sense of the multiple factors that were simultaneously at play and being observed through various data sources, and for developing explanatory theory about using standardised care approaches in practice. PMID:20504293
Arjona, Davinia; Aragón, Carlos; Aguilera, José Antonio; Ramírez, Lucía; Pisabarro, Antonio G
2009-05-01
Fruiting is a crucial developmental process in basidiomycetes yet the genetic and molecular factors that control it are not yet fully understood. The search for fruiting inducers is of major relevance for both basic research and for their use in industrial applications. In this paper, an efficient and reproducible protocol for controlled fruiting induction of Pleurotus ostreatus growing on synthetic medium is described. The protocol is based on the control of light intensity and photoperiod and permits the life cycle for this fungus to be completed in less than two weeks. The fruiting bodies produced by this method release fertile spores after 4-5 d of culture. Our results indicate that fruiting induction is solely dependent on the illumination regime and that it occurs long before the available nutrients are depleted in the culture. This protocol will greatly facilitate molecular and developmental biology research in this fungus as it avoids the need for complex culture media based on lignocellulosic materials or the use of chemical inducers.
Shiel, Flinn; Persson, Carl; Simas, Vini; Furness, James; Climstein, Mike; Schram, Ben
2017-01-01
Dual energy X-ray absorptiometry (DXA) is a commonly used instrument for analysing segmental body composition (BC). The information from the scan guides the clinician in the treatment of conditions such as obesity and can be used to monitor recovery of lean mass following injury. Two commonly used DXA positioning protocols have been identified-the Nana positioning protocol and the National Health and Nutrition Examination Survey (NHANES). Both protocols have been shown to be reliable. However, only one study has assessed the level of agreement between the protocols and ascertained the participants' preference of protocol based upon comfort. Given the paucity of research in the field and the growing use of DXA in both healthy and pathological populations further research determining the most appropriate positioning protocol is warranted. Therefore, the aims of this study were to assess the level of agreement between results from the NHANES protocol and Nana protocol, and the participants' preference of protocol based on comfort. Thirty healthy participants (15 males, 15 females, aged 23-59 years) volunteered to participate in this study. These participants underwent two whole body DXA scans in a single morning (Nana positioning protocol and NHANES positioning protocol), in a randomised order. Each participant attended for scanning wearing minimal clothing and having fasted overnight, refrained from exercise in the past 24 h and voided their bladders. Level of agreement, comparing NAHNES to Nana protocol was assessed using an intra-class correlation coefficient (ICC), concordance correlation coefficient (CCC) and percentage change in mean. Limit of agreement comparing the two protocols were assessed using plots, mean difference and confidence limits. Participants were asked to indicate the protocol they found most comfortable. When assessing level of agreement between protocols both the ICC and CCC scores were very high and ranged from 0.987 to 0.997 for whole body composition, indicating excellent agreement between the Nana and NHANES protocols. Regional analysis (arms, legs, trunk) ICC scores, ranged between 0.966 and 0.996, CCC ranged between 0.964 and 0.997, change in mean percentage ranged between -0.58% and 0.37% which indicated a very high level of agreement. Limit of agreement analysis using mean difference ranged between -0.223 and 0.686 kg and 95% CL produced results ranging between -1.262 kg and 1.630 kg. The majority (80%) of participants found the NHANES positioning protocol more comfortable. This study reveals a strong level of agreement as illustrated by high ICC's and CCC's between the positioning protocols, however systematic bias within limit of agreement plot and a large difference in 95% confidence limits indicates that the protocols should not be interchanged when assessing an individual. The NHANES protocol affords greater participant comfort.
A land classification protocol for pollinator ecology research: An urbanization case study.
Samuelson, Ash E; Leadbeater, Ellouise
2018-06-01
Land-use change is one of the most important drivers of widespread declines in pollinator populations. Comprehensive quantitative methods for land classification are critical to understanding these effects, but co-option of existing human-focussed land classifications is often inappropriate for pollinator research. Here, we present a flexible GIS-based land classification protocol for pollinator research using a bottom-up approach driven by reference to pollinator ecology, with urbanization as a case study. Our multistep method involves manually generating land cover maps at multiple biologically relevant radii surrounding study sites using GIS, with a focus on identifying land cover types that have a specific relevance to pollinators. This is followed by a three-step refinement process using statistical tools: (i) definition of land-use categories, (ii) principal components analysis on the categories, and (iii) cluster analysis to generate a categorical land-use variable for use in subsequent analysis. Model selection is then used to determine the appropriate spatial scale for analysis. We demonstrate an application of our protocol using a case study of 38 sites across a gradient of urbanization in South-East England. In our case study, the land classification generated a categorical land-use variable at each of four radii based on the clustering of sites with different degrees of urbanization, open land, and flower-rich habitat. Studies of land-use effects on pollinators have historically employed a wide array of land classification techniques from descriptive and qualitative to complex and quantitative. We suggest that land-use studies in pollinator ecology should broadly adopt GIS-based multistep land classification techniques to enable robust analysis and aid comparative research. Our protocol offers a customizable approach that combines specific relevance to pollinator research with the potential for application to a wide range of ecological questions, including agroecological studies of pest control.
Tousignant, M; Tougas, G; Rossignol, M; Goulet, L
2002-04-01
At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.
A Survey on Clustering Routing Protocols in Wireless Sensor Networks
Liu, Xuxun
2012-01-01
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. Based on network structure, routing protocols in WSNs can be divided into two categories: flat routing and hierarchical or clustering routing. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. In this paper, we present a comprehensive and fine grained survey on clustering routing protocols proposed in the literature for WSNs. We outline the advantages and objectives of clustering for WSNs, and develop a novel taxonomy of WSN clustering routing methods based on complete and detailed clustering attributes. In particular, we systematically analyze a few prominent WSN clustering routing protocols and compare these different approaches according to our taxonomy and several significant metrics. Finally, we summarize and conclude the paper with some future directions. PMID:23112649
A survey on clustering routing protocols in wireless sensor networks.
Liu, Xuxun
2012-01-01
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. Based on network structure, routing protocols in WSNs can be divided into two categories: flat routing and hierarchical or clustering routing. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. In this paper, we present a comprehensive and fine grained survey on clustering routing protocols proposed in the literature for WSNs. We outline the advantages and objectives of clustering for WSNs, and develop a novel taxonomy of WSN clustering routing methods based on complete and detailed clustering attributes. In particular, we systematically analyze a few prominent WSN clustering routing protocols and compare these different approaches according to our taxonomy and several significant metrics. Finally, we summarize and conclude the paper with some future directions.
Standardized food images: A photographing protocol and image database.
Charbonnier, Lisette; van Meer, Floor; van der Laan, Laura N; Viergever, Max A; Smeets, Paul A M
2016-01-01
The regulation of food intake has gained much research interest because of the current obesity epidemic. For research purposes, food images are a good and convenient alternative for real food because many dietary decisions are made based on the sight of foods. Food pictures are assumed to elicit anticipatory responses similar to real foods because of learned associations between visual food characteristics and post-ingestive consequences. In contemporary food science, a wide variety of images are used which introduces between-study variability and hampers comparison and meta-analysis of results. Therefore, we created an easy-to-use photographing protocol which enables researchers to generate high resolution food images appropriate for their study objective and population. In addition, we provide a high quality standardized picture set which was characterized in seven European countries. With the use of this photographing protocol a large number of food images were created. Of these images, 80 were selected based on their recognizability in Scotland, Greece and The Netherlands. We collected image characteristics such as liking, perceived calories and/or perceived healthiness ratings from 449 adults and 191 children. The majority of the foods were recognized and liked at all sites. The differences in liking ratings, perceived calories and perceived healthiness between sites were minimal. Furthermore, perceived caloric content and healthiness ratings correlated strongly (r ≥ 0.8) with actual caloric content in both adults and children. The photographing protocol as well as the images and the data are freely available for research use on http://nutritionalneuroscience.eu/. By providing the research community with standardized images and the tools to create their own, comparability between studies will be improved and a head-start is made for a world-wide standardized food image database. Copyright © 2015 Elsevier Ltd. All rights reserved.
Maturo, Donna; Powell, Alexis; Major-Wilson, Hannah; Sanchez, Kenia; De Santis, Joseph P; Friedman, Lawrence B
2015-01-01
Advances in care and treatment of adolescents/young adults with HIV infection have made survival into adulthood possible, requiring transition to adult care. Researchers have documented that the transition process is challenging for adolescents/young adults. To ensure successful transition, a formal transition protocol is needed. Despite existing research, little quantitative evaluation of the transition process has been conducted. The purpose of the study was to pilot test the "Movin' Out" Transitioning Protocol, a formalized protocol developed to assist transition to adult care. A retrospective medical/nursing record review was conducted with 38 clients enrolled in the "Movin' Out" Transitioning Protocol at a university-based adolescent medicine clinic providing care to adolescents/young adults with HIV infection. Almost half of the participants were able to successfully transition to adult care. Reasons for failure to transition included relocation, attrition, lost to follow-up, and transfer to another adult service. Failure to transition to adult care was not related to adherence issues, X(2) (1, N=38)=2.49, p=.288; substance use, X(2) (1, N=38)=1.71, p=.474; mental health issues, X(2) (1, N=38)=2.23, p=.322; or pregnancy/childrearing, X(2) (1, N=38)=0.00, p=.627). Despite the small sample size, the "Movin' Out" Transitioning Protocol appears to be useful in guiding the transition process of adolescents/young adults with HIV infection to adult care. More research is needed with a larger sample to fully evaluate the "Movin' Out" Transitioning Protocol. Copyright © 2015 Elsevier Inc. All rights reserved.
Research of Ad Hoc Networks Access Algorithm
NASA Astrophysics Data System (ADS)
Xiang, Ma
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W
2007-08-01
In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards.
Design and research on the platform of network manufacture product electronic trading
NASA Astrophysics Data System (ADS)
Zhou, Zude; Liu, Quan; Jiang, Xuemei
2003-09-01
With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.
Research on a Queue Scheduling Algorithm in Wireless Communications Network
NASA Astrophysics Data System (ADS)
Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai
This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.
Research into alternative network approaches for space operations
NASA Technical Reports Server (NTRS)
Kusmanoff, Antone L.; Barton, Timothy J.
1990-01-01
The main goal is to resolve the interoperability problem of applications employing DOD TCP/IP (Department of Defence Transmission Control Protocol/Internet Protocol) family of protocols on a CCITT/ISO based network. The objective is to allow them to communicate over the CCITT/ISO protocol GPLAN (General Purpose Local Area Network) network without modification to the user's application programs. There were two primary assumptions associated with the solution that was actually realized. The first is that the solution had to allow for future movement to the exclusive use of the CCITT/ISO standards. The second is that the solution had to be software transparent to the currently installed TCP/IP and CCITT/ISO user application programs.
Implementation Research: Embracing Practitioners' Views
ERIC Educational Resources Information Center
Feuerstein, Julie L.; Olswang, Lesley B.; Greenslade, Kathryn J.; Dowden, Patricia; Pinder, Gay Lloyd; Madden, Jodi
2018-01-01
Purpose: This research explores practitioners' perspectives during the implementation of triadic gaze intervention (TGI), an evidence-based protocol for assessing and planning treatment targeting gaze as an early signal of intentional communication for young children with physical disabilities. Method: Using qualitative methods, 7 practitioners…
Predicting Silk Fiber Mechanical Properties through Multiscale Simulation and Protein Design.
Rim, Nae-Gyune; Roberts, Erin G; Ebrahimi, Davoud; Dinjaski, Nina; Jacobsen, Matthew M; Martín-Moldes, Zaira; Buehler, Markus J; Kaplan, David L; Wong, Joyce Y
2017-08-14
Silk is a promising material for biomedical applications, and much research is focused on how application-specific, mechanical properties of silk can be designed synthetically through proper amino acid sequences and processing parameters. This protocol describes an iterative process between research disciplines that combines simulation, genetic synthesis, and fiber analysis to better design silk fibers with specific mechanical properties. Computational methods are used to assess the protein polymer structure as it forms an interconnected fiber network through shearing and how this process affects fiber mechanical properties. Model outcomes are validated experimentally with the genetic design of protein polymers that match the simulation structures, fiber fabrication from these polymers, and mechanical testing of these fibers. Through iterative feedback between computation, genetic synthesis, and fiber mechanical testing, this protocol will enable a priori prediction capability of recombinant material mechanical properties via insights from the resulting molecular architecture of the fiber network based entirely on the initial protein monomer composition. This style of protocol may be applied to other fields where a research team seeks to design a biomaterial with biomedical application-specific properties. This protocol highlights when and how the three research groups (simulation, synthesis, and engineering) should be interacting to arrive at the most effective method for predictive design of their material.
Van Dorn, Richard A; Desmarais, Sarah L; Rade, Candalyn B; Burris, Elizabeth N; Cuddeback, Gary S; Johnson, Kiersten L; Tueller, Stephen J; Comfort, Megan L; Mueser, Kim T
2017-08-04
Adults with co-occurring mental and substance use disorders (CODs) are overrepresented in jails. In-custody barriers to treatment, including a lack of evidence-based treatment options and the often short periods of incarceration, and limited communication between jails and community-based treatment agencies that can hinder immediate enrollment into community care once released have contributed to a cycle of limited treatment engagement, unaddressed criminogenic risks, and (re)arrest among this vulnerable and high-risk population. This paper describes a study that will develop research and communication protocols and adapt two evidence-based treatments, dual-diagnosis motivational interviewing (DDMI) and integrated group therapy (IGT), for delivery to adults with CODs across a jail-to-community treatment continuum. Adaptations to DDMI and IGT were guided by the Risk-Need-Responsivity model and the National Institute of Corrections' implementation competencies; the development of the implementation framework and communication protocols were guided by the Evidence-Based Interagency Implementation Model for community corrections and the Inter-organizational Relationship model, respectively. Implementation and evaluation of the protocols and adapted interventions will occur via an open trial and a pilot randomized trial. The clinical intervention consists of two in-jail DDMI sessions and 12 in-community IGT sessions. Twelve adults with CODs and four clinicians will participate in the open trial to evaluate the acceptability and feasibility of, and fidelity to, the interventions and research and communication protocols. The pilot controlled trial will be conducted with 60 inmates who will be randomized to either DDMI-IGT or treatment as usual. A baseline assessment will be conducted in jail, and four community-based assessments will be conducted during a 6-month follow-up period. Implementation, clinical, public health, and treatment preference outcomes will be evaluated. Findings have the potential to improve both jail- and community-based treatment services for adults with CODs as well as inform methods for conducting rigorous pilot implementation and evaluation research in correctional settings and as inmates re-enter the community. Findings will contribute to a growing area of work focused on interrupting the cycle of limited treatment engagement, unaddressed criminogenic risks, and (re)arrest among adults with CODs. ClinicalTrials.gov, NCT02214667 . Registered on 10 August 2014.
NASA Astrophysics Data System (ADS)
Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu
2017-08-01
Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.
Kim, Soo Ji; Jo, Uiri
2013-01-01
Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.
Research on IPv6 intrusion detection system Snort-based
NASA Astrophysics Data System (ADS)
Shen, Zihao; Wang, Hui
2010-07-01
This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Can a science-based definition of acupuncture improve clinical outcomes?
Priebe, Ted; Stumpf, Steven H; Zalunardo, Rod
2017-05-01
Research on acupuncture has been muddled by attempts to bridge the ancient with the modern. Barriers to effectiveness research are reflected in recurring conflicts that include disagreement on use of the most basic terms, lack of standard intervention controls, and the absence of functional measures for assessing treatment effect. Acupuncture research has stalled at the "placebo barrier" wherein acupuncture is "no better than placebo." The most widely recognized comparative effectiveness research in acupuncture does not compare acupuncture treatment protocols within groups, thereby, mutating large scale effectiveness studies into large scale efficacy trials. Too often research in acupuncture attempts to tie outcomes to traditional belief systems thereby limiting usefulness of the research. The acupuncture research paradigm needs to focus more closely on a scientific definition of treatments and outcomes that compare protocols in terms of prevalent clinical issues such as relative effectiveness for treating pain.
Summary and Synthesis: How to Present a Research Proposal.
Setia, Maninder Singh; Panda, Saumya
2017-01-01
This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the "methods" section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal.
Summary and Synthesis: How to Present a Research Proposal
Setia, Maninder Singh; Panda, Saumya
2017-01-01
This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the “methods” section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal. PMID:28979004
Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris
2016-01-01
ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use of evidence‐informed protocols during telephone calls with patients about symptoms. Training and other interventions improved nurses’ confidence with using COSTaRS protocols and their uptake was evident in some documented telephone calls. Protocols could be adapted for use by patients and nurses globally. PMID:27243574
Virtual laboratories: new opportunities for collaborative water science
NASA Astrophysics Data System (ADS)
Ceola, Serena; Arheimer, Berit; Bloeschl, Guenter; Baratti, Emanuele; Capell, Rene; Castellarin, Attilio; Freer, Jim; Han, Dawei; Hrachowitz, Markus; Hundecha, Yeshewatesfa; Hutton, Christopher; Lindström, Goran; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Toth, Elena; Viglione, Alberto; Wagener, Thorsten
2015-04-01
Reproducibility and repeatability of experiments are the fundamental prerequisites that allow researchers to validate results and share hydrological knowledge, experience and expertise in the light of global water management problems. Virtual laboratories offer new opportunities to enable these prerequisites since they allow experimenters to share data, tools and pre-defined experimental procedures (i.e. protocols). Here we present the outcomes of a first collaborative numerical experiment undertaken by five different international research groups in a virtual laboratory to address the key issues of reproducibility and repeatability. Moving from the definition of accurate and detailed experimental protocols, a rainfall-runoff model was independently applied to 15 European catchments by the research groups and model results were collectively examined through a web-based discussion. We found that a detailed modelling protocol was crucial to ensure the comparability and reproducibility of the proposed experiment across groups. Our results suggest that sharing comprehensive and precise protocols and running the experiments within a controlled environment (e.g. virtual laboratory) is as fundamental as sharing data and tools for ensuring experiment repeatability and reproducibility across the broad scientific community and thus advancing hydrology in a more coherent way.
Ludgate, Jackie L; Wright, James; Stockwell, Peter A; Morison, Ian M; Eccles, Michael R; Chatterjee, Aniruddha
2017-08-31
Formalin fixed paraffin embedded (FFPE) tumor samples are a major source of DNA from patients in cancer research. However, FFPE is a challenging material to work with due to macromolecular fragmentation and nucleic acid crosslinking. FFPE tissue particularly possesses challenges for methylation analysis and for preparing sequencing-based libraries relying on bisulfite conversion. Successful bisulfite conversion is a key requirement for sequencing-based methylation analysis. Here we describe a complete and streamlined workflow for preparing next generation sequencing libraries for methylation analysis from FFPE tissues. This includes, counting cells from FFPE blocks and extracting DNA from FFPE slides, testing bisulfite conversion efficiency with a polymerase chain reaction (PCR) based test, preparing reduced representation bisulfite sequencing libraries and massively parallel sequencing. The main features and advantages of this protocol are: An optimized method for extracting good quality DNA from FFPE tissues. An efficient bisulfite conversion and next generation sequencing library preparation protocol that uses 50 ng DNA from FFPE tissue. Incorporation of a PCR-based test to assess bisulfite conversion efficiency prior to sequencing. We provide a complete workflow and an integrated protocol for performing DNA methylation analysis at the genome-scale and we believe this will facilitate clinical epigenetic research that involves the use of FFPE tissue.
Gregg, Justin R; Bhalla, Rohan G; Cook, J Paul; Kang, Caroline; Dmochowski, Roger; Talbot, Thomas R; Barocas, Daniel A
2018-04-01
Symptomatic urinary tract infection is a complication of office based cystourethroscopy. Studies are mixed regarding the efficacy of antibiotic prophylaxis to prevent urinary tract infections. Our aim was to develop and evaluate an evidence-based protocol that reduces unnecessary antibiotic use while avoiding an increase in urinary tract infections. We created a clinic antibiogram based on all urology office visits performed during a 2-year period. Bacterial resistance rates, institutional risk related data and clinical guidelines were applied to create a protocol for antibiotic administration before cystourethroscopy. We then analyzed 1,245 consecutive patients without a renal transplant who underwent outpatient cystourethroscopy, including 610 after protocol initiation. Urinary tract infection rates and antibiotic use were analyzed for an association with the protocol change using the Fisher exact test. Cultures had an overall 20% rate of resistance to fluoroquinolones, representing 40% of the cultures that grew Escherichia coli. Before the protocol change 602 of 635 patients (94.8%) received a preprocedural antibiotic compared to 426 of 610 (69.9%) after protocol initiation (p <0.01). A total of 19 patients (3.0%) had a symptomatic urinary tract infection prior to the protocol change while 16 (2.6%) had a urinary tract infection after the change (p = 0.69). Regarding resistance, fluoroquinolone resistant organisms grew in the cultures of 12 of 19 patients (63.2%) with a urinary tract infection before the protocol change compared to 5 of 16 (31.3%) with a urinary tract infection after the change. Recent antibiotic administration, hospitalization and chronic catheterization were associated with urinary tract infection in the entire cohort (all p ≤0.01). A local antibiogram with infection related risk data effectively risk stratifies patients before cystourethroscopy, decreasing the use of antibiotics without increasing the rate of symptomatic urinary tract infection. Copyright © 2018 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Cost-effectiveness of risk stratified followup after urethral reconstruction: a decision analysis.
Belsante, Michael J; Zhao, Lee C; Hudak, Steven J; Lotan, Yair; Morey, Allen F
2013-10-01
We propose a novel risk stratified followup protocol for use after urethroplasty and explore potential cost savings. Decision analysis was performed comparing a symptom based, risk stratified protocol for patients undergoing excision and primary anastomosis urethroplasty vs a standard regimen of close followup for urethroplasty. Model assumptions included that excision and primary anastomosis has a 94% success rate, 11% of patients with successful urethroplasty had persistent lower urinary tract symptoms requiring cystoscopic evaluation, patients in whom treatment failed undergo urethrotomy and patients with recurrence on symptom based surveillance have a delayed diagnosis requiring suprapubic tube drainage. The Nationwide Inpatient Sample from 2010 was queried to identify the number of urethroplasties performed per year in the United States. Costs were obtained based on Medicare reimbursement rates. The 5-year cost of a symptom based, risk stratified followup protocol is $430 per patient vs $2,827 per patient using standard close followup practice. An estimated 7,761 urethroplasties were performed in the United States in 2010. Assuming that 60% were excision and primary anastomosis, and with more than 5 years of followup, the risk stratified protocol was projected to yield an estimated savings of $11,165,130. Sensitivity analysis showed that the symptom based, risk stratified followup protocol was far more cost-effective than standard close followup in all settings. Less than 1% of patients would be expected to have an asymptomatic recurrence using the risk stratified followup protocol. A risk stratified, symptom based approach to urethroplasty followup would produce a significant reduction in health care costs while decreasing unnecessary followup visits, invasive testing and radiation exposure. Copyright © 2013 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.
Standardized terminology for clinical trial protocols based on top-level ontological categories.
Heller, B; Herre, H; Lippoldt, K; Loeffler, M
2004-01-01
This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.
NASA Astrophysics Data System (ADS)
Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui
2016-06-01
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007
Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)
NASA Technical Reports Server (NTRS)
Ivancic, William D.
1997-01-01
The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.
Sharma, Arun; Li, Guang; Rajarajan, Kuppusamy; Hamaguchi, Ryoko; Burridge, Paul W; Wu, Sean M
2015-03-18
Human induced pluripotent stem cell-derived cardiomyocytes (hiPSC-CMs) have become an important cell source to address the lack of primary cardiomyocytes available for basic research and translational applications. To differentiate hiPSCs into cardiomyocytes, various protocols including embryoid body (EB)-based differentiation and growth factor induction have been developed. However, these protocols are inefficient and highly variable in their ability to generate purified cardiomyocytes. Recently, a small molecule-based protocol utilizing modulation of Wnt/β-Catenin signaling was shown to promote cardiac differentiation with high efficiency. With this protocol, greater than 50%-60% of differentiated cells were cardiac troponin-positive cardiomyocytes were consistently observed. To further increase cardiomyocyte purity, the differentiated cells were subjected to glucose starvation to specifically eliminate non-cardiomyocytes based on the metabolic differences between cardiomyocytes and non-cardiomyocytes. Using this selection strategy, we consistently obtained a greater than 30% increase in the ratio of cardiomyocytes to non-cardiomyocytes in a population of differentiated cells. These highly purified cardiomyocytes should enhance the reliability of results from human iPSC-based in vitro disease modeling studies and drug screening assays.
A Quantum Private Query Protocol for Enhancing both User and Database Privacy
NASA Astrophysics Data System (ADS)
Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang
2018-01-01
In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016
Disentangling the nature of the nicotine stimulus.
Bevins, Rick A; Barrett, Scott T; Polewan, Robert J; Pittenger, Steven T; Swalve, Natashia; Charntikov, Sergios
2012-05-01
Learning involving interoceptive stimuli likely plays an important role in many diseases and psychopathologies. Within this area, there has been extensive research investigating the interoceptive stimulus effects of abused drugs. In this pursuit, behavioral pharmacologists have taken advantage of what is known about learning processes and adapted the techniques to investigate the behavioral and receptor mechanisms of drug stimuli. Of particular interest is the nicotine stimulus and the use of the two-lever operant drug discrimination task and the Pavlovian drug discriminated goal-tracking task. There is strong concordance between the two methods when using "standard" testing protocols that minimize learning on test days. For example, ABT-418, nornicotine, and varenicline all fully evoked nicotine-appropriate responding. Notably, research from our laboratory with the discriminated goal-tracking task has used an alternative testing protocol. This protocol assesses stimulus substitution based on how well extinction learning using a non-nicotine ligand transfers back to the nicotine stimulus. These findings challenge conclusions based on more "standard" testing procedures (e.g., ABT-418 is not nicotine-like). As a starting point, we propose Thurstone scaling as a quantitative method for more precisely comparing transfer of extinction across doses, experiments, and investigators. We close with a discussion of future research directions and potential implications of the research for understanding interoceptive stimuli. Copyright © 2011 Elsevier B.V. All rights reserved.
Kertai, Miklos D.; Whitlock, Elizabeth L.; Avidan, Michael S.
2011-01-01
Cardiac surgery presents particular challenges for the anesthesiologist. In addition to standard and advanced monitors typically used during cardiac surgery, anesthesiologists may consider monitoring the brain with raw or processed electroencephalography (EEG). There is strong evidence that a protocol incorporating the processed EEG Bispectral Index (BIS) decreases the incidence intraoperative awareness compared with standard practice. However there is conflicting evidence that incorporating the BIS into cardiac anesthesia practice improves “fast-tracking,” decreases anesthetic drug use, or detects cerebral ischemia. Recent research, including many cardiac surgical patients, shows that a protocol based on BIS monitoring is not superior to a protocol based on end tidal anesthetic concentration monitoring in preventing awareness. There has been a resurgence of interest in the anesthesia literature in limited montage EEG monitoring, including nonproprietary processed indices. This has been accompanied by research showing that with structured training, anesthesiologists can glean useful information from the raw EEG trace. In this review, we discuss both the hypothesized benefits and limitations of BIS and frontal channel EEG monitoring in the cardiac surgical population. PMID:22253267
Prescott, Mark J; Brown, Verity J; Flecknell, Paul A; Gaffan, David; Garrod, Kate; Lemon, Roger N; Parker, Andrew J; Ryder, Kathy; Schultz, Wolfram; Scott, Leah; Watson, Jayne; Whitfield, Lucy
2010-11-30
This report provides practical guidance on refinement of the use of food and fluid control as motivational tools for macaques used in behavioural neuroscience research. The guidance is based on consideration of the scientific literature and, where data are lacking, expert opinion and professional experience, including that of the members of a Working Group convened by the United Kingdom National Centre for the Replacement, Refinement and Reduction of Animals in Research (NC3Rs). The report should be useful to researchers, veterinarians and animal care staff responsible for the welfare of macaques used in food and fluid control protocols, as well as those involved with designing, performing and analysing studies that use these protocols. It should also assist regulatory authorities and members of local ethical review processes or institutional animal care and use committees concerned with evaluating such protocols. The report provides a framework for refinement that can be tailored to meet local requirements. It also identifies data gaps and areas for future research and sets out the Working Group's recommendations on contemporary best practice. Copyright © 2010 Elsevier B.V. All rights reserved.
Sathar, Aslam; Dhai, Amaboo; van der Linde, Stephan
2014-12-01
Human Biological Materials (HBMs) are an invaluable resource in biomedical research. To determine if researchers and a Research Ethics Committee (REC) at a South African institution addressed ethical issues pertaining to HBMs in collaborative research with developed countries. Ethically approved retrospective cross-sectional descriptive audit. Of the 1305 protocols audited, 151 (11.57%) fulfilled the study's inclusion criteria. Compared to other developed countries, a majority of sponsors (90) were from the USA (p = 0.0001). The principle investigators (PIs) in all 151 protocols informed the REC of their intent to store HBMs. Only 132 protocols informed research participants (P < 0.0001). In 148 protocols informed consent (IC) was obtained from research participants, 116 protocols (76.8%) solicited broad consent compared to specific consent (32; 21.2%) [p < 0.0001]. In 105 cases a code was used to maintain confidentiality. HBMs were anonymised in 14 protocols [p < 0.0001]. More protocols informed the REC (90) than the research participants (67) that HBMs would be exported (p = 0.011). Export permits (EPs) and Material Transfer Agreements (MTAs) were not available in 109 and 143 protocols, respectively. Researchers and the REC did not adequately address the inter-related ethical and regulatory issues pertaining to HBMs. There was a lack of congruence between the ethical guidelines of developed countries and their actions which are central to the access to HBMs in collaborative research. HBMs may be leaving South Africa without EPs and MTAs during the process of international collaborative research. © 2013 John Wiley & Sons Ltd.
Analysis of Pervasive Mobile Ad Hoc Routing Protocols
NASA Astrophysics Data System (ADS)
Qadri, Nadia N.; Liotta, Antonio
Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.
Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.
Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel
2018-02-01
To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P < 0.001). Within the limitations of the study, the short drilling protocol proposed herein may represent a safe approach for implant site preparation.
Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-01-01
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415
Performance improvement in geographic routing for Vehicular Ad Hoc Networks.
Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar
2014-11-25
Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
Logos, Ethos, Pathos, and Ecos: Neighborhood Housing Design Research and Development
ERIC Educational Resources Information Center
Abell, John H.
2010-01-01
This article presents an overview of a community-based teaching and learning project linking sustainability, working family housing, neighborhood social capital, and urban design research and development. The article foregrounds principles and protocols that can be used to measure community effectiveness and it highlights a basis for further…
Collective Leadership Measurement for the U.S. Army
2014-03-01
methods employed were adapted from standard texts on survey research methods (e.g., Podsakoff, MacKenzie, Lee, & Podsakoff, 2003; Shadish, Cook...members of the research team, as well as procedures for interviews in standard research methods texts (e.g., Campion, Palmer, & Campion, 1997; Latham...critical incident protocol was based on procedures for critical incidents in standard research methods texts (e.g., Flanagan, 1954; Lowenberg, 1979
Auer, Jorg A; Goodship, Allen; Arnoczky, Steven; Pearce, Simon; Price, Jill; Claes, Lutz; von Rechenberg, Brigitte; Hofmann-Amtenbrinck, Margarethe; Schneider, Erich; Müller-Terpitz, R; Thiele, F; Rippe, Klaus-Peter; Grainger, David W
2007-01-01
Background In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. Methods The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Results & Conclusion Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards. PMID:17678534
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR), Office of Regulatory Affairs for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES - THIS POSITION IS CONTINGENT UPON FUNDING APPROVAL The Protocol Coordinator II: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers, maintains records of these approvals at the outside centers in the protocol files, and sends protocol amendments and other reports to the participating centers Maintains a schedule of all review committee submission deadline dates and meeting dates Assists clinical investigators in understanding and complying with the entire review process Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document management and tracking system for NCI protocols Converts protocols from Word format to PDF with bookmarks Maintains the PDF version of the most current approved version of each active clinical protocol on a central server This position has the option to be located in Frederick or Rockville, Maryland.
Novel methods to estimate antiretroviral adherence: protocol for a longitudinal study.
Saberi, Parya; Ming, Kristin; Legnitto, Dominique; Neilands, Torsten B; Gandhi, Monica; Johnson, Mallory O
2018-01-01
There is currently no gold standard for assessing antiretroviral (ARV) adherence, so researchers often resort to the most feasible and cost-effective methods possible (eg, self-report), which may be biased or inaccurate. The goal of our study was to evaluate the feasibility and acceptability of innovative and remote methods to estimate ARV adherence, which can potentially be conducted with less time and financial resources in a wide range of clinic and research settings. Here, we describe the research protocol for studying these novel methods and some lessons learned. The 6-month pilot study aimed to examine the feasibility and acceptability of a remotely conducted study to evaluate the correlation between: 1) text-messaged photographs of pharmacy refill dates for refill-based adherence; 2) text-messaged photographs of pills for pill count-based adherence; and 3) home-collected hair sample measures of ARV concentration for pharmacologic-based adherence. Participants were sent monthly automated text messages to collect refill dates and pill counts that were taken and sent via mobile telephone photographs, and hair collection kits every 2 months by mail. At the study end, feasibility was calculated by specific metrics, such as the receipt of hair samples and responses to text messages. Participants completed a quantitative survey and qualitative exit interviews to examine the acceptability of these adherence evaluation methods. The relationship between the 3 novel metrics of adherence and self-reported adherence will be assessed. Investigators conducting adherence research are often limited to using either self-reported adherence, which is subjective, biased, and often overestimated, or other more complex methods. Here, we describe the protocol for evaluating the feasibility and acceptability of 3 novel and remote methods of estimating adherence, with the aim of evaluating the relationships between them. Additionally, we note the lessons learned from the protocol implementation to date. We expect that these novel measures will be feasible and acceptable. The implications of this research will be the identification and evaluation of innovative and accurate metrics of ARV adherence for future implementation.
Novel methods to estimate antiretroviral adherence: protocol for a longitudinal study
Saberi, Parya; Ming, Kristin; Legnitto, Dominique; Neilands, Torsten B; Gandhi, Monica; Johnson, Mallory O
2018-01-01
Background There is currently no gold standard for assessing antiretroviral (ARV) adherence, so researchers often resort to the most feasible and cost-effective methods possible (eg, self-report), which may be biased or inaccurate. The goal of our study was to evaluate the feasibility and acceptability of innovative and remote methods to estimate ARV adherence, which can potentially be conducted with less time and financial resources in a wide range of clinic and research settings. Here, we describe the research protocol for studying these novel methods and some lessons learned. Methods The 6-month pilot study aimed to examine the feasibility and acceptability of a remotely conducted study to evaluate the correlation between: 1) text-messaged photographs of pharmacy refill dates for refill-based adherence; 2) text-messaged photographs of pills for pill count-based adherence; and 3) home-collected hair sample measures of ARV concentration for pharmacologic-based adherence. Participants were sent monthly automated text messages to collect refill dates and pill counts that were taken and sent via mobile telephone photographs, and hair collection kits every 2 months by mail. At the study end, feasibility was calculated by specific metrics, such as the receipt of hair samples and responses to text messages. Participants completed a quantitative survey and qualitative exit interviews to examine the acceptability of these adherence evaluation methods. The relationship between the 3 novel metrics of adherence and self-reported adherence will be assessed. Discussion Investigators conducting adherence research are often limited to using either self-reported adherence, which is subjective, biased, and often overestimated, or other more complex methods. Here, we describe the protocol for evaluating the feasibility and acceptability of 3 novel and remote methods of estimating adherence, with the aim of evaluating the relationships between them. Additionally, we note the lessons learned from the protocol implementation to date. We expect that these novel measures will be feasible and acceptable. The implications of this research will be the identification and evaluation of innovative and accurate metrics of ARV adherence for future implementation. PMID:29950816
Privacy-preserving record linkage using Bloom filters
2009-01-01
Background Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. Methods A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Results Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. Conclusion We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage. PMID:19706187
Privacy-preserving record linkage using Bloom filters.
Schnell, Rainer; Bachteler, Tobias; Reiher, Jörg
2009-08-25
Combining multiple databases with disjunctive or additional information on the same person is occurring increasingly throughout research. If unique identification numbers for these individuals are not available, probabilistic record linkage is used for the identification of matching record pairs. In many applications, identifiers have to be encrypted due to privacy concerns. A new protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers has been developed. The protocol is based on Bloom filters on q-grams of identifiers. Tests on simulated and actual databases yield linkage results comparable to non-encrypted identifiers and superior to results from phonetic encodings. We proposed a protocol for privacy-preserving record linkage with encrypted identifiers allowing for errors in identifiers. Since the protocol can be easily enhanced and has a low computational burden, the protocol might be useful for many applications requiring privacy-preserving record linkage.
Ex-vivo imaging of excised tissue using vital dyes and confocal microscopy
Johnson, Simon; Rabinovitch, Peter
2012-01-01
Vital dyes routinely used for staining cultured cells can also be used to stain and image live tissue slices ex-vivo. Staining tissue with vital dyes allows researchers to collect structural and functional data simultaneously and can be used for qualitative or quantitative fluorescent image collection. The protocols presented here are useful for structural and functional analysis of viable properties of cells in intact tissue slices, allowing for the collection of data in a structurally relevant environment. With these protocols, vital dyes can be applied as a research tool to disease processes and properties of tissue not amenable to cell culture based studies. PMID:22752953
Evidence-Based Assessment in Case Management to Improve Abnormal Cancer Screen Follow-Up
ERIC Educational Resources Information Center
Vourlekis, Betsy; Ell, Kathleen; Padgett, Deborah
2005-01-01
The authors describe an evidence-based assessment protocol for intensive case management to improve screening diagnostic follow-up developed through a research project in breast and cervical cancer early detection funded by the Centers for Disease Control and Prevention. Three components of an evidence-based approach to assessment are presented…
Electronic Clinical Trial Protocol Distribution via the World-Wide Web
Afrin, Lawrence B.; Kuppuswamy, Valarmathi; Slater, Barbara; Stuart, Robert K.
1997-01-01
Clinical trials today typically are inefficient, paper-based operations. Poor community physician awareness of available trials and difficult referral mechanisms also contribute to poor accrual. The Physicians Research Network (PRN) web was developed for more efficient trial protocol distribution and eligibility inquiries. The Medical University of South Carolina's Hollings Cancer Center trials program and two community oncology practices served as a testbed. In 581 man-hours over 18 months, 147 protocols were loaded into PRN. The trials program eliminated all protocol hardcopies except the masters, reduced photocopier use 59%, and saved 1.0 full-time equivalents (FTE), but 1.0 FTE was needed to manage PRN. There were no known security breaches, downtime, or content-related problems. Therefore, PRN is a paperless, user-preferred, reliable, secure method for distributing protocols and reducing distribution errors and delays because only a single copy of each protocol is maintained. Furthermore, PRN is being extended to serve other aspects of trial operations. PMID:8988471
IoT real time data acquisition using MQTT protocol
NASA Astrophysics Data System (ADS)
Atmoko, R. A.; Riantini, R.; Hasin, M. K.
2017-05-01
The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.
Smart Objects, Dumb Archives: A User-Centric, Layered Digital Library Framework
NASA Technical Reports Server (NTRS)
Maly, Kurt; Nelson, Michael L.; Zubair, Mohammad
1999-01-01
Currently, there exist a large number of superb digital libraries, all of which are, unfortunately, vertically integrated and all presenting a monolithic interface to their users. Ideally, a user would want to locate resources from a variety of digital libraries dealing only with one interface. A number of approaches exist to this interoperability issue exist including: defining a universal protocol for all libraries to adhere to; or developing mechanisms to translate between protocols. The approach we illustrate in this paper is to push down the level of universal protocols to one for digital object communication and for communication for simple archives. This approach creates the opportunity for digital library service providers to create digital libraries tailored to the needs of user communities drawing from available archives and individual publishers who adhere to this standard. We have created a reference implementation based on the hyper text transfer protocol (http) with the protocols being derived from the Dienst protocol. We have created a special class of digital objects called buckets and a number of archives based on a NASA collection and NSF funded projects. Starting from NCSTRL we have developed a set of digital library services called NCSTRL+ and have created digital libraries for researchers, educators and students that can each draw on all the archives and individually created buckets.
Pound, Joe Mathews; Miller, John Allen; George, John E; Fish, Durland
2009-08-01
The Northeast Area-wide Tick Control Project (NEATCP) was funded by the United States Department of Agriculture (USDA) as a large-scale cooperative demonstration project of the USDA-Agricultural Research Service (ARS)-patented 4-Poster tick control technology (Pound et al. 1994) involving the USDA-ARS and a consortium of universities, state agencies, and a consulting firm at research locations in the five states of Connecticut (CT), Maryland (MD), New Jersey (NJ), New York (NY), and Rhode Island (RI). The stated objective of the project was "A community-based field trial of ARS-patented tick control technology designed to reduce the risk of Lyme disease in northeastern states." Here we relate the rationale and history of the technology, a chronological listing of events leading to implementation of the project, the original protocol for selecting treatment, and control sites, and protocols for deployment of treatments, sampling, assays, data analyses, and estimates of efficacy.
Sahoo, Soumendra; Mohammed, Ciraj Ali
2018-06-01
This intervention was aimed to analyse the effect of academic writing and journal critiquing as educational approaches in improving critical thinking and collaborative learning among undergraduate medical students. A research proposal writing format was created for the 4th year medical students of Melaka Manipal Medical College, Malaysia during their ophthalmology clinical postings. The students worked in small groups and developed research protocols through an evidence based approach. This was followed by writing reflective summaries in academic portfolios about the activity undertaken. A mixed methods study was designed to explore the possible role of collaborative research proposal writing in enhancing critical thinking and collaborative learning. Analysis of reflections submitted by 188 medical students after the intervention indicate that majority of them found an improvement in their skills of critical thinking and collaborative learning as a result of research protocol writing. All participants agreed that the model helped in applying concepts to new situations in the form of designing their own study, which reflected in enhanced higher order cognitive skills. This study shows that the introduction of a structured module in the core medical curriculum that focuses on research writing skills embedded with collaborative and reflective practices can enhance collaborative learning, critical thinking, and reasoning among medical students.
Schnyer, Rosa N; Allen, John J B
2002-10-01
An important methodological challenge encountered in acupuncture clinical research involves the design of treatment protocols that help ensure standardization and replicability while allowing for the necessary flexibility to tailor treatments to each individual. Manualization of protocols used in clinical trials of acupuncture and other traditionally-based complementary and alternative medicine (CAM) systems facilitates the systematic delivery of replicable and standardized, yet individually-tailored treatments. To facilitate high-quality CAM acupuncture research by outlining a method for the systematic design and implementation of protocols used in CAM clinical trials based on the concept of treatment manualization. A series of treatment manuals was developed to systematically articulate the Chinese medical theoretical and clinical framework for a given Western-defined illness, to increase the quality and consistency of treatment, and to standardize the technical aspects of the protocol. In all, three manuals were developed for National Institutes of Health (NIH)-funded clinical trials of acupuncture for depression, spasticity in cerebral palsy, and repetitive stress injury. In Part I, the rationale underlying these manuals and the challenges encountered in creating them are discussed, and qualitative assessments of their utility are provided. In Part II, a methodology to develop treatment manuals for use in clinical trials is detailed, and examples are given. A treatment manual provides a precise way to train and supervise practitioners, enable evaluation of conformity and competence, facilitate the training process, and increase the ability to identify the active therapeutic ingredients in clinical trials of acupuncture.
Stability and sensitivity of ABR flow control protocols
NASA Astrophysics Data System (ADS)
Tsai, Wie K.; Kim, Yuseok; Chiussi, Fabio; Toh, Chai-Keong
1998-10-01
This tutorial paper surveys the important issues in stability and sensitivity analysis of ABR flow control of ATM networks. THe stability and sensitivity issues are formulated in a systematic framework. Four main cause of instability in ABR flow control are identified: unstable control laws, temporal variations of available bandwidth with delayed feedback control, misbehaving components, and interactions between higher layer protocols and ABR flow control. Popular rate-based ABR flow control protocols are evaluated. Stability and sensitivity is shown to be the fundamental issues when the network has dynamically-varying bandwidth. Simulation result confirming the theoretical studies are provided. Open research problems are discussed.
A Protocol for Evaluating Contextual Design Principles
Stamps, Arthur
2014-01-01
This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies. PMID:25431448
Fabricating a UV-Vis and Raman Spectroscopy Immunoassay Platform.
Hanson, Cynthia; Israelsen, Nathan D; Sieverts, Michael; Vargis, Elizabeth
2016-11-10
Immunoassays are used to detect proteins based on the presence of associated antibodies. Because of their extensive use in research and clinical settings, a large infrastructure of immunoassay instruments and materials can be found. For example, 96- and 384-well polystyrene plates are available commercially and have a standard design to accommodate ultraviolet-visible (UV-Vis) spectroscopy machines from various manufacturers. In addition, a wide variety of immunoglobulins, detection tags, and blocking agents for customized immunoassay designs such as enzyme-linked immunosorbent assays (ELISA) are available. Despite the existing infrastructure, standard ELISA kits do not meet all research needs, requiring individualized immunoassay development, which can be expensive and time-consuming. For example, ELISA kits have low multiplexing (detection of more than one analyte at a time) capabilities as they usually depend on fluorescence or colorimetric methods for detection. Colorimetric and fluorescent-based analyses have limited multiplexing capabilities due to broad spectral peaks. In contrast, Raman spectroscopy-based methods have a much greater capability for multiplexing due to narrow emission peaks. Another advantage of Raman spectroscopy is that Raman reporters experience significantly less photobleaching than fluorescent tags 1 . Despite the advantages that Raman reporters have over fluorescent and colorimetric tags, protocols to fabricate Raman-based immunoassays are limited. The purpose of this paper is to provide a protocol to prepare functionalized probes to use in conjunction with polystyrene plates for direct detection of analytes by UV-Vis analysis and Raman spectroscopy. This protocol will allow researchers to take a do-it-yourself approach for future multi-analyte detection while capitalizing on pre-established infrastructure.
Hawley, Philippa Helen; Byeon, Jai Jun
2008-05-01
Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p < 0.05). In the S group admitted for symptom control/supportive care 62.5% had a bowel movement more than 50% of days, as compared with 32% in those receiving the DS protocol. Fifty-seven percent of the DS group required additional interventions (lactulose, suppositories or enemas) compared to 40% in the S group. Cramps were reported equally by 3 (10%) patients in each group. Eight patients (27%) experienced diarrhea in the S group compared to 4 (13%) in the DS group. The addition of the initial docusate-only step and adding docusate 400-600 mg/d to the sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.
Decullier, Evelyne; Lhéritier, Véronique; Chapuis, François
2005-10-17
Clinical trials throughout the world must be evaluated by research ethics committees. No one has yet attempted to clearly quantify at the national level the activity of ethics committees and describe the characteristics of the protocols submitted. The objectives of this study were to describe 1) the workload and the activity of Research Ethics Committees in France, and 2) the characteristics of protocols approved on a nation-wide basis. Retrospective cohort of 976 protocols approved by a representative sample of 25/48 of French Research Ethics Committees in 1994. Protocols characteristics (design, study size, investigator), number of revisions requested by the ethics committee before approval, time to approval and number of amendments after approval were collected for each protocol by trained research assistant using the committee's files and archives. Thirty-one percent of protocols were approved with no modifications requested in 16 days (95% CI: 14-17). The number of revisions requested by the committee, and amendments submitted by the investigator was on average respectively 39 (95% CI: 25-53) and 37 (95% CI: 27-46), per committee and per year. When revisions were requested, the main reasons were related to information to the patient (28%) and consent modalities (18%). Drugs were the object of research in 68% of the protocols examined. The majority of the research was national (80%) with a predominance of single-centre studies. Workload per protocol has been estimated at twelve and half hours on average for administrative support and at eleven and half hours for expertise. The estimated workload justifies specific and independent administrative and financial support for Research Ethics Committees.
Sociometric Indicators of Leadership: An Exploratory Analysis
2018-01-01
streamline existing observational protocols and assessment methods . This research provides an initial test of sociometric badges in the context of the U.S...understand, the requirements of the mission. Traditional research and assessment methods focusing on leader and follower interactions require direct...based methods of social network analysis. Novel Measures of Leadership Building on these findings and earlier research , it is apparent that
Raggi, Alberto; Quintas, Rui; Russo, Emanuela; Martinuzzi, Andrea; Costardi, Daniela; Frisoni, Giovanni Battista; Franco, Maria Grazia; Andreotti, Alessandra; Ojala, Matti; Peña, Sebastián; Perales, Jaime; Chatterji, Somnath; Miret, Marta; Tobiasz-Adamczyk, Beata; Koskinen, Seppo; Frattura, Lucilla; Leonardi, Matilde
2014-01-01
The collaborative research on ageing in Europe protocol was based on that of the World Health Organization Study on global AGEing and adult health (SAGE) project that investigated the relationship between health and well-being and provided a set of instruments that can be used across countries to monitor health and health-related outcomes of older populations as well as the strategies for addressing issues concerning the ageing process. To evaluate the degree to which SAGE protocol covered the spectrum of disability given the scope of the World Health Organization International Classification of Functioning, Disability and Health (ICF), a mapping exercise was performed with SAGE protocol. Results show that the SAGE protocol covers ICF domains in a non-uniform way, with environmental factors categories being underrepresented, whereas mental, cardiovascular, sensory functions and mobility were overrepresented. To overcome this partial coverage of ICF functioning categories, new assessment instruments have been developed. PRACTITIONER MESSAGE: Mapping exercises are valid procedures to understand the extent to which a survey protocol covers the spectrum of functioning. The mapping exercise with SAGE protocol shows that it provides only a partial representation of body functions and activities and participation domains, and the coverage of environmental factors is poor. New instruments are therefore needed for researchers to properly understand the health and disability of ageing populations. Copyright © 2013 John Wiley & Sons, Ltd.
Reyon, Deepak; Khayter, Cyd; Regan, Maureen R; Joung, J Keith; Sander, Jeffry D
2012-10-01
Engineered transcription activator-like effector nucleases (TALENs) are broadly useful tools for performing targeted genome editing in a wide variety of organisms and cell types including plants, zebrafish, C. elegans, rat, human somatic cells, and human pluripotent stem cells. Here we describe detailed protocols for the serial, hierarchical assembly of TALENs that require neither PCR nor specialized multi-fragment ligations and that can be implemented by any laboratory. These restriction enzyme and ligation (REAL)-based protocols can be practiced using plasmid libraries and user-friendly, Web-based software that both identifies target sites in sequences of interest and generates printable graphical guides that facilitate assembly of TALENs. With the described platform of reagents, protocols, and software, researchers can easily engineer multiple TALENs within 2 weeks using standard cloning techniques. 2012 by John Wiley & Sons, Inc.
VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance
Watzlaf, Valerie R.; Ondich, Briana
2012-01-01
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194
[Recommendations in neonatal resuscitation].
2004-01-01
The recommendations for neonatal resuscitation are not always based on sufficient scientific evidence and thus expert consensus based on current research, knowledge, and experience are useful for formulating practical protocols that are easy to follow. The latest recommendations, in 2000, modified previously published recommendations and are included in the present text.
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Bonfill, Xavier; Ballesteros, Mónica; Gich, Ignasi; Serrano, María Antonia; García López, Fernando; Urrútia, Gerard
2013-01-01
Objective To describe the characteristics of randomized controlled clinical trials (RCT) on cancer drugs conducted in Spain between 1999 and 2003 based on their protocols. Methods We conducted an observational retrospective cohort study to identify the protocols of RCTs on cancer drugs authorized by the Agencia Española del Medicamento y Productos Sanitarios (AEMPS) (Spanish Agency for Medicines and Medical Devices) during 1999-2003. A descriptive analysis was completed and the association between variables based on the study setting and sponsorship were assessed. Results We identified a total of 303 protocols, which included 176,835 potentially eligible patients. Three-quarter of the studies were internationally-based, 61.7% were phase III, and 76.2% were sponsored by pharmaceutical companies. The most frequently assessed outcomes were response rate (24.7%), overall survival (20.7%), and progression-free survival (14.5%). Of all protocols, 10.6% intended to include more than 1000 patients (mean: 2442, SD: 2724). Compared with their national counterparts, internationally-based studies were significantly larger (p<0.001) and were more likely to implement centralized randomization (p<0.001), blinding of the intervention (p<0.001), and survival as primary outcome (p<0.001). Additionally, most internationally-based studies were sponsored by pharmaceutical companies (p<0.01). In a high percentage of protocols, the available information was not explicit enough to assess the validity of each trial. Compared to other European countries, the proportion of Spanish cancer drugs protocols registered at www.clinicaltrials.gov (7%) was lower. Conclusion RCTs on cancer drugs conducted in Spain between 1999 and 2003 were more likely to be promoted by pharmaceutical companies rather than by non-profit national groups. The former were more often part of international studies, which generally had better methodological quality than national ones. There are some worldwide on-going initiatives that aim to increase the transparency and quality of future research. PMID:24236154
Kost, Rhonda G.; Dowd, Kathleen A.; Hurley, Arlene M.; Rainer, Tyler‐Lauren; Coller, Barry S.
2014-01-01
Abstract The development of translational clinical research protocols is complex. To assist investigators, we developed a structured supportive guidance process (Navigation) to expedite protocol development to the standards of good clinical practice (GCP), focusing on research ethics and integrity. Navigation consists of experienced research coordinators leading investigators through a concerted multistep protocol development process from concept initiation to submission of the final protocol. To assess the effectiveness of Navigation, we collect data on the experience of investigators, the intensity of support required for protocol development, IRB review outcomes, and protocol start and completion dates. One hundred forty‐four protocols underwent Navigation and achieved IRB approval since the program began in 2007, including 37 led by trainee investigators, 26 led by MDs, 9 by MD/PhDs, 57 by PhDs, and 12 by investigators with other credentials (e.g., RN, MPH). In every year, more than 50% of Navigated protocols were approved by the IRB within 30 days. For trainees who had more than one protocol navigated, the intensity of Navigation support required decreased over time. Navigation can increase access to translational studies for basic scientists, facilitate GCP training for investigators, and accelerate development and approval of protocols of high ethical and scientific quality. PMID:24405608
Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose.
Valle, Xavier; L Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume
2015-12-01
Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP.
Addressing the potential adverse effects of school-based BMI assessments on children's wellbeing.
Gibbs, Lisa; O'Connor, Thea; Waters, Elizabeth; Booth, Michael; Walsh, Orla; Green, Julie; Bartlett, Jenny; Swinburn, Boyd
2008-01-01
INTRODUCTION. Do child obesity prevention research and intervention measures have the potential to generate adverse concerns about body image by focussing on food, physical activity and body weight? Research findings now demonstrate the emergence of body image concerns in children as young as 5 years. In the context of a large school-community-based child health promotion and obesity prevention study, we aimed to address the potential negative effects of height and weight measures on child wellbeing by developing and implementing an evidence-informed protocol to protect and prevent body image concerns. fun 'n healthy in Moreland! is a cluster randomised controlled trial of a child health promotion and obesity prevention intervention in 23 primary schools in an inner urban area of Melbourne, Australia. Body image considerations were incorporated into the study philosophies, aims, methods, staff training, language, data collection and reporting procedures of this study. This was informed by the published literature, professional body image expertise, pilot testing and implementation in the conduct of baseline data collection and the intervention. This study is the first record of a body image protection protocol being an integral part of the research processes of a child obesity prevention study. Whilst we are yet to measure its impact and outcome, we have developed and tested a protocol based on the evidence and with support from stakeholders in order to minimise the adverse impact of study processes on child body image concerns.
Pothier, Kristell; Soriano, G; Lussier, M; Naudin, A; Costa, N; Guyonnet, S; Piau, A; Ousset, P J; Nourhashemi, F; Vellas, B; de Souto Barreto, P
2018-01-24
Multidomain interventions composed of nutritional counseling, exercise and cognitive trainings have shown encouraging results as effective preventive strategies delaying age-related declines. However, these interventions are time- and resource-consuming. The use of Information and Communication Technologies (ICT) might facilitate the translation from research into real-world practice and reach a massive number of people. This article describes the protocol of the eMIND study, a randomized controlled trial (RCT) using a web-based multidomain intervention for older adults. One hundred and twenty older adults (≥ 65 years), with a spontaneous memory complaint, will be randomly assigned to a six-month web-based multidomain (nutritional counseling, physical and cognitive trainings) intervention group with a connected accelerometer (number of steps, energy expenditure), or to a control group with access to general information on healthy aging plus the accelerometer, but no access to the multidomain intervention. The main outcome is the feasibility/acceptability of the web-based intervention. Secondary clinical outcomes include: cognitive functions, physical performance, nutritional status and cost-effectiveness. We expect a high amount of adherers (ie, > 75% compliance to the protocol) to reflect the feasibility. Acceptability, assessed through interviews, should allow us to understand motivators and barriers to this ICT intervention. We also expect to provide data on its effects on various clinical outcomes and efficiency. The eMIND study will provide crucial information to help developing a future and larger web-based multidomain lifestyle RCT, which should facilitate the translation of this ICT intervention from the research world into real-life clinical practice for the healthcare of older adults.
Handling Neighbor Discovery and Rendezvous Consistency with Weighted Quorum-Based Approach
Own, Chung-Ming; Meng, Zhaopeng; Liu, Kehan
2015-01-01
Neighbor discovery and the power of sensors play an important role in the formation of Wireless Sensor Networks (WSNs) and mobile networks. Many asynchronous protocols based on wake-up time scheduling have been proposed to enable neighbor discovery among neighboring nodes for the energy saving, especially in the difficulty of clock synchronization. However, existing researches are divided two parts with the neighbor-discovery methods, one is the quorum-based protocols and the other is co-primality based protocols. Their distinction is on the arrangements of time slots, the former uses the quorums in the matrix, the latter adopts the numerical analysis. In our study, we propose the weighted heuristic quorum system (WQS), which is based on the quorum algorithm to eliminate redundant paths of active slots. We demonstrate the specification of our system: fewer active slots are required, the referring rate is balanced, and remaining power is considered particularly when a device maintains rendezvous with discovered neighbors. The evaluation results showed that our proposed method can effectively reschedule the active slots and save the computing time of the network system. PMID:26404297
Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren
2017-05-01
Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.
Gill, Kathryn J; Campbell, Emily; Gauthier, Gail; Xenocostas, Spyridoula; Charney, Dara; Macaulay, Ann C
2014-08-20
Substance abuse is a worldwide public health concern. Extensive scientific research has shown that screening and brief interventions for substance use disorders administered in primary care provide substantial benefit at relatively low cost. Frontline health clinicians are well placed to detect and treat patients with substance use disorders. Despite effectiveness shown in research, there are many factors that impact the implementation of these practices in real-world clinical practice. Recently, the Ministry of Health and Social Services in Quebec, Canada, issued two policy documents aimed at introducing screening and early intervention for substance abuse into frontline healthcare clinics in Quebec. The current research protocol was developed in order to study the process of implementation of evidence-based addiction treatment practices at three primary care clinics in Montreal (Phase 1). In addition, the research protocol was designed to examine the efficacy of overall policy implementation, including barriers and facilitators to addictions program development throughout Quebec (Phase 2). Phase 1 will provide an in-depth case study of knowledge translation and implementation. The study protocol will utilize an integrated knowledge translation strategy to build collaborative mechanisms for knowledge exchange between researchers, addiction specialists, and frontline practitioners (guided by the principles of participatory-action research), and directly examine the process of knowledge uptake and barriers to transfer using both qualitative and quantitative methodologies. Evaluation will involve multiple measures, time points and domains; program uptake and effectiveness will be determined by changes in healthcare service delivery, sustainability and outcomes. In Phase 2, qualitative methods will be utilized to examine the contextual facilitators and barriers that frontline organizations face in implementing services for substance dependence. Phase 2 will provide the first study exploring the wide-scale implementation of frontline services for substance dependence in the province of Quebec and yield needed information about how to effectively implement mandated policies into clinical practice and impact public health. Findings from this research program will contribute to the understanding of factors associated with implementation of frontline services for substance dependence and help to inform future policy and organizational support for the implementation of evidence-based practices.
Developing an organizing framework to guide nursing research in the Children’s Oncology Group (COG)
Kelly, Katherine Patterson; Hooke, Mary C.; Ruccione, Kathleen; Landier, Wendy; Haase, Joan
2014-01-01
Objectives To describe the development and application of an organizing research framework to guide COG Nursing research. Data Sources Research articles, reports and meeting minutes Conclusion An organizing research framework helps to outline research focus and articulate the scientific knowledge being produced by nurses in the pediatric cooperative group. Implication for Nursing Practice The use of an organizing framework for COG nursing research can facilitate clinical nurses’ understanding of how children and families sustain or regain optimal health when faced with a pediatric cancer diagnosis through interventions designed to promote individual and family resilience. The Children’s Oncology Group (COG) is the sole National Cancer Institute (NCI)-supported cooperative pediatric oncology clinical trials group and the largest organization in the world devoted exclusively to pediatric cancer research. It was founded in 2000 following the merger of the four legacy NCI-supported pediatric clinical trials groups (Children’s Cancer Group [CCG], Pediatric Oncology Group [POG], National Wilms Tumor Study Group, and Intergroup Rhabdomyosarcoma Study Group). The COG currently has over 200 member institutions across North America, Australia, New Zealand and Europe and a multidisciplinary membership of over 8,000 pediatric, radiation, and surgical oncologists, nurses, clinical research associates, pharmacists, behavioral scientists, pathologists, laboratory scientists, patient/parent advocates and other pediatric cancer specialists. The COG Nursing Discipline was formed from the merger of the legacy CCG and POG Nursing Committees, and current membership exceeds 2000 registered nurses. The discipline has a well-developed infrastructure that promotes nursing involvement throughout all levels of the organization, including representation on disease, protocol, scientific, executive and other administrative committees (e.g., nominating committee, data safety monitoring boards). COG nurses facilitate delivery of protocol-based treatments for children enrolled on COG protocols, and Nursing Discipline initiatives support nursing research, professional and patient/family education, evidence-based practice, and a patient-reported outcomes resource center. The research agenda of the Nursing Discipline is enacted through a well-established nursing scholar program. PMID:24559776
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. The Clinical Monitoring Research Program (CMRP) provides comprehensive clinical and administrative support to the National Cancer Institute’s Center for Cancer Research’s (CCR) Protocol Support Office (PSO) for protocol development review, regulatory review, and the implementation process as well as oversees medical writing/editing, regulatory/ compliance, and protocol coordination/navigation and administration. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator III: Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials. Provides deployment of clinical support services for clinical research. Streamlines the protocol development timeline. Provides data and documents collection and compilation for regulatory filing with the U.S. Food and Drug Administration (FDA) and other regulatory authorities.. Provides technical review and report preparation. Provides administrative coordination and general logistical support for regulatory activities. Ensures the provision of training for investigators and associate staff to reinforce and enhance a Good Clinical Practices (GCP) culture. Oversees quality assurance and quality control, performs regulatory review of clinical protocols, informed consent and other clinical documents. Tracks and facilitates a portfolio of protocols through each process step (Institutional Review Board [IRB], Regulatory Affairs Compliance [RAC], Data Safety Monitoring Board [DSMB], Office of Protocol Services). Assists clinical investigators in preparing clinical research protocols, including writing and formatting consent forms. Prepares protocol packages for review and ensures that protocol packages include all of the required material and comply with CCR, NCI and NIH policies. Collaborates with investigators to resolve any protocol/data issues. Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI IRB, and the clinical trial sponsor or the FDA. Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events. Attends and prepares minutes for the Branch Protocol Review Committees. Contacts coordinators at other centers for protocols that are performed there to obtain review committee approvals at those centers, maintains records of these approvals and sends protocol amendments and other reports to the participating centers. Maintains a schedule of all review committee submission deadline dates and meeting dates. Assists clinical investigators in understanding and complying with the entire review process. Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document and tracking system for NCI protocols. Converts protocols from Word format to .pdf with bookmarks. Maintains the .pdf version of the most current approved version of each active clinical protocol on a central server. This position is located in Rockville, Maryland.
Patient Care Coordinator | Center for Cancer Research
We are looking for a Patient Care Coordinator to join our thoracic and gastrointestinal oncology clinical team to help us coordinate care for patients enrolled on our clinical research protocols. Duties include scheduling appointments, coordinating new patients, obtaining patient records, attending weekly clinic meetings, and data base entry. Be part of our mission to solve
Patient Care Coordinator | Center for Cancer Research
We are looking for a Patient Care Coordinator to join our clinical team to help us coordinate care for patients enrolled on our clinical research protocols. Duties include scheduling appointments, coordinating new patients, obtaining patient records, attending weekly clinic meetings, and data base entry. Be part of our mission to solve the most important, challenging and
Patient Care Coordinator | Center for Cancer Research
We are looking for a Patient Care Coordinator to join our women's malignancies clinical team to help us coordinate care for patients enrolled on our clinical research protocols. Duties include scheduling appointments, coordinating new patients, obtaining patient records, attending weekly clinic meetings, and data base entry. Be part of our mission to solve the most important,
Publication trends of study protocols in rehabilitation.
Jesus, Tiago S; Colquhoun, Heather L
2017-09-04
Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.
A Mindfulness-Based Cognitive Psychoeducational Group Manual for Problem Gambling
ERIC Educational Resources Information Center
Cormier, Abigail; McBride, Dawn Lorraine
2012-01-01
This project provides a comprehensive overview of the research literature on problem gambling in adults and includes a detailed mindfulness-based psychoeducational group manual for problem gambling, complete with an extensive group counselling consent form, assessment and screening protocols, 10 user-friendly lesson plans, templates for a…
Many PCR-based methods for microbial source tracking (MST) have been developed and validated within individual research laboratories. Inter-laboratory validation of these methods, however, has been minimal, and the effects of protocol standardization regimes have not been thor...
Roberts, Laura Weiss; Kim, Jane Paik
2017-01-01
Understanding the perspectives of healthy individuals is important ethically and for the advancement of science. We assessed perceptions of risk associated with research procedures, comparing views of healthy individuals with and without experience in clinical research, and the respondents' reported willingness to volunteer. Semistructured interviews and written surveys were conducted. Study participants were healthy individuals, half of whom were currently enrolled in clinical research and half of whom had no prior experience in clinical research. Participants were queried regarding seven "minimal risk" or "greater than minimal risk" protocol vignettes with procedures of three types: routine diagnostic tests, more burdensome (i.e., more effort or potential harm) diagnostic tests, and pharmacologic interventions. Views of influences on enrollment decisions were also assessed. Most healthy individuals indicated that protocols with more burdensome or pharmacologic interventions were very risky (59%, 58%), as opposed to routine diagnostic test procedures (32%). Respondents' willingness to enroll in protocols varied by type of protocol (p value < .001) and was inversely correlated with risk assessments (regression coefficients from GEE = -0.4; -0.5; -0.7). The odds of healthy individuals with research experience expressing strong willingness to enroll in the depicted protocols were twice the odds of healthy individuals without research experience expressing the same level of willingness (OR = 2.0 95% CI: [1.1, 3.9]). Respondents did not assign risk categories as institutional review boards (IRBs) would, as indicated by low agreement (26%) between respondent and expert opinion on minimal risk protocols. Perceptions of procedure risk appear to influence healthy individuals' willingness to enroll in protocols. Participants with experience in clinical research were far more likely to express willingness to enroll, a finding with important scientific and ethical implications. The lack of alignment between healthy individuals' views of protocol risk and IRB categorization warrants further study.
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.
2016-01-01
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN. PMID:27916822
Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.
Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M
2016-11-29
With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN.
Nacul, Luis; O'Donovan, Dominic G; Lacerda, Eliana M; Gveric, Djordje; Goldring, Kirstin; Hall, Alison; Bowman, Erinna; Pheby, Derek
2014-06-18
Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments.
Enhancing the role of faith-based organizations to improve health: a commentary.
Schoenberg, Nancy E
2017-09-01
Researchers, policymakers, and community members increasingly recognize the potential to leverage faith-based organizations (FBOs) to improve health. This commentary complements Leyva and colleagues' article on whether and how members of FBOs view such a role. The commentary draws on our 13+ years operating a faith-based and community-based research organization, Faith Moves Mountains, in the Appalachian context. Issues to be addressed in the further development of faith-based health promotion include sustainability; adherence to the evidence-based operations of interventions, training, and privacy and protection protocols; and understanding the changing landscape of American public life.
Lund, Travis J; Pilarz, Matthew; Velasco, Jonathan B; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. © 2015 T. J. Lund et al. CBE—Life Sciences Education © 2015 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).
Syvertsen, Jennifer L; Robertson, Angela M; Abramovitz, Daniela; Rangel, M Gudelia; Martinez, Gustavo; Patterson, Thomas L; Ulibarri, Monica D; Vera, Alicia; El-Bassel, Nabila; Strathdee, Steffanie A
2012-02-20
Researchers are increasingly recognizing the importance of addressing sexual and drug-related HIV risk within the context of intimate relationships rather than solely focusing on individual behaviors. Practical and effective methods are needed to recruit, screen, and enroll the high risk and hard-to-reach couples who would most benefit from HIV interventions, such as drug-using female sex workers (FSWs) and their intimate, non-commercial partners. This paper outlines a bi-national, multidisciplinary effort to develop and implement a study protocol for research on the social context and epidemiology of HIV, sexually transmitted infections (STI), and high risk behaviors among FSWs and their non-commercial male partners in Tijuana and Ciudad Juarez, Mexico. We provide an overview of our study and specifically focus on the sampling, recruitment, screening, and successful enrollment of high risk couples into a public health study in this context. We used targeted and snowball sampling to recruit couples through the female partner first and administered a primary screener to check her initial eligibility. Willing and eligible females then invited their primary male partners for couple-based screening using a couple verification screening (CVS) instrument adapted from previous studies. The CVS rechecked eligibility and separately asked each partner the same questions about their relationship to "test" if the couple was legitimate. We adapted the original protocol to consider issues of gender and power within the local cultural and socioeconomic context and expanded the question pool to create multiple versions of the CVS that were randomly administered to potential couples to determine eligibility and facilitate study enrollment. The protocol successfully enrolled 214 high risk couples into a multi-site public health study. This work suggests the importance of collaborating to construct a study protocol, understanding the local population and context, and drawing on multiple sources of input to determine eligibility and verify the legitimacy of relationships. We provide a practical set of tools that other researchers should find helpful in the study of high risk couples in international settings, with particular relevance to studies of FSWs and their intimate partners.
2012-01-01
Background Researchers are increasingly recognizing the importance of addressing sexual and drug-related HIV risk within the context of intimate relationships rather than solely focusing on individual behaviors. Practical and effective methods are needed to recruit, screen, and enroll the high risk and hard-to-reach couples who would most benefit from HIV interventions, such as drug-using female sex workers (FSWs) and their intimate, non-commercial partners. This paper outlines a bi-national, multidisciplinary effort to develop and implement a study protocol for research on the social context and epidemiology of HIV, sexually transmitted infections (STI), and high risk behaviors among FSWs and their non-commercial male partners in Tijuana and Ciudad Juarez, Mexico. We provide an overview of our study and specifically focus on the sampling, recruitment, screening, and successful enrollment of high risk couples into a public health study in this context. Methods/Design We used targeted and snowball sampling to recruit couples through the female partner first and administered a primary screener to check her initial eligibility. Willing and eligible females then invited their primary male partners for couple-based screening using a couple verification screening (CVS) instrument adapted from previous studies. The CVS rechecked eligibility and separately asked each partner the same questions about their relationship to "test" if the couple was legitimate. We adapted the original protocol to consider issues of gender and power within the local cultural and socioeconomic context and expanded the question pool to create multiple versions of the CVS that were randomly administered to potential couples to determine eligibility and facilitate study enrollment. Discussion The protocol successfully enrolled 214 high risk couples into a multi-site public health study. This work suggests the importance of collaborating to construct a study protocol, understanding the local population and context, and drawing on multiple sources of input to determine eligibility and verify the legitimacy of relationships. We provide a practical set of tools that other researchers should find helpful in the study of high risk couples in international settings, with particular relevance to studies of FSWs and their intimate partners. PMID:22348625
de Lecuona, Itziar
2018-05-31
The current model for reviewing research with human beings basically depends on decision-making processes within research ethics committees. These committees must be aware of the importance of the new digital paradigm based on the large-scale exploitation of datasets, including personal data on health. This article offers guidelines, with the application of the EU's General Data Protection Regulation, for the appropriate evaluation of projects that are based on the use of big data analytics in healthcare. The processes for gathering and using this data constitute a niche where current research is developed. In this context, the existing protocols for obtaining informed consent from participants are outdated, as they are based not only on the assumption that personal data are anonymized, but that they will continue to be so in the future. As a result, it is essential that research ethics committees take on new capabilities and revisit values such as privacy and freedom, updating protocols, methodologies and working procedures. This change in the work culture will provide legal security to the personnel involved in research, will make it possible to guarantee the protection of the privacy of the subjects of the data, and will permit orienting the exploitation of data to avoid the commodification of personal data in this era of deidentification, so that research meets actual social needs and not spurious or opportunistic interests disguised as research. Copyright © 2018 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
Use of the Delay-Tolerant Networking Bundle Protocol from Space
NASA Technical Reports Server (NTRS)
Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex
2009-01-01
The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.
Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.
Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E
2016-01-01
A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365
Establishing the first institutional animal care and use committee in Egypt.
Fahmy, Sohair R; Gaafar, Khadiga
2016-04-09
Although animal research ethics committees (AREC) are well established in Western countries, this field is weakly developed and its concept is poorly understood in the Middle East and North Africa region. Our main objective was to introduce the concept and requirements of ethical approaches in dealing with experimental animal in research and teaching in Egypt. Due to its very recent inception, Cairo University, Faculty of Science IACUC decided to operate in accordance with Guide for the Care and Use of Laboratory Animals 8th Edition 2011 (the Guide) since Egypt has not yet compiled its own guide. Fifty protocols were reviewed in 2013-2014. Only ten protocols were reviewed in 2013, but in 2014, forty protocols were reviewed. In 2013 all protocols were approved and in 2014, number of approvals were 35, the number of deferrals were 4, and one refused protocol. Master's theses (MSc) research protocols constituted the majority of the total reviewed protocols. This is attributed to the decision of the Board of the Faculty of Science, Cairo University in September, 2013 that the approval of the IACUC is mandatory before conducting any research involving animals or theses registration. The first IACUC was established in the Cairo University, Faculty of Science, since 2012. The challenges encountered by the committee were diverse, such as the absence of laws that control the use of animal models in scientific research, lack of guidelines (protocols for experimental animals in research) and, mandatory ethical approval for any experimental animal research.
Alkema, Nicolette G; Tomar, Tushar; Duiker, Evelien W; Jan Meersma, Gert; Klip, Harry; van der Zee, Ate G J; Wisman, G Bea A; de Jong, Steven
2015-10-06
Using patient-derived xenografts (PDXs) for preclinical cancer research demands proper storage of tumour material to facilitate logistics and to reduce the number of animals needed. We successfully established 45 subcutaneous ovarian cancer PDXs, reflecting all histological subtypes, with an overall take rate of 68%. Corresponding cells from mouse replaced human tumour stromal and endothelial cells in second generation PDXs as demonstrated with mouse-specific vimentin and CD31 immunohistochemical staining. For biobanking purposes two cryopreservation methods, a fetal calf serum (FCS)-based (95%v/v) "FCS/DMSO" protocol and a low serum-based (10%v/v) "vitrification" protocol were tested. After primary cryopreservation, tumour take rates were 38% and 67% using either the vitrification or FCS/DMSO-based cryopreservation protocol, respectively. Cryopreserved tumour tissue of established PDXs achieved take rates of 67% and 94%, respectively compared to 91% using fresh PDX tumour tissue. Genotyping analysis showed that no changes in copy number alterations were introduced by any of the biobanking methods. Our results indicate that both protocols can be used for biobanking of ovarian tumour and PDX tissues. However, FCS/DMSO-based cryopreservation is more successful. Moreover, primary engraftment of fresh patient-derived tumours in mice followed by freezing tissue of successfully established PDXs is the preferred way of efficient ovarian cancer PDX biobanking.
The influence of solvent processing on polyester bioabsorbable polymers.
Manson, Joanne; Dixon, Dorian
2012-01-01
Solvent-based methods are commonly employed for the production of polyester-based samples and coatings in both medical device production and research. The influence of solvent casting and subsequent drying time was studied using thermal analysis, spectroscopy and weight measurement for four grades of 50 : 50 poly(lactic-co-glycolic acid) (PLGA) produced by using chloroform, dichloromethane, and acetone. The results demonstrate that solvent choice and PLGA molecular weight are critical factors in terms of solvent removal rate and maintaining sample integrity, respectively. The protocols widely employed result in high levels of residual solvent and a new protocol is presented together with solutions to commonly encountered problems.
Saurin, Tarcisio Abreu; Wachs, Priscila; Righi, Angela Weber; Henriqson, Eder
2014-07-01
Although scenario-based training (SBT) can be an effective means to help workers develop resilience skills, it has not yet been analyzed from the resilience engineering (RE) perspective. This study introduces a five-stage method for designing SBT from the RE view: (a) identification of resilience skills, work constraints and actions for re-designing the socio-technical system; (b) design of template scenarios, allowing the simulation of the work constraints and the use of resilience skills; (c) design of the simulation protocol, which includes briefing, simulation and debriefing; (d) implementation of both scenarios and simulation protocol; and (e) evaluation of the scenarios and simulation protocol. It is reported how the method was applied in an electricity distribution company, in order to train grid electricians. The study was framed as an application of design science research, and five research outputs are discussed: method, constructs, model of the relationships among constructs, instantiations of the method, and theory building. Concerning the last output, the operationalization of the RE perspective on three elements of SBT is presented: identification of training objectives; scenario design; and debriefing. Copyright © 2013 Elsevier Ltd. All rights reserved.
Teaching Integrity in Empirical Research: A Protocol for Documenting Data Management and Analysis
ERIC Educational Resources Information Center
Ball, Richard; Medeiros, Norm
2012-01-01
This article describes a protocol the authors developed for teaching undergraduates to document their statistical analyses for empirical research projects so that their results are completely reproducible and verifiable. The protocol is guided by the principle that the documentation prepared to accompany an empirical research project should be…
Research and implementation of SATA protocol link layer based on FPGA
NASA Astrophysics Data System (ADS)
Liu, Wen-long; Liu, Xue-bin; Qiang, Si-miao; Yan, Peng; Wen, Zhi-gang; Kong, Liang; Liu, Yong-zheng
2018-02-01
In order to solve the problem high-performance real-time, high-speed the image data storage generated by the detector. In this thesis, it choose an suitable portable image storage hard disk of SATA interface, it is relative to the existing storage media. It has a large capacity, high transfer rate, inexpensive, power-down data which is not lost, and many other advantages. This paper focuses on the link layer of the protocol, analysis the implementation process of SATA2.0 protocol, and build state machines. Then analyzes the characteristics resources of Kintex-7 FPGA family, builds state machines according to the agreement, write Verilog implement link layer modules, and run the simulation test. Finally, the test is on the Kintex-7 development board platform. It meets the requirements SATA2.0 protocol basically.
Chlan, Linda; Patterson, Robert P.; Heiderscheit, Annie
2011-01-01
Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicates data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. PMID:21382515
Whole Building Cost and Performance Measurement: Data Collection Protocol Revision 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fowler, Kimberly M.; Spees, Kathleen L.; Kora, Angela R.
2009-03-27
This protocol was written for the Department of Energy’s Federal Energy Management Program (FEMP) to be used by the public as a tool for assessing building cost and performance measurement. The primary audiences are sustainable design professionals, asset owners, building managers, and research professionals within the Federal sector. The protocol was developed based on the need for measured performance and cost data on sustainable design projects. Historically there has not been a significant driver in the public or private sector to quantify whole building performance in comparable terms. The deployment of sustainable design into the building sector has initiated manymore » questions on the performance and operational cost of these buildings.« less
Wireless Communications in Space
NASA Technical Reports Server (NTRS)
2004-01-01
In 1992, NASA and the U.S. Department of Defense jointly commissioned the research and development of a technology solution to address the challenges and requirements of communicating with their spacecraft. The project yielded an international consortium composed of representatives from the space science community, industry, and academia. This group of experts developed a broad suite of protocols specifically designed for space-based communications, known today as Space Communications Protocol Standards (SCPS). Having been internationally standardized by the Consultative Committee on Space Data Systems and the International Standards Organization, SCPS is distributed as open source technology by NASA s Jet Propulsion Laboratory (JPL). The protocols are used for every national space mission that takes place today.
Chlan, Linda; Patterson, Robert P; Heiderscheit, Annie
2011-07-01
Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicate data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. Copyright © 2011 Elsevier Inc. All rights reserved.
Assessing L2 Competency in Early Immersion Classrooms.
ERIC Educational Resources Information Center
Weber, Sandra; Tardif, Claudette
1991-01-01
Reports on a study that explored the use of puppets and classroom-based interview protocols as a practical way for teachers and researchers to get feedback on young students' learning in second-language classrooms. (21 references) (GLR)
Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose
Valle, Xavier; L.Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume
2015-01-01
Context: Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. Evidence Acquisition: In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. Results: The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Conclusions: Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP. PMID:26715969
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.
2018-04-01
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
ERIC Educational Resources Information Center
Schirmer, Barbara R.; Lockman, Alison S.; Schirmer, Todd N.
2016-01-01
We conducted this conceptual study to determine if the Institute of Education Sciences/National Science Foundation pipeline of evidence guidelines could be applied as a protocol that researchers could follow in establishing evidence of effective instructional practices. To do this, we compared these guidelines, new drug development process, and…
Coyote and Raven (P)re-Visit Environmental Education, Sustainability, and Run-Away Capitalism
ERIC Educational Resources Information Center
Cole, Peter; O'Riley, Pat
2010-01-01
Together with ubiquitous agent evocateurs, Coyote and Raven, the authors engage trickster discourse and narrative shape shifting as they share research protocols and community conversations based on their research with the four Lower Stl'atl'imx communities (Xa'xtsa, N'Quat'qua, Skatin and Samahquam First Nations) of British Columbia, Canada, in…
ERIC Educational Resources Information Center
Whitworth, David E.
2016-01-01
Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to…
ERIC Educational Resources Information Center
Borckardt, Jeffrey J.; Nash, Michael R.; Murphy, Martin D.; Moore, Mark; Shaw, Darlene; O'Neil, Patrick
2008-01-01
Both researchers and practitioners need to know more about how laboratory treatment protocols translate to real-world practice settings and how clinical innovations can be systematically tested and communicated to a skeptical scientific community. The single-case time-series study is well suited to opening a productive discourse between practice…
2018-01-01
Purpose This intervention was aimed to analyse the effect of academic writing and journal critiquing as educational approaches in improving critical thinking and collaborative learning among undergraduate medical students. Methods A research proposal writing format was created for the 4th year medical students of Melaka Manipal Medical College, Malaysia during their ophthalmology clinical postings. The students worked in small groups and developed research protocols through an evidence based approach. This was followed by writing reflective summaries in academic portfolios about the activity undertaken.A mixed methods study was designed to explore the possible role of collaborative research proposal writing in enhancing critical thinking and collaborative learning. Results Analysis of reflections submitted by 188 medical students after the intervention indicate that majority of them found an improvement in their skills of critical thinking and collaborative learning as a result of research protocol writing. All participants agreed that the model helped in applying concepts to new situations in the form of designing their own study, which reflected in enhanced higher order cognitive skills. Conclusion This study shows that the introduction of a structured module in the core medical curriculum that focuses on research writing skills embedded with collaborative and reflective practices can enhance collaborative learning, critical thinking, and reasoning among medical students. PMID:29860777
TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.
Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue
2017-06-01
Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments.
Heslop, Carl William; Burns, Sharyn; Lobo, Roanna; McConigley, Ruth
2017-01-01
Introduction There is limited research examining community-based or multilevel interventions that address the sexual health of young people in the rural Australian context. This paper describes the Participatory Action Research (PAR) project that will develop and validate a framework that is effective for planning, implementing and evaluating multilevel community-based sexual health interventions for young people aged 16–24 years in the Australian rural setting. Methods and analysis To develop a framework for sexual health interventions with stakeholders, PAR will be used. Three PAR cycles will be conducted, using semistructured one-on-one interviews, focus groups, community mapping and photovoice to inform the development of a draft framework. Cycle 2 and Cycle 3 will use targeted Delphi studies to gather evaluation and feedback on the developed draft framework. All data collected will be reviewed and analysed in detail and coded as concepts become apparent at each stage of the process. Ethics and dissemination This protocol describes a supervised doctoral research project. This project seeks to contribute to the literature regarding PAR in the rural setting and the use of the Delphi technique within PAR projects. The developed framework as a result of the project will provide a foundation for further research testing the application of the framework in other settings and health areas. This research has received ethics approval from the Curtin University Human Research and Ethics Committee (HR96/2015). PMID:28559453
Ethics of Social Media Research: Common Concerns and Practical Considerations
Goniu, Natalie; Moreno, Peter S.; Diekema, Douglas
2013-01-01
Abstract Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols. PMID:23679571
Ethics of social media research: common concerns and practical considerations.
Moreno, Megan A; Goniu, Natalie; Moreno, Peter S; Diekema, Douglas
2013-09-01
Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols.
DOT National Transportation Integrated Search
2008-01-01
This research involved a detailed laboratory study of a new test method for evaluating road base materials based on : the strength of the soil binder. In this test method, small test specimens (5.0in length and 0.75in square cross : section) of binde...
Original Research and Peer Review Using Web-Based Collaborative Tools by College Students
ERIC Educational Resources Information Center
Cakir, Mustafa; Carlsen, William S.
2007-01-01
The Environmental Inquiry program supports inquiry based, student-centered science teaching on selected topics in the environmental sciences. Many teachers are unfamiliar with both the underlying science of toxicology, and the process and importance of peer review in scientific method. The protocol and peer review process was tested with college…
Inhibitors to Responsibility-Based Professional Development with In-Service Teachers
ERIC Educational Resources Information Center
Hemphill, Michael A.
2015-01-01
Researchers of continuing professional development (CPD) in physical education have called for new models that move beyond the traditional CPD model. The outcomes of CPD protocols are hard to predict even when they align with the best practices. Responsibility-based CPD has become the focus of recent attention to assist physical educators in…
2011-03-31
protocols conducted in Iraq. His office had been designated by the 1 A research protocol is a formal document detailing the study methodology and the...Human Research Protections Program plan requires scientific peer review to ensure that research is scientifically sound in its design and methods, and...ofthe approved research protocol and IRB minutes, revealed that there was no mention of "active rehabilitation and exercise" under the design
ERIC Educational Resources Information Center
Jacob, Stacy A.; Furgerson, S. Paige
2012-01-01
Students new to doing qualitative research in the ethnographic and oral traditions, often have difficulty creating successful interview protocols. This article offers practical suggestions for students new to qualitative research for both writing interview protocol that elicit useful data and for conducting the interview. This piece was originally…
Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV.
Lv, Zhichao; Zhang, Jie; Jin, Jiucai; Li, Qi; Gao, Baoru
2018-04-16
The Unmanned Surface Vehicle (USV) integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Overholser, Brian R; Foster, David R; Henry, Joshua R; Plake, Kimberly S; Sowinski, Kevin M
2010-11-10
To assess the impact of an elective clinical research course on second- and third-year pharmacy students' knowledge of clinical research methods, training programs, career options, and interest in pursuing postgraduate training. A 2-credit hour elective course in clinical research was designed that included lectures, discussions, workshops, and in-class presentations related to study design and implementation, protocol synthesis, research evaluation, ethical and legal considerations, data analysis, and professional opportunities involving clinical research. Learner knowledge of these topics was assessed using several methods, including 3 assignments related to research protocol, ethical documentation, and presentation. A survey instrument designed to evaluate the effect the course had on pharmacy students' knowledge of clinical research methods and interest in pursuing postgraduate training in clinical research was administered. Students who completed the elective had a greater level of familiarity with research-related topics, training options, and career opportunities (p < 0.05) and a greater interest in pursuing a career in clinical research (p < 0.05) than did students in a matched control group. Taking a 2-credit hour elective course in clinical research increased pharmacy students' interest in pursuing a career in clinical research.
An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling
Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.
2018-01-01
Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with varying age, sex, body composition, and cold sensitivity characteristics. PMID:29593558
The clinical application of research utilization: amphotericin B.
Reedy, A M; Shivnan, J C; Hanson, J L; Haisfield, M E; Gregory, R E
1994-05-01
To describe the first application of the research utilization process by clinical nurses using the Stetler-Marram Model of Research Utilization to the practice of amphotericin B administration; to share the findings; and to discuss issues encountered in the process and their solutions. Published articles identified through computerized literature searches, published abstracts and books, personal communication with one author, and an informal survey of other cancer centers' amphotericin B infusion practices; research articles were selected for review if studies included settings and patient populations similar to those of the authors and if they used experimental designs. Studies were reviewed for scientific merit and clinical applicability according to the Stetler-Marram model; findings were used to develop a specific nursing protocol for infusion times of amphotericin B based on clinical criteria. The Stetler-Marram model helped staff nurses decide how to apply research findings to practice, although using it was difficult and required mentorship. A research base exists for amphotericin B administration time but not for test doses or premedications to prevent or minimize side effects. Staff nurses can use the Stetler-Marram model but need resources and support from individuals, committees, and administration. A specific protocol representing a practice change was implemented and may be applicable to other settings.
Derivation of Thymic Lymphoma T-cell Lines from Atm-/- and p53-/- Mice
Jinadasa, Rasika; Balmus, Gabriel; Gerwitz, Lee; Roden, Jamie; Weiss, Robert; Duhamel, Gerald
2011-01-01
Established cell lines are a critical research tool that can reduce the use of laboratory animals in research. Certain strains of genetically modified mice, such as Atm-/- and p53-/- consistently develop thymic lymphoma early in life 1,2, and thus, can serve as a reliable source for derivation of murine T-cell lines. Here we present a detailed protocol for the development of established murine thymic lymphoma T-cell lines without the need to add interleukins as described in previous protocols 1,3. Tumors were harvested from mice aged three to six months, at the earliest indication of visible tumors based on the observation of hunched posture, labored breathing, poor grooming and wasting in a susceptible strain 1,4. We have successfully established several T-cell lines using this protocol and inbred strains ofAtm-/- [FVB/N-Atmtm1Led/J] 2 and p53-/- [129/S6-Trp53tm1Tyj/J] 5 mice. We further demonstrate that more than 90% of the established T-cell population expresses CD3, CD4 and CD8. Consistent with stably established cell lines, the T-cells generated by using the present protocol have been passaged for over a year. PMID:21490582
STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM
The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...
A Protocol for Collecting Human Cardiac Tissue for Research.
Blair, Cheavar A; Haynes, Premi; Campbell, Stuart G; Chung, Charles; Mitov, Mihail I; Dennis, Donna; Bonnell, Mark R; Hoopes, Charles W; Guglin, Maya; Campbell, Kenneth S
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol.
A Protocol for Collecting Human Cardiac Tissue for Research
Blair, Cheavar A.; Haynes, Premi; Campbell, Stuart G.; Chung, Charles; Mitov, Mihail I.; Dennis, Donna; Bonnell, Mark R.; Hoopes, Charles W.; Guglin, Maya; Campbell, Kenneth S.
2016-01-01
This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol. PMID:28042604
NASA Astrophysics Data System (ADS)
Huang, C. Y.; Wu, C. H.
2016-06-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.
McDade, Thomas W; Williams, Sharon; Snodgrass, J Josh
2007-11-01
Logistical constraints associated with the collection and analysis of biological samples in community-based settings have been a significant impediment to integrative, multilevel bio-demographic and biobehavioral research. However recent methodological developments have overcome many of these constraints and have also expanded the options for incorporating biomarkers into population-based health research in international as well as domestic contexts. In particular using dried blood spot (DBS) samples-drops of whole blood collected on filter paper from a simple finger prick-provides a minimally invasive method for collecting blood samples in nonclinical settings. After a brief discussion of biomarkers more generally, we review procedures for collecting, handling, and analyzing DBS samples. Advantages of using DBS samples-compared with venipuncture include the relative ease and low cost of sample collection, transport, and storage. Disadvantages include requirements for assay development and validation as well as the relatively small volumes of sample. We present the results of a comprehensive literature review of published protocols for analysis of DBS samples, and we provide more detailed analysis of protocols for 45 analytes likely to be of particular relevance to population-level health research. Our objective is to provide investigators with the information they need to make informed decisions regarding the appropriateness of blood spot methods for their research interests.
DOT National Transportation Integrated Search
2009-02-01
The Next Generation 9-1-1 (NG9-1-1) Initiative is a research and development project funded by the US Department of Transportation (USDOT) to define the framework and plan to deploy Internet Protocol (IP)-based emergency communications across the nat...
Melanins and melanogenesis: methods, standards, protocols.
d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke
2013-09-01
Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E
2016-04-01
A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6
Jebaseeli Samuelraj, Ananthi; Jayapal, Sundararajan
2015-01-01
Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point. PMID:26366431
Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.
Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan
2015-01-01
Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.
Walter, Ebile Akoh; Jerome, Ateudjieu; Marceline, Djuidje Ngounoue; Yakum, Martin Ndinakie; Pierre, Watcho
2017-11-21
Over the last decade, there has been a rapid increase in biomedical research in Cameroon. However, the question of whether these research projects target major health priorities, vulnerable populations and geographic locations at risk remains to be answered. The aim of this paper is to describe the state of biomedical research in Cameroon which is a key determinant that would guide future health care policies and promote equitable access to healthcare. A documentary review of all approved protocols (proposals) of biomedical research projects, from 1997 through 2012, at the Cameroon National Ethics Committee. Protocols were reviewed systematically by independent reviewers and data were extracted on a grid. Data were analyzed by calculating proportions at 95% confidence interval, chi-square test (chi2) and p-values. Two thousand one hundred seventy two protocols were reviewed for data extraction. One thousand three hundred ninety-five (64.7%) were student projects, 369 (17.0%) projects had international sponsors, and 1528 (72.4%) were hospital-based studies. The most targeted domain was the fight against diseases 1323 (61.3%); mostly HIV 342 (25.8%) and Malaria 136 (10.3%). Over half of the studies were concentrated in the Centre region 1242 (57.2%), with the least projects conducted in the Northern region 15 (0.7%). There was strong evidence that international and local sponsors would influence the research site (p-value = 0.01) and population targets (p-value = 0.00). Although biomedical research targets some important diseases that pose a great burden to Cameroonians, the most vulnerable populations are excluded from research. Biomedical research scarcely addresses other components of the health system and emerging diseases of vital public health importance. We recommend that the government should play a central role, between researchers from academic institutions, sponsors, NGOs and research institutions, to ensure that biomedical research addresses the health priorities of Cameroonians. It should include vulnerable populations, and address other components of the health system for a balance. These recommendations are critical to ensuring that future research informed health policies reflect the health needs of the populations and promote equity in healthcare access.
Ruggiero, Kenneth J; Davidson, Tatiana M; McCauley, Jenna; Gros, Kirstin Stauffacher; Welsh, Kyleen; Price, Matthew; Resnick, Heidi S; Danielson, Carla Kmett; Soltis, Kathryn; Galea, Sandro; Kilpatrick, Dean G; Saunders, Benjamin E; Nissenboim, Josh; Muzzy, Wendy; Fleeman, Anna; Amstadter, Ananda B
2015-01-01
Disasters have far-reaching and potentially long-lasting effects on youth and families. Research has consistently shown a clear increase in the prevalence of several mental health disorders after disasters, including depression and posttraumatic stress disorder. Widely accessible evidence-based interventions are needed to address this unmet need for youth and families, who are underrepresented in disaster research. Rapid growth in Internet and Smartphone access, as well as several Web based evaluation studies with various adult populations has shown that Web-based interventions are likely to be feasible in this context and can improve clinical outcomes. Such interventions also are generally cost-effective, can be targeted or personalized, and can easily be integrated in a stepped care approach to screening and intervention delivery. This is a protocol paper that describes an innovative study design in which we evaluate a self-help Web-based resource, Bounce Back Now, with a population-based sample of disaster affected adolescents and families. The paper includes description and justification for sampling selection and procedures, selection of assessment measures and methods, design of the intervention, and statistical evaluation of critical outcomes. Unique features of this study design include the use of address-based sampling to recruit a population-based sample of disaster-affected adolescents and parents, telephone and Web-based assessments, and development and evaluation of a highly individualized Web intervention for adolescents. Challenges related to large-scale evaluation of technology-delivered interventions with high-risk samples in time-sensitive research are discussed, as well as implications for future research and practice. Published by Elsevier Inc.
Ruggiero, Kenneth J.; Davidson, Tatiana M.; McCauley, Jenna; Gros, Kirstin Stauffacher; Welsh, Kyleen; Price, Matthew; Resnick, Heidi S.; Danielson, Carla Kmett; Soltis, Kathryn; Galea, Sandro; Kilpatrick, Dean G.; Saunders, Benjamin E.; Nissenboim, Josh; Muzzy, Wendy; Fleeman, Anna; Amstadter, Ananda B.
2014-01-01
Disasters have far-reaching and potentially long-lasting effects on youth and families. Research has consistently shown a clear increase in the prevalence of several mental health disorders after disasters, including depression and posttraumatic stress disorder. Widely accessible evidence-based interventions are needed to address this unmet need for youth and families, who are underrepresented in disaster research. Rapid growth in Internet and Smartphone access, as well as several web based evaluation studies with various adult populations has shown that web-based interventions are likely to be feasible in this context and can improve clinical outcomes. Such interventions also are generally cost-effective, can be targeted or personalized, and can easily be integrated in a stepped care approach to screening and intervention delivery. This is a protocol paper that describes an innovative study design in which we evaluate a self-help web-based resource, Bounce Back Now, with a population-based sample of disaster affected adolescents and families. The paper includes description and justification for sampling selection and procedures, selection of assessment measures and methods, design of the intervention, and statistical evaluation of critical outcomes. Unique features of this study design include the use of address-based sampling to recruit a population-based sample of disaster-affected adolescents and parents, telephone and web-based assessments, and development and evaluation of a highly individualized web intervention for adolescents. Challenges related to large-scale evaluation of technology-delivered interventions with high-risk samples in time-sensitive research are discussed, as well as implications for future research and practice. PMID:25478956
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-08-01
A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.
Developing the skills required for evidence-based practice.
French, B
1998-01-01
The current health care environment requires practitioners with the skills to find and apply the best currently available evidence for effective health care, to contribute to the development of evidence-based practice protocols, and to evaluate the impact of utilizing validated research findings in practice. Current approaches to teaching research are based mainly on gaining skills by participation in the research process. Emphasis on the requirement for rigour in the process of creating new knowledge is assumed to lead to skill in the process of using research information created by others. This article reflects upon the requirements for evidence-based practice, and the degree to which current approaches to teaching research prepare practitioners who are able to find, evaluate and best use currently available research information. The potential for using the principles of systematic review as a teaching and learning strategy for research is explored, and some of the possible strengths and weakness of this approach are highlighted.
Development and evaluation of a study design typology for human research.
Carini, Simona; Pollock, Brad H; Lehmann, Harold P; Bakken, Suzanne; Barbour, Edward M; Gabriel, Davera; Hagler, Herbert K; Harper, Caryn R; Mollah, Shamim A; Nahm, Meredith; Nguyen, Hien H; Scheuermann, Richard H; Sim, Ida
2009-11-14
A systematic classification of study designs would be useful for researchers, systematic reviewers, readers, and research administrators, among others. As part of the Human Studies Database Project, we developed the Study Design Typology to standardize the classification of study designs in human research. We then performed a multiple observer masked evaluation of active research protocols in four institutions according to a standardized protocol. Thirty-five protocols were classified by three reviewers each into one of nine high-level study designs for interventional and observational research (e.g., N-of-1, Parallel Group, Case Crossover). Rater classification agreement was moderately high for the 35 protocols (Fleiss' kappa = 0.442) and higher still for the 23 quantitative studies (Fleiss' kappa = 0.463). We conclude that our typology shows initial promise for reliably distinguishing study design types for quantitative human research.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Teaching medical students to discern ethical problems in human clinical research studies.
Roberts, Laura Weiss; Warner, Teddy D; Green Hammond, Katherine A; Brody, Janet L; Kaminsky, Alexis; Roberts, Brian B
2005-10-01
Investigators and institutional review boards are entrusted with ensuring the conduct of ethically sound human studies. Assessing ethical aspects of research protocols is a key skill in fulfilling this duty, yet no empirically validated method exists for preparing professionals to attain this skill. The authors performed a randomized controlled educational intervention, comparing a criteria-based learning method, a clinical-research- and experience-based learning method, and a control group. All 300 medical students enrolled at the University of New Mexico School of Medicine in 2001 were invited to participate. After a single half-hour educational session, a written posttest of ability to detect ethical problems in hypothetical protocol vignettes was administered. The authors analyzed responses to ten protocol vignettes that had been evaluated independently by experts. For each vignette, a global assessment of the perceived significance of ethical problems and the identification of specific ethical problems were evaluated. Eighty-three medical students (27%) volunteered: 50 (60%) were women and 55 (66%) were first- and second-year students. On global assessments, the criteria-focused group perceived ethical problems as more significant than did the other two groups (p < .02). Students in the criteria-focused group were better able than students in the control group (p < .03) to discern specific ethical problems, more closely resembling expert assessments. Unexpectedly, the group focused on clinical research participants identified fewer problems than did the control group (p < .05). The criteria-focused intervention produced enhanced ethical evaluation skills. This work supports the potential value of empirically derived methods for preparing professionals to discern ethical aspects of human studies.
Yeh, Hsin-Chieh; Clark, Jeanne M; Emmons, Karen E; Moore, Reneé H; Bennett, Gary G; Warner, Erica T; Sarwer, David B; Jerome, Gerald J; Miller, Edgar R; Volger, Sheri; Louis, Thomas A; Wells, Barbara; Wadden, Thomas A; Colditz, Graham A; Appel, Lawrence J
2010-08-01
The National Heart, Lung, and Blood Institute (NHLBI) funded three institutions to conduct effectiveness trials of weight loss interventions in primary care settings. Unlike traditional multi-center clinical trials, each study was established as an independent trial with a distinct protocol. Still, efforts were made to coordinate and standardize several aspects of the trials. The three trials formed a collaborative group, the 'Practice-based Opportunities for Weight Reduction (POWER) Trials Collaborative Research Group.' We describe the common and distinct features of the three trials, the key characteristics of the collaborative group, and the lessons learned from this novel organizational approach. The Collaborative Research Group consists of three individual studies: 'Be Fit, Be Well' (Washington University in St. Louis/Harvard University), 'POWER Hopkins' (Johns Hopkins), and 'POWER-UP' (University of Pennsylvania). There are a total of 15 participating clinics with ~1100 participants. The common primary outcome is change in weight at 24 months of follow-up, but each protocol has trial-specific elements including different interventions and different secondary outcomes. A Resource Coordinating Unit at Johns Hopkins provides administrative support. The Collaborative Research Group established common components to facilitate potential cross-site comparisons. The main advantage of this approach is to develop and evaluate several interventions, when there is insufficient evidence to test one or two approaches, as would be done in a traditional multi-center trial. The challenges of the organizational design include the complex decision-making process, the extent of potential data pooling, time intensive efforts to standardize reports, and the additional responsibilities of the DSMB to monitor three distinct protocols.
Pinkerton, Steven D.; Pearson, Cynthia R.; Eachus, Susan R.; Berg, Karina M.; Grimes, Richard M.
2008-01-01
Summary Maximizing our economic investment in HIV prevention requires balancing the costs of candidate interventions against their effects and selecting the most cost-effective interventions for implementation. However, many HIV prevention intervention trials do not collect cost information, and those that do use a variety of cost data collection methods and analysis techniques. Standardized cost data collection procedures, instrumentation, and analysis techniques are needed to facilitate the task of assessing intervention costs and to ensure comparability across intervention trials. This article describes the basic elements of a standardized cost data collection and analysis protocol and outlines a computer-based approach to implementing this protocol. Ultimately, the development of such a protocol would require contributions and “buy-in” from a diverse range of stakeholders, including HIV prevention researchers, cost-effectiveness analysts, community collaborators, public health decision makers, and funding agencies. PMID:18301128
Investigation of Interference Models for RFID Systems.
Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio
2016-02-04
The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.
j5 DNA assembly design automation.
Hillson, Nathan J
2014-01-01
Modern standardized methodologies, described in detail in the previous chapters of this book, have enabled the software-automated design of optimized DNA construction protocols. This chapter describes how to design (combinatorial) scar-less DNA assembly protocols using the web-based software j5. j5 assists biomedical and biotechnological researchers construct DNA by automating the design of optimized protocols for flanking homology sequence as well as type IIS endonuclease-mediated DNA assembly methodologies. Unlike any other software tool available today, j5 designs scar-less combinatorial DNA assembly protocols, performs a cost-benefit analysis to identify which portions of an assembly process would be less expensive to outsource to a DNA synthesis service provider, and designs hierarchical DNA assembly strategies to mitigate anticipated poor assembly junction sequence performance. Software integrated with j5 add significant value to the j5 design process through graphical user-interface enhancement and downstream liquid-handling robotic laboratory automation.
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network’s scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed. PMID:22346584
Self-configuration and self-optimization process in heterogeneous wireless networks.
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed.
The Utility of Home-Practice in Mindfulness-Based Group Interventions: A Systematic Review.
Lloyd, Annette; White, Ross; Eames, Catrin; Crane, Rebecca
2018-01-01
A growing body of research supports the efficacy of mindfulness-based interventions (MBIs). MBIs consider home-practice as essential to increasing the therapeutic effects of the treatment. To date however, the synthesis of the research conducted on the role of home-practice in controlled MBI studies has been a neglected area. This review aimed to conduct a narrative synthesis of published controlled studies, evaluating mindfulness-based group interventions, which have specifically measured home-practice. Empirical research literature published until June 2016 was searched using five databases. The search strategy focused on mindfulness-based stress reduction (MBSR), mindfulness-based cognitive therapy (MBCT), and home-practice. Included studies met the following criteria: controlled trials, participants 18 years and above, evaluations of MBSR or MBCT, utilised standardised quantitative outcome measures and monitored home-practice using a self-reported measure. Fourteen studies met the criteria and were included in the review. Across all studies, there was heterogeneity in the guidance and resources provided to participants and the approaches used for monitoring home-practice. In addition, the guidance on the length of home-practice was variable across studies, which indicates that research studies and teachers are not adhering to the published protocols. Finally, only seven studies examined the relationship between home-practice and clinical outcomes, of which four found that home-practice predicted improvements on clinical outcome measures. Future research should adopt a standardised approach for monitoring home-practice across MBIs. Additionally, studies should assess whether the amount of home-practice recommended to participants is in line with MBSR/MBCT manualised protocols. Finally, research should utilise experimental methodologies to explicitly explore the relationship between home-practice and clinical outcomes.
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-01-01
Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326
Progress in satellite quantum key distribution
NASA Astrophysics Data System (ADS)
Bedington, Robert; Arrazola, Juan Miguel; Ling, Alexander
2017-08-01
Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world.
Recommended features of protocols for long-term ecological monitoring
Oakley, Karen L.; Boudreau, Susan L.; Humphrey, Sioux-Z
2001-01-01
In 1991, the National Park Service (NPS) selected seven parks to serve as prototypes for development of a long-term ecological monitoring program. Denali National Park and Preserve was one of the prototype parks selected. The principal focus of this national program was to detect and document resource changes and to understand the forces driving those changes. One of the major tasks of each prototype park was to develop monitoring protocols. In this paper, we discuss some lessons learned and what we believe to be the most important features of protocols.One of the many lessons we have learned is that monitoring protocols vary greatly in content and format. This variation leads to confusion about what information protocols should contain and how they should be formatted. Problems we have observed in existing protocols include (1) not providing enough detail, (2) omitting critical topics (such as data management), and (3) mixing explanation with instructions. Once written, protocols often sit on the shelf to collect dust, allowing methods changes to occur without being adequately considered, tested, or documented. Because a lengthy and costly research effort is often needed to develop protocols, a vision of what the final product should look like is helpful. Based on our involvement with the prototype monitoring program for Denali (Oakley and Boudreau 2000), we recommend key features of protocols, including a scheme for linking protocols to data in the data management system and for tracking protocol revisions. A protocol system is crucial for producing long-term data sets of known quality that meet program objectives.
ERIC Educational Resources Information Center
Flor, Alexander Gonzalez
2013-01-01
The paper is based on the challenges encountered by the researcher while conducting a study titled "Design, Development and Testing of an Indigenous Knowledge Management System Using Mobile Device Video Capture and Web 2.0 Protocols." During the conduct of the study the researcher observed a marked reluctance from organized indigenous…
Wong, Kwan Ching; Wong, Frances Kam Yuet; Chang, Katherine Ka Pik
2015-11-01
This paper aims to describe the research protocol that will be used to determine the effectiveness of a health-social partnership intervention programme among community-dwelling older adults. Ageing in place is a preferred option for overcoming challenges of the increasing prevalence of chronic diseases and the risk for hospitalization associated with the ageing population. Nevertheless, our knowledge of how to implement this concept is limited. The integrated efforts of health and social services may help to enable older adults to live with a sense of control over their daily life and to be independent to the fullest extent possible in the community. This is a randomized, controlled trial. Participants are community-dwelling older adults referred from a community centre. Sample size calculation was based on power analysis. The intervention group will receive the programme with the standard protocols guided by a comprehensive assessment-intervention-evaluation framework. Home visits and telephones follow-up will be employed as means of conducting the interventions and monitoring their progress. The customary care group will receive placebo social calls. The duration of the interventions will be 3 months. The study was funded by the School of Nursing in Hong Kong. Research Ethics Committee approval was obtained in September 2014. The results of this research are expected to enable older adults to stay in the community with optimal health and well-being. Health and social sciences are integrated into the practice in this research protocol. The scarce literature on this topic means that this study can also provide an opportunity to bridge the caring gap among older adults. © 2015 John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Smith, Phillip; Poindexter, Erin; Cukrowicz, Kelly
2010-01-01
The effect of engaging in an intensive research protocol that inquired extensively about psychiatric and suicide symptoms and exposed participants to a number of images, including suicide-related content was explored. Individuals experiencing a major depressive episode were called at 1 and 3 months after the initial protocol. Participants were…
Sacarlal, Jahit; Muchanga, Vasco; Mabutana, Carlos; Mabui, Matilde; Mariamo, Arlete; Cuamba, Assa Júlio; Fumo, Leida Artur; Silveira, Jacinta; Heitman, Elizabeth; Moon, Troy D
2018-05-23
Mozambique has seen remarkable growth in biomedical research over the last decade. To meet a growing need, the National Committee for Bioethics in Health of Mozambique (CNBS) encouraged the development of ethical review processes at institutions that regularly conduct medical and social science research. In 2012, the Faculty of Medicine (FM) of University Eduardo Mondlane (UEM) and the Maputo Central Hospital (MCH) established a joint Institutional Committee on Bioethics for Health (CIBS FM & MCH). This study examines the experience of the first 4 years of the CIBS FM & MCH. This study provides a descriptive, retrospective analysis of research protocols submitted to and approved by the CIBS FM & MCH between March 1, 2013 and December 31, 2016, together with an analysis of the Committee's respective reviews and actions. A total of 356 protocols were submitted for review during the period under analysis, with 309 protocols approved. Sixty-four percent were submitted by students, faculty, and researchers from UEM, mainly related to Master's degree research (42%). Descriptive cross-sectional studies were the most frequently reviewed research (61%). The majority were prospective (71%) and used quantitative methodologies (51%). The Departments of Internal Medicine at MCH and Community Health at the FM submitted the most protocols from their respective institutions, with 38 and 53% respectively. The CIBS's average time to final approval for all protocols was 56 days, rising to 161 for the 40 protocols that required subsequent national-level review by the CNBS. Our results show that over its first 4 years, the CIBS FM & MCH has been successful in managing a constant demand for protocol review and that several broad quality improvement initiatives, such as investigator mentoring and an electronic protocol submission platform have improved efficiency in the review process and the overall quality of the protocols submitted. Beyond Maputo, long-term investments in training and ethical capacity building for CIBS across the country continue to be needed, as Mozambique develops greater capacity for research and makes progress toward improving the health of all its citizens.
Colon cleansing protocol in children: research conditions vs. clinical practice.
Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah
2018-04-01
Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice. This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice. The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice. We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.
Cognitive Hypnotherapy as a Transdiagnostic Protocol for Emotional Disorders.
Alladin, Assen; Amundson, Jon
2016-01-01
This article describes cognitive hypnotherapy (CH), an integrative treatment that provides an evidence-based framework for synthesizing clinical practice and research. CH combines hypnotherapy with cognitive-behavior therapy in the management of emotional disorders. This blended version of clinical practice meets criteria for an assimilative model of integrative psychotherapy, which incorporates both theory and empirical findings. Issues related to (a) additive effect of hypnosis in treatment, (b) transdiagnostic consideration, and (c) unified treatment protocols in the treatment of emotional disorders are considered in light of cognitive hypnotherapy.
Mobile Router Technology Development
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent
2002-01-01
Cisco Systems and NASA have been performing joint research on mobile routing technology under a NASA Space Act Agreement. Cisco developed mobile router technology and provided that technology to NASA for applications to aeronautic and space-based missions. NASA has performed stringent performance testing of the mobile router, including the interaction of routing and transport-level protocols. This paper describes mobile routing, the mobile router, and some key configuration parameters. In addition, the paper describes the mobile routing test network and test results documenting the performance of transport protocols in dynamic routing environments.
Systematic Evaluation of the Patient-Reported Outcome (PRO) Content of Clinical Trial Protocols
Kyte, Derek; Duffy, Helen; Fletcher, Benjamin; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; King, Madeleine; Draper, Heather; Ives, Jonathan; Brundage, Michael; Blazeby, Jane; Calvert, Melanie
2014-01-01
Background Qualitative evidence suggests patient-reported outcome (PRO) information is frequently absent from clinical trial protocols, potentially leading to inconsistent PRO data collection and risking bias. Direct evidence regarding PRO trial protocol content is lacking. The aim of this study was to systematically evaluate the PRO-specific content of UK National Institute for Health Research (NIHR) Health Technology Assessment (HTA) programme trial protocols. Methods and Findings We conducted an electronic search of the NIHR HTA programme database (inception to August 2013) for protocols describing a randomised controlled trial including a primary/secondary PRO. Two investigators independently reviewed the content of each protocol, using a specially constructed PRO-specific protocol checklist, alongside the ‘Standard Protocol Items: Recommendations for Interventional Trials’ (SPIRIT) checklist. Disagreements were resolved through discussion with a third investigator. 75 trial protocols were included in the analysis. Protocols included a mean of 32/51 (63%) SPIRIT recommendations (range 16–41, SD 5.62) and 11/33 (33%) PRO-specific items (range 4–18, SD 3.56). Over half (61%) of the PRO items were incomplete. Protocols containing a primary PRO included slightly more PRO checklist items (mean 14/33 (43%)). PRO protocol content was not associated with general protocol completeness; thus, protocols judged as relatively ‘complete’ using SPIRIT were still likely to have omitted a large proportion of PRO checklist items. Conclusions The PRO components of HTA clinical trial protocols require improvement. Information on the PRO rationale/hypothesis, data collection methods, training and management was often absent. This low compliance is unsurprising; evidence shows existing PRO guidance for protocol developers remains difficult to access and lacks consistency. Study findings suggest there are a number of PRO protocol checklist items that are not fully addressed by the current SPIRIT statement. We therefore advocate the development of consensus-based supplementary guidelines, aimed at improving the completeness and quality of PRO content in clinical trial protocols. PMID:25333349
Boyer, Edward W; Fay, Richard J; Cook, Aaron; Buckosh, Martin; Hibberd, Patricia L; Case, Patricia
2010-03-01
Physician-scientists, in the eyes of the National Institutes of Health (NIH), are crucial to the biomedical research enterprise since the development of evidence-based practice based on cutting-edge research. At the same time, NIH has heightened the importance of research mentorship by permitting investigators to revise an application a single time. The current NIH approach, therefore, narrows the margin of error allowable in a proposal and requires that investigators fully develop research protocols for initial submission. The purpose of this manuscript, therefore, is to provide medical toxicologists with a proven research methodology that can be applied to substance abuse investigations. A secondary aim is to provide successful grant language that can be used in subsequent applications for research funding.
Ciesla, Nancy; Dinglas, Victor; Fan, Eddy; Kho, Michelle; Kuramoto, Jill; Needham, Dale
2011-04-12
Survivors of acute respiratory distress syndrome (ARDS) and other causes of critical illness often have generalized weakness, reduced exercise tolerance, and persistent nerve and muscle impairments after hospital discharge. Using an explicit protocol with a structured approach to training and quality assurance of research staff, manual muscle testing (MMT) is a highly reliable method for assessing strength, using a standardized clinical examination, for patients following ARDS, and can be completed with mechanically ventilated patients who can tolerate sitting upright in bed and are able to follow two-step commands. (7, 8) This video demonstrates a protocol for MMT, which has been taught to ≥ 43 research staff who have performed >800 assessments on >280 ARDS survivors. Modifications for the bedridden patient are included. Each muscle is tested with specific techniques for positioning, stabilization, resistance, and palpation for each score of the 6-point ordinal Medical Research Council scale. Three upper and three lower extremity muscles are graded in this protocol: shoulder abduction, elbow flexion, wrist extension, hip flexion, knee extension, and ankle dorsiflexion. These muscles were chosen based on the standard approach for evaluating patients for ICU-acquired weakness used in prior publications. (1,2).
NASA Astrophysics Data System (ADS)
Mulatsari, E.; Mumpuni, E.; Herfian, A.
2017-05-01
Curcumin is yellow colored phenolic compounds contained in Curcuma longa. Curcumin is known to have biological activities as anti-inflammatory, antiviral, antioxidant, and anti-infective agent [1]. Synthesis of curcumin analogue compounds has been done and some of them had biological activity like curcumin. In this research, the virtual screening of curcumin analogue compounds has been conducted. The purpose of this research was to determine the activity of these compounds as selective Cyclooxygenase-2inhibitors in in-silico. Binding mode elucidation was made by active and inactive representative compounds to see the interaction of the amino acids in the binding site of the compounds. This research used AYO_COX2_V.1.1, a structure-based virtual screening protocol (SBVS) that has been validated by Mumpuni E et al, 2014 [2]. AYO_COX2_V.1.1 protocol using a variety of integrated applications such as SPORES, PLANTS, BKchem, OpenBabel and PyMOL. The results of virtual screening conducted on 49 curcumin analogue compounds obtained 8 compounds with 4 active amino acid residues (GLY340, ILE503, PHE343, and PHE367) that were considered active as COX-2 inhibitor.
Transcranial Electric Stimulation for Precision Medicine: A Spatiomechanistic Framework
Yavari, Fatemeh; Nitsche, Michael A.; Ekhtiari, Hamed
2017-01-01
During recent years, non-invasive brain stimulation, including transcranial electrical stimulation (tES) in general, and transcranial direct current stimulation (tDCS) in particular, have created new hopes for treatment of neurological and psychiatric diseases. Despite promising primary results in some brain disorders, a more widespread application of tES is hindered by the unsolved question of determining optimum stimulation protocols to receive meaningful therapeutic effects. tES has a large parameter space including various montages and stimulation parameters. Moreover, inter- and intra-individual differences in responding to stimulation protocols have to be taken into account. These factors contribute to the complexity of selecting potentially effective protocols for each disorder, different clusters of each disorder, and even each single patient. Expanding knowledge in different dimensions of basic and clinical neuroscience could help researchers and clinicians to select potentially effective protocols based on tES modulatory mechanisms for future clinical studies. In this article, we propose a heuristic spatiomechanistic framework which contains nine levels to address tES effects on brain functions. Three levels refer to the spatial resolution (local, small-scale networks and large-scale networks) and three levels of tES modulatory effects based on its mechanisms of action (neurochemical, neuroelectrical and oscillatory modulations). At the group level, this framework could be helpful to enable an informed and systematic exploration of various possible protocols for targeting a brain disorder or its neuroscience-based clusters. Considering recent advances in exploration of neurodiversity at the individual level with different brain mapping technologies, the proposed framework might also be used in combination with personal data to design individualized protocols for tES in the context of precision medicine in the future. PMID:28450832
Upgrading physical activity counselling in primary care in the Netherlands.
Verwey, Renée; van der Weegen, Sanne; Spreeuwenberg, Marieke; Tange, Huibert; van der Weijden, Trudy; de Witte, Luc
2016-06-01
The systematic development of a counselling protocol in primary care combined with a monitoring and feedback tool to support chronically ill patients to achieve a more active lifestyle. An iterative user-centred design method was used to develop a counselling protocol: the Self-management Support Programme (SSP). The needs and preferences of future users of this protocol were identified by analysing the literature, through qualitative research, and by consulting an expert panel. The counselling protocol is based on the Five A's model. Practice nurses apply motivational interviewing, risk communication and goal setting to support self-management of patients in planning how to achieve a more active lifestyle. The protocol consists of a limited number of behaviour change consultations intertwined with interaction with and responses from the It's LiFe! monitoring and feedback tool. This tool provides feedback on patients' physical activity levels via an app on their smartphone. A summary of these levels is automatically sent to the general practice so that practice nurses can respond to this information. A SSP to stimulate physical activity was defined based on user requirements of care providers and patients, followed by a review by a panel of experts. By following this user-centred approach, the organization of care was carefully taken into account, which has led to a practical and affordable protocol for physical activity counselling combined with mobile technology. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Empirically-derived Knowledge on Adolescent Assent to Pediatric Biomedical Research
Brody, Janet L.; Annett, Robert D.; Turner, Charles; Dalen, Jeanne; Yoon, Yesel
2013-01-01
Background There has been a recent growth in empirical research on assent with pediatric populations, due in part, to the demand for increased participation of this population in biomedical research. Despite methodological limitations, studies of adolescent capacities to assent have advanced and identified a number of salient psychological and social variables that are key to understanding assent. Methods The authors review a subsection of the empirical literature on adolescent assent focusing primarily on asthma and cancer therapeutic research; adolescent competencies to assent to these studies; perceptions of protocol risk and benefit; the affects of various social context variables on adolescent research participation decision making; and the inter-relatedness of these psychological and social factors. Results Contemporary studies of assent, using multivariate methods and updated approaches to statistical modeling, have revealed the importance of studying the intercorrelation between adolescents’ psychological capacities and their ability to employ these capacities in family and medical decision-making contexts. Understanding these dynamic relationships will enable researchers and ethicists to develop assent procedures that respect the authority of parents, while at the same time accord adolescents appropriate decision-making autonomy. Conclusions Reviews of empirical literature on the assent process reveal that adolescents possess varying capacities for biomedical research participation decision making depending on their maturity and the social context in which the decision is made. The relationship between adolescents and physician-investigators can be used to attenuate concerns about research protocols and clarify risk and benefit information so adolescents, in concert with their families, can make the most informed and ethical decisions. Future assent researchers will be better able to navigate the complicated interplay of contextual and developmental factors and develop the empirical bases for research enrollment protocols that will support increased involvement of adolescents in biomedical research. PMID:23914304
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
IMPROVING THE REPORTING OF THERAPEUTIC EXERCISE INTERVENTIONS IN REHABILITATION RESEARCH.
Page, Phil; Hoogenboom, Barb; Voight, Michael
2017-04-01
The foundation of evidence-based practice lies in clinical research, which is based on the utilization of the scientific method. The scientific method requires that all details of the experiment be provided in publications to support replication of the study in order to evaluate and validate the results. More importantly, clinical research can only be translated into practice when researchers provide explicit details of the study. Too often, rehabilitation exercise intervention studies lack the appropriate detail to allow clinicians to replicate the exercise protocol in their patient populations. Therefore, the purpose of this clinical commentary is to provide guidelines for optimal reporting of therapeutic exercise interventions in rehabilitation research. 5.
Workflow based framework for life science informatics.
Tiwari, Abhishek; Sekhar, Arvind K T
2007-10-01
Workflow technology is a generic mechanism to integrate diverse types of available resources (databases, servers, software applications and different services) which facilitate knowledge exchange within traditionally divergent fields such as molecular biology, clinical research, computational science, physics, chemistry and statistics. Researchers can easily incorporate and access diverse, distributed tools and data to develop their own research protocols for scientific analysis. Application of workflow technology has been reported in areas like drug discovery, genomics, large-scale gene expression analysis, proteomics, and system biology. In this article, we have discussed the existing workflow systems and the trends in applications of workflow based systems.
Carleton, R Nicholas; Teale Sapach, Michelle J N; Oriet, Chris; LeBouthillier, Daniel M
2017-01-01
Social anxiety disorder (SAD) models posit vigilance for external social threat cues and exacerbated self-focused attention as key in disorder development and maintenance. Evidence indicates a modified dot-probe protocol may reduce symptoms of SAD; however, the efficacy when compared to a standard protocol and long-term maintenance of treatment gains remains unclear. Furthermore, the efficacy of such protocols on SAD-related constructs remains relatively unknown. The current investigation clarified these associations using a randomized control trial replicating and extending previous research. Participants with SAD (n = 113; 71% women) were randomized to complete a standard (i.e. control) or modified (i.e. active) dot-probe protocol consisting of 15-min sessions twice weekly for four weeks. Self-reported symptoms were measured at baseline, post-treatment, and 4-month and 8-month follow-ups. Hierarchical linear modeling indicated significant self-reported reductions in symptoms of social anxiety, fear of negative evaluation, trait anxiety, and depression, but no such reductions in fear of positive evaluation. Symptom changes did not differ based on condition and were maintained at 8-month follow-up. Attentional biases during the dot-probe task were not related to symptom change. Overall, our results replicate support for the efficacy of both protocols in reducing symptoms of SAD and specific related constructs, and suggest a role of exposure, expectancy, or practice effects, rather than attention modification, in effecting such reductions. The current results also support distinct relationships between fears of negative and positive evaluation and social anxiety. Further research focused on identifying the mechanisms of change in attention modification protocols appears warranted.
Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias
2016-06-01
Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol.
Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti
2008-11-06
At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.
Evidence-Based Ethics for Neurology and Psychiatry Research
Kim, Scott Y. H.
2004-01-01
Summary: American bioethics, historically arising out of theology and philosophy, has been dominated by the method of normative analysis. Ethics as policy, however, requires in addition a solid evidence base. This paper discusses the background conditions that make neurotherapeutics research particularly challenging. Three key ethical issues are discussed within an evidence-based ethics framework: the ethical challenges arising from changes in the financial incentive structures for academic researchers and their institutions, the challenges of risk-benefit analysis for neurotherapeutics protocols testing innovative interventions, and the evolving issues surrounding impaired decision-making capacity and surrogate consent for research. For each of these issues, selected empirical data are reviewed, areas for further inquiry are noted, and the need for development of novel methods for bioethics policy research is discussed. PMID:15717040
Farnbach, Sara; Eades, Anne-Marie; Hackett, Maree Lisa
2015-12-30
Research with a focus on Aboriginal and Torres Strait Islander Australian's (hereafter referred to as Indigenous(1)) needs is crucial to ensure culturally appropriate evidence-based strategies are developed to improve health. However, concerns surrounding this research exist, arising from some previous research lacking community consultation, resulting in little community benefit or infringing on important cultural values. Values and Ethics: Guidelines for Ethical conduct in Aboriginal and Torres Strait Islander Health Research (hereafter referred to as Values and Ethics), developed by The National Health and Medical Research Council of Australia in 2003, is the ethical standard for Indigenous-focused health research. Researchers must address its Values in research design and conduct. However, its impact on research processes is unclear. Local Protocols should also be considered. This review aims to systematically examine practices related to Values and Ethics, Local Protocols and the processes of conducting Indigenous-focused primary healthcare research in collaboration with external researchers. The following electronic databases and grey literature will be searched (2003 to current): MEDLINE, EMBASE, CINAHL, Informit and HealthInfoNet--an Indigenous-specific research and program website. Indigenous-focused research will be included. Research must be conducted in one or more primary healthcare services, in collaboration with external researchers and with a focus on social and emotional well being. One reviewer will review titles and abstracts to remove obviously irrelevant research articles. Full-text research articles will be retrieved and independently examined by two reviewers. Data and quality assessment will be completed by one reviewer and verified by a second reviewer. Quality will be assessed using modified versions of established quality assessment tools. This review will provide information on research processes and the impact of Values and Ethics on Indigenous-focused primary healthcare research, informing communities and primary healthcare staff around research practices, and researchers and policy makers of strengths and weaknesses of practice. PROSPERO CRD42015024994.
AEROBIC SOIL MICROCOSMS FOR LONG-TERM BIODEGRADATION OF HYDROCARBON VAPORS
The aims of this research project included the development of laboratory protocols for the preparation of aerobic soil microcosms using aseptic field soil samples, and for the gas chromatographic analysis of hydrocarbon vapor biodegradation based on vapor samples obtained from th...
A randomized trial of protocol-based care for early septic shock.
Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C
2014-05-01
In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).
Gittelsohn, Joel; Evans, Marguerite; Helitzer, Deborah; Anliker, Jean; Story, Mary; Metcalfe, Lauve; Davis, Sally; Cloud, Patty Iron
2016-01-01
This paper describes how formative research was developed and implemented to produce obesity prevention interventions among school children in six different Native American nations that are part of the Pathways study. The formative assessment work presented here was unique in several ways: (1) it represents the first time formative research methods have been applied across multiple Native American tribes; (2) it is holistic, including data collection from parents, children, teachers, administrators and community leaders; and (3) it was developed by a multi-disciplinary group, including substantial input from Native American collaborators. The paper describes the process of developing the different units of the protocol, how data collection was implemented and how analyses were structured around the identification of risk behaviors. An emphasis is placed on describing which units of the formative assessment protocol were most effective and which were less effective. PMID:10181023
Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Li, B. B.; Yuan, Z. F.
2006-10-01
In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently.
A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs
Islam, Md. Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper. PMID:22164084
A novel addressing scheme for PMIPv6 based global IP-WSNs.
Islam, Md Motaharul; Huh, Eui-Nam
2011-01-01
IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.
How to write a surgical clinical research protocol: literature review and practical guide.
Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome
2014-02-01
The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.
Secure voice-based authentication for mobile devices: vaulted voice verification
NASA Astrophysics Data System (ADS)
Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.
2013-05-01
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.
2014-01-01
Background Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. Findings We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. Conclusion An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments. PMID:24938650
Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.
Willis, John L; Yuan, Zhiguo; Murthy, Sudhir
2016-08-01
Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.
González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina
2015-10-31
Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.
Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru
2018-01-01
The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and/or trial subjects as specific risk-alleviating measures.
Chevrier, Sandy; Boidot, Romain
2014-10-06
The widespread use of Next Generation Sequencing has opened up new avenues for cancer research and diagnosis. NGS will bring huge amounts of new data on cancer, and especially cancer genetics. Current knowledge and future discoveries will make it necessary to study a huge number of genes that could be involved in a genetic predisposition to cancer. In this regard, we developed a Nextera design to study 11 complete genes involved in DNA damage repair. This protocol was developed to safely study 11 genes (ATM, BARD1, BRCA1, BRCA2, BRIP1, CHEK2, PALB2, RAD50, RAD51C, RAD80, and TP53) from promoter to 3'-UTR in 24 patients simultaneously. This protocol, based on transposase technology and gDNA enrichment, gives a great advantage in terms of time for the genetic diagnosis thanks to sample multiplexing. This protocol can be safely used with blood gDNA.
McClements, Jake; McClements, David Julian
2016-06-10
There has been a rapid increase in the fabrication of various kinds of edible nanoparticles for oral delivery of bioactive agents, such as those constructed from proteins, carbohydrates, lipids, and/or minerals. It is currently difficult to compare the relative advantages and disadvantages of different kinds of nanoparticle-based delivery systems because researchers use different analytical instruments and protocols to characterize them. In this paper, we briefly review the various analytical methods available for characterizing the properties of edible nanoparticles, such as composition, morphology, size, charge, physical state, and stability. This information is then used to propose a number of standardized protocols for characterizing nanoparticle properties, for evaluating their stability to environmental stresses, and for predicting their biological fate. Implementation of these protocols would facilitate comparison of the performance of nanoparticles under standardized conditions, which would facilitate the rational selection of nanoparticle-based delivery systems for different applications in the food, health care, and pharmaceutical industries.
ERIC Educational Resources Information Center
Kloser, Matthew J.; Brownell, Sara E.; Shavelson, Richard J.; Fukami, Tadashi
2013-01-01
Undergraduate biology lab courses have long been criticized for engaging students in "cookbook" experiences in which students follow a given protocol to collect data that help answer a predetermined question. Recent reform documents in biology education have suggested that students should engage in lab courses that provide more authentic…
2001-07-01
Web-based applications to improve health data systems and quality of care; innovative strategies for data collection in clinical settings; approaches...research to increase interoperability and integration of software in distributed systems ; protocols and tools for data annotation and management; and...Generation National Defense and National Security Systems .......................... 27 Improved Health Care Systems for All Citizens
Absolute counting of neutrophils in whole blood using flow cytometry.
Brunck, Marion E G; Andersen, Stacey B; Timmins, Nicholas E; Osborne, Geoffrey W; Nielsen, Lars K
2014-12-01
Absolute neutrophil count (ANC) is used clinically to monitor physiological dysfunctions such as myelosuppression or infection. In the research laboratory, ANC is a valuable measure to monitor the evolution of a wide range of disease states in disease models. Flow cytometry (FCM) is a fast, widely used approach to confidently identify thousands of cells within minutes. FCM can be optimised for absolute counting using spiked-in beads or by measuring the sample volume analysed. Here we combine the 1A8 antibody, specific for the mouse granulocyte protein Ly6G, with flow cytometric counting in straightforward FCM assays for mouse ANC, easily implementable in the research laboratory. Volumetric and Trucount™ bead assays were optimized for mouse neutrophils, and ANC values obtained with these protocols were compared to ANC measured by a dual-platform assay using the Orphee Mythic 18 veterinary haematology analyser. The single platform assays were more precise with decreased intra-assay variability compared with ANC obtained using the dual protocol. Defining ANC based on Ly6G expression produces a 15% higher estimate than the dual protocol. Allowing for this difference in ANC definition, the flow cytometry counting assays using Ly6G can be used reliably in the research laboratory to quantify mouse ANC from a small volume of blood. We demonstrate the utility of the volumetric protocol in a time-course study of chemotherapy induced neutropenia using four drug regimens. © 2014 International Society for Advancement of Cytometry.
Simple Tools to Facilitate Project Management of a Nursing Research Project.
Aycock, Dawn M; Clark, Patricia C; Thomas-Seaton, LaTeshia; Lee, Shih-Yu; Moloney, Margaret
2016-07-01
Highly organized project management facilitates rigorous study implementation. Research involves gathering large amounts of information that can be overwhelming when organizational strategies are not used. We describe a variety of project management and organizational tools used in different studies that may be particularly useful for novice researchers. The studies were a multisite study of caregivers of stroke survivors, an Internet-based diary study of women with migraines, and a pilot study testing a sleep intervention in mothers of low-birth-weight infants. Project management tools were used to facilitate enrollment, data collection, and access to results. The tools included protocol and eligibility checklists, event calendars, screening and enrollment logs, instrument scoring tables, and data summary sheets. These tools created efficiency, promoted a positive image, minimized errors, and provided researchers with a sense of control. For the studies described, there were no protocol violations, there were minimal missing data, and the integrity of data collection was maintained. © The Author(s) 2016.
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
NASA Astrophysics Data System (ADS)
Lee, Adam J.; Winslett, Marianne; Perano, Kenneth J.
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. These theoretical works and proofs of concept have been quite successful from a research perspective, and thus researchers must now begin to address the systems constraints that act as barriers to the deployment of these systems. To this end, we present TrustBuilder2, a fully-configurable and extensible framework for prototyping and evaluating trust negotiation systems. TrustBuilder2 leverages a plug-in based architecture, extensible data type hierarchy, and flexible communication protocol to provide a framework within which numerous trust negotiation protocols and system configurations can be quantitatively analyzed. In this paper, we discuss the design and implementation of TrustBuilder2, study its performance, examine the costs associated with flexible authorization systems, and leverage this knowledge to identify potential topics for future research, as well as a novel method for attacking trust negotiation systems.
48 CFR 1352.235-73 - Research involving human subjects-after initial contract award.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the United States Department of Health and Human Services' Office for Human Research Protections... documentation may include: (1) Copies of the human subjects research protocol, advertisements, recruitment... human subjects research protocol, advertisements, recruitment material, and informed consent forms by...
Campoy, Irene; Lanau, Lucia; Altadill, Tatiana; Sequeiros, Tamara; Cabrera, Silvia; Cubo-Abert, Montserrat; Pérez-Benavente, Assumpción; Garcia, Angel; Borrós, Salvador; Santamaria, Anna; Ponce, Jordi; Matias-Guiu, Xavier; Reventós, Jaume; Gil-Moreno, Antonio; Rigau, Marina; Colas, Eva
2016-06-18
Uterine aspirates are used in the diagnostic process of endometrial disorders, yet further applications could emerge if its complex milieu was simplified. Exosome-like vesicles isolated from uterine aspirates could become an attractive source of biomarkers, but there is a need to standardize isolation protocols. The objective of the study was to determine whether exosome-like vesicles exist in the fluid fraction of uterine aspirates and to compare protocols for their isolation, characterization, and analysis. We collected uterine aspirates from 39 pre-menopausal women suffering from benign gynecological diseases. The fluid fraction of 27 of those aspirates were pooled and split into equal volumes to evaluate three differential centrifugation-based procedures: (1) a standard protocol, (2) a filtration protocol, and (3) a sucrose cushion protocol. Characterization of isolated vesicles was assessed by electron microscopy, nanoparticle tracking analysis and immunoblot. Specifically for RNA material, we evaluate the effect of sonication and RNase A treatment at different steps of the protocol. We finally confirmed the efficiency of the selected methods in non-pooled samples. All protocols were useful to isolate exosome-like vesicles. However, the Standard procedure was the best performing protocol to isolate exosome-like vesicles from uterine aspirates: nanoparticle tracking analysis revealed a higher concentration of vesicles with a mode of 135 ± 5 nm, and immunoblot showed a higher expression of exosome-related markers (CD9, CD63, and CD81) thus verifying an enrichment in this type of vesicles. RNA contained in exosome-like vesicles was successfully extracted with no sonication treatment and exogenous nucleic acids digestion with RNaseA, allowing the analysis of the specific inner cargo by Real-Time qPCR. We confirmed the existence of exosome-like vesicles in the fluid fraction of uterine aspirates. They were successfully isolated by differential centrifugation giving sufficient proteomic and transcriptomic material for further analyses. The Standard protocol was the best performing procedure since the other two tested protocols did not ameliorate neither yield nor purity of exosome-like vesicles. This study contributes to establishing the basis for future comparative studies to foster the field of biomarker research in gynecology.
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2012 CFR
2012-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2014 CFR
2014-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2011 CFR
2011-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2010 CFR
2010-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2013 CFR
2013-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2013 CFR
2013-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2011 CFR
2011-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-71 - Protection of human subjects-exemption.
Code of Federal Regulations, 2012 CFR
2012-10-01
... a systematic investigation, including research development, testing and evaluation, designed to...; (2) Documentation of approval for the human subjects research protocol, questionnaires, surveys... contractor modifies a human subjects research protocol, questionnaire, survey, advertisement, or informed...
48 CFR 1352.235-70 - Protection of human subjects.
Code of Federal Regulations, 2014 CFR
2014-10-01
... investigation, including research development, testing and evaluation, designed to develop or contribute to... subjects research protocol, all questionnaires, surveys, advertisements, and informed consent forms... addition, if the contractor modifies a human subjects research protocol, questionnaire, survey...
NASA Astrophysics Data System (ADS)
Wang, Le; Zhao, Sheng-Mei; Gong, Long-Yan; Cheng, Wei-Wen
2015-12-01
In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003), the Natural Science Research Foundation for Universities of Jiangsu Province of China (Grant No. 11KJA510002), the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011), and the Innovation Program of Graduate Education of Jiangsu Province, China (Grant No. KYLX0810). Gong Long-Yan is partially supported by Qinglan Project of Jiangsu Province, China.
Riber-Hansen, Rikke; Hastrup, Nina; Clemmensen, Ole; Behrendt, Nille; Klausen, Siri; Ramsing, Mette; Spaun, Eva; Hamilton-Dutoit, Stephen Jacques; Steiniche, Torben
2012-02-01
Metastasis size in melanoma sentinel lymph nodes (SLNs) is an emerging prognostic factor. Two European melanoma treatment trials include SLN metastasis diameters as inclusion criteria. Whilst diameter estimates are sensitive to the number of sections examined, the level of this bias is largely unknown. We performed a prospective multicentre study to compare the European Organisation for Research and Treatment of Cancer (EORTC) recommended protocol with a protocol of complete step-sectioning. One hundred and thirty-three consecutive SLNs from seven SLN centres were analysed by five central sections 50μm apart (EORTC Protocol) followed by complete 250μm step-sectioning. Overall, 29 patients (21.8%) were SLN-positive. The EORTC Protocol missed eight of these metastases (28%), one metastasis measuring less than 0.1mm in diameter, seven measuring between 0.1 and 1mm. Complete step-sectioning at 250μm intervals (Extensive Protocol) missed one metastasis (3%) that measured less than 0.1mm. Thirteen treatment courses (34%) performed if inclusion was based on the Combined Protocol would not be performed if assessed by the EORTC Protocol. Thus, 10 patients would be without completion lymph node dissection (EORTC MINITUB study), whilst three patients would not be eligible for anti-CTLA4 trial (EORTC protocol 18071). The corresponding number with the Extensive Protocol would be three; one patient for the MINITUB registration study and two patients for the anti-CTLA4 study. Examining SLNs by close central sectioning alone (EORTC Protocol) misses a substantial number of metastases and underestimates the maximum metastasis diameter, leading to important changes in patient eligibility for various treatment protocols. Copyright © 2011 Elsevier Ltd. All rights reserved.
Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Leeuwen, Brian P.; Eldridge, John M.
Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less
de Kroon, Marlou L A; Bulthuis, Jozien; Mulder, Wico; Schaafsma, Frederieke G; Anema, Johannes R
2016-12-01
Since the extent of sick leave and the problems of vocational school students are relatively large, we aimed to tailor a sick leave protocol at Dutch lower secondary education schools to the particular context of vocational schools. Four steps of the iterative process of Intervention Mapping (IM) to adapt this protocol were carried out: (1) performing a needs assessment and defining a program objective, (2) determining the performance and change objectives, (3) identifying theory-based methods and practical strategies and (4) developing a program plan. Interviews with students using structured questionnaires, in-depth interviews with relevant stakeholders, a literature research and, finally, a pilot implementation were carried out. A sick leave protocol was developed that was feasible and acceptable for all stakeholders. The main barriers for widespread implementation are time constraints in both monitoring and acting upon sick leave by school and youth health care. The iterative process of IM has shown its merits in the adaptation of the manual 'A quick return to school is much better' to a sick leave protocol for vocational school students.
Rosa, Carmen; Campbell, Aimee; Kleppinger, Cynthia; Sampson, Royce; Tyson, Clare; Mamay-Gentilin, Stephanie
2009-04-01
Quality assurance (QA) of clinical trials is essential to protect the welfare of trial participants and the integrity of the data collected. However, there is little detailed information available on specific procedures and outcomes of QA monitoring for clinical trials. This article describes the experience of the National Institute on Drug Abuse's (NIDA) National Drug Abuse Treatment Clinical Trials Network (CTN) in devising and implementing a three-tiered QA model for rigorous multi-site randomized clinical trials implemented in community-based substance abuse treatment programs. The CTN QA model combined local and national resources and was developed to address the unique needs of clinical trial sites with limited research experience. The authors reviewed internal records maintained by the sponsor, a coordinating site (Lead Nodes), and a local site detailing procedural development, training sessions, protocol violation monitoring, and site visit reporting. Between January 2001 and September 2005, the CTN implemented 21 protocols, of which 18 were randomized clinical trials, one was a quality improvement study and two were surveys. Approximately 160 community-based treatment programs participated in the 19 studies that were monitored, with a total of 6560 participants randomized across the sites. During this time 1937 QA site visits were reported across the three tiers of monitoring and the cost depended on the location of the sites and the salaries of the staff involved. One study reported 109 protocol violations (M = 15.6). Examples are presented to highlight training, protocol violation monitoring, site visit frequency and intensity and cost considerations. : QA data from the entire network were not easily available for review as much of the data were not electronically accessible. The authors reviewed and discussed a representative sample of internal data from the studies and participating sites. The lessons learned from the CTN's experience include the need for balancing thoroughness with efficiency, monitoring early, assessing research staff abilities in order to judge the need for proactive, focused attention, providing targeted training sessions, and developing flexible tools. The CTN model can work for sponsors overseeing studies at sites with limited research experience that require more frequent, in-depth monitoring. We recommend that sponsors not develop a rigid monitoring approach, but work with the study principal investigators to determine the intensity of monitoring needed depending on trial complexity, the risks of the intervention(s), and the experience of the staff with clinical research. After careful evaluation, sponsors should then determine the best approach to site monitoring and what resources will be needed.
Rosa, Carmen; Campbell, Aimee; Kleppinger, Cynthia; Sampson, Royce; Tyson, Clare; Mamay-Gentilin, Stephanie
2009-01-01
Background: Quality assurance (QA) of clinical trials is essential to protect the welfare of trial participants and the integrity of the data collected. However, there is little detailed information available on specific procedures and outcomes of QA monitoring for clinical trials. Purpose: This article describes the experience of the National Institute on Drug Abuse's (NIDA) National Drug Abuse Treatment Clinical Trials Network (CTN) in devising and implementing a three-tiered QA model for rigorous multi-site randomized clinical trials implemented in community-based substance abuse treatment programs. The CTN QA model combined local and national resources and was developed to address the unique needs of clinical trial sites with limited research experience. Methods: The authors reviewed internal records maintained by the sponsor, a coordinating site (Lead Nodes), and a local site detailing procedural development, training sessions, protocol violation monitoring, and site visit reporting. Results: Between January 2001 and September 2005, the CTN implemented 21 protocols, of which 18 were randomized clinical trials, one was a quality improvement study and two were surveys. Approximately 160 community-based treatment programs participated in the 19 studies that were monitored, with a total of 6560 participants randomized across the sites. During this time 1937 QA site visits were reported across the three tiers of monitoring and the cost depended on the location of the sites and the salaries of the staff involved. One study reported 109 protocol violations (M = 15.6). Examples are presented to highlight training, protocol violation monitoring, site visit frequency and intensity and cost considerations. Limitations: QA data from the entire network were not easily available for review as much of the data were not electronically accessible. The authors reviewed and discussed a representative sample of internal data from the studies and participating sites. Conclusions: The lessons learned from the CTN's experience include the need for balancing thoroughness with efficiency, monitoring early, assessing research staff abilities in order to judge the need for proactive, focused attention, providing targeted training sessions, and developing flexible tools. The CTN model can work for sponsors overseeing studies at sites with limited research experience that require more frequent, in-depth monitoring. We recommend that sponsors not develop a rigid monitoring approach, but work with the study principal investigators to determine the intensity of monitoring needed depending on trial complexity, the risks of the intervention(s), and the experience of the staff with clinical research. After careful evaluation, sponsors should then determine the best approach to site monitoring and what resources will be needed. PMID:19342468
A Pilot Systematic Review and Meta-Analysis on the Effectiveness of Problem Based Learning.
ERIC Educational Resources Information Center
Newman, Mark
This paper reports on the development and piloting of a systematic review and meta analysis of research on the effectiveness of problem based learning (PBL). The systematic review protocol was pilot tested with a sample of studies cited as providing "evidence" about the effectiveness of PBL. From the 5 studies mentioned in the sample of reviews,…
Principal Leadership of Data Team Protocols within a Professional Learning Community
ERIC Educational Resources Information Center
Chambers, Charmelle
2014-01-01
The following document represents a Problem Based Learning Project (PBL) focusing on school leadership practices leading to increased student achievement. Current research findings indicate effective principals recognize the importance of building teacher capacity through promoting collaborative team work. School principals effectively leading…
Zone-Based Routing Protocol for Wireless Sensor Networks
Venkateswarlu Kumaramangalam, Muni; Adiyapatham, Kandasamy; Kandasamy, Chandrasekaran
2014-01-01
Extensive research happening across the globe witnessed the importance of Wireless Sensor Network in the present day application world. In the recent past, various routing algorithms have been proposed to elevate WSN network lifetime. Clustering mechanism is highly successful in conserving energy resources for network activities and has become promising field for researches. However, the problem of unbalanced energy consumption is still open because the cluster head activities are tightly coupled with role and location of a particular node in the network. Several unequal clustering algorithms are proposed to solve this wireless sensor network multihop hot spot problem. Current unequal clustering mechanisms consider only intra- and intercluster communication cost. Proper organization of wireless sensor network into clusters enables efficient utilization of limited resources and enhances lifetime of deployed sensor nodes. This paper considers a novel network organization scheme, energy-efficient edge-based network partitioning scheme, to organize sensor nodes into clusters of equal size. Also, it proposes a cluster-based routing algorithm, called zone-based routing protocol (ZBRP), for elevating sensor network lifetime. Experimental results show that ZBRP out-performs interims of network lifetime and energy conservation with its uniform energy consumption among the cluster heads. PMID:27437455
Zone-Based Routing Protocol for Wireless Sensor Networks.
Venkateswarlu Kumaramangalam, Muni; Adiyapatham, Kandasamy; Kandasamy, Chandrasekaran
2014-01-01
Extensive research happening across the globe witnessed the importance of Wireless Sensor Network in the present day application world. In the recent past, various routing algorithms have been proposed to elevate WSN network lifetime. Clustering mechanism is highly successful in conserving energy resources for network activities and has become promising field for researches. However, the problem of unbalanced energy consumption is still open because the cluster head activities are tightly coupled with role and location of a particular node in the network. Several unequal clustering algorithms are proposed to solve this wireless sensor network multihop hot spot problem. Current unequal clustering mechanisms consider only intra- and intercluster communication cost. Proper organization of wireless sensor network into clusters enables efficient utilization of limited resources and enhances lifetime of deployed sensor nodes. This paper considers a novel network organization scheme, energy-efficient edge-based network partitioning scheme, to organize sensor nodes into clusters of equal size. Also, it proposes a cluster-based routing algorithm, called zone-based routing protocol (ZBRP), for elevating sensor network lifetime. Experimental results show that ZBRP out-performs interims of network lifetime and energy conservation with its uniform energy consumption among the cluster heads.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Identifying Effective and Sustainable Measures for Community-Based Environmental Monitoring
NASA Astrophysics Data System (ADS)
McKay, Ariana J.; Johnson, Chris J.
2017-09-01
Resource development projects typically result in monitoring programs that fail to fully consider the values and participation of surrounding communities. Also, monitoring protocols for single environmental values can be insufficient for addressing the cumulative impacts of resource development. Community-based environmental monitoring (CBEM) has emerged as a way to meaningfully include local citizens in the decision-making process and assessment of the development of natural resources. Our research explored how to develop effective and sustainable CBEM. Interviews were conducted with staff from 15 CBEM programs established across Canada to identify criteria of what constitutes effective CBEM. Results demonstrate that CBEM offers an effective, locally adapted, and culturally applicable approach to facilitate community participation in natural resource management and to track environmental change. Benefits of CBEM include: locally relevant monitoring protocols, inclusion of cumulative impacts, better informed decision-making, and increased awareness and collaboration amongst community, governments, and proponents. Challenges associated with CBEM are cost, capacity, longevity, distribution of results, and establishing credibility. This research validates the use of CBEM for improving resource management.
UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna
NASA Astrophysics Data System (ADS)
Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang
2018-01-01
This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.
Microfluidic differential immunocapture biochip for specific leukocyte counting
Hassan, Umer; Watkins, Nicholas N; Reddy, Bobby; Damhorst, Gregory; Bashir, Rashid
2016-01-01
Enumerating specific cell types from whole blood can be very useful for research and diagnostic purposes—e.g., for counting of cD4 and cD8 t cells in HIV/aIDs diagnostics. We have developed a biosensor based on a differential immunocapture technology to enumerate specific cells in 30 min using 10 µl of blood. this paper provides a comprehensive stepwise protocol to replicate our biosensor for cD4 and cD8 cell counts. the biochip can also be adapted to enumerate other specific cell types such as somatic cells or cells from tissue or liquid biopsies. capture of other specific cells requires immobilization of their corresponding antibodies within the capture chamber. therefore, this protocol is useful for research into areas surrounding immunocapture-based biosensor development. the biosensor production requires 24 h, a one-time cell capture optimization takes 6–9 h, and the final cell counting experiment in a laboratory environment requires 30 min to complete. PMID:26963632
Dyrbye, Liselotte N; Thomas, Matthew R; Mechaber, Alex J; Eacker, Anne; Harper, William; Massie, F Stanford; Power, David V; Shanafelt, Tait D
2007-07-01
To compare how different institutional review boards (IRBs) process and evaluate the same multiinstitutional educational research proposal of medical students' quality of life. Prospective collection in 2005 of key variables regarding the IRB submission and review process of the same educational research proposal involving medical students, which was submitted to six IRBs, each associated with a different medical school. Four IRBs determined the protocol was appropriate for expedited review, and the remaining two required full review. Substantial variation existed in the time to review the protocol by an IRB administrator/IRB member (range 1-101 days) and by the IRB committee (range 6-115 days). One IRB committee approved the study as written. The remaining five IRB committees had a median of 13 requests for additional information/changes to the protocol. Sixty-eight percent of requests (36 of 53) pertained to the informed consent letter; one third (12 of 36) of these requests were unique modifications requested by one IRB but not the others. Although five IRB committees approved the survey after a median of 47 days (range 6-73), one committee had not responded six months after submission (164 days), preventing that school from participating. The findings suggest variability in the timeliness and consistency of IRB review of medical education research across institutions that may hinder multi-institutional research and slow evidence-based medical education reform. The findings demonstrate the difficulties of having medical education research reviewed by IRBs, which are typically designed to review clinical trials, and suggest that the review process for medical education research needs reform.
Students Engaged in Climate Change Research Through Vegetation Phenology Studies
NASA Astrophysics Data System (ADS)
Sparrow, E. B.; Verbyla, D. L.; White, M. A.; Gordon, L. S.
2004-12-01
The project goal is to engage students in scientific research as a way of learning science, math, and technology in K-12 classrooms by providing an opportunity for student-scientist collaborations. This NSF-funded GLOBE project is of significance to scientists who track plant phenological changes as an indicator of climate change and study carbon cycling. To students it is a means of studying Earth as a system. Plants and their phenology stages reflect and integrate the effects of weather and other environmental parameters that are components of the Earth system. Remotely sensed data indicate that the plant growing season has increased in northern latitudes. The greenness estimates could vary due to possible interference from clouds and other atmospheric properties, low sun angles at high latitudes and aging of satellite detectors; hence the need for ground-based observations to help validate satellite-derived estimates of plant growing season lengths. GLOBE plant phenology measurements (protocols) of Green-up and Green-down for deciduous trees and shrubs, and for grasses were developed at the University of Alaska Fairbanks, and Budburst at Utah State University. These were pilot- tested, and revised several times with input from teachers and GLOBE personnel. Learning activities to support understanding of science concepts, were also developed and/or adapted. The protocols and learning activities were aligned to national science standards and incorporated in the "Earth as a System" chapter in the 2003 GLOBE Teacher Guide published and also posted on the GLOBE website (www.globe.gov). Phenology protocols and learning activities are being used in Alaska by teachers and students who participate in different NSF and NASA-funded science education programs, such as the Schoolyard Long Term Ecological Research Project, the Global Change Education Using Western Science and Native Observations (OLCG) Project, the Alaska GLOBE program and the EPSCoR Rural Research Partnership Education Outreach program. Pre-college students and their teachers from 77 schools in 11 countries have engaged in GLOBE plant phenology research and entered phenology data on the GLOBE web server. Thus, collaborative efforts in research and education among science education projects in Alaska and in other countries have been facilitated. Scientists now have access to global plant phenology data-ground-based observations that previously have been very rare. Students have also used the phenology protocols for their own investigations.
Ellis, Isabelle; Howard, Peter; Larson, Ann; Robertson, Jeanette
2005-01-01
This article examines the process of translating evidence into practice using a facilitation model developed by the Western Australian Centre for Evidence Based Nursing and Midwifery. Using the conceptual framework Promoting Action on Research Implementation in Health Services (PARIHS), the aims of the study were (1) to explore the relative and combined importance of context and facilitation in the successful implementation of a new evidence-based clinical practice protocol and (2) to examine the establishment of more lasting change to individuals and organizations that resulted in greater incorporation of the principles of evidence-based practice (EBP). A pre-workshop, semi-structured telephone survey with 16 nurse managers in six rural hospitals; a summative evaluation immediately post-workshop with 54 participants; and follow-up, semi-structured interviews with 23 workshop participants. The contexts in each of the participating hospitals were very different; of the six hospitals, only one had not implemented the new protocol. Five had reviewed their practices and brought them in line with the protocol developed at the workshop. The rate of adoption varied considerably from 2 weeks to months. The participants reported being better informed about EBP in general and were positive about their ability to improve their practice and search more efficiently for best practice information. Underlying motivations for protocol development should be included in the PARIHS framework. IMPLICATIONS FOR EDUCATION: Good facilitation appears to be more influential than context in overcoming the barriers to the uptake of EBP.
Investigating the Effects of the Interaction Intensity in a Weak Measurement.
Piacentini, Fabrizio; Avella, Alessio; Gramegna, Marco; Lussana, Rudi; Villa, Federica; Tosi, Alberto; Brida, Giorgio; Degiovanni, Ivo Pietro; Genovese, Marco
2018-05-03
Measurements are crucial in quantum mechanics, for fundamental research as well as for applicative fields like quantum metrology, quantum-enhanced measurements and other quantum technologies. In the recent years, weak-interaction-based protocols like Weak Measurements and Protective Measurements have been experimentally realized, showing peculiar features leading to surprising advantages in several different applications. In this work we analyze the validity range for such measurement protocols, that is, how the interaction strength affects the weak value extraction, by measuring different polarization weak values on heralded single photons. We show that, even in the weak interaction regime, the coupling intensity limits the range of weak values achievable, setting a threshold on the signal amplification effect exploited in many weak measurement based experiments.
NASA Astrophysics Data System (ADS)
Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui
There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.
Rakovshik, Sarah G; McManus, Freda
2010-07-01
Cognitive behavior therapy's (CBT) demonstrated efficacy has prompted calls for its increased dissemination to routine clinical practice settings. For the widespread dissemination of CBT to be successful in achieving effects similar to the original efficacy trials, there must also be effective dissemination of CBT training practices. However, as yet, CBT training is not evidence-based. This review examines what can be learned from existing research into the efficacy and effectiveness of CBT training. Due to the paucity of research specifically investigating CBT training, CBT effectiveness and dissemination studies are also examined to glean information about potentially effective training practices. In order to draw conclusions about effective training practices, comparisons are drawn between studies according to the clinical outcomes that they achieved. Training approaches are compared according to dose and active training elements, and theoretical models of learning are applied to interpret the findings. The limitations of the existing literature are discussed, as well as recommendations for improving training research to meet the standards evident in treatment trials (e.g., random allocation, control conditions, self-report and blind assessment, and adherence monitoring). Finally, the process of developing efficacious CBT treatment protocols is offered as a template for developing evidence-based CBT training protocols. 2010 Elsevier Ltd. All rights reserved.
Comprehensive overview of computer-based health information tailoring: a scoping review protocol.
Ghalibaf, Azadeh Kamel; Nazari, Elham; Gholian-Aval, Mahdi; Tabesh, Hamed; Tara, Mahmood
2017-12-27
Tailoring health information to the needs of individuals has become an important part of modern health communications. Tailoring has been addressed by researchers from different disciplines leading to the emergence of a wide range of approaches, making the newcomers confused. In order to address this, a comprehensive overview of the field with the indications of research gaps, tendencies and trends will be helpful. As a result, a systematic protocol was outlined to conduct a scoping review within the field of computer-based health information tailoring. This protocol is based on the York's five-stage framework outlined by Arksey and O'Malley. A field-specific structure was defined as a basis for undertaking each stage. The structure comprised three main aspects: system design , information communication and evaluation . Five leading databases were searched: PubMed, Scopus, Science Direct, EBSCO and IEEE and a broad search strategy was used with less strict inclusion criteria to cover the breadth of evidence. Theoretical frameworks were used to develop the data extraction form and a rigorous approach was introduced to identify the categories from data. Several explanatory-descriptive methods were considered to analyse the data, from which some were proposed to be employed for the first time in scoping studies. This study investigates the breadth and depth of existing literature on computer-tailoring and as a secondary analysis, does not require ethics approval. We anticipate that the results will identify research gaps and novel ideas for future studies and provide direction to combine methods from different disciplines. The research findings will be submitted for publication to relevant peer-reviewed journals and conferences targeting health promotion and patient education. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Whitworth, David E
2016-07-08
Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
NASA Astrophysics Data System (ADS)
Gavrielides, Marios A.; DeFilippo, Gino; Berman, Benjamin P.; Li, Qin; Petrick, Nicholas; Schultz, Kurt; Siegelman, Jenifer
2017-03-01
Computed tomography is primarily the modality of choice to assess stability of nonsolid pulmonary nodules (sometimes referred to as ground-glass opacity) for three or more years, with change in size being the primary factor to monitor. Since volume extracted from CT is being examined as a quantitative biomarker of lung nodule size, it is important to examine factors affecting the performance of volumetric CT for this task. More specifically, the effect of reconstruction algorithms and measurement method in the context of low-dose CT protocols has been an under-examined area of research. In this phantom study we assessed volumetric CT with two different measurement methods (model-based and segmentation-based) for nodules with radiodensities of both nonsolid (-800HU and -630HU) and solid (-10HU) nodules, sizes of 5mm and 10mm, and two different shapes (spherical and spiculated). Imaging protocols included CTDIvol typical of screening (1.7mGy) and sub-screening (0.6mGy) scans and different types of reconstruction algorithms across three scanners. Results showed that radio-density was the factor contributing most to overall error based on ANOVA. The choice of reconstruction algorithm or measurement method did not affect substantially the accuracy of measurements; however, measurement method affected repeatability with repeatability coefficients ranging from around 3-5% for the model-based estimator to around 20-30% across reconstruction algorithms for the segmentation-based method. The findings of the study can be valuable toward developing standardized protocols and performance claims for nonsolid nodules.
Rethinking the NTCIP Design and Protocols - Analyzing the Issues
DOT National Transportation Integrated Search
1998-03-03
This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...
Liu, Chi; He, Gu; Jiang, Qinglin; Han, Bo; Peng, Cheng
2013-01-01
Methione tRNA synthetase (MetRS) is an essential enzyme involved in protein biosynthesis in all living organisms and is a potential antibacterial target. In the current study, the structure-based pharmacophore (SBP)-guided method has been suggested to generate a comprehensive pharmacophore of MetRS based on fourteen crystal structures of MetRS-inhibitor complexes. In this investigation, a hybrid protocol of a virtual screening method, comprised of pharmacophore model-based virtual screening (PBVS), rigid and flexible docking-based virtual screenings (DBVS), is used for retrieving new MetRS inhibitors from commercially available chemical databases. This hybrid virtual screening approach was then applied to screen the Specs (202,408 compounds) database, a structurally diverse chemical database. Fifteen hit compounds were selected from the final hits and shifted to experimental studies. These results may provide important information for further research of novel MetRS inhibitors as antibacterial agents. PMID:23839093
Facilitating the Adoption of Contingency Management for the Treatment of Substance Use Disorders
Roll, John M; Madden, Gregory J; Rawson, Richard; Petry, Nancy M
2009-01-01
Contingency management (CM) is an effective treatment strategy for addressing many types of substance abuse disorders and associated problems. Nonetheless, CM protocols have not been widely embraced by community-based treatment providers. Exploration of the viability of CM outside of a research context remains largely an academic pursuit. In this paper, we outline several areas that may hinder the transfer of CM technology into community-based practice settings, review the literature that may address these barriers, and offer suggestions to researchers for overcoming them. PMID:22477692
Web Transfer Over Satellites Being Improved
NASA Technical Reports Server (NTRS)
Allman, Mark
1999-01-01
Extensive research conducted by NASA Lewis Research Center's Satellite Networks and Architectures Branch and the Ohio University has demonstrated performance improvements in World Wide Web transfers over satellite-based networks. The use of a new version of the Hypertext Transfer Protocol (HTTP) reduced the time required to load web pages over a single Transmission Control Protocol (TCP) connection traversing a satellite channel. However, an older technique of simultaneously making multiple requests of a given server has been shown to provide even faster transfer time. Unfortunately, the use of multiple simultaneous requests has been shown to be harmful to the network in general. Therefore, we are developing new mechanisms for the HTTP protocol which may allow a single request at any given time to perform as well as, or better than, multiple simultaneous requests. In the course of study, we also demonstrated that the time for web pages to load is at least as short via a satellite link as it is via a standard 28.8-kbps dialup modem channel. This demonstrates that satellites are a viable means of accessing the Internet.
Shanks, O.C.; Sivaganesan, M.; Peed, L.; Kelty, C.A.; Blackwood, A.D.; Greene, M.R.; Noble, R.T.; Bushon, R.N.; Stelzer, E.A.; Kinzelman, J.; Anan'Eva, T.; Sinigalliano, C.; Wanless, D.; Griffith, J.; Cao, Y.; Weisberg, S.; Harwood, V.J.; Staley, C.; Oshima, K.H.; Varma, M.; Haugland, R.A.
2012-01-01
The application of quantitative real-time PCR (qPCR) technologies for the rapid identification of fecal bacteria in environmental waters is being considered for use as a national water quality metric in the United States. The transition from research tool to a standardized protocol requires information on the reproducibility and sources of variation associated with qPCR methodology across laboratories. This study examines interlaboratory variability in the measurement of enterococci and Bacteroidales concentrations from standardized, spiked, and environmental sources of DNA using the Entero1a and GenBac3 qPCR methods, respectively. Comparisons are based on data generated from eight different research facilities. Special attention was placed on the influence of the DNA isolation step and effect of simplex and multiplex amplification approaches on interlaboratory variability. Results suggest that a crude lysate is sufficient for DNA isolation unless environmental samples contain substances that can inhibit qPCR amplification. No appreciable difference was observed between simplex and multiplex amplification approaches. Overall, interlaboratory variability levels remained low (<10% coefficient of variation) regardless of qPCR protocol. ?? 2011 American Chemical Society.
The APOSTEL recommendations for reporting quantitative optical coherence tomography studies.
Cruz-Herranz, Andrés; Balk, Lisanne J; Oberwahrenbrock, Timm; Saidha, Shiv; Martinez-Lapiscina, Elena H; Lagreze, Wolf A; Schuman, Joel S; Villoslada, Pablo; Calabresi, Peter; Balcer, Laura; Petzold, Axel; Green, Ari J; Paul, Friedemann; Brandt, Alexander U; Albrecht, Philipp
2016-06-14
To develop consensus recommendations for reporting of quantitative optical coherence tomography (OCT) study results. A panel of experienced OCT researchers (including 11 neurologists, 2 ophthalmologists, and 2 neuroscientists) discussed requirements for performing and reporting quantitative analyses of retinal morphology and developed a list of initial recommendations based on experience and previous studies. The list of recommendations was subsequently revised during several meetings of the coordinating group. We provide a 9-point checklist encompassing aspects deemed relevant when reporting quantitative OCT studies. The areas covered are study protocol, acquisition device, acquisition settings, scanning protocol, funduscopic imaging, postacquisition data selection, postacquisition data analysis, recommended nomenclature, and statistical analysis. The Advised Protocol for OCT Study Terminology and Elements recommendations include core items to standardize and improve quality of reporting in quantitative OCT studies. The recommendations will make reporting of quantitative OCT studies more consistent and in line with existing standards for reporting research in other biomedical areas. The recommendations originated from expert consensus and thus represent Class IV evidence. They will need to be regularly adjusted according to new insights and practices. © 2016 American Academy of Neurology.
National protocol framework for the inventory and monitoring of bees
Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,
2016-01-01
This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative describes the history and need for the protocol framework and summarizes the basic elements of objectives, sampling design, field methods, training, data management, analysis, and reporting. The SOPs provide more detail and specific instructions for implementing the protocol framework. A central database, for managing all the resulting data is under development. We welcome use of this protocol framework by our partners, as appropriate for their bee inventory and monitoring objectives.
USDA-ARS?s Scientific Manuscript database
The fungus Colletotrichum cereale incites anthracnose disease on Poa annua (annual bluegrass) turfgrass. Anthracnose disease is geographically widespread highly destructive, with infections by C. cereale resulting in extensive turfgrass loss. Comprehensive research aimed at controlling turfgrass a...
Computer-Based Techniques for Collection of Pulmonary Function Variables during Rest and Exercise.
1991-03-01
routinely Included in experimental protocols involving hyper- and hypobaric excursions. Unfortunately, the full potential of those tests Is often not...for a Pulmonary Function data acquisition system that has proven useful in the hyperbaric research laboratory. It illustrates how computers can
Increasing value and reducing waste: addressing inaccessible research.
Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C; Krumholz, Harlan M; Ghersi, Davina; van der Worp, H Bart
2014-01-18
The methods and results of health research are documented in study protocols, full study reports (detailing all analyses), journal reports, and participant-level datasets. However, protocols, full study reports, and participant-level datasets are rarely available, and journal reports are available for only half of all studies and are plagued by selective reporting of methods and results. Furthermore, information provided in study protocols and reports varies in quality and is often incomplete. When full information about studies is inaccessible, billions of dollars in investment are wasted, bias is introduced, and research and care of patients are detrimentally affected. To help to improve this situation at a systemic level, three main actions are warranted. First, academic institutions and funders should reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Second, standards for the content of protocols and full study reports and for data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should endorse and enforce policies supporting study registration and wide availability of journal reports, full study reports, and participant-level datasets. Copyright © 2014 Elsevier Ltd. All rights reserved.
Increasing value and reducing waste: addressing inaccessible research
Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C.; Krumholz, Harlan M.; Ghersi, Davina; van der Worp, H. Bart
2015-01-01
The study protocol, publications, full study report detailing all analyses, and participant-level dataset constitute the main documentation of methods and results for health research. However, journal publications are available for only half of all studies and are plagued by selective reporting of methods and results. The protocol, full study report, and participant-level dataset are rarely available. The quality of information provided in study protocols and reports is variable and often incomplete. Inaccessibility of full information for the vast majority of studies wastes billions of dollars, introduces bias, and has a detrimental impact on patient care and research. To help improve this situation at a systemic level, three main actions are warranted. Firstly, it is important that academic institutions and funders reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Secondly, standards for the content of protocols, full study reports, and data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should implement and enforce policies supporting study registration and availability of journal publications, full study reports, and participant-level datasets. PMID:24411650
A shorter and more specific oral sensitization-based experimental model of food allergy in mice.
Bailón, Elvira; Cueto-Sola, Margarita; Utrilla, Pilar; Rodríguez-Ruiz, Judith; Garrido-Mesa, Natividad; Zarzuelo, Antonio; Xaus, Jordi; Gálvez, Julio; Comalada, Mònica
2012-07-31
Cow's milk protein allergy (CMPA) is one of the most prevalent human food-borne allergies, particularly in children. Experimental animal models have become critical tools with which to perform research on new therapeutic approaches and on the molecular mechanisms involved. However, oral food allergen sensitization in mice requires several weeks and is usually associated with unspecific immune responses. To overcome these inconveniences, we have developed a new food allergy model that takes only two weeks while retaining the main characters of allergic response to food antigens. The new model is characterized by oral sensitization of weaned Balb/c mice with 5 doses of purified cow's milk protein (CMP) plus cholera toxin (CT) for only two weeks and posterior challenge with an intraperitoneal administration of the allergen at the end of the sensitization period. In parallel, we studied a conventional protocol that lasts for seven weeks, and also the non-specific effects exerted by CT in both protocols. The shorter protocol achieves a similar clinical score as the original food allergy model without macroscopically affecting gut morphology or physiology. Moreover, the shorter protocol caused an increased IL-4 production and a more selective antigen-specific IgG1 response. Finally, the extended CT administration during the sensitization period of the conventional protocol is responsible for the exacerbated immune response observed in that model. Therefore, the new model presented here allows a reduction not only in experimental time but also in the number of animals required per experiment while maintaining the features of conventional allergy models. We propose that the new protocol reported will contribute to advancing allergy research. Copyright © 2012 Elsevier B.V. All rights reserved.
Frierson, Georita M; Morrow, James R; Vidales, Andrew
2012-01-01
Researchers studying physical activity often face challenges dealing with recruitment and resources, particularly when conducting longitudinal Internet-based research. Commonly raised methodological problems such as minority recruitment, participant commitment, and participant-staff involvement are addressed through a theoretically driven recruitment and adherence protocol in The Women's Exercise Injuries: Incidence and Risk Factors (WIN) Internet-based study. The objectives of this paper were to review and suggest solutions to problems of: (1) low recruitment of diverse samples, (2) low adherence, and (3) staffing needs. We recruited 1303 community-dwelling women and followed them through a multiple-phase, longitudinal, Internet-based study. Recruitment and adherence data were analyzed through descriptive methods and logistic regressions to examine participant adherence and sociodemographic factors and predictors of who entered the long-term phase of the study. We successfully retained 71.6% of the sample through 4 recruitment phases. Twenty-seven percent of the initially recruited sample was racial/ethnically diverse, 24% began the long-term phase, and 23% completed. Several strategies to enhance participant commitment were successfully used during the practice phase, providing a successful, low staff to participant ratio. Logistic regression indicated being married, being older, and having greater Internet skills were predictive of successfully entering the long-term phase of the study. Recruitment and compliance protocols were successful in meeting overall and racial/ethnic enrollment and recruitment goals. The theoretically based practice phase techniques were successful in re-engaging noncompliant participants. Strategies for minority enrollment and compliance are evaluated.
Flow cytometry for enrichment and titration in massively parallel DNA sequencing
Sandberg, Julia; Ståhl, Patrik L.; Ahmadian, Afshin; Bjursell, Magnus K.; Lundeberg, Joakim
2009-01-01
Massively parallel DNA sequencing is revolutionizing genomics research throughout the life sciences. However, the reagent costs and labor requirements in current sequencing protocols are still substantial, although improvements are continuously being made. Here, we demonstrate an effective alternative to existing sample titration protocols for the Roche/454 system using Fluorescence Activated Cell Sorting (FACS) technology to determine the optimal DNA-to-bead ratio prior to large-scale sequencing. Our method, which eliminates the need for the costly pilot sequencing of samples during titration is capable of rapidly providing accurate DNA-to-bead ratios that are not biased by the quantification and sedimentation steps included in current protocols. Moreover, we demonstrate that FACS sorting can be readily used to highly enrich fractions of beads carrying template DNA, with near total elimination of empty beads and no downstream sacrifice of DNA sequencing quality. Automated enrichment by FACS is a simple approach to obtain pure samples for bead-based sequencing systems, and offers an efficient, low-cost alternative to current enrichment protocols. PMID:19304748
Highly multiplexed targeted DNA sequencing from single nuclei.
Leung, Marco L; Wang, Yong; Kim, Charissa; Gao, Ruli; Jiang, Jerry; Sei, Emi; Navin, Nicholas E
2016-02-01
Single-cell DNA sequencing methods are challenged by poor physical coverage, high technical error rates and low throughput. To address these issues, we developed a single-cell DNA sequencing protocol that combines flow-sorting of single nuclei, time-limited multiple-displacement amplification (MDA), low-input library preparation, DNA barcoding, targeted capture and next-generation sequencing (NGS). This approach represents a major improvement over our previous single nucleus sequencing (SNS) Nature Protocols paper in terms of generating higher-coverage data (>90%), thereby enabling the detection of genome-wide variants in single mammalian cells at base-pair resolution. Furthermore, by pooling 48-96 single-cell libraries together for targeted capture, this approach can be used to sequence many single-cell libraries in parallel in a single reaction. This protocol greatly reduces the cost of single-cell DNA sequencing, and it can be completed in 5-6 d by advanced users. This single-cell DNA sequencing protocol has broad applications for studying rare cells and complex populations in diverse fields of biological research and medicine.
Shortcuts to Adiabaticity in Transport of a Single Trapped Ion
NASA Astrophysics Data System (ADS)
An, Shuoming; Lv, Dingshun; Campo, Adolfo Del; Kim, Kihwan
2015-05-01
We report an experimental study on shortcuts to adiabaticity in the transport of a single 171Yb+ ion trapped in a harmonic potential. In these driving schemes, the application of a force induces a nonadiabatic dynamics in which excitations are tailored so as to preserve the ion motional state in the ground state upon completion of the process. We experimentally apply the laser induced force and realize three different protocols: (1) a transitionless driving with a counterdiabatic term out of phase with the displacement force, (2) a classical protocol assisted by counterdiabatic fields in phase with the main force, (3) and an engineered transport protocol based on the Fourier transform of the trap acceleration. We experimentally compare and discuss the robustness of these protocols under given experimental limitations such as trap frequency drifts. This work was supported by the National Basic Research Program of China under Grants No. 2011CBA00300 (No. 2011CBA00301), the National Natural Science Foundation of China 11374178, and the University of Massachusetts Boston (No. P20150000029279).
Combined Heat and Power Protocol for Uniform Methods Project | Advanced
Manufacturing Research | NREL Combined Heat and Power Protocol for Uniform Methods Project Combined Heat and Power Protocol for Uniform Methods Project NREL developed a protocol that provides a ; is consistent with the scope and other protocols developed for the Uniform Methods Project (UMP
Data Set for Pathology Reporting of Cutaneous Invasive Melanoma
Judge, Meagan J.; Evans, Alan; Frishberg, David P.; Prieto, Victor G.; Thompson, John F.; Trotter, Martin J.; Walsh, Maureen Y.; Walsh, Noreen M.G.; Ellis, David W.
2013-01-01
An accurate and complete pathology report is critical for the optimal management of cutaneous melanoma patients. Protocols for the pathologic reporting of melanoma have been independently developed by the Royal College of Pathologists of Australasia (RCPA), Royal College of Pathologists (United Kingdom) (RCPath), and College of American Pathologists (CAP). In this study, data sets, checklists, and structured reporting protocols for pathologic examination and reporting of cutaneous melanoma were analyzed by an international panel of melanoma pathologists and clinicians with the aim of developing a common, internationally agreed upon, evidence-based data set. The International Collaboration on Cancer Reporting cutaneous melanoma expert review panel analyzed the existing RCPA, RCPath, and CAP data sets to develop a protocol containing “required” (mandatory/core) and “recommended” (nonmandatory/noncore) elements. Required elements were defined as those that had agreed evidentiary support at National Health and Medical Research Council level III-2 level of evidence or above and that were unanimously agreed upon by the review panel to be essential for the clinical management, staging, or assessment of the prognosis of melanoma or fundamental for pathologic diagnosis. Recommended elements were those considered to be clinically important and recommended for good practice but with lesser degrees of supportive evidence. Sixteen core/required data elements for cutaneous melanoma pathology reports were defined (with an additional 4 core/required elements for specimens received with lymph nodes). Eighteen additional data elements with a lesser level of evidentiary support were included in the recommended data set. Consensus response values (permitted responses) were formulated for each data item. Development and agreement of this evidence-based protocol at an international level was accomplished in a timely and efficient manner, and the processes described herein may facilitate the development of protocols for other tumor types. Widespread utilization of an internationally agreed upon, structured pathology data set for melanoma will lead not only to improved patient management but is a prerequisite for research and for international benchmarking in health care. PMID:24061524
Roberts, Laura Weiss; Kim, Jane Paik
2014-01-01
Motivation Ethical controversy surrounds clinical research involving seriously ill participants. While many stakeholders have opinions, the extent to which protocol volunteers themselves see human research as ethically acceptable has not been documented. To address this gap of knowledge, authors sought to assess views of healthy and ill clinical research volunteers regarding the ethical acceptability of human studies involving individuals who are ill or are potentially vulnerable. Methods Surveys and semi-structured interviews were used to query clinical research protocol participants and a comparison group of healthy individuals. A total of 179 respondents participated in this study: 150 in protocols (60 mentally ill, 43 physically ill, and 47 healthy clinical research protocol participants) and 29 healthy individuals not enrolled in protocols. Main outcome measures included responses regarding ethical acceptability of clinical research when it presents significant burdens and risks, involves people with serious mental and physical illness, or enrolls people with other potential vulnerabilities in the research situation. Results Respondents expressed decreasing levels of acceptance of participation in research that posed burdens of increasing severity. Participation in protocols with possibly life-threatening consequences was perceived as least acceptable (mean = 1.82, sd = 1.29). Research on serious illnesses, including HIV, cancer, schizophrenia, depression, and post-traumatic stress disorder, was seen as ethically acceptable across respondent groups (range of means = [4.0, 4.7]). Mentally ill volunteers expressed levels of ethical acceptability for physical illness research and mental illness research as acceptable and similar, while physically ill volunteers expressed greater ethical acceptability for physical illness research than for mental illness research. Mentally ill, physically ill, and healthy participants expressed neutral to favorable perspectives regarding the ethical acceptability of clinical research participation by potentially vulnerable subpopulations (difference in acceptability perceived by mentally ill - healthy=−0.04, CI [−0.46, 0.39]; physically ill – healthy= −0.13, CI [−0.62, −.36]). Conclusions Clinical research volunteers and healthy clinical research-“naive” individuals view studies involving ill people as ethically acceptable, and their responses reflect concern regarding research that poses considerable burdens and risks and research involving vulnerable subpopulations. Physically ill research volunteers may be more willing to see burdensome and risky research as acceptable. Mentally ill research volunteers and healthy individuals expressed similar perspectives in this study, helping to dispel a misconception that those with mental illness should be presumed to hold disparate views. PMID:24931849
Roberts, Laura Weiss; Kim, Jane Paik
2014-09-01
Ethical controversy surrounds clinical research involving seriously ill participants. While many stakeholders have opinions, the extent to which protocol volunteers themselves see human research as ethically acceptable has not been documented. To address this gap of knowledge, authors sought to assess views of healthy and ill clinical research volunteers regarding the ethical acceptability of human studies involving individuals who are ill or are potentially vulnerable. Surveys and semi-structured interviews were used to query clinical research protocol participants and a comparison group of healthy individuals. A total of 179 respondents participated in this study: 150 in protocols (60 mentally ill, 43 physically ill, and 47 healthy clinical research protocol participants) and 29 healthy individuals not enrolled in protocols. Main outcome measures included responses regarding ethical acceptability of clinical research when it presents significant burdens and risks, involves people with serious mental and physical illness, or enrolls people with other potential vulnerabilities in the research situation. Respondents expressed decreasing levels of acceptance of participation in research that posed burdens of increasing severity. Participation in protocols with possibly life-threatening consequences was perceived as least acceptable (mean = 1.82, sd = 1.29). Research on serious illnesses, including HIV, cancer, schizophrenia, depression, and post-traumatic stress disorder, was seen as ethically acceptable across respondent groups (range of means = [4.0, 4.7]). Mentally ill volunteers expressed levels of ethical acceptability for physical illness research and mental illness research as acceptable and similar, while physically ill volunteers expressed greater ethical acceptability for physical illness research than for mental illness research. Mentally ill, physically ill, and healthy participants expressed neutral to favorable perspectives regarding the ethical acceptability of clinical research participation by potentially vulnerable subpopulations (difference in acceptability perceived by mentally ill - healthy = -0.04, CI [-0.46, 0.39]; physically ill - healthy = -0.13, CI [-0.62, -.36]). Clinical research volunteers and healthy clinical research-"naïve" individuals view studies involving ill people as ethically acceptable, and their responses reflect concern regarding research that poses considerable burdens and risks and research involving vulnerable subpopulations. Physically ill research volunteers may be more willing to see burdensome and risky research as acceptable. Mentally ill research volunteers and healthy individuals expressed similar perspectives in this study, helping to dispel a misconception that those with mental illness should be presumed to hold disparate views. Copyright © 2014 Elsevier Ltd. All rights reserved.
Byk, J C
1997-02-01
The objective of this paper is to stimulate academic debate on embryo and fetal research from the perspective of the drafting of a protocol to the European Convention on Biomedicine. The Steering Committee on Bioethics of the Council of Europe was mandated to draw up such a protocol and for this purpose organised an important symposium on reproductive technologies and embryo research, in Strasbourg from the 16th to the 18th of December 1996.
Weigler, Benjamin J; Cooper, Donna R; Hankenson, F Claire
2012-01-01
A national survey was conducted to assess immunization practices and tuberculosis screening methods for animal care and research workers in biomedical settings throughout the United States. Veterinarians (n = 953) were surveyed via a web-based mechanism; completed surveys (n = 308) were analyzed. Results showed that occupational health and safety programs were well-developed, enrolling veterinary, husbandry, and research staff at rates exceeding 90% and involving multiple modalities of health assessments and risk communication for vaccine-preventable diseases. Most (72.7%) institutions did not store serum samples from animal research personnel. More than half of the institutions housed nonhuman primates and maintained tuberculosis screening programs, although screening methods varied. Immunization protocols included various recommended or required vaccines that differed depending on job duties, type of institution, and nature of scientific programs. A single case of an identified vaccine–preventable illness in a laboratory worker was noted. Tetanus toxoid was the predominant vaccine administered (91.7%) to animal care and research workers, followed by hepatitis B (54.8%), influenza (39.9%), and rabies (38.3%). For some immunization protocols, an inconsistent rationale for administration was evident. Indications that animal care and research workers are unprotected from work-related etiologic agents did not emerge from this survey; rather, existing guidelines from the Advisory Committee on Immunization Practices and available biologics seem sufficient to address most needs of the laboratory animal research community. Institutions should commit to performance-based standards in parallel with context-specific risk assessment methods to maintain occupational health and safety programs and practices appropriate to their needs. PMID:23312084
Hughes, Laurie; Wang, Xinheng; Chen, Tao
2012-01-01
The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient's own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring. PMID:23202185
Prihodova, Lucia; Guerin, Suzanne; Kernohan, W George
2015-07-01
To review knowledge transfer and exchange frameworks used in health, to analyse the core concepts of these frameworks and appraise their potential applicability to palliative care. Although there are over 60 different models of knowledge transfer and exchange designed for various areas of the fields of health care, many remain largely unrefined and untested. There is a lack of studies that create guidelines for scaling-up successful implementation of research findings and of proven models ensuring that patients have access to optimal health care, guided by current research. The protocol for this scoping review was devised according to the guidelines proposed by Arksey and O'Malley (2005) and Levac et al. (2010). The protocol includes decisions about the review objectives, inclusion criteria, search strategy, study selection, data extraction, quality assessment, data synthesis and plans for dissemination. The review will allow us to identify the currently used models of knowledge transfer and exchange in healthcare setting and analyse their applicability to the complex demands of palliative care. Results from this review will identify effective way of translating different types of knowledge to different PC providers and could be used in hospital, community and home based PC and future research. © 2015 John Wiley & Sons Ltd.
Refolo, P; Sacchini, D; Minacori, R; Daloiso, V; Spagnolo, A G
2015-01-01
Patient recruitment is a critical point of today's clinical research. Several proposals have been made for improving it, but the effectiveness of these measures is actually uncertain. The use of Internet (e-recruitment) could represent a great chance to improve patient enrolment, even though the effectiveness of this implementation is not so evident. E-recruitment could bring some advantages, such as better interaction between clinical research demand and clinical research supply, time and resources optimization, and reduction of data entry errors. It raises some issues too, such as sampling errors, validity of informed consent, and protection of privacy. Research Ethics Committees/Institutional Review Boards should consider these critical points. The paper deals with Internet recruitment for clinical research. It also attempts to provide Research Ethics Committees/Institutional Review Boards with notes for assessing e-recruitment based clinical protocols.
SPP: A data base processor data communications protocol
NASA Technical Reports Server (NTRS)
Fishwick, P. A.
1983-01-01
The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.
Code of Federal Regulations, 2010 CFR
2010-01-01
... clinical study involving human subjects under a clinical research protocol approved by an institutional review board. (2) Clinical research has the meaning set forth in 42 U.S.C. 284d(b). (3) Institutional... review a clinical research protocol and approve the initiation of biomedical research involving human...
The report provides guidance and a readily available reference to groups involved with the Florida Radon Research Program's (FRRP's) research house studies. It includes: 1): Lists of Parameters for continuous and periodic high and low resolution measurements; (2) Protocols for c...
Abad-Corpa, Eva; Meseguer-Liza, Cristobal; Martínez-Corbalán, José Tomás; Zárate-Riscal, Lourdes; Caravaca-Hernández, Amor; Paredes-Sidrach de Cardona, Antonio; Carrillo-Alcaraz, Andrés; Delgado-Hito, Pilar; Cabrero-García, Julio
2010-08-01
To generate changes in nursing practice introducing an evidence-based clinical practice (EBCP) model through a participatory process. To evaluate the effectiveness of the changes in terms of nurse-sensitive outcome (NSO). For international nursing science, it is necessary to explore the reasons for supporting EBCP and evaluate the real repercussions and effectiveness. A mixed methods study with a sequential transformative design will be conducted in the bone marrow transplant unit of a tertiary-level Spanish hospital, in two time periods >12 months (date of approval of the protocol: 2006). To evaluate the effectiveness of the intervention, we will use a prospective quasi-experimental design with two non-equivalent and non-concurrent groups. NSO and patient health data will be collected: (a) impact of psycho-social adjustment; (b) patient satisfaction; (c) symptom control; (d) adverse effects. All patients admitted during the period of time will be included, and all staff working on the unit during a participatory action research (PAR). The PAR design will be adopted from a constructivist paradigm perspective, following Checkland's "Soft Systems" theoretical model. Qualitative techniques will be used: 2-hour group meetings with nursing professionals, to be recorded and transcribed. Field diaries (participants and researchers) will be drawn up and data analysis will be carried out by content analysis. PAR is a rigorous research method for introducing changes into practice to improve NSO.
Freeman, Anne; Stanko, Patrick; Berkowitz, Lily N; Parnell, Neanta; Zuppe, Anastasia; Bale, Tracy L; Ziolek, Tracy; Epperson, C Neill
2017-01-01
The 2015 National Institutes of Health (NIH) policy that sex be considered as a biological variable (SABV) is now a critical part of the peer-review process for NIH funding as well as publication in several high-impact scientific journals. We sought to determine the degree to which biomedical researchers at the University of Pennsylvania already consider SABV or gender in their research. We reviewed 240 research protocols approved by the University of Pennsylvania Investigational Review Board (IRB) consecutively submitted between January and July 2016. Each protocol was searched for the terms sex, gender, male, female, man, and woman and justifications related to the population under study. A PubMed search was conducted to determine the current state of knowledge regarding potential sex and/or gender differences with respect to protocol topic. Data were summarized using descriptive statistics. Of the 165 (68.8%) protocols that included one of the search terms, only 24 (14.5%) provided justification for the choice of the sex/gender of the population studied. Sixty-three percent ( n = 151) of the protocols focused on topics for which the extant literature supports at least a moderate degree of sex/gender differences in some aspect of the disorder/condition being studied. Of these, only three (2.0%) indicated that the investigator would consider sex or gender impact on their primary outcomes. Review of a subset of IRB protocols submitted at a major research institution suggests that very few investigators are considering sex or gender as important variables in their clinical research at the stage of protocol development. IRBs are in an excellent position to encourage investigators to consider SABV and gender in order to enhance the rigor of research design, maximize the importance of the resulting knowledge, and ensure that subject selection is equitable. These findings serve as the basis for developing an intervention at the level of IRB protocol development and submission that will promote consideration of SABV and/or gender, factors with critical import to patient safety and efficacy of interventions.
Neme, A L; Frazier, K B; Roeder, L B; Debner, T L
2002-01-01
Many polishing protocols have been evaluated in vitro for their effect on the surface roughness of restorative materials. These results have been useful in establishing protocols for in vivo application. However, limited research has focused on the subsequent care and maintenance of esthetic restorations following their placement. This investigation evaluated the effect of five polishing protocols that could be implemented at recall on the surface roughness of five direct esthetic restorative materials. Specimens (n=25) measuring 8 mm diameter x 3 mm thick were fabricated in an acrylic mold using five light-cured resin-based materials (hybrid composite, microfilled composite, packable composite, compomer and resin-modified glass ionomer). After photopolymerization, all specimens were polished with Sof-Lex Disks to produce an initial (baseline) surface finish. All specimens were then polished with one of five prophylactic protocols (Butler medium paste, Butler coarse paste, OneGloss, SuperBuff or OneGloss & SuperBuff). The average surface roughness of each treated specimen was determined from three measurements with a profilometer (Surface 1). Next, all specimens were brushed 60,000 times at 1.5 Hz using a brush-head force of 2 N on a Manly V-8 cross-brushing machine in a 50:50 (w/w) slurry of toothpaste and water. The surface roughness of each specimen was measured after brushing (Surface 2) followed by re-polishing with one of five protocols, then final surface roughness values were determined (Surface 3). The data were analyzed using repeated measures ANOVA. Significant differences (p=0.05) in surface roughness were observed among restorative materials and polishing protocols. The microfilled and hybrid resin composite yielded significantly rougher surfaces than the other three materials following tooth brushing. Prophylactic polishing protocols can be used to restore a smooth surface on resin-based esthetic restorative materials following simulated tooth brushing.
Turner, D; Levine, A; Weiss, B; Hirsh, A; Shamir, R; Shaoul, R; Berkowitz, D; Bujanover, Y; Cohen, S; Eshach-Adiv, O; Jamal, Gera; Kori, M; Lerner, A; On, A; Rachman, L; Rosenbach, Y; Shamaly, H; Shteyer, E; Silbermintz, A; Yerushalmi, B
2010-12-01
There are no current recommendations for bowel cleansing before colonoscopy in children. The Israeli Society of Pediatric Gastroenterology and Nutrition (ISPGAN) established an iterative working group to formulate evidence-based guidelines for bowel cleansing in children prior to colonoscopy. Data were collected by systematic review of the literature and via a national-based survey of all endoscopy units in Israel. Based on the strength of evidence, the Committee reached consensus on six recommended protocols in children. Guidelines were finalized after an open audit of ISPGAN members. Data on 900 colonoscopies per year were accrued, which represents all annual pediatric colonoscopies performed in Israel. Based on the literature review, the national survey, and the open audit, several age-stratified pediatric cleansing protocols were proposed: two PEG-ELS protocols (polyethylene-glycol with electrolyte solution); Picolax-based protocol (sodium picosulphate with magnesium citrate); sodium phosphate protocol (only in children over the age of 12 years who are at low risk for renal damage); stimulant laxative-based protocol (e. g. bisacodyl); and a PEG 3350-based protocol. A population-based analysis estimated that the acute toxicity rate of oral sodium phosphate is at most 3/7320 colonoscopies (0.041 %). Recommendations on diet and enema use are provided in relation to each proposed protocol. There is no ideal bowel cleansing regimen and, thus, various protocols are in use. We propose several evidence-based protocols to optimize bowel cleansing in children prior to colonoscopy and minimize adverse events. © Georg Thieme Verlag KG Stuttgart · New York.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Screening Protocol for Early Identification of Brazilian Children at Risk for Dyslexia
Germano, Giseli D.; César, Alexandra B. P. de C.; Capellini, Simone A.
2017-01-01
Early identification of students at risk of dyslexia has been an educational challenge in the past years. This research had two main goals. First, we aimed to develop a screening protocol for early identification of Brazilian children at risk for dyslexia; second, we aimed to identify the predictive variables of this protocol using Principal Component Analysis. The major step involved in developing this protocol was the selection of variables, which were chosen based on the literature review and linguistic criteria. The screening protocol was composed of seven cognitive-linguistic skills: Letter naming; Phonological Awareness (which comprises the following subtests: Rhyme production, Rhyme identification, Syllabic segmentation, Production of words from a given phoneme, Phonemic Synthesis, and Phonemic analysis); Phonological Working memory, Rapid naming Speed; Silent reading; Reading of words and non-words; and Auditory Comprehension of sentences from pictures. A total of 149 children, aged from 6 years to 6 and 11, of both genders who were enrolled in the 1st grade of elementary public schools were submitted to the screening protocol. Principal Component Analysis revealed four factors, accounting for 64.45% of the variance of the Protocol variables: first factor (“pre-reading”), second factor (“decoding”), third factor (“Reading”), and fourth factor “Auditory processing.” The factors found corroborate those reported in the National and International literature and have been described as early signs of dyslexia and reading problems. PMID:29163246
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
Student/Scientist Partnerships: A Teacher's Guide To Evaluating the Critical Components.
ERIC Educational Resources Information Center
Evans, Celia A.; Abrams, Eleanor D.; Rock, Barret N.; Spencer, Shannon L.
2001-01-01
Presents a guide to the critical components of partnerships in Students/Scientist Partnerships (SSPs), a project-based instruction. Uses examples from the Forest Watch (FW) program to support the ideas. Focuses on access to experts, workshops, training sessions, student congresses, support materials and research protocols, science education…
ERIC Educational Resources Information Center
Feuerstein, Julie; Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi
2017-01-01
Purpose: This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about…
Relapse and Recurrence Prevention in the Treatment for Adolescents with Depression Study
ERIC Educational Resources Information Center
Simons, Anne D.; Rohde, Paul; Kennard, Betsy D.; Robins, Michele
2005-01-01
Relapse and recurrence in adolescent depression are important problems. Much less is known about relapse prevention compared to the acute treatment of depression in adolescents. Based on previous research, theoretical predictions, and clinical experience, the Treatment for Adolescents With Depression Study (TADS) protocol was designed to determine…
Ban, Kristen A; Gibbons, Melinda M; Ko, Clifford Y; Wick, Elizabeth C; Cannesson, Maxime; Scott, Michael J; Grant, Michael C; Wu, Christopher L
2018-04-11
The Agency for Healthcare Research and Quality, in partnership with the American College of Surgeons and the Johns Hopkins Medicine Armstrong Institute for Patient Safety and Quality, has developed the Safety Program for Improving Surgical Care and Recovery (ISCR), which is a national effort to disseminate best practices in perioperative care to more than 750 hospitals across multiple procedures in the next 5 years. The program will integrate evidence-based processes central to enhanced recovery and prevention of surgical site infection, venous thromboembolic events, catheter-associated urinary tract infections with socioadaptive interventions to improve surgical outcomes, patient experience, and perioperative safety culture. The objectives of this review are to evaluate the evidence supporting anesthesiology components of colorectal (CR) pathways and to develop an evidence-based CR protocol for implementation. Anesthesiology protocol components were identified through review of existing CR enhanced recovery pathways from several professional associations/societies and expert feedback. These guidelines/recommendations were supplemented by evidence made further literature searches. Anesthesiology protocol components were identified spanning the immediate preoperative, intraoperative, and postoperative phases of care. Components included carbohydrate loading, reduced fasting, multimodal preanesthesia medication, antibiotic prophylaxis, blood transfusion, intraoperative fluid management/goal-directed fluid therapy, normothermia, a standardized intraoperative anesthesia pathway, and standard postoperative multimodal analgesic regimens.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Electric Research and Management, Inc.; IIT Research Institute; Magnetic Measurements
1997-03-11
The purpose of this project was to document widely applicable methods for characterizing the magnetic fields in a given environment, recognizing the many sources co-existing within that space. The guidelines are designed to allow the reader to follow an efficient process to (1) plan the goals and requirements of a magnetic-field study, (2) develop a study structure and protocol, and (3) document and carry out the plan. These guidelines take the reader first through the process of developing a basic study strategy, then through planning and performing the data collection. Last, the critical factors of data management, analysis reporting, andmore » quality assurance are discussed. The guidelines are structured to allow the researcher to develop a protocol that responds to specific site and project needs. The Research and Public Information Dissemination Program (RAPID) is based on exposure to magnetic fields and the potential health effects. Therefore, the most important focus for these magnetic-field measurement guidelines is relevance to exposure. The assumed objective of an environment-specific measurement is to characterize the environment (given a set of occupants and magnetic-field sources) so that information about the exposure of the occupants may be inferred. Ideally, the researcher seeks to obtain complete or "perfect" information about these magnetic fields, so that personal exposure might also be modeled perfectly. However, complete data collection is not feasible. In fact, it has been made more difficult as the research field has moved to expand the list of field parameters measured, increasing the cost and complexity of performing a measurement and analyzing the data. The guidelines address this issue by guiding the user to design a measurement protocol that will gather the most exposure-relevant information based on the locations of people in relation to the sources. We suggest that the "microenvironment" become the base unit of area in a study, with boundaries defined by the occupant's activity patterns and the field variation from the sources affecting the area. Such a stratification allows the researcher to determine which microenvironment are of most interest, and to methodically focus the areas, in order to gather the most relevant set of data.« less
Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.
Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo
2016-01-01
to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este "Protocolo Eletrônico" da Oftalmologia ao Sistema Integrado de Protocolos Eletrônicos (SINPE(c)). este é um estudo descritivo e a metodologia aplicada em seu desenvolvimento está didaticamente dividida em três fases: 1) criação da base teórica de dados clínicos de oftalmologia com ênfase em estrabismo; 2) informatização da base teórica dos dados utilizando o SINPE(c); e 3) interpretação das informações com demonstração dos resultados. A informatização da base de dados foi realizada pela utilização da concessão de uso do SINPE(c). Foram incluídos neste protocolo 50 pacientes com estrabismo para validação do protocolo. o protocolo eletrônico desenvolvido permitiu armazenar informações relacionadas à anamnese, exame físico, exames complementares, diagnóstico e tratamento de pacientes com doenças oftalmológicas, com ênfase em estrabismo. Foram incluídos neste trabalho 2141 itens no protocolo mestre e foram criados 20 protocolos específicos de estrabismo, cada um com suas particularidades. Os 50 pacientes que foram incluídos nos protocolos específicos demonstraram a eficácia do método empregado. foi criada uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Esta base de dados foi informatizada sob a forma de software onde os futuros usuários poderão utilizar o protocolo eletrônico multiprofissional de doenças oftalmológicas com ênfase em estrabismo para a coleta de seus dados.
Prayer Healing: A Case Study Research Protocol.
Kruijthoff, Dirk J; van der Kooi, Cornelis; Glas, Gerrit; Abma, Tineke A
2017-01-01
Context • Prayer healing is a common practice in many religious communities around the world. Even in the highly secularized Dutch society, cases of prayer healing are occasionally reported in the media, often generating public attention. There is an ongoing debate regarding whether such miraculous cures do actually occur and how to interpret them. Objective • The aim of the article was to present a research protocol for the investigation of reported cases of remarkable and/or unexplained healing after prayer. Design • The research team developed a method to perform a retrospective, case-based study of prayer healing. Reported prayer healings can be investigated systematically in accordance with a step-by-step methodology. The focus is on understanding the healing by studying it from multiple perspectives, using both medical judgment and patients' narratives collected by qualitative methods Setting • The study occurred at Vrije Universiteit (VU) and VU Medical Center (Amsterdam, Netherlands) as well as the general medical practice of the first author. Participants • Potential participants could be any individuals in the Netherlands or neighboring countries who claim to have been healed through prayer. The reports of healing came from multiple sources, including the research team's medical practices and their direct vicinities, newspaper articles, prayer healers, and medical colleagues. Outcome Measures • Medical data were obtained before and after prayer. Subsequently, a member of a research team and of a medical assessment committee made a standardized judgment that evaluated whether a cure was clinically remarkable or scientifically unexplained. The participants' experiences and insider perspectives were studied, using in-depth interviews in accordance with a qualitative research methodology, to gain insight into the perceptions and explanations of the cures that were offered by participants and by the members of the medical assessment committee. The medical findings and participants' experiences were weighed and interpreted based on a transdisciplinary framework, including biopsychosocial and theological perspectives, with reference to a conceptual framework derived from Ian Barbour's typology of positions in the science-religion debate. Conclusion • A case-based, research study protocol that compares medical and experiential findings and that interprets and structures those findings with reference to Ian Barbour's conceptual model is an innovative way of gaining deeper insight into the nature of remarkable and/or unexplained cures.
Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D
2017-01-01
Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at different stages of the study. Biases need to be considered by researchers implementing the standardized protocols as well as by users of observational epidemiological studies of ZIKV.
Mickan, Sharon; Wenke, Rachel; Weir, Kelly; Bialocerkowski, Andrea; Noble, Christy
2017-09-11
Allied health professionals (AHPs) report positive attitudes to using research evidence in clinical practice, yet often lack time, confidence and skills to use, participate in and conduct research. A range of multifaceted strategies including education, mentoring and guidance have been implemented to increase AHPs' use of and participation in research. Emerging evidence suggests that knowledge brokering activities have the potential to support research engagement, but it is not clear which knowledge brokering strategies are most effective and in what contexts they work best to support and maintain clinicians' research engagement. This protocol describes an exploratory concurrent mixed methods study that is designed to understand how allied health research fellows use knowledge brokering strategies within tailored evidence-based interventions, to facilitate research engagement by allied health clinicians. Simultaneously, a realist approach will guide a systematic process evaluation of the research fellows' pattern of use of knowledge brokering strategies within each case study to build a programme theory explaining which knowledge brokering strategies work best, in what contexts and why. Learning and behavioural theories will inform this critical explanation. An explanation of how locally tailored evidence-based interventions improve AHPs use of, participation in and leadership of research projects will be summarised and shared with all participating clinicians and within each case study. It is expected that local recommendations will be developed and shared with medical and nursing professionals in and beyond the health service, to facilitate building research capacity in a systematic and effective way. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Wright, Melanie C; Taekman, Jeffrey M; Barber, Linda; Hobbs, Gene; Newman, Mark F; Stafford-Smith, Mark
2005-12-01
Errors in clinical research can be costly, in terms of patient safety, data integrity, and data collection. Data inaccuracy in early subjects of a clinical study may be associated with problems in the design of the protocol, procedures, and data collection tools. High-fidelity patient simulation centers provide an ideal environment to apply human-centered design to clinical trial development. A draft of a complex clinical protocol was designed, evaluated and modified using a high-fidelity human patient simulator in the Duke University Human Simulation and Patient Safety Center. The process included walk-throughs, detailed modifications of the protocol and development of procedural aids. Training of monitors and coordinators provided an opportunity for observation of performance that was used to identify further improvements to the protocol. Evaluative steps were used to design the research protocol and procedures. Iterative modifications were made to the protocol and data collection tools. The success in use of human simulation in the preparation of a complex clinical drug trial suggests the benefits of human patient simulation extend beyond training and medical equipment evaluation. Human patient simulation can provide a context for informal expert evaluation of clinical protocol design and for formal "rehearsal" to evaluate the efficacy of procedures and support tools.
Mondragón Barrios, Liliana; Guarneros García, Tonatiuh; Jiménez Tapia, Alberto
2017-07-01
The objective of this article is to compare various ethical issues considered by social scientists and research ethics committees in the evaluation of mental health social research protocols. We contacted 47 social scientists and 10 members of ethics committees in Mexico with two electronic national surveys that requested information from both groups related to the application of ethical principles in mental health social research. The results showed no significant difference between these groups in the value placed on the ethical issues explored. Based on this finding, we make proposals to strengthen the collaboration between the two groups.
IRB Process Improvements: A Machine Learning Analysis.
Shoenbill, Kimberly; Song, Yiqiang; Cobb, Nichelle L; Drezner, Marc K; Mendonca, Eneida A
2017-06-01
Clinical research involving humans is critically important, but it is a lengthy and expensive process. Most studies require institutional review board (IRB) approval. Our objective is to identify predictors of delays or accelerations in the IRB review process and apply this knowledge to inform process change in an effort to improve IRB efficiency, transparency, consistency and communication. We analyzed timelines of protocol submissions to determine protocol or IRB characteristics associated with different processing times. Our evaluation included single variable analysis to identify significant predictors of IRB processing time and machine learning methods to predict processing times through the IRB review system. Based on initial identified predictors, changes to IRB workflow and staffing procedures were instituted and we repeated our analysis. Our analysis identified several predictors of delays in the IRB review process including type of IRB review to be conducted, whether a protocol falls under Veteran's Administration purview and specific staff in charge of a protocol's review. We have identified several predictors of delays in IRB protocol review processing times using statistical and machine learning methods. Application of this knowledge to process improvement efforts in two IRBs has led to increased efficiency in protocol review. The workflow and system enhancements that are being made support our four-part goal of improving IRB efficiency, consistency, transparency, and communication.
Wittink, Harriet; Verschuren, Olaf; Terwee, Caroline; de Groot, Janke; Kwakkel, Gert; van de Port, Ingrid
2017-11-21
To systematically review and critically appraise the literature on measurement properties of cardiopulmonary exercise test protocols for measuring aerobic capacity, VO2max, in persons after stroke. PubMed, Embase and Cinahl were searched from inception up to 15 June 2016. A total of 9 studies were identified reporting on 9 different cardiopulmonary exercise test protocols. VO2max measured with cardiopulmonary exercise test and open spirometry was the construct of interest. The target population was adult persons after stroke. We included all studies that evaluated reliability, measurement error, criterion validity, content validity, hypothesis testing and/or responsiveness of cardiopulmonary exercise test protocols. Two researchers independently screened the literature, assessed methodological quality using the COnsensus-based Standards for the selection of health Measurement INstruments checklist and extracted data on measurement properties of cardiopulmonary exercise test protocols. Most studies reported on only one measurement property. Best-evidence synthesis was derived taking into account the methodological quality of the studies, the results and the consistency of the results. No judgement could be made on which protocol is "best" for measuring VO2max in persons after stroke due to lack of high-quality studies on the measurement properties of the cardiopulmonary exercise test.
Yamanaka, Ashley; Fialkowski, Marie Kainoa; Wilkens, Lynne; Li, Fenfang; Ettienne, Reynolette; Fleming, Travis; Power, Julianne; Deenik, Jonathan; Coleman, Patricia; Leon Guerrero, Rachael; Novotny, Rachel
2016-09-02
Quality assurance plays an important role in research by assuring data integrity, and thus, valid study results. We aim to describe and share the results of the quality assurance process used to guide the data collection process in a multi-site childhood obesity prevalence study and intervention trial across the US Affiliated Pacific Region. Quality assurance assessments following a standardized protocol were conducted by one assessor in every participating site. Results were summarized to examine and align the implementation of protocol procedures across diverse settings. Data collection protocols focused on food and physical activity were adhered to closely; however, protocols for handling completed forms and ensuring data security showed more variability. Quality assurance protocols are common in the clinical literature but are limited in multi-site community-based studies, especially in underserved populations. The reduction in the number of QA problems found in the second as compared to the first data collection periods for the intervention study attest to the value of this assessment. This paper can serve as a reference for similar studies wishing to implement quality assurance protocols of the data collection process to preserve data integrity and enhance the validity of study findings. NIH clinical trial #NCT01881373.
Securing Real-Time Sessions in an IMS-Based Architecture
NASA Astrophysics Data System (ADS)
Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco
The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Michael; Haeri, Hossein; Reynolds, Arlis
This chapter provides a set of model protocols for determining energy and demand savings that result from specific energy efficiency measures implemented through state and utility efficiency programs. The methods described here are approaches that are or are among the most commonly used and accepted in the energy efficiency industry for certain measures or programs. As such, they draw from the existing body of research and best practices for energy efficiency program evaluation, measurement, and verification (EM&V). These protocols were developed as part of the Uniform Methods Project (UMP), funded by the U.S. Department of Energy (DOE). The principal objectivemore » for the project was to establish easy-to-follow protocols based on commonly accepted methods for a core set of widely deployed energy efficiency measures.« less
A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services
NASA Astrophysics Data System (ADS)
Luo, Zhen-yu; Shi, Run-hua; Xu, Min; Zhang, Shun
2018-04-01
We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.
Snooks, Helen; Anthony, Rebecca; Chatters, Robin; Cheung, Wai-Yee; Dale, Jeremy; Donohoe, Rachael; Gaze, Sarah; Halter, Mary; Koniotou, Marina; Logan, Phillippa; Lyons, Ronan; Mason, Suzanne; Nicholl, Jon; Phillips, Ceri; Phillips, Judith; Russell, Ian; Siriwardena, A Niroshan; Wani, Mushtaq; Watkins, Alan; Whitfield, Richard; Wilson, Lynsey
2012-01-01
Introduction Emergency calls to ambulance services are frequent for older people who have fallen, but ambulance crews often leave patients at the scene without ongoing care. Evidence shows that when left at home with no further support older people often experience subsequent falls which result in injury and emergency-department attendances. SAFER 2 is an evaluation of a new clinical protocol which allows paramedics to assess and refer older people who have fallen, and do not need hospital care, to community-based falls services. In this protocol paper, we report methods and progress during trial implementation. SAFER 2 is recruiting patients through three ambulance services. A successful trial will provide robust evidence about the value of this new model of care, and enable ambulance services to use resources efficiently. Design Pragmatic cluster randomised trial. Methods and analysis We randomly allocated 25 participating ambulance stations (clusters) in three services to intervention or control group. Intervention paramedics received training and clinical protocols for assessing and referring older people who have fallen to community-based falls services when appropriate, while control paramedics deliver care as usual. Patients are eligible for the trial if they are aged 65 or over; resident in a participating falls service catchment area; and attended by a trial paramedic following an emergency call coded as a fall without priority symptoms. The principal outcome is the rate of further emergency contacts (or death), for any cause and for falls. Secondary outcomes include further falls, health-related quality of life, ‘fear of falling’, patient satisfaction reported by participants through postal questionnaires at 1 and 6 months, and quality and pathways of care at the index incident. We shall compare National Health Service (NHS) and patient/carer costs between intervention and control groups and estimate quality-adjusted life years (QALYs) gained from the intervention and thus incremental cost per QALY. We shall estimate wider system effects on key-performance indicators. We shall interview 60 intervention patients, and conduct focus groups with contributing NHS staff to explore their experiences of the assessment and referral service. We shall analyse quantitative trial data by ‘treatment allocated’; and qualitative data using content analysis. Ethics and dissemination The Research Ethics Committee for Wales gave ethical approval and each participating centre gave NHS Research and Development approval. We shall disseminate study findings through peer-reviewed publications and conference presentations. Trial Registration: ISRCTN 60481756 PMID:23148348
Protocol Coordinator | Center for Cancer Research
PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood diseases and conditions; parasitic infections; rheumatic and inflammatory diseases; and rare and neglected diseases. CMRP’s collaborative approach to clinical research and the expertise and dedication of staff to the continuation and success of the program’s mission has contributed to improving the overall standards of public health on a global scale. KEY ROLES/RESPONSIBILITIES The Protocol Coordinator II: Provides comprehensive clinical and administrative support to the Brain Tumor Trial Collaborative, Neuro-Oncology Branch, NCI, National Institutes of Health Serves as a liaison with Principal Investigators (PIs), the associated study teams and a variety of offices associated with protocol development and approvals Orchestrates meetings with investigators and other key medical staff to identify required support Coordinates the writing and regulatory review processes that occur in tandem, facilitates the bi-directional dialogue and feedback between various teams, and assists investigators and medical writers on the production/revision of clinical research protocols Assists research staff in coordinating/navigating requirements for special circumstances and facilitates access to necessary services Facilitates initiation of intramural research by providing assistance in obtaining required approvals Coordinates with investigators and medical writers to ensure Institutional Review Board (IRB) and Food and Drug Administration (FDA) stipulations are appropriately addressed in a timely manner Provides consultation and assistance for all aspects of the protocol lifecycle including initial Investigational New Drug (IND) submission, IRB submission, continuing review applications, protocol amendments, annual reports, and protocol inactivation with IRB and FDA Tracks a portfolio of protocols through each lifecycle step; processes and tracks appropriate approvals (e.g., IRB, Data and Safety Monitoring Board, Radiation Safety, Office of Protocol Services, etc.) Provides administrative support to Scientific Review Committees (SRC), reviews proposed protocol documents to ensure they are complete, distributes to reviewers, documents meeting minutes, enters data into the IRIS database, facilitates processes to obtain approval to initiate and continue clinical research Creates, maintains and queries an IRB database of approved amendment descriptions Maintains records of the current protocol(s) version, current Informed Consent document(s), FDA Safe to Proceed designation, etc. for each IND Provides expertise in data management including data collection and analysis Develops procedural manuals for clinical trials protocols Participates in quality improvement and assurance involving International Conference on Harmonization (ICH) Good Clinical Practice (GCP) guidelines This position is located at the National Institutes of Health (NIH) in Bethesda, Maryland.
Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias
2016-01-01
Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol. PMID:27352244
Roberts, Laura Weiss; Warner, Teddy D; Anderson, Charles T; Smithpeter, Megan V; Rogers, Melinda K
2004-04-01
To examine the perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing of people with schizophrenia who volunteered for research protocols. A structured interview to assess research-related views of people with schizophrenia was developed and piloted. Data collection occurred at three sites. For this analysis, we examined the subset of responses from schizophrenia patients currently enrolled in a protocol. Data from 28 schizophrenia research volunteers were analyzed. Of these, 22 were men and 11 were voluntary inpatients. Most (n=23) recalled speaking with someone before enrolling in the protocol, and most (n=26) reported trusting the person who told them about it. Participants reported a moderate understanding of their protocols. All but one person (n=27) remembered signing a consent form. Twenty-one volunteers indicated that consent forms are meant to help both the patient and the researcher. Most (n=23) reported making the enrollment decision alone, with 22 making this decision prior to reviewing the consent form. The decision was described as relatively easy. Respondents felt some pressure to enroll, with women experiencing more pressure. Debriefing practices were strongly endorsed by participants. All 28 of the volunteers wished to be informed if a health problem (i.e., "something wrong") was discovered during the protocol. The persons living with schizophrenia who were interviewed for this project expressed interesting perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing in clinical research that may help guide efforts to make research processes more attuned to participants and merit further inquiry.
Teaching Cell Biology to Dental Students with a Project-Based Learning Approach.
Costa-Silva, Daniela; Côrtes, Juliana A; Bachinski, Rober F; Spiegel, Carolina N; Alves, Gutemberg G
2018-03-01
Although the discipline of cell biology (CB) is part of the curricula of predoctoral dental schools, students often fail to recognize its practical relevance. The aim of this study was to assess the effectiveness of a practical-theoretical project-based course in closing the gaps among CB, scientific research, and dentistry for dental students. A project-based learning course was developed with nine sequential lessons to evaluate 108 undergraduate dental students enrolled in CB classes of a Brazilian school of dentistry during 2013-16. To highlight the relevance of in vitro studies in the preclinical evaluation of dental materials at the cellular level, the students were challenged to complete the process of drafting a protocol and performing a cytocompatibility assay for a bone substitute used in dentistry. Class activities included small group discussions, scientific database search and article presentations, protocol development, lab experimentation, and writing of a final scientific report. A control group of 31 students attended only one laboratory class on the same theme, and the final reports were compared between the two groups. The results showed that the project-based learning students had superior outcomes in acknowledging the relevance of in vitro methods during biocompatibility testing. Moreover, they produced scientifically sound reports with more content on methodological issues, the relationship with dentistry, and the scientific literature than the control group (p<0.05). The project-based learning students also recognized a higher relevance of scientific research and CB to dental practice. These results suggest that a project-based approach can help contextualize scientific research in dental curricula.
van Oostrom, Conny T.; Jonker, Martijs J.; de Jong, Mark; Dekker, Rob J.; Rauwerda, Han; Ensink, Wim A.; de Vries, Annemieke; Breit, Timo M.
2014-01-01
In transcriptomics research, design for experimentation by carefully considering biological, technological, practical and statistical aspects is very important, because the experimental design space is essentially limitless. Usually, the ranges of variable biological parameters of the design space are based on common practices and in turn on phenotypic endpoints. However, specific sub-cellular processes might only be partially reflected by phenotypic endpoints or outside the associated parameter range. Here, we provide a generic protocol for range finding in design for transcriptomics experimentation based on small-scale gene-expression experiments to help in the search for the right location in the design space by analyzing the activity of already known genes of relevant molecular mechanisms. Two examples illustrate the applicability: in-vitro UV-C exposure of mouse embryonic fibroblasts and in-vivo UV-B exposure of mouse skin. Our pragmatic approach is based on: framing a specific biological question and associated gene-set, performing a wide-ranged experiment without replication, eliminating potentially non-relevant genes, and determining the experimental ‘sweet spot’ by gene-set enrichment plus dose-response correlation analysis. Examination of many cellular processes that are related to UV response, such as DNA repair and cell-cycle arrest, revealed that basically each cellular (sub-) process is active at its own specific spot(s) in the experimental design space. Hence, the use of range finding, based on an affordable protocol like this, enables researchers to conveniently identify the ‘sweet spot’ for their cellular process of interest in an experimental design space and might have far-reaching implications for experimental standardization. PMID:24823911
156 Mbps Ultrahigh-Speed Wireless LAN Prototype in the 38 GHz Band
NASA Astrophysics Data System (ADS)
Wu, Gang; Inoue, Masugi; Murakami, Homare; Hase, Yoshihiro
2001-12-01
This paper describes a 156 Mbps ultrahigh-speed wireless LAN operating in the 38 GHz millimeter (mm)-wave band. The system is a third prototype developed at the Communications Research Laboratory since 1998. Compared with the previous prototypes, the system is faster (156 Mbps) and smaller (volume of radio transceiver less than 1000 cc), it has a larger service area (two overlapping basic service sets), and a longer transmission distance (the protocol can support a distance of more than two hundred meters). The development is focused on the physical layer and the data link control layer, and thus a GMSK-based mm-wave transceiver and an enhanced RS-ISMA (reservation-based slotted idle signal multiple access) protocol are key development components. This paper describes the prototype system's design, configuration, and implementation.
Evaluation and modeling of HIV based on communication theory in biological systems.
Dong, Miaowu; Li, Wenrong; Xu, Xi
2016-12-01
Some forms of communication are used in biological systems such as HIV transmission in human beings. In this paper, we plan to get a unique insight into biological communication systems generally through the analogy between HIV infection and electrical communication system. The model established in this paper can be used to test and simulate various communication systems since it provides researchers with an opportunity. We interpret biological communication systems by using telecommunications exemplification from a layered communication protocol developed before and use the model to indicate HIV spreading. We also implement a simulation of HIV infection based on the layered communication protocol to predict the development of this disease and the results prove the validity of the model. Copyright © 2016 Elsevier B.V. All rights reserved.
Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications
NASA Technical Reports Server (NTRS)
Wagner, Raymond S.
2010-01-01
Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.
ERIC Educational Resources Information Center
Early, Diane M.; Rogge, Ronald D.; Deci, Edward L.
2014-01-01
This paper investigates engagement (E), alignment (A), and rigor (R) as vital signs of high-quality teacher instruction as measured by the EAR Classroom Visit Protocol, designed by the Institute for Research and Reform in Education (IRRE). Findings indicated that both school leaders and outside raters could learn to score the protocol with…
Quissell, David O.; Bryant, Lucinda L.; Braun, Patricia A.; Cudeii, Diana; Johs, Nikolas; Smith, Vongphone L.; George, Carmen; Henderson, William G.; Albino, Judith
2014-01-01
Navajo Nation children have the greatest prevalence of early childhood caries in the United States. This protocol describes an innovative combination of community-based participatory research and clinical trial methods to rigorously test a lay native Community Oral Health Specialists-delivered oral health intervention, with the goal of reducing the progression of disease and improving family knowledge and behaviors. Methods/Design This cluster-randomized trial designed by researchers at the Center for Native Oral Health Research at the University of Colorado in conjunction with members of the Navajo Nation community compares outcomes between the manualized 2-year oral health fluoride varnish-oral health promotion intervention and usual care in the community (child-caregiver dyads from 26 Head Start classrooms in each study arm; total of 1016 dyads). Outcome assessment includes annual dental screening and an annual caregiver survey of knowledge, attitudes and behaviors; collection of cost data will support cost-benefit analyses. Discussion The study protocol meets all standards required of randomized clinical trials. Aligned with principles of community-based participatory research, extended interaction between members of the Navajo community and researchers preceded study initiation, and collaboration between project staff and a wide variety of community members informed the study design and implementation. We believe the benefits of adding CBPR methods to those of randomized clinical studies outweigh the barriers and constraints, especially in studies of health disparities and in challenging settings. When done well, this innovative mix of methods will increase the likelihood of valid results that communities can use. PMID:24469238
Assessing the Efficacy of an App-Based Method of Family Planning: The Dot Study Protocol.
Simmons, Rebecca G; Shattuck, Dominick C; Jennings, Victoria H
2017-01-18
Some 222 million women worldwide have unmet needs for contraception; they want to avoid pregnancy, but are not using a contraceptive method, primarily because of concerns about side effects associated with most available methods. Expanding contraceptive options-particularly fertility awareness options that provide women with information about which days during their menstrual cycles they are likely to become pregnant if they have unprotected intercourse-has the potential to reduce unmet need. Making these methods available to women through their mobile phones can facilitate access. Indeed, many fertility awareness applications have been developed for smartphones, some of which are digital platforms for existing methods, requiring women to enter information about fertility signs such as basal body temperature and cervical secretions. Others are algorithms based on (unexplained) calculations of the fertile period of the menstrual cycle. Considering particularly this latter (largely untested) group, it is critical that these apps be subject to the same rigorous research as other contraceptive methods. Dynamic Optimal Timing, available via the Dot app as a free download for iPhone and Android devices, is one such method and the only one that has published the algorithm that forms its basis. It combines historical cycle data with a woman's own personal cycle history, continuing to accrue this information over time to identify her fertile period. While Dot has a theoretical failure rate of only 3 in 100 for preventing pregnancy with perfect use, its effectiveness in typical use has yet to be determined. The study objective is to assess both perfect and typical use to determine the efficacy of the Dot app for pregnancy prevention. To determine actual use efficacy, the Institute for Reproductive Health is partnering with Cycle Technologies, which developed the Dot app, to conduct a prospective efficacy trial, following 1200 women over the course of 13 menstrual cycles to assess pregnancy status over time. This paper outlines the protocol for this efficacy trial, following the Standard Protocol Items: Recommendations for Intervention Trials checklist, to provide an overview of the rationale, methodology, and analysis plan. Participants will be asked to provide daily sexual history data and periodically answer surveys administered through a call center or directly on their phone. Funding for the study was provided in 2013 under the United States Agency for International Development Fertility Awareness for Community Transformation project. Recruitment for the study will begin in January of 2017. The study is expected to last approximately 18 months, depending on recruitment. Findings on the study's primary outcomes are expected to be finalized by September 2018. Reproducibility and transparency, important aspects of all research, are particularly critical in developing new approaches to research design. This protocol outlines the first study to prospectively test both the efficacy (correct use) and effectiveness (actual use) of a pregnancy prevention app. This protocol and the processes it describes reflect the dynamic integration of mobile technologies, a call center, and Health Insurance Portability and Accountability Act-compliant study procedures. Future fertility app studies can build on our approaches to develop methodologies that can contribute to the evidence base around app-based methods of contraception. ClinicalTrials.gov NCT02833922; https://clinicaltrials.gov/ct2/show/NCT02833922 (Archived be WebCite at http://www.webcitation.org/6nDkr0e76). ©Rebecca G Simmons, Dominick C Shattuck, Victoria H Jennings. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.01.2017.
Debating Ethics in HIV Research: Gaps between Policy and Practice in Nigeria.
Folayan, Morenike Oluwatoyin; Peterson, Kristin; Haire, Bridget; Brown, Brandon; Audu, Kadiri; Makanjuola, Olumide; Pelemo, Babatunde; Marsh, Vicki
2015-12-01
HIV prevention is a critical health issue in Nigeria; a country that has one of the worst HIV epidemic profiles in the world. With 270,000 new infections in 2012, Nigeria is a prime site for HIV prevention research. One effect of the HIV epidemic has been to revolutionalise ethical norms for the conduct of research: it is now considered unethical to design and implement HIV related studies without community engagement. Unfortunately, there is very little commensurate effort in building the capacity of local persons to engage actively with researchers, and there is no existing platform to facilitate dialogue between researchers and communities engaged in research in Nigeria. In an effort to address this gap, we undertook a series of three community dialogues (Phase One) and two community-researcher interface meetings (Phase Two) in Nigeria. This paper aims to give an empirical account of the dialogue from these community engagement processes and provide a resulting critique of the implementation of research ethics practices in Nigeria. It is anticipated that the outputs will: (i) support researchers in designing community-based research protocols; (ii) inform ethics committees of key considerations during research protocol reviews from a community perspective; and (iii) inform policy makers and research sponsors about issues of primary concern to communities with respect to HIV research. © 2014 John Wiley & Sons Ltd.
Research protocols in National Park Service wilderness
Jim Walters
2000-01-01
While the National Park Service encourages the use of its wilderness resource for research, management policies require that all research apply âminimum requirementâ protocols to determine: 1) if the research is needed to support the purposes of wilderness and, 2) if it is appropriate, determine the minimum tool needed to accomplish the work.
Nolte, Kurt B; Stewart, Douglas M; O'Hair, Kevin C; Gannon, William L; Briggs, Michael S; Barron, A Marie; Pointer, Judy; Larson, Richard S
2008-10-01
The authors developed a novel continuous quality improvement (CQI) process for academic biomedical research compliance administration. A challenge in developing a quality improvement program in a nonbusiness environment is that the terminology and processes are often foreign. Rather than training staff in an existing quality improvement process, the authors opted to develop a novel process based on the scientific method--a paradigm familiar to all team members. The CQI process included our research compliance units. Unit leaders identified problems in compliance administration where a resolution would have a positive impact and which could be resolved or improved with current resources. They then generated testable hypotheses about a change to standard practice expected to improve the problem, and they developed methods and metrics to assess the impact of the change. The CQI process was managed in a "peer review" environment. The program included processes to reduce the incidence of infections in animal colonies, decrease research protocol-approval times, improve compliance and protection of animal and human research subjects, and improve research protocol quality. This novel CQI approach is well suited to the needs and the unique processes of research compliance administration. Using the scientific method as the improvement paradigm fostered acceptance of the project by unit leaders and facilitated the development of specific improvement projects. These quality initiatives will allow us to improve support for investigators while ensuring that compliance standards continue to be met. We believe that our CQI process can readily be used in other academically based offices of research.
Efficient ultrafiltration-based protocol to deplete extracellular vesicles from fetal bovine serum
Kornilov, Roman; Puhka, Maija; Mannerström, Bettina; Hiidenmaa, Hanna; Peltoniemi, Hilkka; Siljander, Pia; Seppänen-Kaijansinkko, Riitta; Kaur, Sippy
2018-01-01
ABSTRACT Fetal bovine serum (FBS) is the most commonly used supplement in studies involving cell-culture experiments. However, FBS contains large numbers of bovine extracellular vesicles (EVs), which hamper the analyses of secreted EVs from the cell type of preference and, thus, also the downstream analyses. Therefore, a prior elimination of EVs from FBS is crucial. However, the current methods of EV depletion by ultracentrifugation are cumbersome and the commercial alternatives expensive. In this study, our aim was to develop a protocol to completely deplete EVs from FBS, which may have wide applicability in cell-culture applications. We investigated different EV-depleted FBS prepared by our novel ultrafiltration-based protocol, by conventionally used overnight ultracentrifugation, or commercially available depleted FBS, and compared them with regular FBS. All sera were characterized by nanoparticle tracking analysis, electron microscopy, Western blotting and RNA quantification. Next, adipose-tissue mesenchymal stem cells (AT-MSCs) and cancer cells were grown in the media supplemented with the three different EV-depleted FBS and compared with cells grown in regular FBS media to assess the effects on cell proliferation, stress, differentiation and EV production. The novel ultrafiltration-based protocol depleted EVs from FBS clearly more efficiently than ultracentrifugation and commercial methods. Cell proliferation, stress, differentiation and EV production of AT-MSCs and cancer cell lines were similarly maintained in all three EV-depleted FBS media up to 96 h. In summary, our ultrafiltration protocol efficiently depletes EVs, is easy to use and maintains cell growth and metabolism. Since the method is also cost-effective and easy to standardize, it could be used in a wide range of cell-culture applications helping to increase comparability of EV research results between laboratories. PMID:29410778
2013-01-01
Background The use of computerized systems to support evidence-based practice is commonplace in contemporary medicine. Despite the prolific use of electronic support systems there has been relatively little research on the uptake of web-based systems in the oncology setting. Our objective was to examine the uptake of a web-based oncology protocol system (http://www.eviq.org.au) by Australian cancer clinicians. Methods We used web-logfiles and Google Analytics to examine the characteristics of eviQ registrants from October 2009-December 2011 and patterns of use by cancer clinicians during a typical month. Results As of December 2011, there were 16,037 registrants; 85% of whom were Australian health care professionals. During a typical month 87% of webhits occurred in standard clinical hours (08:00 to 18:00 weekdays). Raw webhits were proportional to the size of clinician groups: nurses (47% of Australian registrants), followed by doctors (20%), and pharmacists (14%). However, pharmacists had up to three times the webhit rate of other clinical groups. Clinicians spent five times longer viewing chemotherapy protocol pages than other content and the protocols viewed reflect the most common cancers: lung, breast and colorectal. Conclusions Our results demonstrate eviQ is used by a range of health professionals involved in cancer treatment at the point-of-care. Continued monitoring of electronic decision support systems is vital to understanding how they are used in clinical practice and their impact on processes of care and patient outcomes. PMID:23497080
Sánchez-Rodríguez, Aminael; Tejera, Eduardo; Cruz-Monteagudo, Maykel; Borges, Fernanda; Cordeiro, M. Natália D. S.; Le-Thi-Thu, Huong; Pham-The, Hai
2018-01-01
Gastric cancer is the third leading cause of cancer-related mortality worldwide and despite advances in prevention, diagnosis and therapy, it is still regarded as a global health concern. The efficacy of the therapies for gastric cancer is limited by a poor response to currently available therapeutic regimens. One of the reasons that may explain these poor clinical outcomes is the highly heterogeneous nature of this disease. In this sense, it is essential to discover new molecular agents capable of targeting various gastric cancer subtypes simultaneously. Here, we present a multi-objective approach for the ligand-based virtual screening discovery of chemical compounds simultaneously active against the gastric cancer cell lines AGS, NCI-N87 and SNU-1. The proposed approach relays in a novel methodology based on the development of ensemble models for the bioactivity prediction against each individual gastric cancer cell line. The methodology includes the aggregation of one ensemble per cell line using a desirability-based algorithm into virtual screening protocols. Our research leads to the proposal of a multi-targeted virtual screening protocol able to achieve high enrichment of known chemicals with anti-gastric cancer activity. Specifically, our results indicate that, using the proposed protocol, it is possible to retrieve almost 20 more times multi-targeted compounds in the first 1% of the ranked list than what is expected from a uniform distribution of the active ones in the virtual screening database. More importantly, the proposed protocol attains an outstanding initial enrichment of known multi-targeted anti-gastric cancer agents. PMID:29420638
[Endovascular treatment in acute ischaemic stroke. A stroke care plan for the region of Madrid].
Alonso de Leciñana, M; Díaz-Guzmán, J; Egido, J A; García Pastor, A; Martínez-Sánchez, P; Vivancos, J; Díez-Tejedor, E
2013-09-01
Endovascular therapies (intra-arterial thrombolysis and mechanical thrombectomy) after acute ischaemic stroke are being implemented in the clinical setting even as they are still being researched. Since we lack sufficient data to establish accurate evidence-based recommendations for use of these treatments, we must develop clinical protocols based on current knowledge and carefully monitor all procedures. After review of the literature and holding work sessions to reach a consensus among experts, we developed a clinical protocol including indications and contraindications for endovascular therapies use in acute ischaemic stroke. The protocol includes methodology recommendations for diagnosing and selecting patients, performing revascularisation procedures, and for subsequent patient management. Its objective is to increase the likelihood of efficacy and treatment benefit and minimise risk of complications and ineffective recanalisation. Based on an analysis of healthcare needs and available resources, a cooperative inter-hospital care system has been developed. This helps to ensure availability of endovascular therapies to all patients, a fast response time, and a good cost-to-efficacy ratio. It includes also a prospective register which serves to monitor procedures in order to identify any opportunities for improvement. Implementation of endovascular techniques for treating acute ischaemic stroke requires the elaboration of evidence-based clinical protocols and the establishment of appropriate cooperative healthcare networks guaranteeing both the availability and the quality of these actions. Such procedures must be monitored in order to improve methodology. Copyright © 2012 Sociedad Española de Neurología. Published by Elsevier Espana. All rights reserved.
Gaudiano, Brandon A.; Davis, Carter H.; Epstein-Lubow, Gary; Johnson, Jennifer E.; Mueser, Kim T.; Miller, Ivan W.
2017-01-01
Patients with schizophrenia-spectrum disorders frequently require treatment at inpatient hospitals during periods of acute illness for crisis management and stabilization. Acceptance and Commitment Therapy (ACT), a “third wave” cognitive-behavioral intervention that employs innovative mindfulness-based strategies, has shown initial efficacy in randomized controlled trials for improving acute and post-discharge outcomes in patients with psychosis when studied in acute-care psychiatric hospitals in the U.S. However, the intervention has not been widely adopted in its current form because of its use of an individual-only format and delivery by doctoral-level research therapists with extensive prior experience using ACT. The aim of the Researching the Effectiveness of Acceptance-based Coping during Hospitalization (REACH) Study is to adapt a promising acute-care psychosocial treatment for inpatients with psychosis, and to pilot test its effectiveness in a routine inpatient setting. More specifically, we describe our plans to: (a) further develop and refine the treatment and training protocols, (b) conduct an open trial and make further modifications based on the experience gained, and (c) conduct a pilot randomized controlled trial in preparation for a future fully-powered clinical trial testing the effectiveness of ACT. PMID:28475123
Lowther, Helen; Newman, Emily
2014-10-01
Attention Bias Modification (ABM) is a novel computer based treatment for anxiety disorders. It has been proposed as an efficient, accessible psychological therapy and is based on cognitive theories of attention. The present review sought to investigate the efficacy of ABM as a potential treatment for child and adolescent anxiety. A systematic literature review was conducted, using three main databases, PsycINFO, Embase and Medline, to identify original research articles which measured the effect of ABM on anxiety levels in children and/or adolescents. Ten articles met the inclusion criteria and of these 10, three were randomised control trials. A lack of standardisation in relation to the treatment protocol was observed; nonetheless the identified studies generally provided evidence for the efficacy of ABM as an anxiety treatment. Due to the nature of the studies found, a statistical meta-analysis was not possible. ABM seems to be a promising, novel treatment for child and/or adolescent anxiety disorders with merits over lengthier, talking based therapies. However, more rigorous research trials are needed to clarify the mechanisms behind ABM and establish effective, standardised treatment protocols. Copyright © 2014 Elsevier B.V. All rights reserved.
Innovating for Transformation in First Nations Health Using Community-Based Participatory Research.
Kyoon-Achan, Grace; Lavoie, Josée; Avery Kinew, Kathi; Phillips-Beck, Wanda; Ibrahim, Naser; Sinclair, Stephanie; Katz, Alan
2018-06-01
Community-based participatory research (CBPR) provides the opportunity to engage communities for sustainable change. We share a journey to transformation in our work with eight Manitoba First Nations seeking to improve the health of their communities and discuss lessons learned. The study used community-based participatory research approach for the conceptualization of the study, data collection, analysis, and knowledge translation. It was accomplished through a variety of methods, including qualitative interviews, administrative health data analyses, surveys, and case studies. Research relationships built on strong ethics and protocols to enhance mutual commitment to support community-driven transformation. Collaborative and respectful relationships are platforms for defining and strengthening community health care priorities. We further discuss how partnerships were forged to own and sustain innovations. This article contributes a blueprint for respectful CBPR. The outcome is a community-owned, widely recognized process that is sustainable while fulfilling researcher and funding obligations.
REFOLDdb: a new and sustainable gateway to experimental protocols for protein refolding.
Mizutani, Hisashi; Sugawara, Hideaki; Buckle, Ashley M; Sangawa, Takeshi; Miyazono, Ken-Ichi; Ohtsuka, Jun; Nagata, Koji; Shojima, Tomoki; Nosaki, Shohei; Xu, Yuqun; Wang, Delong; Hu, Xiao; Tanokura, Masaru; Yura, Kei
2017-04-24
More than 7000 papers related to "protein refolding" have been published to date, with approximately 300 reports each year during the last decade. Whilst some of these papers provide experimental protocols for protein refolding, a survey in the structural life science communities showed a necessity for a comprehensive database for refolding techniques. We therefore have developed a new resource - "REFOLDdb" that collects refolding techniques into a single, searchable repository to help researchers develop refolding protocols for proteins of interest. We based our resource on the existing REFOLD database, which has not been updated since 2009. We redesigned the data format to be more concise, allowing consistent representations among data entries compared with the original REFOLD database. The remodeled data architecture enhances the search efficiency and improves the sustainability of the database. After an exhaustive literature search we added experimental refolding protocols from reports published 2009 to early 2017. In addition to this new data, we fully converted and integrated existing REFOLD data into our new resource. REFOLDdb contains 1877 entries as of March 17 th , 2017, and is freely available at http://p4d-info.nig.ac.jp/refolddb/ . REFOLDdb is a unique database for the life sciences research community, providing annotated information for designing new refolding protocols and customizing existing methodologies. We envisage that this resource will find wide utility across broad disciplines that rely on the production of pure, active, recombinant proteins. Furthermore, the database also provides a useful overview of the recent trends and statistics in refolding technology development.
Suzuki, Mika; Sato, Keiko
2016-07-01
Research Ethics Committees (RECs) are designed to protect human subjects in research. It is essential to recognize whether the RECs are achieving this goal. Several studies have reported on RECs; however, detailed data regarding the quality of research protocols and the review process of RECs have not been reported in Japan. We examine research protocols reviewed by RECs and the review processes at three institutions using a novel checklist we developed. The data show that approximately half of all examined protocols lacked a clearly written "Background" section that defines the study rationale and design. These results reiterate suggestions made in previous research regarding educational programs and support departments that could enhance responsible conduct in clinical research to protect human subjects in Japan. © The Author(s) 2016.
Resident choice and the survey process: the need for standardized observation and transparency.
Schnelle, John F; Bertrand, Rosanna; Hurd, Donna; White, Alan; Squires, David; Feuerberg, Marvin; Hickey, Kelly; Simmons, Sandra F
2009-08-01
To describe a standardized observation protocol to determine if nursing home (NH) staff offer choice to residents during 3 morning activities of daily living (ADL) and compare the observational data with deficiency statements cited by state survey staff. Morning ADL care was observed in 20 NHs in 5 states by research staff using a standardized observation protocol. The number of observations in which choice was not offered was documented for 3 morning ADL care activities and compared with deficiency statements made by surveyors. Staff failed to offer choice during morning ADL care delivery for at least 1 of 3 ADL care activities in all 20 NHs. Observational data showed residents were not offered choice about when to get out of bed (11%), what to wear (25%), and breakfast dining location (39%). In comparison, survey staff issued only 2 deficiencies in all 20 NHs relevant to choice in the targeted ADL care activities, and neither deficiency was based on observational data. Survey interpretative guidelines instruct surveyors to observe if residents are offered choice during daily care provision, but standardized observation protocols are not provided to surveyors to make this determination. The use of a standardized observation protocol in the survey process similar to that used by research staff in this study would improve the accuracy and transparency of the survey process.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Progeria Research Foundation Diagnostic Testing Program
... Culture Protocols Immortalized Cell Culture Protocols Induced Pluripotent Stem Cells PRF Cell and Tissue Bank Publications Research Funding Opportunities Grant Application Application Deadlines Grants Funded Close Meet The Kids Meet The Kids Our Ambassadors Find The Other ...
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Research-Based Implementation of Peer Instruction: A Literature Review
Vickrey, Trisha; Rosploch, Kaitlyn; Rahmanian, Reihaneh; Pilarz, Matthew; Stains, Marilyne
2015-01-01
Current instructional reforms in undergraduate science, technology, engineering, and mathematics (STEM) courses have focused on enhancing adoption of evidence-based instructional practices among STEM faculty members. These practices have been empirically demonstrated to enhance student learning and attitudes. However, research indicates that instructors often adapt rather than adopt practices, unknowingly compromising their effectiveness. Thus, there is a need to raise awareness of the research-based implementation of these practices, develop fidelity of implementation protocols to understand adaptations being made, and ultimately characterize the true impact of reform efforts based on these practices. Peer instruction (PI) is an example of an evidence-based instructional practice that consists of asking students conceptual questions during class time and collecting their answers via clickers or response cards. Extensive research has been conducted by physics and biology education researchers to evaluate the effectiveness of this practice and to better understand the intricacies of its implementation. PI has also been investigated in other disciplines, such as chemistry and computer science. This article reviews and summarizes these various bodies of research and provides instructors and researchers with a research-based model for the effective implementation of PI. Limitations of current studies and recommendations for future empirical inquiries are also provided. PMID:25713095
Geiger, Paul J.; Boggero, Ian A.; Brake, C. Alex; Caldera, Carolina A.; Combs, Hannah L.; Peters, Jessica R.; Baer, Ruth A.
2015-01-01
This comprehensive review examined the effects of mindfulness-based interventions on the physical and emotional wellbeing of older adults, a rapidly growing segment of the general population. Search procedures yielded 15 treatment outcome studies meeting inclusion criteria. Support was found for the feasibility and acceptability of mindfulness-based interventions with older adults. Physical and emotional wellbeing outcome variables offered mixed support for the use of mindfulness-based interventions with older adults. Potential explanations of mixed findings may include methodological flaws, study limitations, and inconsistent modifications of protocols. These are discussed in detail and future avenues of research are discussed, emphasizing the need to incorporate geriatric populations into future mindfulness-based empirical research. PMID:27200109
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Automating Security Protocol Analysis
2004-03-01
language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java
Factors influencing the effectiveness of research ethics committees.
Schuppli, C A; Fraser, D
2007-05-01
Research ethics committees - animal ethics committees (AECs) for animal-based research and institutional research boards (IRBs) for human subjects - have a key role in research governance, but there has been little study of the factors influencing their effectiveness. The objectives of this study were to examine how the effectiveness of a research ethics committee is influenced by committee composition and dynamics, recruitment of members, workload, participation level and member turnover. As a model, 28 members of AECs at four universities in western Canada were interviewed. Committees were selected to represent variation in the number and type of protocols reviewed, and participants were selected to include different types of committee members. We found that a bias towards institutional or scientific interests may result from (1) a preponderance of institutional and scientist members, (2) an intimidating atmosphere for community members and other minority members, (3) recruitment of community members who are affiliated with the institution and (4) members joining for reasons other than to fulfil the committee mandate. Thoroughness of protocol review may be influenced by heavy workloads, type of review process and lack of full committee participation. These results, together with results from the literature on research ethics committees, suggested potential ways to improve the effectiveness of research ethics committees.
Using the Internet for Surveys and Health Research
Eysenbach, Gunther; Wyatt, Jeremy
2002-01-01
This paper concerns the use of the Internet in the research process, from identifying research issues through qualitative research, through using the Web for surveys and clinical trials, to pre-publishing and publishing research results. Material published on the Internet may be a valuable resource for researchers desiring to understand people and the social and cultural contexts within which they live outside of experimental settings, with due emphasis on the interpretations, experiences, and views of `real world' people. Reviews of information posted by consumers on the Internet may help to identify health beliefs, common topics, motives, information, and emotional needs of patients, and point to areas where research is needed. The Internet can further be used for survey research. Internet-based surveys may be conducted by means of interactive interviews or by questionnaires designed for self-completion. Electronic one-to-one interviews can be conducted via e-mail or using chat rooms. Questionnaires can be administered by e-mail (e.g. using mailing lists), by posting to newsgroups, and on the Web using fill-in forms. In "open" web-based surveys, selection bias occurs due to the non-representative nature of the Internet population, and (more importantly) through self-selection of participants, i.e. the non-representative nature of respondents, also called the `volunteer effect'. A synopsis of important techniques and tips for implementing Web-based surveys is given. Ethical issues involved in any type of online research are discussed. Internet addresses for finding methods and protocols are provided. The Web is also being used to assist in the identification and conduction of clinical trials. For example, the web can be used by researchers doing a systematic review who are looking for unpublished trials. Finally, the web is used for two distinct types of electronic publication. Type 1 publication is unrefereed publication of protocols or work in progress (a `post-publication' peer review process may take place), whereas Type 2 publication is peer-reviewed and will ordinarily take place in online journals. PMID:12554560
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.
Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young
2016-03-01
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.
Protocol Architecture Model Report
NASA Technical Reports Server (NTRS)
Dhas, Chris
2000-01-01
NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.
Sacrificial adhesive bonding: a powerful method for fabrication of glass microchips
Lima, Renato S.; Leão, Paulo A. G. C.; Piazzetta, Maria H. O.; Monteiro, Alessandra M.; Shiroma, Leandro Y.; Gobbi, Angelo L.; Carrilho, Emanuel
2015-01-01
A new protocol for fabrication of glass microchips is addressed in this research paper. Initially, the method involves the use of an uncured SU-8 intermediate to seal two glass slides irreversibly as in conventional adhesive bonding-based approaches. Subsequently, an additional step removes the adhesive layer from the channels. This step relies on a selective development to remove the SU-8 only inside the microchannel, generating glass-like surface properties as demonstrated by specific tests. Named sacrificial adhesive layer (SAB), the protocol meets the requirements of an ideal microfabrication technique such as throughput, relatively low cost, feasibility for ultra large-scale integration (ULSI), and high adhesion strength, supporting pressures on the order of 5 MPa. Furthermore, SAB eliminates the use of high temperature, pressure, or potential, enabling the deposition of thin films for electrical or electrochemical experiments. Finally, the SAB protocol is an improvement on SU-8-based bondings described in the literature. Aspects such as substrate/resist adherence, formation of bubbles, and thermal stress were effectively solved by using simple and inexpensive alternatives. PMID:26293346
NASA Technical Reports Server (NTRS)
Dhas, Chris
2000-01-01
NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.
LC-MS based analysis of endogenous steroid hormones in human hair.
Gao, Wei; Kirschbaum, Clemens; Grass, Juliane; Stalder, Tobias
2016-09-01
The quantification of endogenous steroid hormone concentrations in hair is increasingly used as a method for obtaining retrospective information on long-term integrated hormone exposure. Several different analytical procedures have been employed for hair steroid analysis, with liquid chromatography-mass spectrometry (LC-MS) being recognized as a particularly powerful analytical tool. Several methodological aspects affect the performance of LC-MS systems for hair steroid analysis, including sample preparation and pretreatment, steroid extraction, post-incubation purification, LC methodology, ionization techniques and MS specifications. Here, we critically review the differential value of such protocol variants for hair steroid hormones analysis, focusing on both analytical quality and practical feasibility issues. Our results show that, when methodological challenges are adequately addressed, LC-MS protocols can not only yield excellent sensitivity and specificity but are also characterized by relatively simple sample processing and short run times. This makes LC-MS based hair steroid protocols particularly suitable as a high-quality option for routine application in research contexts requiring the processing of larger numbers of samples. Copyright © 2016 Elsevier Ltd. All rights reserved.
Byk, J C
1997-01-01
The objective of this paper is to stimulate academic debate on embryo and fetal research from the perspective of the drafting of a protocol to the European Convention on Biomedicine. The Steering Committee on Bioethics of the Council of Europe was mandated to draw up such a protocol and for this purpose organised an important symposium on reproductive technologies and embryo research, in Strasbourg from the 16th to the 18th of December 1996. PMID:9055160
Maintenance of Certification Part 4 Credit and recruitment for practice-based research.
Gorzkowski, Julie A; Klein, Jonathan D; Harris, Donna L; Kaseeska, Kristen R; Whitmore Shaefer, Regina M; Bocian, Alison B; Davis, James B; Gotlieb, Edward M; Wasserman, Richard C
2014-10-01
Competing priorities in pediatric practice have created challenges for practice-based research. To increase recruitment success, researchers must design studies that provide added value to participants. This study evaluates recruitment of pediatricians into a study, before and after the development and addition of a quality improvement (QI) curriculum approved for American Board of Pediatrics Maintenance of Certification (MOC) Part 4 Credit as an enrollment incentive. Researchers implemented multiple outreach methods to enroll pediatric practices over 28 months. Field note review revealed that many physicians declined enrollment, stating that they prioritized MOC Part 4 projects over research studies. A QI curriculum meeting standards for MOC Part 4 Credit was developed and added to the study protocol as an enrollment incentive. Enrollment rates and characteristics of practitioners enrolled pre- and post-MOC were compared. Pre-MOC enrollment contributed 48% of practices in 22 months; post-MOC enrollment contributed 49% of practices in 6 months. An average of 3.5 practices enrolled per month pre-MOC, compared with 13.1 per month post-MOC (P < .001). Clinicians in pre- and post-MOC groups were similar in age, gender, race, and time spent on patient care; practices enrolled post-MOC were more likely to be located in federally designated Medically Underserved Areas than those enrolled pre-MOC (28.6% vs 12%, P = .03). Addition of MOC Part 4 Credit increased recruitment success and increased enrollment of pediatricians working in underserved areas. Including QI initiatives meeting MOC Part 4 criteria in practice-based research protocols may enhance participation and aid in recruiting diverse practice and patient populations. Copyright © 2014 by the American Academy of Pediatrics.
ERIC Educational Resources Information Center
Kolko, David J.; Dorn, Lorah D.; Bukstein, Oscar G.; Pardini, Dustin; Holden, Elizabeth A.; Hart, Jonathan
2009-01-01
This study examines the treatment outcomes of 139, 6-11 year-old, clinically referred boys and girls diagnosed with Oppositional Defiant Disorder (ODD) or Conduct Disorder (CD) who were randomly assigned to a modular-based treatment protocol that was applied by research study clinicians either in the community (COMM) or a clinic office (CLINIC).…
Tailored Communication to Enhance Adaptation Across the Breast Cancer Spectrum
2007-10-01
displayed in the Radiation Treatment, Chemotherapy and Outpatient Clinic at FCCC, targets potential participants and contains study’s description...the Negev , Israel. We are in the process of translating the intervention and assessment protocols developed for this study to be tested and evaluated...in the context of a comprehensive community-based survivorship program in the Negev . • Based on the research and experience acquired through this
Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy
2009-01-01
This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.
The era of sport concussion: Evolution of knowledge, practice, and the role of psychology.
Guay, Julie L; Lebretore, Brittany M; Main, Jesse M; DeFrangesco, Katelyn E; Taylor, Jessica L; Amedoro, Sarah M
2016-12-01
The topic of sport concussion has gained significant prominence over the last 20 years, resulting in dramatic growth in research funding, widespread media coverage, and increased public awareness. Although the knowledge base has greatly expanded, there is still much that is unknown or controversial about the long-term effects of sports-related head injury. Because of the high stakes of mismanaging these injuries, professional sports organizations, federal/state government, and various health-related disciplines have responded with efforts to educate the public and improve treatment and management of this injury. This has resulted in changes to laws, game rules and policies, and recovery management protocols. The field of psychology has also made significant contributions to research on sports concussions, resulting in the development of new assessment and treatment protocols. This article summarizes the latest research findings on sport concussion, highlights areas that require more research before consensus can be reached, and discusses the ways that multiple disciplines within psychology (clinical, neuropsychology, school) can continue to play a critical role in enhancing patient care. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
NASA Astrophysics Data System (ADS)
Wilcox, Jesse Lee
This year-long study explored how ten teachers--five first year, five second year--acclimated to their new school environment after leaving a master's level university science teacher preparation program known for being highly effective. Furthermore, this study sought to explore if a relationship existed between teachers' understanding and implementation of research-based science teaching practices, the barriers to enacting these practices--known as institutional constraints, and the constructive-developmental theory which explores meaning-making systems known as orders of consciousness. As a naturalistic inquiry mixed methods study, data were collected using both qualitative (e.g., semi-structured interviews, field notes) as well as quantitative methods (e.g., observation protocols, subject/object protocol). These data sources were used to construct participant summaries and a cross-case analysis. The findings from provide evidence that teachers' orders of consciousness might help to explain why understanding research-based science teaching practices are maintained by some new teachers and not others. Additionally, this study found the orders of consciousness of teachers relates to the perceptions of institutional constraints as well as how a teacher chooses to navigate those constraints. Finally, the extent to which teachers implement research-based science teaching practices is related to orders of consciousness. While many studies have focused on what meaning teachers make, this study highlights the importance of considering how teachers make meaning.
Fallah, F; Minaei Chenar, H; Amiri, H; Omodipour, S; Shirbande Ghods, F; Kahrizi, D; Sohrabi, M; Ghorbani, T; Kazemi, E
2017-02-28
High quality DNA is essential for molecular research. Secondary metabolites can affect the quantity and quality DNA. In current research two DNA isolation methods including CTAB and Delaporta (protocols 1 & 2 respectively) were applied in three leave samples from Cotinus coggygria, Citrus sinensis and Genus juglans that their leaves are rich of secondary metabolites. We successfully isolated DNA from C. coggygria, C. sinensis and Genus Juglans using the two protocols described above. Good quality DNA was isolated from C. coggygria, C. sinensis and Genus Juglans using protocol 1, while protocol 2 failed to produce usable DNA from these sources. The highest amount of DNA (1.3-1.6) was obtained from them using protocol 1. As we discovered, procedure 1 may work better for plants with secondary metabolites.
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Increasing fall risk awareness using wearables: A fall risk awareness protocol.
Danielsen, Asbjørn; Olofsen, Hans; Bremdal, Bernt Arild
2016-10-01
Each year about a third of elderly aged 65 or older experience a fall. Many of these falls may have been avoided if fall risk assessment and prevention tools where available in a daily living situation. We identify what kind of information is relevant for doing fall risk assessment and prevention using wearable sensors in a daily living environment by investigating current research, distinguishing between prospective and context-aware fall risk assessment and prevention. Based on our findings, we propose a fall risk awareness protocol as a fall prevention tool integrating both wearables and ambient sensing technology into a single platform. Copyright © 2016. Published by Elsevier Inc.
Miyagi, Michiko; Yokoyama, Hirokazu; Hibi, Toshifumi
2007-07-01
An HPLC protocol for sugar microanalysis based on the formation of ultraviolet-absorbing benzoyl chloride derivatives was improved. Here, samples were prepared with a C-8 cartridge and analyzed with a high efficiency ODS column, in which porous spherical silica particles 3 microm in diameter were packed. These devices allowed us to simultaneously quantify multiple sugars and sugar alcohols up to 10 ng/ml and to provide satisfactory separations of some sugars, such as fructose and myo-inositol and sorbitol and mannitol. This protocol, which does not require special apparatuses, should become a powerful tool in sugar research.
Analysis of Existing Privacy-Preserving Protocols in Domain Name System
NASA Astrophysics Data System (ADS)
Zhao, Fangming; Hori, Yoshiaki; Sakurai, Kouichi
In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in the current Domain Name System is an important issue worth considering. In this paper, we first review the DNS and some security & privacy threats to make average users begin to concern about the significance of privacy preservation in DNS protocols. Then, by an careful survey of four noise query generation based existing privacy protection approaches, we analyze some benefits and limitations of these proposals in terms of both related performance evaluation results and theoretic proofs. Finally, we point out some problems that still exist for research community's continuing efforts in the future.
Validation of consensus panel diagnosis in dementia.
Gabel, Matthew J; Foster, Norman L; Heidebrink, Judith L; Higdon, Roger; Aizenstein, Howard J; Arnold, Steven E; Barbas, Nancy R; Boeve, Bradley F; Burke, James R; Clark, Christopher M; Dekosky, Steven T; Farlow, Martin R; Jagust, William J; Kawas, Claudia H; Koeppe, Robert A; Leverenz, James B; Lipton, Anne M; Peskind, Elaine R; Turner, R Scott; Womack, Kyle B; Zamrini, Edward Y
2010-12-01
The clinical diagnosis of dementing diseases largely depends on the subjective interpretation of patient symptoms. Consensus panels are frequently used in research to determine diagnoses when definitive pathologic findings are unavailable. Nevertheless, research on group decision making indicates that many factors can adversely affect panel performance. To determine conditions that improve consensus panel diagnosis. Comparison of neuropathologic diagnoses with individual and consensus panel diagnoses based on clinical scenarios only, fludeoxyglucose F 18 positron emission tomography images only, and scenarios plus images. Expert and trainee individual and consensus panel deliberations using a modified Delphi method in a pilot research study of the diagnostic utility of fludeoxyglucose F 18 positron emission tomography. Forty-five patients with pathologically confirmed Alzheimer disease or frontotemporal dementia. Statistical measures of diagnostic accuracy, agreement, and confidence for individual raters and panelists before and after consensus deliberations. The consensus protocol using trainees and experts surpassed the accuracy of individual expert diagnoses when clinical information elicited diverse judgments. In these situations, consensus was 3.5 times more likely to produce positive rather than negative changes in the accuracy and diagnostic certainty of individual panelists. A rule that forced group consensus was at least as accurate as majority and unanimity rules. Using a modified Delphi protocol to arrive at a consensus diagnosis is a reasonable substitute for pathologic information. This protocol improves diagnostic accuracy and certainty when panelist judgments differ and is easily adapted to other research and clinical settings while avoiding the potential pitfalls of group decision making.
Maternal–Child Microbiome: Specimen Collection, Storage and Implications for Research and Practice
Jordan, Sheila; Baker, Brenda; Dunn, Alexis; Edwards, Sara; Ferranti, Erin; Mutic, Abby D.; Yang, Irene; Rodriguez, Jeannie
2017-01-01
Background The maternal microbiome is a key contributor to the development and outcomes of pregnancy and the health status of both mother and infant. Significant advances are occurring in the science of the maternal and child microbiome and hold promise in improving outcomes related to pregnancy complications, child development, and chronic health conditions of mother and child. Objectives The purpose of the paper is to review site-specific considerations in the collection and storage of maternal and child microbiome samples and its implications for nursing research and practice. Approach Microbiome sampling protocols were reviewed and synthesized. Precautions across sampling protocols were also noted. Results Oral, vaginal, gut, placental, and breastmilk are viable sources for sampling the maternal and/or child microbiome. Prior to sampling special considerations need to be addressed related to various factors including current medications, health status, and hygiene practices. Proper storage of samples will avoid degradation of cellular and DNA structures vital for analysis. Discussion Changes in the microbiome throughout the perinatal, postpartum and childhood periods are dramatic and significant to outcomes of the pregnancy and the long-term health of mother and child. Proper sampling techniques are required to produce reliable results from which evidence-based practice recommendations will be built. Ethical and practical issues surrounding study design and protocol development must also be considered when researching vulnerable groups such as pregnant women and infants. Nurses hold the responsibility to both perform the research and to translate findings from microbiome investigations for clinical use. PMID:28252577
NASA Astrophysics Data System (ADS)
Maryboy, N.; Begay, D.; Hawkins, I.; Cline, T.
Humans across all cultures have venerated observed and studied the Sun the Moon the planets and the stars of Father Sky for thousands of years We will highlight a research and development collaboration between NASA UC Berkeley and the Indigenous Education Institute This unique astronomy-based collaboration has been ongoing for the past eight years including partnerships between the Indigenous Education Institute with several NASA entities The collaboration has sustained a successful track record because it upholds the integrity of both western and indigenous astronomy knowledge and research protocols and because it honors the native languages By working together we have been able to identify common elements from seemingly paradoxical frameworks towards an authentic and sustained collaboration We will compare and contrast the native and western research protocols using the Pleiades as an example Drawing on the fact that stars are suns and the Sun is a star we will draw from our collaborative project to delve into the Sun-Earth Connection The Sun our nearest star provides heat and energy is the cause of the seasons and is responsible for space weather effects that influence today s technology Knowledge of the Sun is also a major part of indigenous traditions and cultural practices Within the content of astronomy we will discuss juxtapositions and collaborative possibilities between western and native science We will share a CD of Navajo oral stories and sound effects developed by the Indigenous Education Institute as
Videotutoring, Non-Verbal Communication and Initial Teacher Training.
ERIC Educational Resources Information Center
Nichol, Jon; Watson, Kate
2000-01-01
Describes the use of video tutoring for distance education within the context of a post-graduate teacher training course at the University of Exeter. Analysis of the tapes used a protocol based on non-verbal communication research, and findings suggest that the interaction of participants was significantly different from face-to-face…
Globe, student inquiry, and learning communities
C.L. Henzel
2000-01-01
The Global Learning and Observations to Benefit the Environment (GLOBE) database is a web-based archive of environmental data gathered by K through 12 students in over 85 countries. The data are gathered under protocols developed by research scientists specializing in various fields of earth science. Students gather information, then enter and visualize the data via...
Constraint-Induced Movement Therapy (CIMT): Pediatric Applications
ERIC Educational Resources Information Center
Brady, Kathleen; Garcia, Teressa
2009-01-01
The purpose of this article is to describe theoretical and research bases for constraint-induced movement therapy (CIMT), to discuss key features and variations in protocols currently in use with children, and to review the results of studies of efficacy. CIMT has been found to be an effective intervention for increasing functional use of the…
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
Lawless, Craig; Hubbard, Simon J.; Fan, Jun; Bessant, Conrad; Hermjakob, Henning; Jones, Andrew R.
2012-01-01
Abstract New methods for performing quantitative proteome analyses based on differential labeling protocols or label-free techniques are reported in the literature on an almost monthly basis. In parallel, a correspondingly vast number of software tools for the analysis of quantitative proteomics data has also been described in the literature and produced by private companies. In this article we focus on the review of some of the most popular techniques in the field and present a critical appraisal of several software packages available to process and analyze the data produced. We also describe the importance of community standards to support the wide range of software, which may assist researchers in the analysis of data using different platforms and protocols. It is intended that this review will serve bench scientists both as a useful reference and a guide to the selection and use of different pipelines to perform quantitative proteomics data analysis. We have produced a web-based tool (http://www.proteosuite.org/?q=other_resources) to help researchers find appropriate software for their local instrumentation, available file formats, and quantitative methodology. PMID:22804616
Gum, Amber M; Dautovich, Natalie D; Greene, Jennifer; Hirsch, Anne; Schonfeld, Lawrence
2015-01-01
Health care system fragmentation is a pervasive problem. Research has not delineated concrete behavioral strategies to guide providers to communicate with personnel in other organizations to coordinate care. We addressed this gap within a particular context: home-based providers delivering depression care management (DCM) to older adults requiring coordination with primary care personnel. Our objective was to pilot test a communication protocol ('BRIDGE - BRinging Inter-Disciplinary Guidelines to Elders') in conjunction with DCM. In an open pilot trial (N = 7), home-based providers delivered DCM to participants. Following the BRIDGE protocol, home-based providers made scripted telephone calls and sent structured progress reports to personnel in participants' primary care practices with concise information and requests for assistance. Home-based providers documented visits with participants, contacts to and responses from primary care personnel. A research interviewer assessed participant outcomes [Symptom Checklist-20 (depressive symptoms), World Health Organization Disability Assessment Schedule-12, satisfaction] at baseline, three months, and six months. Over 12 months, home-based providers made 2.4 telephone calls and sent 6.3 faxes to other personnel, on average per participant. Primary care personnel responded to 18 of 22 requests (81.8%; 2 requests dropped, 2 ongoing), with at least one response per participant. Participants' depressive symptoms and disability improved significantly at both post-tests with large effect sizes (d ranged 0.73-2.3). Participants were satisfied. Using BRIDGE, home-based providers expended a small amount of effort to communicate with primary care personnel, who responded to almost all requests. Larger scale research is needed to confirm findings and potentially extend BRIDGE to other client problems, professions, and service sectors.
Extremely high data-rate, reliable network systems research
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Mukkamala, R.; Murray, Nicholas D.; Overstreet, C. Michael
1990-01-01
Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described.
Refining MARGINS Mini-Lessons Using Classroom Observations
NASA Astrophysics Data System (ADS)
Iverson, E. A.; Manduca, C. A.; McDaris, J. R.; Lee, S.
2009-12-01
One of the challenges that we face in developing teaching materials or activities from research findings is testing the materials to determine that they work as intended. Traditionally faculty develop material for their own class, notice what worked and didn’t, and improve them the next year. However, as we move to a community process of creating and sharing teaching materials, a community-based process for testing materials is appropriate. The MARGINS project has piloted such a process for testing teaching materials and activities developed as part of its mini-lesson project (http://serc.carleton.edu/margins/index.html). Building on prior work developing mechanisms for community review of teaching resources (e.g. Kastens, 2002; Hancock and Manduca, 2005; Mayhew and Hall, 2007), the MARGINS evaluation team developed a structured classroom observation protocol. The goals of field testing are to a) gather structured, consistent feedback for the lesson authors based on classroom use; b) guide reviewers of these lessons to reflect on research-based educational practice as a framework for their comments; c) collect information on the data and observations that the reviewer used to underpin their review; d) determine which mini-lessons are ready to be made widely available on the website. The protocol guides faculty observations on why they used the activity, the effectiveness of the activity in their classroom, the success of the activity in leading to the desired learning, and what other faculty need to successfully use the activity. Available online (http://serc.carleton.edu/margins/protocol.html), the protocol can be downloaded and completed during instruction with the activity. In order to encourage review of mini-lessons using the protocol, a workshop focused on review and revision of activities was held in May 2009. In preparation for the workshop, 13 of the 28 participants chose to field test a mini-lesson prior to the workshop and reported that they found this process instructive. Activity authors found the observations very helpful and the first mini-lessons have now been revised using feedback from testers. Initial results show that the tested mini-lessons give students hands-on experience with scientific data and help students make connections between geologic phenomena and data. Productive feedback ranged from suggestions for improving activity design, adaptations for other audiences, suggestions for clearer presentation, and tips for using the materials. The team plans to broaden the use of the protocol to test and refine all of the mini-lessons in the MARGINS collection.
Fitzpatrick, Emily F M; Carter, Maureen; Oscar, June; Lawford, Tom; Martiniuk, Alexandra L C; D’Antoine, Heather A; Elliott, Elizabeth J
2017-01-01
Introduction Research with Indigenous populations is not always designed with cultural sensitivity. Few publications evaluate or describe in detail seeking consent for research with Indigenous participants. When potential participants are not engaged in a culturally respectful manner, participation rates and research quality can be adversely affected. It is unethical to proceed with research without truly informed consent. Methods and analysis We describe a culturally appropriate research protocol that is invited by Aboriginal communities of the Fitzroy Valley in Western Australia. The Picture Talk Project is a research partnership with local Aboriginal leaders who are also chief investigators. We will interview Aboriginal leaders about research, community engagement and the consent process and hold focus groups with Aboriginal community members about individual consent. Cultural protocols will be applied to recruit and conduct research with participants. Transcripts will be analysed using NVivo10 qualitative software and themes synthesised to highlight the key issues raised by the community about the research process. This protocol will guide future research with the Aboriginal communities of the Fitzroy Valley and may inform the approach to research with other Indigenous communities of Australia or the world. It must be noted that no community is the same and all research requires local consultation and input. To conduct culturally sensitive research, respected local people from the community who have knowledge of cultural protocol and language are engaged to guide each step of the research process from the project design to the delivery of results. Ethics and dissemination Ethics approval was granted by the University of Sydney Human Research Ethics Committee (No. 2012/348, reference:14760), the Western Australia Country Health Service Ethics Committee (No. 2012:15), the Western Australian Aboriginal Health Ethics Committee and reviewed by the Kimberley Aboriginal Health Planning Forum Research Sub-Committee (No. 2012–008). Results will be disseminated through peer review articles, a local Fitzroy Valley report and conference presentations. PMID:29288181
Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
Design and evaluation of prosthetic shoulder controller
Barton, Joseph E.; Sorkin, John D.
2015-01-01
We developed a 2-degree-of-freedom (DOF) shoulder position transducer (sensing shoulder protraction-retraction and elevation-depression) that can be used to control two of a powered prosthetic humerus' DOFs. We also developed an evaluation protocol based on Fitts' law to assess the performance of our device. The primary motivation for this work was to support development of powered prosthetic shoulder joints of a new generation of prosthetic arms for people with shoulder disarticulation and very high-level transhumeral amputation. We found that transducers that provided resistance to shoulder movement performed better than those providing no resistance. We also found that a position control scheme, where effector position is proportional to shoulder position, performed better than a velocity control scheme, where effector velocity is proportional to shoulder position. More generally, our transducer can be used to control motion along any two DOFs. It can also be used in a more general 4-DOF control scheme by sequentially controlling two DOFs at a time. The evaluation protocol has general applicability for researchers and practitioners. Researchers can employ it to compare different prosthesis designs and control schemes, while practitioners may find the evaluation protocol useful in evaluating and training people with amputation in the use of prostheses. PMID:25357185
Esplugues, Ana; Fernández-Patier, Rosalía; Aguilera, Inma; Iñíguez, Carmen; García Dos Santos, Saúl; Aguirre Alfaro, Amelia; Lacasaña, Marina; Estarlich, Marisa; Grimalt, Joan O; Fernández, Marieta; Rebagliato, Marisa; Sala, María; Tardón, Adonina; Torrent, Maties; Martínez, María Dolores; Ribas-Fitó, Núria; Sunyer, Jordi; Ballester, Ferran
2007-01-01
The INMA (INfancia y Medio Ambiente [Spanish for Environment and Childhood]) project is a cooperative research network. This project aims to study the effects of environment and diet on fetal and early childhood development. This article aims to present the air pollutant exposure protocol during pregnancy and fetal and early childhood development of the INMA project. The information to assess air pollutant exposure during pregnancy is based on outdoor measurement of air pollutants (nitrogen dioxide [NO2], volatile organic compounds [VOC], ozone, particulate matter [PM10, PM2,5 ] and of their composition [polycyclic aromatic hydrocarbons]); measurement of indoor and personal exposure (VOC and NO2); urinary measurement of a biological marker of hydrocarbon exposure (1-hydroxypyrene); and data gathered by questionnaires and geographic information systems. These data allow individual air pollutant exposure indexes to be developed, which can then be used to analyze the possible effects of exposure on fetal development and child health. This protocol and the type of study allow an approximation to individual air pollutant exposure to be obtained. Finally, the large number of participants (N = 4,000), as well as their geographic and social diversity, increases the study's potential.
A protocol for eliciting nonmaterial values through a cultural ecosystem services frame.
Gould, Rachelle K; Klain, Sarah C; Ardoin, Nicole M; Satterfield, Terre; Woodside, Ulalia; Hannahs, Neil; Daily, Gretchen C; Chan, Kai M
2015-04-01
Stakeholders' nonmaterial desires, needs, and values often critically influence the success of conservation projects. These considerations are challenging to articulate and characterize, resulting in their limited uptake in management and policy. We devised an interview protocol designed to enhance understanding of cultural ecosystem services (CES). The protocol begins with discussion of ecosystem-related activities (e.g., recreation, hunting) and management and then addresses CES, prompting for values encompassing concepts identified in the Millennium Ecosystem Assessment (2005) and explored in other CES research. We piloted the protocol in Hawaii and British Columbia. In each location, we interviewed 30 individuals from diverse backgrounds. We analyzed results from the 2 locations to determine the effectiveness of the interview protocol in elucidating nonmaterial values. The qualitative and spatial components of the protocol helped characterize cultural, social, and ethical values associated with ecosystems in multiple ways. Maps and situational, or vignette-like, questions helped respondents articulate difficult-to-discuss values. Open-ended prompts allowed respondents to express a diversity of ecosystem-related values and proved sufficiently flexible for interviewees to communicate values for which the protocol did not explicitly probe. Finally, the results suggest that certain values, those mentioned frequently throughout the interview, are particularly salient for particular populations. The protocol can provide efficient, contextual, and place-based data on the importance of particular ecosystem attributes for human well-being. Qualitative data are complementary to quantitative and spatial assessments in the comprehensive representation of people's values pertaining to ecosystems, and this protocol may assist in incorporating values frequently overlooked in decision making processes. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
Wang, Y T; Mohammed, S D; Farmer, A D; Wang, D; Zarate, N; Hobson, A R; Hellström, P M; Semler, J R; Kuo, B; Rao, S S; Hasler, W L; Camilleri, M; Scott, S M
2015-09-01
The wireless motility capsule (WMC) offers the ability to investigate luminal gastrointestinal (GI) physiology in a minimally invasive manner. To investigate the effect of testing protocol, gender, age and study country on regional GI transit times and associated pH values using the WMC. Regional GI transit times and pH values were determined in 215 healthy volunteers from USA and Sweden studied using the WMC over a 6.5-year period. The effects of test protocol, gender, age and study country were examined. For GI transit times, testing protocol was associated with differences in gastric emptying time (GET; shorter with protocol 2 (motility capsule ingested immediately after meal) vs. protocol 1 (motility capsule immediately before): median difference: 52 min, P = 0.0063) and colonic transit time (CTT; longer with protocol 2: median 140 min, P = 0.0189), but had no overall effect on whole gut transit time. Females had longer GET (by median 17 min, P = 0.0307), and also longer CTT by (104 min, P = 0.0285) and whole gut transit time by (263 min, P = 0.0077). Increasing age was associated with shorter small bowel transit time (P = 0.002), and study country also influenced small bowel and CTTs. Whole gut and CTTs showed clustering of data at values separated by 24 h, suggesting that describing these measures as continuous variables is invalid. Testing protocol, gender and study country also significantly influenced pH values. Regional GI transit times and pH values, delineated using the wireless motility capsule (WMC), vary based on testing protocol, gender, age and country. Standardisation of testing is crucial for cross-referencing in clinical practice and future research. © 2015 John Wiley & Sons Ltd.
Investigating nurse practitioners in the private sector: a theoretically informed research protocol.
Adams, Margaret; Gardner, Glenn; Yates, Patsy
2017-06-01
To report a study protocol and the theoretical framework normalisation process theory that informs this protocol for a case study investigation of private sector nurse practitioners. Most research evaluating nurse practitioner service is focused on public, mainly acute care environments where nurse practitioner service is well established with strong structures for governance and sustainability. Conversely, there is lack of clarity in governance for emerging models in the private sector. In a climate of healthcare reform, nurse practitioner service is extending beyond the familiar public health sector. Further research is required to inform knowledge of the practice, operational framework and governance of new nurse practitioner models. The proposed research will use a multiple exploratory case study design to examine private sector nurse practitioner service. Data collection includes interviews, surveys and audits. A sequential mixed method approach to analysis of each case will be conducted. Findings from within-case analysis will lead to a meta-synthesis across all four cases to gain a holistic understanding of the cases under study, private sector nurse practitioner service. Normalisation process theory will be used to guide the research process, specifically coding and analysis of data using theory constructs and the relevant components associated with those constructs. This article provides a blueprint for the research and describes a theoretical framework, normalisation process theory in terms of its flexibility as an analytical framework. Consistent with the goals of best research practice, this study protocol will inform the research community in the field of primary health care about emerging research in this field. Publishing a study protocol ensures researcher fidelity to the analysis plan and supports research collaboration across teams. © 2016 John Wiley & Sons Ltd.
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
The Length of Child Anxiety Treatment in a Regional Health System.
Whiteside, Stephen P H; Ale, Chelsea M; Young, Brennan; Olsen, Mark W; Biggs, Bridget K; Gregg, Melissa S; Geske, Jennifer R; Homan, Kendra
2016-12-01
Anxiety disorders are often undertreated due to unsuccessful dissemination of evidence-based treatments (EBTs). Lack of empirical data regarding the typical length of treatment in clinical settings may hamper the development of clinically relevant protocols. The current study examined billing records for 335 children ages 7-17 years to quantify the treatment received for newly diagnosed anxiety disorders within a regional health system. The vast majority of patients did not receive a sufficient number of appointments to complete the typical cognitive behavioral therapy protocol or reach the sessions introducing exposure. Although half of the sample received pharmacotherapy, the vast majority received fewer follow-up appointments than participants in pharmacotherapy research studies. Further, the type of treatment (i.e., number of sessions and medication) differed depending on utilization of specialty care. These results underscore the need to develop brief and flexible EBT protocols that can be standardized and implemented in community practice.