Sample records for session key distribution

  1. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    PubMed

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  2. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    PubMed Central

    Park, Namje; Kang, Namhi

    2015-01-01

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759

  3. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    PubMed Central

    Chen, Huifang; Xie, Lei

    2014-01-01

    Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked. PMID:25529204

  4. Flexible session management in a distributed environment

    NASA Astrophysics Data System (ADS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  5. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  6. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  7. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  8. A Secure Multicast Framework in Large and High-Mobility Network Groups

    NASA Astrophysics Data System (ADS)

    Lee, Jung-San; Chang, Chin-Chen

    With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.

  9. A Secure Group Communication Architecture for a Swarm of Autonomous Unmanned Aerial Vehicles

    DTIC Science & Technology

    2008-03-01

    members to use the same decryption key. This shared decryption key is called the Session Encryption Key ( SEK ) or Traffic Encryption Key (TEK...Since everyone shares the SEK , members need to hold additional Key Encryption Keys (KEK) that are used to securely distribute the SEK to each valid...managing this process. To preserve the secrecy of the multicast data, the SEK needs to be updated upon certain events such as a member joining and

  10. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  11. Network and data security design for telemedicine applications.

    PubMed

    Makris, L; Argiriou, N; Strintzis, M G

    1997-01-01

    The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided.

  12. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  13. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    PubMed Central

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606

  14. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.

    PubMed

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  15. Entropy uncertainty relations and stability of phase-temporal quantum cryptography with finite-length transmitted strings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-12-15

    Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less

  16. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  17. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  18. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  19. Experimental demonstration on the deterministic quantum key distribution based on entangled photons.

    PubMed

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-02-10

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified "Ping-Pong"(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.

  20. Experimental demonstration on the deterministic quantum key distribution based on entangled photons

    PubMed Central

    Chen, Hua; Zhou, Zhi-Yuan; Zangana, Alaa Jabbar Jumaah; Yin, Zhen-Qiang; Wu, Juan; Han, Yun-Guang; Wang, Shuang; Li, Hong-Wei; He, De-Yong; Tawfeeq, Shelan Khasro; Shi, Bao-Sen; Guo, Guang-Can; Chen, Wei; Han, Zheng-Fu

    2016-01-01

    As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications. PMID:26860582

  1. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  2. Teaching Principles of Patient-Centered Care During Radiology Residency.

    PubMed

    Miller, Matthew M; Slanetz, Priscilla J; Lourenco, Ana P; Eisenberg, Ronald L; Kung, Justin W

    2016-07-01

    Patient-centered healthcare delivery has become increasingly established as a cornerstone of quality medical care, but teaching these principles in a radiology residency setting is often difficult and ineffective in a traditional lecture format. We developed a novel educational session in which actual patient letters about a healthcare provider are used to facilitate a case-based discussion of key principles of patient-centered care. A novel patient letter-facilitated, case-based session was conducted at two different university-based teaching institutions. Prior to the educational session, patient letters introducing the principles of patient-centered care were distributed to residents for review. During the session, radiology-specific cases were discussed in the context of the principles introduced by the letters. A post-session survey was administered to evaluate the efficacy and usefulness of the session. Forty-six of the 61 session attendees (75%) completed the post session survey. Most respondents (93%) preferred this case-based, interactive session to a typical didactic session. A majority of the residents indicated that both the patient letters (64%) and radiology specific cases (73%) helped them think differently about how they interact with patients. They indicated that the session enhanced their understanding of professionalism (3.7 out of 5.0 [95% CI 3.4-4.0]) and increased their motivation to become more patient-centered (3.0 out of 4.0 [95% CI 2.8-3.3]). Our findings suggest that patient letter-facilitated, case-based sessions may influence resident attitudes regarding the principles of patient-centered care and may help to increase resident motivation to become more patient-centered in their own practice. Copyright © 2016 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  3. Key facts. Leaflets.

    PubMed

    1998-01-01

    Leaflets about HIV/AIDS are useful for distributing after talks or counseling sessions, leaving out in settings such as clinics, and mailing out in response to frequently asked questions or inquiries about an organization's services. As is the case with other educational materials, leaflet production involves identification of a target audience, careful planning and pretesting, and attention to design principles. Leaflets can be produced more quickly when adapted from existing materials distributed by other programs. Presented in this article are instructions that should be given to writers, designers, illustrators, or photographers when work is commissioned as well as guidelines for communicating with printers.

  4. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  5. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  6. PDS4 Training: Key Concepts and Vocabulary

    NASA Astrophysics Data System (ADS)

    Gordon, M. K.; Guinness, E. A.; Neakrase, L. D. V.; Padams, J.; Raugh, A. C.

    2017-06-01

    Those planning to attend the PDS4 training session are strongly encouraged to review this poster prior to the training session. This poster briefly describes new vocabulary and a number of key concepts introduced with PDS4.

  7. Automatic Tools for Enhancing the Collaborative Experience in Large Projects

    NASA Astrophysics Data System (ADS)

    Bourilkov, D.; Rodriquez, J. L.

    2014-06-01

    With the explosion of big data in many fields, the efficient management of knowledge about all aspects of the data analysis gains in importance. A key feature of collaboration in large scale projects is keeping a log of what is being done and how - for private use, reuse, and for sharing selected parts with collaborators and peers, often distributed geographically on an increasingly global scale. Even better if the log is automatically created on the fly while the scientist or software developer is working in a habitual way, without the need for extra efforts. This saves time and enables a team to do more with the same resources. The CODESH - COllaborative DEvelopment SHell - and CAVES - Collaborative Analysis Versioning Environment System projects address this problem in a novel way. They build on the concepts of virtual states and transitions to enhance the collaborative experience by providing automatic persistent virtual logbooks. CAVES is designed for sessions of distributed data analysis using the popular ROOT framework, while CODESH generalizes the approach for any type of work on the command line in typical UNIX shells like bash or tcsh. Repositories of sessions can be configured dynamically to record and make available the knowledge accumulated in the course of a scientific or software endeavor. Access can be controlled to define logbooks of private sessions or sessions shared within or between collaborating groups. A typical use case is building working scalable systems for analysis of Petascale volumes of data as encountered in the LHC experiments. Our approach is general enough to find applications in many fields.

  8. The Evaluation of Vehicle Mass Reduction and Material Choice in Life Cycle Assessments: Key Factors and Dynamic Industries

    EPA Science Inventory

    Developments in the realm of lightweight materials for automotive use continue to be announced by the industry and by academia. This session will provide new and updated information on new generation of materials. Additionally, this session will focus on the key topics involved i...

  9. Debunking Astronomical Fiction Science: A Resource Guide

    NASA Astrophysics Data System (ADS)

    Fraknoi, A.

    2010-08-01

    This resource guide is for educators who receive questions about controversial topics and want readings or websites to brush up on the facts or to recommend to students or the public. This is by no means a complete list, but a short guide of some of the key resources that may be of help. A version of this was distributed at the meeting during the oral session. Longer version of this list can be found online at http://www.astrosociety.org/education/resources/pseudobib.html.

  10. A Model for Linking Organizational Culture and Performance. Innovative Session 6. [AHRD Conference, 2001].

    ERIC Educational Resources Information Center

    McCullough, Cathy Bolton

    An innovative session was conducted to introduce session participants to a concept and researched model for linking organizational culture and performance. The session goals were as follows: (1) give participants a working knowledge of the link between business culture and key business performance indicators; (2) give participants a hands-on…

  11. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  12. Achieving the NOAA Arctic Action Plan: The Missing Permafrost Element - Permafrost Forecasting Listening Session Results

    NASA Astrophysics Data System (ADS)

    Buxbaum, T. M.; Thoman, R.; Romanovsky, V. E.

    2015-12-01

    Permafrost is ground at or below freezing for at least two consecutive years. It currently occupies 80% of Alaska. Permafrost temperature and active layer thickness (ALT) are key climatic variables for monitoring permafrost conditions. Active layer thickness is the depth that the top layer of ground above the permafrost thaws each summer season and permafrost temperature is the temperature of the frozen permafrost under this active layer. Knowing permafrost conditions is key for those individuals working and living in Alaska and the Arctic. The results of climate models predict vast changes and potential permafrost degradation across Alaska and the Arctic. NOAA is working to implement its 2014 Arctic Action Plan and permafrost forecasting is a missing piece of this plan. The Alaska Center for Climate Assessment and Policy (ACCAP), using our webinar software and our diverse network of statewide stakeholder contacts, hosted a listening session to bring together a select group of key stakeholders. During this listening session the National Weather Service (NWS) and key permafrost researchers explained what is possible in the realm of permafrost forecasting and participants had the opportunity to discuss and share with the group (NWS, researchers, other stakeholders) what is needed for usable permafrost forecasting. This listening session aimed to answer the questions: Is permafrost forecasting needed? If so, what spatial scale is needed by stakeholders? What temporal scales do stakeholders need/want? Are there key times (winter, fall freeze-up, etc.) or locations (North Slope, key oil development areas, etc.) where forecasting would be most applicable and useful? Are there other considerations or priority needs we haven't thought of regarding permafrost forecasting? This presentation will present the results of that listening session.

  13. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    NASA Astrophysics Data System (ADS)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  14. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    PubMed

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  15. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

    PubMed Central

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615

  16. Summary of the First Network-Centric Sensing Community Workshop, ’Netted Sensors: A Government, Industry and Academia Dialogue’

    DTIC Science & Technology

    2006-04-01

    and Scalability, (2) Sensors and Platforms, (3) Distributed Computing and Processing , (4) Information Management, (5) Fusion and Resource Management...use of the deployed system. 3.3 Distributed Computing and Processing Session The Distributed Computing and Processing Session consisted of three

  17. Perspectives on the Key PK-12 Education Legislation of 2013

    ERIC Educational Resources Information Center

    Center for Evaluation and Education Policy, Indiana University, 2013

    2013-01-01

    The 2013 session of the 118th Indiana General Assembly adjourned sine die (with no appointed date for resumption) on Saturday, April 27, 2013. The legislature considered over 2,200 bills during the session, many of which addressed education policy and school governance, or were child-related legislation. This report is a summary of 12 key PK-12…

  18. The Evaluation of Vehicle Mass Reduction and Material ...

    EPA Pesticide Factsheets

    Developments in the realm of lightweight materials for automotive use continue to be announced by the industry and by academia. This session will provide new and updated information on new generation of materials. Additionally, this session will focus on the key topics involved in Life-Cycle-Analysis of light-weight materials including practices and developments in material recyclability. This presentation will review key findings from recent LCAs for vehicle mass reduction. Presentation for panel session on advanced materials/lightweighting for light duty vehicles at the Society of Automotive Engineers (SAE) Government/Industry Meeting, Washington, DC (January 25, 2017)

  19. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  20. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  1. At least some errors are randomly generated (Freud was wrong)

    NASA Technical Reports Server (NTRS)

    Sellen, A. J.; Senders, J. W.

    1986-01-01

    An experiment was carried out to expose something about human error generating mechanisms. In the context of the experiment, an error was made when a subject pressed the wrong key on a computer keyboard or pressed no key at all in the time allotted. These might be considered, respectively, errors of substitution and errors of omission. Each of seven subjects saw a sequence of three digital numbers, made an easily learned binary judgement about each, and was to press the appropriate one of two keys. Each session consisted of 1,000 presentations of randomly permuted, fixed numbers broken into 10 blocks of 100. One of two keys should have been pressed within one second of the onset of each stimulus. These data were subjected to statistical analyses in order to probe the nature of the error generating mechanisms. Goodness of fit tests for a Poisson distribution for the number of errors per 50 trial interval and for an exponential distribution of the length of the intervals between errors were carried out. There is evidence for an endogenous mechanism that may best be described as a random error generator. Furthermore, an item analysis of the number of errors produced per stimulus suggests the existence of a second mechanism operating on task driven factors producing exogenous errors. Some errors, at least, are the result of constant probability generating mechanisms with error rate idiosyncratically determined for each subject.

  2. Rolling in the Dough, Running from Reform: An Analysis and Critique of the 1994 Utah Legislative Session and Its Impact on Education.

    ERIC Educational Resources Information Center

    Johnson, Bob L., Jr.

    This paper provides a critical review of the 1994 Utah Legislative session as it relates to public and higher education in the state. The paper discusses the defining contextual features of the 1994 Legislative Session, the agendas of key state educational policy actors for the 1994 session, and significant issues and legislation in the…

  3. A view of software management issues

    NASA Technical Reports Server (NTRS)

    Manley, J. H.

    1985-01-01

    The Software Development Environment (SDE) Panel addressed key programmatic, scope, and structural issues raised by its members and the general audience regarding the proposed software development environment for the Space Station program. The general team approach taken by this group led to a consensus on 18 recommendations to NASA mangament regarding the acquisition and definition of the SDE. This approach was keyed by the initial issues presentation given to the general audience. Additional issues (for a total of 23) were developed by the panelists in their first closed session from which key areas were selected and discussed in open session. These discussions led to key recommendations which are summarized and described.

  4. The Incremental Effects of Manual Therapy or Booster Sessions in Addition to Exercise Therapy for Knee Osteoarthritis: A Randomized Clinical Trial.

    PubMed

    Abbott, J Haxby; Chapple, Catherine M; Fitzgerald, G Kelley; Fritz, Julie M; Childs, John D; Harcombe, Helen; Stout, Kirsten

    2015-12-01

    A factorial randomized controlled trial. To investigate the addition of manual therapy to exercise therapy for the reduction of pain and increase of physical function in people with knee osteoarthritis (OA), and whether "booster sessions" compared to consecutive sessions may improve outcomes. The benefits of providing manual therapy in addition to exercise therapy, or of distributing treatment sessions over time using periodic booster sessions, in people with knee OA are not well established. All participants had knee OA and were provided 12 sessions of multimodal exercise therapy supervised by a physical therapist. Participants were randomly allocated to 1 of 4 groups: exercise therapy in consecutive sessions, exercise therapy distributed over a year using booster sessions, exercise therapy plus manual therapy without booster sessions, and exercise therapy plus manual therapy with booster sessions. The primary outcome measure was the Western Ontario and McMaster Universities Osteoarthritis Index (WOMAC score; 0-240 scale) at 1-year follow-up. Secondary outcome measures were the numeric pain-rating scale and physical performance tests. Of 75 participants recruited, 66 (88%) were retained at 1-year follow-up. Factorial analysis of covariance of the main effects showed significant benefit from booster sessions (P = .009) and manual therapy (P = .023) over exercise therapy alone. Group analysis showed that exercise therapy with booster sessions (WOMAC score, -46.0 points; 95% confidence interval [CI]: -80.0, -12.0) and exercise therapy plus manual therapy (WOMAC score, -37.5 points; 95% CI: -69.7, -5.5) had superior effects compared with exercise therapy alone. The combined strategy of exercise therapy plus manual therapy with booster sessions was not superior to exercise therapy alone. Distributing 12 sessions of exercise therapy over a year in the form of booster sessions was more effective than providing 12 consecutive exercise therapy sessions. Providing manual therapy in addition to exercise therapy improved treatment effectiveness compared to providing 12 consecutive exercise therapy sessions alone. Trial registered with the Australian New Zealand Clinical Trials Registry (ACTRN12612000460808).

  5. Interrupted: The roles of distributed effort and incubation in preventing fixation and generating problem solutions.

    PubMed

    Sio, Ut Na; Kotovsky, Kenneth; Cagan, Jonathan

    2017-05-01

    Fixation on inappropriate concepts is a key barrier to problem solving. Previous research has shown that continuous work is likely to cause repeated retrieval of those concepts, resulting in increased fixation. Accordingly, distributing effort across problems through multiple, brief, and interlaced sessions (distributed effort) should prevent such fixation and in turn enhance problem solving. This study examined whether distributed effort can provide an advantage for problem solving, particularly for problems that can induce fixation (Experiment 1), and whether and how incubation can be combined with distributed effort to further enhance performance (Experiment 2). Remote Associates Test (RAT) problems were used as the problem-solving tasks. Half of them (i.e., misleading RAT) were more likely to mislead individuals to fixate on incorrect associates than the other half. Experiments revealed a superiority of distributed over massed effort on misleading RAT performance and a differing time course of incubation for the massed and distributed groups. We conclude that distributed effort facilitates problem solving, most likely via overcoming fixation. Cognitive mechanisms other than the commonly posited forgetting of inappropriate ideas may occur during incubation to facilitate problem solving. The experiments in this article offer support for the occurrence of spreading activation during incubation.

  6. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  7. Report of the Annual Scientific Session of the American College of Cardiology (ACC) 2018, Orlando.

    PubMed

    Hashimoto, Takuya; Ako, Junya

    2018-04-28

    The 67 th Annual Scientific Session and Expo of the American College of Cardiology (ACC) were held at the Orange County Convention Center, Orlando, from March 10-12, 2018. This meeting offered 2,700 accepted abstracts presented in oral and poster sessions by 2,100 experts and 37 Late-Breaking Clinical Trials and Featured Clinical Research presentations. This report introduces the key presentations and highlights from the ACC 2018 Scientific Session.

  8. Effects of smoking abstinence on reaction time variability in smokers with and without ADHD: an ex-Gaussian analysis.

    PubMed

    Kollins, Scott H; McClernon, F Joseph; Epstein, Jeff N

    2009-02-01

    Smoking abstinence differentially affects cognitive functioning in smokers with ADHD, compared to non-ADHD smokers. Alternative approaches for analyzing reaction time data from these tasks may further elucidate important group differences. Adults smoking > or = 15 cigarettes with (n=12) or without (n=14) a diagnosis of ADHD completed a continuous performance task (CPT) during two sessions under two separate laboratory conditions--a 'Satiated' condition wherein participants smoked up to and during the session; and an 'Abstinent' condition, in which participants were abstinent overnight and during the session. Reaction time (RT) distributions from the CPT were modeled to fit an ex-Gaussian distribution. The indicator of central tendency for RT from the normal component of the RT distribution (mu) showed a main effect of Group (ADHD < Control) and a Group x Session interaction (ADHD group RTs decreased when abstinent). RT standard deviation for the normal component of the distribution (sigma) showed no effects. The ex-Gaussian parameter tau, which describes the mean and standard deviation of the non-normal component of the distribution, showed significant effects of session (Abstinent > Satiated), Group x Session interaction (ADHD increased significantly under Abstinent condition compared to Control), and a trend toward a main effect of Group (ADHD > Control). Alternative approaches to analyzing RT data provide a more detailed description of the effects of smoking abstinence in ADHD and non-ADHD smokers and results differ from analyses using more traditional approaches. These findings have implications for understanding the neuropsychopharmacology of nicotine and nicotine withdrawal.

  9. A Course in Critical Thinking for PhD Students in Biomolecular Sciences and Biotechnology: Classical Experiments in Biochemistry

    ERIC Educational Resources Information Center

    Hirschberg, Carlos B.

    2016-01-01

    This essay presents and discusses an eight-session seminar course designed to develop critical thinking skills in doctoral biochemistry students by exposing them to classical experiments in biochemistry. During each 2.5 session, different key topics of the discovery and development of biochemical concepts are discussed. Before each session,…

  10. GMLC Hawaii Regional Partnership: Distributed Inverter-Based Grid Frequency Support

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Austin; Hoke, Andy

    This presentation is part of a panel session at the IEEE ISGT conference on Grid Modernization Initiative projects. This segment of the panel session provides a brief overview of a Hawaii Regional Partnership project focusing grid frequency support from distributed resources on the fastest time scales.

  11. Industrial Hygiene Issues

    NASA Technical Reports Server (NTRS)

    Brisbin, Steven G.

    1999-01-01

    This breakout session is a traditional conference instrument used by the NASA industrial hygiene personnel as a method to convene personnel across the Agency with common interests. This particular session focused on two key topics, training systems and automation of industrial hygiene data. During the FY 98 NASA Occupational Health Benchmarking study, the training system under development by the U.S. Environmental Protection Agency (EPA) was deemed to represent a "best business practice." The EPA has invested extensively in the development of computer based training covering a broad range of safety, health and environmental topics. Currently, five compact disks have been developed covering the topics listed: Safety, Health and Environmental Management Training for Field Inspection Activities; EPA Basic Radiation Training Safety Course; The OSHA 600 Collateral Duty Safety and Health Course; and Key program topics in environmental compliance, health and safety. Mr. Chris Johnson presented an overview of the EPA compact disk-based training system and answered questions on its deployment and use across the EPA. This training system has also recently been broadly distributed across other Federal Agencies. The EPA training system is considered "public domain" and, as such, is available to NASA at no cost in its current form. Copies of the five CD set of training programs were distributed to each NASA Center represented in the breakout session. Mr. Brisbin requested that each NASA Center review the training materials and determine whether there is interest in using the materials as it is or requesting that EPA tailor the training modules to suit NASA's training program needs. The Safety, Health and Medical Services organization at Ames Research Center has completed automation of several key program areas. Mr. Patrick Hogan, Safety Program Manager for Ames Research Center, presented a demonstration of the automated systems, which are described by the following: (1) Safety, Health and Environmental Training. This system includes an assessment of training needs for every NASA Center organization, course descriptions, schedules and automated course scheduling, and presentation of training program metrics; (2) Safety and Health Inspection Information. This system documents the findings from each facility inspection, tracks abatement status on those findings and presents metrics on each department for senior management review; (3) Safety Performance Evaluation Profile. The survey system used by NASA to evaluate employee and supervisory perceptions of safety programs is automated in this system; and (4) Documentation Tracking System. Electronic archive and retrieval of all correspondence and technical reports generated by the Safety, Health and Medical Services Office are provided by this system.

  12. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  13. An automated device for appetitive conditioning in zebrafish (Danio rerio).

    PubMed

    Manabe, Kazuchika; Dooling, R J; Takaku, Shinichi

    2013-12-01

    An automated device and a procedure for the operant conditioning individual zebrafish were developed. The key feature of this procedure was the construction of a simple, inexpensive feeder that can deliver extremely small amounts of food, thus preventing rapid satiation. This allows the experimenter to run multiple trails in a single test session and multiple sessions in one day. In addition, small response keys made from acryl rods and fiber sensors were developed that were sufficiently sensitive to detect fish contact. To illustrate the efficiency and utility of the device for traditional learning paradigms, we trained zebrafish in a fixed ratio schedule where subjects were reinforced with food after 10 responses. Zebrafish reliably responded on the response key for sessions that lasted as long 80-reinforcements. They also showed the traditional "break and run" response pattern that has been found in many species. These results show that this system will be valuable for behavioral studies with zebrafish, especially for experiments that need many repeated trials using food reinforcer in a session. The present system can be used for sensory and learning investigations, as well applications in behavioral pharmacology, behavioral genetics, and toxicology where the zebrafish is becoming the vertebrate model of choice.

  14. The Psychedelic Debriefing in Alcohol Dependence Treatment: Illustrating Key Change Phenomena through Qualitative Content Analysis of Clinical Sessions

    PubMed Central

    Nielson, Elizabeth M.; May, Darrick G.; Forcehimes, Alyssa A.; Bogenschutz, Michael P.

    2018-01-01

    Research on the clinical applications of psychedelic-assisted psychotherapy has demonstrated promising early results for treatment of alcohol dependence. Detailed description of the content and methods of psychedelic-assisted psychotherapy, as it is conducted in clinical settings, is scarce. Methods: An open-label pilot (proof-of-concept) study of psilocybin-assisted treatment of alcohol dependence (NCT01534494) was conducted to generate data for a phase 2 RCT (NCT02061293) of a similar treatment in a larger population. The present paper presents a qualitative content analysis of the 17 debriefing sessions conducted in the pilot study, which occurred the day after corresponding psilocybin medication sessions. Results: Participants articulated a series of key phenomena related to change in drinking outcomes and acute subjective effects of psilocybin. Discussion: The data illuminate change processes in patients' own words during clinical sessions, shedding light on potential therapeutic mechanisms of change and how participants express effects of psilocybin. This study is unique in analyzing actual clinical sessions, as opposed to interviews of patients conducted separately from treatment. PMID:29515449

  15. Remote software upload techniques in future vehicles and their performance analysis

    NASA Astrophysics Data System (ADS)

    Hossain, Irina

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update/fix functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Software modules of advanced vehicles can be updated using Remote Software Upload (RSU) technique. The RSU employs infrastructure-based wireless communication technique where the software supplier sends the software to the targeted vehicle via a roadside Base Station (BS). However, security is critically important in RSU to avoid any disasters due to malfunctions of the vehicle or to protect the proprietary algorithms from hackers, competitors or people with malicious intent. In this thesis, a mechanism of secure software upload in advanced vehicles is presented which employs mutual authentication of the software provider and the vehicle using a pre-shared authentication key before sending the software. The software packets are sent encrypted with a secret key along with the Message Digest (MD). In order to increase the security level, it is proposed the vehicle to receive more than one copy of the software along with the MD in each copy. The vehicle will install the new software only when it receives more than one identical copies of the software. In order to validate the proposition, analytical expressions of average number of packet transmissions for successful software update is determined. Different cases are investigated depending on the vehicle's buffer size and verification methods. The analytical and simulation results show that it is sufficient to send two copies of the software to the vehicle to thwart any security attack while uploading the software. The above mentioned unicast method for RSU is suitable when software needs to be uploaded to a single vehicle. Since multicasting is the most efficient method of group communication, updating software in an ECU of a large number of vehicles could benefit from it. However, like the unicast RSU, the security requirements of multicast communication, i.e., authenticity, confidentiality and integrity of the software transmitted and access control of the group members is challenging. In this thesis, an infrastructure-based mobile multicasting for RSU in vehicle ECUs is proposed where an ECU receives the software from a remote software distribution center using the road side BSs as gateways. The Vehicular Software Distribution Network (VSDN) is divided into small regions administered by a Regional Group Manager (RGM). Two multicast Group Key Management (GKM) techniques are proposed based on the degree of trust on the BSs named Fully-trusted (FT) and Semi-trusted (ST) systems. Analytical models are developed to find the multicast session establishment latency and handover latency for these two protocols. The average latency to perform mutual authentication of the software vendor and a vehicle, and to send the multicast session key by the software provider during multicast session initialization, and the handoff latency during multicast session is calculated. Analytical and simulation results show that the link establishment latency per vehicle of our proposed schemes is in the range of few seconds and the ST system requires few ms higher time than the FT system. The handoff latency is also in the range of few seconds and in some cases ST system requires less handoff time than the FT system. Thus, it is possible to build an efficient GKM protocol without putting too much trust on the BSs.

  16. Anxiety at the first radiotherapy session for non-metastatic breast cancer: key communication and communication-related predictors.

    PubMed

    Lewis, Florence; Merckaert, Isabelle; Liénard, Aurore; Libert, Yves; Etienne, Anne-Marie; Reynaert, Christine; Slachmuylder, Jean-Louis; Scalliet, Pierre; Van Houtte, Paul; Coucke, Philippe; Salamon, Emile; Razavi, Darius

    2015-01-01

    Patients may experience clinically relevant anxiety at their first radiotherapy (RT) sessions. To date, studies have not investigated during/around the RT simulation the key communication and communication-related predictors of this clinically relevant anxiety. Breast cancer patients (n=227) completed visual analog scale (VAS) assessments of anxiety before and after their first RT sessions. Clinically relevant anxiety was defined as having pre- and post-first RT session VAS scores ⩾4 cm. Communication during RT simulation was assessed with content analysis software (LaComm), and communication-related variables around the RT simulation were assessed with questionnaires. Clinically relevant anxiety at the first RT session was predicted by lower self-efficacy to communicate with the RT team (OR=0.65; p=0.020), the perception of lower support received from the RT team (OR=0.70; p=0.020), lower knowledge of RT-associated side effects (OR=0.95; p=0.057), and higher use of emotion-focused coping (OR=1.09; p=0.013). This study provides RT team members with information about potential communication strategies, which may be used to reduce patient anxiety at the first RT session. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. Effects of smoking abstinence on reaction time variability in smokers with and without ADHD: An ex-Gaussian analysis

    PubMed Central

    Kollins, Scott H.; McClernon, F. Joseph; Epstein, Jeff N.

    2009-01-01

    Smoking abstinence differentially affects cognitive functioning in smokers with ADHD, compared to non-ADHD smokers. Alternative approaches for analyzing reaction time data from these tasks may further elucidate important group differences. Adults smoking ≥15 cigarettes with (n = 12) or without (n = 14) a diagnosis of ADHD completed a continuous performance task (CPT) during two sessions under two separate laboratory conditions—a ‘Satiated’ condition wherein participants smoked up to and during the session; and an ‘Abstinent’ condition, in which participants were abstinent overnight and during the session. Reaction time (RT) distributions from the CPT were modeled to fit an ex-Gaussian distribution. The indicator of central tendency for RT from the normal component of the RT distribution (mu) showed a main effect of Group (ADHD Satiated), Group × Session interaction (ADHD increased significantly under Abstinent condition compared to Control), and a trend toward a main effect of Group (ADHD > Control). Alternative approaches to analyzing RT data provide a more detailed description of the effects of smoking abstinence in ADHD and non-ADHD smokers and results differ from analyses using more traditional approaches. These findings have implications for understanding the neuropsychopharmacology of nicotine and nicotine withdrawal. PMID:19041198

  18. [A bomb attack in the Netherlands; how would we provide hospital care?

    PubMed

    Haverkort, J J M; de Jong, M B; van Spengler, L L; Leenen, L P H

    2017-01-01

    - There is an ever-present threat of large-scale incidents and disasters, such as terrorism and natural disasters.- Preparation and planning are the key to successful response to major incidents and disasters, which is why education, training sessions and exercises take place in the Netherlands.- Analysis of recent large-scale incidents in Europe and the USA emphasises the importance of adequate distribution of the wounded to centres where the correct care can be provided.- A major step has been taken in the Netherlands to provide for such an eventuality with the introduction of distribution plans for the wounded, and other initiatives such as a regional hospital disaster plan.- If a large-scale incident should take place the Netherlands also has a Major Incident Hospital at its disposal; this is a unique facility that can guarantee availability of 200 spare beds to the Netherlands healthcare system within 30 minutes.

  19. Less is more: latent learning is maximized by shorter training sessions in auditory perceptual learning.

    PubMed

    Molloy, Katharine; Moore, David R; Sohoglu, Ediz; Amitay, Sygal

    2012-01-01

    The time course and outcome of perceptual learning can be affected by the length and distribution of practice, but the training regimen parameters that govern these effects have received little systematic study in the auditory domain. We asked whether there was a minimum requirement on the number of trials within a training session for learning to occur, whether there was a maximum limit beyond which additional trials became ineffective, and whether multiple training sessions provided benefit over a single session. We investigated the efficacy of different regimens that varied in the distribution of practice across training sessions and in the overall amount of practice received on a frequency discrimination task. While learning was relatively robust to variations in regimen, the group with the shortest training sessions (∼8 min) had significantly faster learning in early stages of training than groups with longer sessions. In later stages, the group with the longest training sessions (>1 hr) showed slower learning than the other groups, suggesting overtraining. Between-session improvements were inversely correlated with performance; they were largest at the start of training and reduced as training progressed. In a second experiment we found no additional longer-term improvement in performance, retention, or transfer of learning for a group that trained over 4 sessions (∼4 hr in total) relative to a group that trained for a single session (∼1 hr). However, the mechanisms of learning differed; the single-session group continued to improve in the days following cessation of training, whereas the multi-session group showed no further improvement once training had ceased. Shorter training sessions were advantageous because they allowed for more latent, between-session and post-training learning to emerge. These findings suggest that efficient regimens should use short training sessions, and optimized spacing between sessions.

  20. Less Is More: Latent Learning Is Maximized by Shorter Training Sessions in Auditory Perceptual Learning

    PubMed Central

    Molloy, Katharine; Moore, David R.; Sohoglu, Ediz; Amitay, Sygal

    2012-01-01

    Background The time course and outcome of perceptual learning can be affected by the length and distribution of practice, but the training regimen parameters that govern these effects have received little systematic study in the auditory domain. We asked whether there was a minimum requirement on the number of trials within a training session for learning to occur, whether there was a maximum limit beyond which additional trials became ineffective, and whether multiple training sessions provided benefit over a single session. Methodology/Principal Findings We investigated the efficacy of different regimens that varied in the distribution of practice across training sessions and in the overall amount of practice received on a frequency discrimination task. While learning was relatively robust to variations in regimen, the group with the shortest training sessions (∼8 min) had significantly faster learning in early stages of training than groups with longer sessions. In later stages, the group with the longest training sessions (>1 hr) showed slower learning than the other groups, suggesting overtraining. Between-session improvements were inversely correlated with performance; they were largest at the start of training and reduced as training progressed. In a second experiment we found no additional longer-term improvement in performance, retention, or transfer of learning for a group that trained over 4 sessions (∼4 hr in total) relative to a group that trained for a single session (∼1 hr). However, the mechanisms of learning differed; the single-session group continued to improve in the days following cessation of training, whereas the multi-session group showed no further improvement once training had ceased. Conclusions/Significance Shorter training sessions were advantageous because they allowed for more latent, between-session and post-training learning to emerge. These findings suggest that efficient regimens should use short training sessions, and optimized spacing between sessions. PMID:22606309

  1. The growth and evolution of cardiovascular magnetic resonance: a 20-year history of the Society for Cardiovascular Magnetic Resonance (SCMR) annual scientific sessions.

    PubMed

    Lee, Daniel C; Markl, Michael; Dall'Armellina, Erica; Han, Yuchi; Kozerke, Sebastian; Kuehne, Titus; Nielles-Vallespin, Sonia; Messroghli, Daniel; Patel, Amit; Schaeffter, Tobias; Simonetti, Orlando; Valente, Anne Marie; Weinsaft, Jonathan W; Wright, Graham; Zimmerman, Stefan; Schulz-Menger, Jeanette

    2018-01-31

    The purpose of this work is to summarize cardiovascular magnetic resonance (CMR) research trends and highlights presented at the annual Society for Cardiovascular Magnetic Resonance (SCMR) scientific sessions over the past 20 years. Scientific programs from all SCMR Annual Scientific Sessions from 1998 to 2017 were obtained. SCMR Headquarters also provided data for the number and the country of origin of attendees and the number of accepted abstracts according to type. Data analysis included text analysis (key word extraction) and visualization by 'word clouds' representing the most frequently used words in session titles for 5-year intervals. In addition, session titles were sorted into 17 major subject categories to further evaluate research and clinical CMR trends over time. Analysis of SCMR annual scientific sessions locations, attendance, and number of accepted abstracts demonstrated substantial growth of CMR research and clinical applications. As an international field of study, significant growth of CMR was documented by a strong increase in SCMR scientific session attendance (> 500%, 270 to 1406 from 1998 to 2017, number of accepted abstracts (> 700%, 98 to 701 from 1998 to 2018) and number of international participants (42-415% increase for participants from Asia, Central and South America, Middle East and Africa in 2004-2017). 'Word clouds' based evaluation of research trends illustrated a shift from early focus on 'MRI technique feasibility' to new established techniques (e.g. late gadolinium enhancement) and their clinical applications and translation (key words 'patient', 'disease') and more recently novel techniques and quantitative CMR imaging (key words 'mapping', 'T1', 'flow', 'function'). Nearly every topic category demonstrated an increase in the number of sessions over the 20-year period with 'Clinical Practice' leading all categories. Our analysis identified three growth areas 'Congenital', 'Clinical Practice', and 'Structure/function/flow'. The analysis of the SCMR historical archives demonstrates a healthy and internationally active field of study which continues to undergo substantial growth and expansion into new and emerging CMR topics and clinical application areas.

  2. Does Exposure Imitate Art: Exposure Science for 21st Century Toxicity Testing

    EPA Science Inventory

    This Issues Session will continue the dialog begun at the highly successful 2008 NRC session in which the Annual Meeting participants were provided an overview of the three National Academy reports addressing key issues impacting the Society and the profession of toxicology. Thes...

  3. Individual differences in social information gathering revealed through Bayesian hierarchical models

    PubMed Central

    Pearson, John M.; Watson, Karli K.; Klein, Jeffrey T.; Ebitz, R. Becket; Platt, Michael L.

    2013-01-01

    As studies of the neural circuits underlying choice expand to include more complicated behaviors, analysis of behaviors elicited in laboratory paradigms has grown increasingly difficult. Social behaviors present a particular challenge, since inter- and intra-individual variation are expected to play key roles. However, due to limitations on data collection, studies must often choose between pooling data across all subjects or using individual subjects' data in isolation. Hierarchical models mediate between these two extremes by modeling individual subjects as drawn from a population distribution, allowing the population at large to serve as prior information about individuals' behavior. Here, we apply this method to data collected across multiple experimental sessions from a set of rhesus macaques performing a social information valuation task. We show that, while the values of social images vary markedly between individuals and between experimental sessions for the same individual, individuals also differentially value particular categories of social images. Furthermore, we demonstrate covariance between values for image categories within individuals and find evidence suggesting that magnitudes of stimulus values tend to diminish over time. PMID:24062635

  4. Key paediatric messages from Amsterdam

    PubMed Central

    Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio

    2016-01-01

    The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186

  5. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  6. Selective Attention in Pigeon Temporal Discrimination.

    PubMed

    Subramaniam, Shrinidhi; Kyonka, Elizabeth

    2017-07-27

    Cues can vary in how informative they are about when specific outcomes, such as food availability, will occur. This study was an experimental investigation of the functional relation between cue informativeness and temporal discrimination in a peak-interval (PI) procedure. Each session consisted of fixed-interval (FI) 2-s and 4-s schedules of food and occasional, 12-s PI trials during which pecks had no programmed consequences. Across conditions, the phi (ϕ) correlation between key light color and FI schedule value was manipulated. Red and green key lights signaled the onset of either or both FI schedules. Different colors were either predictive (ϕ = 1), moderately predictive (ϕ = 0.2-0.8), or not predictive (ϕ = 0) of a specific FI schedule. This study tested the hypothesis that temporal discrimination is a function of the momentary conditional probability of food; that is, pigeons peck the most at either 2 s or 4 s when ϕ = 1 and peck at both intervals when ϕ < 1. Response distributions were bimodal Gaussian curves; distributions from red- and green-key PI trials converged when ϕ ≤ 0.6. Peak times estimated by summed Gaussian functions, averaged across conditions and pigeons, were 1.85 s and 3.87 s, however, pigeons did not always maximize the momentary probability of food. When key light color was highly correlated with FI schedules (ϕ ≥ 0.6), estimates of peak times indicated that temporal discrimination accuracy was reduced at the unlikely interval, but not the likely interval. The mechanism of this reduced temporal discrimination accuracy could be interpreted as an attentional process.

  7. Community Member and Stakeholder Perspectives on a Healthy Environment Initiative in North Carolina.

    PubMed

    Carter-Edwards, Lori; Lowe-Wilson, Abby; Mouw, Mary Sherwyn; Jeon, Janet Yewon; Baber, Ceola Ross; Vu, Maihan B; Bethell, Monique

    2015-08-13

    The North Carolina Community Transformation Grant Project (NC-CTG) aimed to implement policy, system, and environmental strategies to promote healthy eating, active living, tobacco-free living, and clinical and community preventive services to advance health equity and reduce health disparities for the state's most vulnerable communities. This article presents findings from the Health Equity Collaborative Evaluation and Implementation Project, which assessed community and stakeholder perceptions of health equity for 3 NC-CTG strategies: farmers markets, shared use, and smoke-free multiunit housing. In a triangulated qualitative evaluation, 6 photo elicitation (PE) sessions among 45 community members in 1 urban and 3 rural counties and key informant interviews among 22 stakeholders were conducted. Nine participants from the PE sessions and key informant interviews in the urban county subsequently participated in a stakeholder power analysis and mapping session (SPA) to discuss and identify people and organizations in their community perceived to be influential in addressing health equity-related issues. Evaluations of the PE sessions and key informant interviews indicated that access (convenience, cost, safety, and awareness of products and services) and community fit (community-defined quality, safety, values, and norms) were important constructs across the strategies. The SPA identified specific community- and faith-based organizations, health care organizations, and local government agencies as key stakeholders for future efforts. Both community fit and access are essential constructs for promoting health equity. Findings demonstrate the feasibility of and need for formative research that engages community members and local stakeholders to shape context-specific, culturally relevant health promotion strategies.

  8. Community Member and Stakeholder Perspectives on a Healthy Environment Initiative in North Carolina

    PubMed Central

    Lowe-Wilson, Abby; Mouw, Mary Sherwyn; Jeon, Janet Yewon; Baber, Ceola Ross; Vu, Maihan B.; Bethell, Monique

    2015-01-01

    Introduction The North Carolina Community Transformation Grant Project (NC-CTG) aimed to implement policy, system, and environmental strategies to promote healthy eating, active living, tobacco-free living, and clinical and community preventive services to advance health equity and reduce health disparities for the state’s most vulnerable communities. This article presents findings from the Health Equity Collaborative Evaluation and Implementation Project, which assessed community and stakeholder perceptions of health equity for 3 NC-CTG strategies: farmers markets, shared use, and smoke-free multiunit housing. Methods In a triangulated qualitative evaluation, 6 photo elicitation (PE) sessions among 45 community members in 1 urban and 3 rural counties and key informant interviews among 22 stakeholders were conducted. Nine participants from the PE sessions and key informant interviews in the urban county subsequently participated in a stakeholder power analysis and mapping session (SPA) to discuss and identify people and organizations in their community perceived to be influential in addressing health equity–related issues. Results Evaluations of the PE sessions and key informant interviews indicated that access (convenience, cost, safety, and awareness of products and services) and community fit (community-defined quality, safety, values, and norms) were important constructs across the strategies. The SPA identified specific community- and faith-based organizations, health care organizations, and local government agencies as key stakeholders for future efforts. Conclusions Both community fit and access are essential constructs for promoting health equity. Findings demonstrate the feasibility of and need for formative research that engages community members and local stakeholders to shape context-specific, culturally relevant health promotion strategies. PMID:26270741

  9. Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time.

    PubMed

    Yan, Chongjun; Tang, Jiafu; Jiang, Bowen; Fung, Richard Y K

    2015-01-01

    This paper compares the performance measures of traditional appointment scheduling (AS) with those of an open-access appointment scheduling (OA-AS) system with exponentially distributed service time. A queueing model is formulated for the traditional AS system with no-show probability. The OA-AS models assume that all patients who call before the session begins will show up for the appointment on time. Two types of OA-AS systems are considered: with a same-session policy and with a same-or-next-session policy. Numerical results indicate that the superiority of OA-AS systems is not as obvious as those under deterministic scenarios. The same-session system has a threshold of relative waiting cost, after which the traditional system always has higher total costs, and the same-or-next-session system is always preferable, except when the no-show probability or the weight of patients' waiting is low. It is concluded that open-access policies can be viewed as alternative approaches to mitigate the negative effects of no-show patients.

  10. Technical viability and development needs for waste forms and facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pegg, I.; Gould, T.

    1996-05-01

    The objective of this breakout session was to provide a forum to discuss technical issues relating to plutonium-bearing waste forms and their disposal facilities. Specific topics for discussion included the technical viability and development needs associated with the waste forms and/or disposal facilities. The expected end result of the session was an in-depth (so far as the limited time would allow) discussion of key issues by the session participants. The session chairs expressed allowance for, and encouragement of, alternative points of view, as well as encouragement for discussion of any relevant topics not addressed in the paper presentations. It wasmore » not the intent of this session to recommend or advocate any one technology over another.« less

  11. Multi-modality Imaging: Bird's eye view from the 2015 American Heart Association Scientific Sessions.

    PubMed

    Einstein, Andrew J; Lloyd, Steven G; Chaudhry, Farooq A; AlJaroudi, Wael A; Hage, Fadi G

    2016-04-01

    Multiple novel studies were presented at the 2015 American Heart Association Scientific Sessions which was considered a successful conference at many levels. In this review, we will summarize key studies in nuclear cardiology, cardiac magnetic resonance, echocardiography, and cardiac computed tomography that were presented at the Sessions. We hope that this bird's eye view will keep readers updated on the newest imaging studies presented at the meeting whether or not they were able to attend the meeting.

  12. Session 1.5: health policy and coordination: a critical review of experiences.

    PubMed

    Procacci, Pasqualino; Doran, Rodger; Chunkath, Sheela Rani; Garfield, Richard; Briceno, Salvano; Fric, Anton

    2005-01-01

    This is a summary of the presentations and discussion of Session 1.5 on Health Policy and Coordination: A Critical Review of Experiences during the Conference, Health Aspects of the Tsunami Disaster in Asia, convened by the World Health Organization (WHO) in Phuket, Thailand, 04-06 May 2005. The topics discussed included issues related to health policy and coordination as pertain to the responses to the damage created by the Tsunami. Key questions were answered in this session, and recommendations were made.

  13. Report of the American Heart Association (AHA) Scientific Sessions 2016, New Orleans.

    PubMed

    Amaki, Makoto; Konagai, Nao; Fujino, Masashi; Kawakami, Shouji; Nakao, Kazuhiro; Hasegawa, Takuya; Sugano, Yasuo; Tahara, Yoshio; Yasuda, Satoshi

    2016-12-22

    The American Heart Association (AHA) Scientific Sessions 2016 were held on November 12-16 at the Ernest N. Morial Convention Center, New Orleans, LA. This 5-day event featured cardiovascular clinical practice covering all aspects of basic, clinical, population, and translational content. One of the hot topics at AHA 2016 was precision medicine. The key presentations and highlights from the AHA Scientific Sessions 2016, including "precision medicine" as one of the hot topics, are herein reported.

  14. Using Quality Enhancement Processes to Achieve Sustainable Development and Support for Sessional Staff

    ERIC Educational Resources Information Center

    Lekkas, D.; Winning, T. A.

    2017-01-01

    Consistent with quality enhancement, we report on how we used a continuous improvement cycle to formalise and embed an academic development and support programme for our School's sessional staff. Key factors in establishing and maintaining the programme included: local change agents supported initially by institutional project funding; School…

  15. Introductory Guide to Africa.

    ERIC Educational Resources Information Center

    Wyss, Esther, Ed.

    This guide seeks to be a tool for action and a resource for understanding some of the key issues concerning Africa today. Through a series of six sessions, participants focus on a particular theme or issue that links their community with the African context. The six sessions focus on: (1) "Building Connections with Africa"; (2)…

  16. Vulnerability and Protection Talk: Systemic Therapy Process with People with Intellectual Disability

    ERIC Educational Resources Information Center

    Pote, Helen; Mazon, Teresa; Clegg, Jennifer; King, Susan

    2011-01-01

    Background: Vulnerability and protection are key concepts within the literature relating to systemic therapy for people with an intellectual disability (ID). This paper explores the processes by which these concepts were discussed in systemic therapy sessions. Method: Four videotapes of systemic therapy sessions were evaluated using a qualitative…

  17. What's in a Name? Recent Key Projects of the Committee on Organization and Delivery of Burn Care.

    PubMed

    Hickerson, William L; Ryan, Colleen M; Conlon, Kathe M; Harrington, David T; Foster, Kevin; Schwartz, Suzanne; Iyer, Narayan; Jeschke, Marc; Haller, Herbert L; Faucher, Lee D; Arnoldo, Brett D; Jeng, James C

    2015-01-01

    The Committee for the Organization and Delivery of Burn Care (ODBC) was charged by President Palmieri and the American Burn Association (ABA) Board of Directors with presenting a plenary session at the 45th Meeting of the ABA in Palm Springs, CA, in 2013. The objective of the plenary session was to inform the membership about the wide range of the activities performed by the ODBC committee. The hope was that this session would encourage active involvement within the ABA as a means to improve the delivery of future burn care. Selected current activities were summarized by key leaders of each project and highlighted in the plenary session. The history of the committee, current projects in disaster management, regionalization, best practice guidelines, federal partnerships, product development, new technologies, electronic medical records, and manpower issues in the burn workforce were summarized. The ODBC committee is a keystone committee of the ABA. It is tasked by the ABA leadership with addressing and leading progress in many areas that constitute current challenges in the delivery of burn care.

  18. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  19. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  20. Distributed Training Enhances Implicit Sequence Acquisition in Children with Specific Language Impairment

    ERIC Educational Resources Information Center

    Desmottes, Lise; Meulemans, Thierry; Patinec, Marie-Aude; Maillart, Christelle

    2017-01-01

    Purpose: This study explored the effects of 2 different training structures on the implicit acquisition of a sequence in a serial reaction time (SRT) task in children with and without specific language impairment (SLI). Method: All of the children underwent 3 training sessions, followed by a retention session 2 weeks after the last session. In the…

  1. MOBILE-izing Adolescent Sexual and Reproductive Health Care: A Pilot Study Using a Mobile Health Unit in Chicago.

    PubMed

    Stefansson, Lilja S; Webb, M Elizabeth; Hebert, Luciana E; Masinter, Lisa; Gilliam, Melissa L

    2018-03-01

    Adolescents experience numerous barriers to obtaining sexual and reproductive health care (SRHC). Mobile Health Units (MHUs) can remove some barriers by traveling to the community. This pilot study developed Mobile SRHC through an iterative process on an existing MHU and evaluated it among adolescents and providers. Mobile SRHC was developed through a mixed-method, multiphase study. Three key informant interviews with MHU providers, an adolescent needs assessment survey, and a Youth Model Development Session informed model development. Emergency contraception (EC), oral contraceptive pills (OCPs), and depot-medroxyprogesterone acetate (DMPA) were sequentially incorporated into MHU services. Administrative data assessed method distribution and surveys assessed patient satisfaction. Key informants held positive attitudes toward implementing Mobile SRHC into their practice. Needs assessment surveys (N = 103) indicated a majority was interested in learning about sexual health (66.0%) and obtaining birth control (54.4%) on an MHU. Over 3 months, 123 adolescents participated in Mobile SRHC. Seven packs and 9 prescriptions of EC, 8 3-month packs and 10 prescriptions of OCPs, and 5 injections and 5 prescriptions of DMPA were distributed. Ninety-two percent of adolescent participants reported they would recommend Mobile SRHC to friends. Mobile SRHC is a feasible approach for reproductive health care among adolescents. © 2018, American School Health Association.

  2. Advances in Cryptology - EUROCRYPT’ 97

    DTIC Science & Technology

    1998-05-03

    public keys is about T/102. For example, one can choose T ~ 227.67 and M ~ 2 35.65. To obtain the secret session key from the determined internal state...scenario, where the objective is to reconstruct the secret key controlled LFSR initial states from the known keystream sequence, for a survey see... the secret message keys defining different initial internal states. This may open new possibilities for the secret key recovery cryptanalytic attacks

  3. Some Effects of Procedural Variations on Choice Responding in Concurrent Chains

    ERIC Educational Resources Information Center

    Moore, J.

    2009-01-01

    The present research used pigeons in a three-key operant chamber and varied procedural features pertaining to both initial and terminal links of concurrent chains. The initial links randomly alternated on the side keys during a session, while the terminal links always appeared on the center key. Both equal and unequal initial-link schedules were…

  4. Development of a national electronic interval cancer review for breast screening

    NASA Astrophysics Data System (ADS)

    Halling-Brown, M. D.; Patel, M. N.; Wallis, M. G.; Young, K. C.

    2018-03-01

    Reviewing interval cancers and prior screening mammograms are a key measure to monitor screening performance. Radiological analysis of the imaging features in prior mammograms and retrospective classification are an important educational tool for readers to improve individual performance. The requirements of remote, collaborative image review sessions, such as those required to run a remote interval cancer review, are variable and demand a flexible and configurable software solution that is not currently available on commercial workstations. The wide range of requirements for both collection and remote review of interval cancers has precipitated the creation of extensible medical image viewers and accompanying systems. In order to allow remote viewing, an application has been designed to allow workstation-independent, PACS-less viewing and interaction with medical images in a remote, collaborative manner, providing centralised reporting and web-based feedback. A semi-automated process, which allows the centralisation of interval cancer cases, has been developed. This stand-alone, flexible image collection toolkit provides the extremely important function of bespoke, ad-hoc image collection at sites where there is no dedicated hardware. Web interfaces have been created which allow a national or regional administrator to organise, coordinate and administer interval cancer review sessions and deploy invites to session members to participate. The same interface allows feedback to be analysed and distributed. The eICR provides a uniform process for classifying interval cancers across the NHSBSP, which facilitates rapid access to a robust 'external' review for patients and their relatives seeking answers about why their cancer was 'missed'.

  5. A session-to-session examination of homework engagement in cognitive therapy for depression: Do patients experience immediate benefits?

    PubMed

    Conklin, Laren R; Strunk, Daniel R

    2015-09-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of observer-rated homework engagement and session-to-session symptom change across the first five sessions. Within patient (and not between patient) variability in homework engagement was significantly related to greater session-to-session symptom improvements. These findings were similar when homework engagement was assessed through a measure of general engagement with homework assignments and a measure assessing engagement in specific assignments often used in CT. Secondary analyses suggested that observer ratings of the effort patients made on homework and the completion of cognitive homework were the numerically strongest predictors of depressive symptom improvements. Patient engagement with homework assignments appears to be an important predictor of early session-to-session symptom improvements. Future research is needed to identify what therapist behaviors promote homework engagement. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. A Session-to-Session Examination of Homework Engagement in Cognitive Therapy for Depression: Do patients experience immediate benefits?

    PubMed Central

    Conklin, Laren R.; Strunk, Daniel R.

    2015-01-01

    Homework is a key component of Cognitive Therapy (CT) for depression. Although previous research has found evidence for a positive relationship between homework compliance and treatment outcome, the methods used in previous studies have often not been optimal. In this study, we examine the relation of specific aspects of homework engagement and symptom change over successive session-to-session intervals. In a sample of 53 depressed adults participating in CT, we examined the relation of observer-rated homework engagement and session-to-session symptom change across the first five sessions. Within patient (and not between patient) variability in homework engagement was significantly related to session-to-session symptom improvements. These findings were similar when homework engagement was assessed through a measure of general engagement with homework assignments and a measure assessing engagement in specific assignments often used in CT. Secondary analyses suggested that observer ratings of the effort patients made on homework and the completion of cognitive homework were the numerically strongest predictors of depressive symptom improvements. Patient engagement with homework assignments appears to be an important predictor of early session-to-session symptom improvements. Future research is needed to identify what therapist behaviors promote homework engagement. PMID:26183022

  7. Unifying practice schedules in the timescales of motor learning and performance.

    PubMed

    Verhoeven, F Martijn; Newell, Karl M

    2018-06-01

    In this article, we elaborate from a multiple time scales model of motor learning to examine the independent and integrated effects of massed and distributed practice schedules within- and between-sessions on the persistent (learning) and transient (warm-up, fatigue) processes of performance change. The timescales framework reveals the influence of practice distribution on four learning-related processes: the persistent processes of learning and forgetting, and the transient processes of warm-up decrement and fatigue. The superposition of the different processes of practice leads to a unified set of effects for massed and distributed practice within- and between-sessions in learning motor tasks. This analysis of the interaction between the duration of the interval of practice trials or sessions and parameters of the introduced time scale model captures the unified influence of the between trial and session scheduling of practice on learning and performance. It provides a starting point for new theoretically based hypotheses, and the scheduling of practice that minimizes the negative effects of warm-up decrement, fatigue and forgetting while exploiting the positive effects of learning and retention. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. Behaviour change for better health: nutrition, hygiene and sustainability.

    PubMed

    Newson, Rachel S; Lion, Rene; Crawford, Robert J; Curtis, Valerie; Elmadfa, Ibrahim; Feunekes, Gerda I J; Hicks, Cheryl; van Liere, Marti; Lowe, C Fergus; Meijer, Gert W; Pradeep, B V; Reddy, K Srinath; Sidibe, Myriam; Uauy, Ricardo

    2013-01-01

    As the global population grows there is a clear challenge to address the needs of consumers, without depleting natural resources and whilst helping to improve nutrition and hygiene to reduce the growth of noncommunicable diseases. For fast-moving consumer goods companies, like Unilever, this challenge provides a clear opportunity to reshape its business to a model that decouples growth from a negative impact on natural resources and health. However, this change in the business model also requires a change in consumer behaviour. In acknowledgement of this challenge Unilever organised a symposium entitled 'Behaviour Change for Better Health: Nutrition, Hygiene and Sustainability'. The intention was to discuss how consumers can be motivated to live a more healthy and sustainable lifestlye in today's environment. This article summarises the main conclusions of the presentations given at the symposium. Three main topics were discussed. In the first session, key experts discussed how demographic changes - particularly in developing and emerging countries - imply the need for consumer behaviour change. The second session focused on the use of behaviour change theory to design, implement and evaluate interventions, and the potential role of (new or reformulated) products as agents of change. In the final session, key issues were discussed regarding the use of collaborations to increase the impact and reach, and to decrease the costs, of interventions. The symposium highlighted a number of key scientific challenges for Unilever and other parties that have set nutrition, hygiene and sustainability as key priorities. The key challenges include: adapting behaviour change approaches to cultures in developing and emerging economies; designing evidence-based behaviour change interventions, in which products can play a key role as agents of change; and scaling up behaviour change activities in cost-effective ways, which requires a new mindset involving public-private partnerships.

  9. Behaviour change for better health: nutrition, hygiene and sustainability

    PubMed Central

    2013-01-01

    As the global population grows there is a clear challenge to address the needs of consumers, without depleting natural resources and whilst helping to improve nutrition and hygiene to reduce the growth of noncommunicable diseases. For fast-moving consumer goods companies, like Unilever, this challenge provides a clear opportunity to reshape its business to a model that decouples growth from a negative impact on natural resources and health. However, this change in the business model also requires a change in consumer behaviour. In acknowledgement of this challenge Unilever organised a symposium entitled ‘Behaviour Change for Better Health: Nutrition, Hygiene and Sustainability’. The intention was to discuss how consumers can be motivated to live a more healthy and sustainable lifestlye in today’s environment. This article summarises the main conclusions of the presentations given at the symposium. Three main topics were discussed. In the first session, key experts discussed how demographic changes – particularly in developing and emerging countries – imply the need for consumer behaviour change. The second session focused on the use of behaviour change theory to design, implement and evaluate interventions, and the potential role of (new or reformulated) products as agents of change. In the final session, key issues were discussed regarding the use of collaborations to increase the impact and reach, and to decrease the costs, of interventions. The symposium highlighted a number of key scientific challenges for Unilever and other parties that have set nutrition, hygiene and sustainability as key priorities. The key challenges include: adapting behaviour change approaches to cultures in developing and emerging economies; designing evidence-based behaviour change interventions, in which products can play a key role as agents of change; and scaling up behaviour change activities in cost-effective ways, which requires a new mindset involving public–private partnerships. PMID:23530770

  10. Development of a coping intervention to improve traumatic stress and HIV care engagement among South African women with sexual trauma histories.

    PubMed

    Sikkema, Kathleen J; Choi, Karmel W; Robertson, Corne; Knettel, Brandon A; Ciya, Nonceba; Knippler, Elizabeth T; Watt, Melissa H; Joska, John A

    2018-06-01

    This paper describes the development and preliminary trial run of ImpACT (Improving AIDS Care after Trauma), a brief coping intervention to address traumatic stress and HIV care engagement among South African women with sexual trauma histories. We engaged in an iterative process to culturally adapt a cognitive-behavioral intervention for delivery within a South African primary care clinic. This process involved three phases: (a) preliminary intervention development, drawing on content from a prior evidence-based intervention; (b) contextual adaptation of the curriculum through formative data collection using a multi-method qualitative approach; and (c) pre-testing of trauma screening procedures and a subsequent trial run of the intervention. Feedback from key informant interviews and patient in-depth interviews guided the refinement of session content and adaptation of key intervention elements, including culturally relevant visuals, metaphors, and interactive exercises. The trial run curriculum consisted of four individual sessions and two group sessions. Strong session attendance during the trial run supported the feasibility of ImpACT. Participants responded positively to the logistics of the intervention delivery and the majority of session content. Trial run feedback helped to further refine intervention content and delivery towards a pilot randomized clinical trial to assess the feasibility and potential efficacy of this intervention. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Teaching the Pressure-Flow Hypothesis of Phloem Transport in a Problem-Solving Session

    ERIC Educational Resources Information Center

    Clifford, Paul

    2004-01-01

    Problem solving is an ideal learning strategy, especially for topics that are perceived as difficult to teach. As an example, a format is described for a problem-solving session designed to help students understand the pressure-flow hypothesis of phloem transport in plants. Five key facts and their discussion can lead to the conclusion that a…

  12. Effectiveness of motor sequential learning according to practice schedules in healthy adults; distributed practice versus massed practice

    PubMed Central

    Kwon, Yong Hyun; Kwon, Jung Won; Lee, Myoung Hee

    2015-01-01

    [Purpose] The purpose of the current study was to compare the effectiveness of motor sequential learning according to two different types of practice schedules, distributed practice schedule (two 12-hour inter-trial intervals) and massed practice schedule (two 10-minute inter-trial intervals) using a serial reaction time (SRT) task. [Subjects and Methods] Thirty healthy subjects were recruited and then randomly and evenly assigned to either the distributed practice group or the massed practice group. All subjects performed three consecutive sessions of the SRT task following one of the two different types of practice schedules. Distributed practice was scheduled for two 12-hour inter-session intervals including sleeping time, whereas massed practice was administered for two 10-minute inter-session intervals. Response time (RT) and response accuracy (RA) were measured in at pre-test, mid-test, and post-test. [Results] For RT, univariate analysis demonstrated significant main effects in the within-group comparison of the three tests as well as the interaction effect of two groups × three tests, whereas the between-group comparison showed no significant effect. The results for RA showed no significant differences in neither the between-group comparison nor the interaction effect of two groups × three tests, whereas the within-group comparison of the three tests showed a significant main effect. [Conclusion] Distributed practice led to enhancement of motor skill acquisition at the first inter-session interval as well as at the second inter-interval the following day, compared to massed practice. Consequentially, the results of this study suggest that a distributed practice schedule can enhance the effectiveness of motor sequential learning in 1-day learning as well as for two days learning formats compared to massed practice. PMID:25931727

  13. Dietary Microperiodization in Elite Female and Male Runners and Race Walkers During a Block of High Intensity Precompetition Training.

    PubMed

    Heikura, Ida A; Burke, Louise M; Mero, Antti A; Uusitalo, Arja Leena Tuulia; Stellingwerff, Trent

    2017-08-01

    We investigated one week of dietary microperiodization in elite female (n = 23) and male (n = 15) runners and race-walkers by examining the frequency of training sessions and recovery periods conducted with recommended carbohydrate (CHO) and protein availability. Food and training diaries were recorded in relation to HARD (intense or >90min sessions; KEY) versus RECOVERY days (other-than KEY sessions; EASY). The targets for amount and timing of CHO and protein around KEY sessions were based on current nutrition recommendations. Relative daily energy and CHO intake was significantly (p < .05) higher in males (224 ± 26 kJ/kg/d, 7.3 ± 1.4 g/kg/d CHO) than females (204 ± 29 kJ/kg/d, 6.2 ± 1.1 g/kg/d CHO) on HARD days. However, when adjusted for training volume (km), there was no sex-based difference in CHO intake daily (HARD: 0.42 ± 0.14 vs 0.39 ± 0.15 g/kg/km). Females appeared to periodize energy and protein intake with greater intakes on HARD training days (204 ± 29 vs 187 ± 35 kJ/kg/d, p = .004; 2.0 ± 0.3 vs 1.9 ± 0.3 g/kg/d protein, p = .013), while males did not periodize intakes. Females showed a pattern of periodization of postexercise CHO for KEY vs EASY (0.9 ± 0.4 vs 0.5 ± 0.3 g/kg; p < .05) while males had higher intakes but only modest periodization (1.3 ± 0.9 vs 1.0 ± 0.4; p = .32). There was only modest evidence from female athletes of systematic microperiodization of eating patterns to meet contemporary sports nutrition guidelines. While this pattern of periodization was absent in males, in general they consumed more energy and CHO daily and around training sessions compared with females. Elite endurance athletes do not seem to systematically follow the most recent sports nutrition guidelines of periodized nutrition.

  14. The influence of "preparedness" on autoshaping, schedule performance, and choice.

    PubMed

    Burns, J D; Malone, J C

    1992-11-01

    Two groups of experimentally naive pigeons were exposed to an autoshaping procedure in which the response key was mounted on the wall (the conventional location) or on the floor of the chamber. In two experiments, subjects readily responded to the wall key, but floor-key subjects required shaping. A subsequent experiment compared performance of wall- and floor-key groups on an ascending series of fixed-ratio schedule values, resistance to extinction, differential reinforcement of other behavior, and reversal of key assignment. Each experiment was followed by several sessions of fixed-ratio training; the performance of the wall- and floor-key groups was almost identical throughout. In the final experiment, a fixed-ratio requirement could be completed on either or both keys. Birds initially chose the key on which they had responded during the preceding (reversal of key assignment) experiment. However, within a few sessions both groups showed almost exclusive preference for the floor key. Preference for a key located on the floor may follow from the fact that pigeons are ground feeders and may thus be more "prepared" to peck the floor than to peck a wall. However, autoshaping, under the conditions prevailing here, occurred much more readily to the wall key, suggesting that pecking a vertical surface is more highly prepared. Difficulties in determining relative preparedness seem moot, however, given the lack of between-group differences in the intervening experiments. It is thus unlikely that schedule performances critically depend upon the specific operant response involved.

  15. The Specificity of Rugby Union Training Sessions in Preparation for Match Demands.

    PubMed

    Campbell, Patrick G; Peake, Jonathan M; Minett, Geoffrey M

    2018-04-01

    Investigations into the specificity of rugby union training practices in preparation for competitive demands have predominantly focused on physical and physiological demands. The evaluation of the contextual variance in perceptual strain or skill requirements between training and matches in rugby union is unclear, yet holistic understanding may assist to optimize training design. This study evaluated the specificity of physical, physiological, perceptual, and skill demands of training sessions compared with competitive match play in preprofessional, elite club rugby union. Global positioning system devices, video capture, heart rate, and session ratings of perceived exertion were used to assess movement patterns, skill completions, physiologic, and perceptual responses, respectively. Data were collected across a season (training sessions n = 29; matches n = 14). Participants (n = 32) were grouped in playing positions as: outside backs, centers, halves, loose forwards, lock forwards, and front row forwards. Greater total distance, low-intensity activity, maximal speed, and meters per minute were apparent in matches compared with training in all positions (P < .02; d > 0.90). Similarly, match heart rate and session ratings of perceived exertion responses were higher than those recorded in training (P < .05; d > 0.8). Key skill completions for forwards (ie, scrums, rucks, and lineouts) and backs (ie, kicks) were greater under match conditions than in training (P < .001; d > 1.50). Considerable disparities exist between the perceptual, physiological, and key skill demands of competitive matches versus training sessions in preprofessional rugby union players. Practitioners should consider the specificity of training tasks for preprofessional rugby players to ensure the best preparation for match demands.

  16. Context effects in a temporal discrimination task" further tests of the Scalar Expectancy Theory and Learning-to-Time models.

    PubMed

    Arantes, Joana; Machado, Armando

    2008-07-01

    Pigeons were trained on two temporal bisection tasks, which alternated every two sessions. In the first task, they learned to choose a red key after a 1-s signal and a green key after a 4-s signal; in the second task, they learned to choose a blue key after a 4-s signal and a yellow key after a 16-s signal. Then the pigeons were exposed to a series of test trials in order to contrast two timing models, Learning-to-Time (LeT) and Scalar Expectancy Theory (SET). The models made substantially different predictions particularly for the test trials in which the sample duration ranged from 1 s to 16 s and the choice keys were Green and Blue, the keys associated with the same 4-s samples: LeT predicted that preference for Green should increase with sample duration, a context effect, but SET predicted that preference for Green should not vary with sample duration. The results were consistent with LeT. The present study adds to the literature the finding that the context effect occurs even when the two basic discriminations are never combined in the same session.

  17. STATE RESEARCH, OUTREACH AND TECHNICAL ASSISTANCE TO IMPROVE THE NATION’S TRANSMISSION AND DISTRIBUTION SYSTEMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Terry; Ben Deitchman; Shemika Spencer

    2009-06-29

    The goal of the project 'State Research, Outreach and Technical Assistance to Improve the Nation's Transmission and Distribution Systems' was for the National Association of State Energy Officials (NASEO) to partner with the National Governors Association (NGA) Center for Best Practices, the National Conference of State Legislators (NCSL), and the National Association of Regulatory Utility Commissioners (NARUC) to assist DOE's Office of Electricity Delivery and Energy Reliability (OE) in its effort to modernize and expand America's electric delivery system. NASEO focused on key transmission and distribution issues where coordination between the federal and state governments was critical. Throughout the durationmore » of this program, NASEO engaged in monthly coordination - occasionally more often - with NGA, NCSL and NARUC. NASEO staff and General Counsel Jeff Genzer also had regular face-to-face meetings, phone calls and emails with OE staff to learn from DOE and share information and feedback from the state energy offices on transmission and distribution. To commence work on this project, NASEO met with OE, NGA, NCSL and NARUC in January 2005 and remained committed to regular communications with all involved entities throughout the duration of this project. NASEO provided comments and analysis to the other partners on deliverable reports under this award. This award provided support to NASEO's Energy Production Committee (chaired by Dub Taylor of Texas, followed by Tom Fuller of Wyoming) to plan and host sessions at NASEO's Annual Meeting and Energy Outlook Conferences. Sessions included presentations from state, DOE, national laboratory and private sector experts on transmission, distribution, distributed energy resources, integrating renewable resources into the electricity grid. NASEO disseminated information to its members through emails and its website on transmission and distribution technology and policy. NASEO was an active member of the National Council on Electricity Policy as part of its transmission and distribution work. The National Council on Electricity Policy (National Council) is a venture between NASEO, NARUC, NCSL, National Association of Clean Air Agencies (NACAA) and the National Governors Association (NGA). The National Council also includes several federal members including FERC, DOE, and the U.S. Environment Protection Agency (EPA). NASEO members serve on the policy committee and NASEO General Council Jeff Genzer is a member of the National Council's Executive Committee. NASEO staff participated on regularly scheduled policy committee and executive committee calls and helped to plan agendas and publications for various state decision-makers. Specifically, NASEO organized state energy officials and participating in formulating the agenda for meetings, including the Mid-Atlantic Distributed Generation Workshop in New Jersey in September 2007. NASEO shared the results of these meetings through its website, email communications and direct conversations with state energy officials. NASEO participated as a member of the National Action Plan for Energy Efficiency (NAPEE) Leadership Committee, representing the interests and expertise of the state energy offices. In addition, NASEO was part of the Long-Term Vision Committee. NASEO members also participated in these activities and NASEO has encouraged further efforts of its membership with regards to NAPEE. NASEO has worked to ensure that its membership has the most timely and accurate information about transmission and distribution technology and policy. Its work with other associations has facilitated greater partnerships to enhance activities across the nation and encourage state energy offices to collaborate with public utility commissions, legislatures and executives to improve modern transmission and distribution. NASEO has identified transmission and distribution as a key area for further action.« less

  18. High-volume resistance training session acutely diminishes respiratory muscle strength.

    PubMed

    Hackett, Daniel A; Johnson, Nathan A; Chow, Chin-Moi

    2012-01-01

    This study investigated the effect of a high-volume compared to a low-volume resistance training session on maximal inspiratory pressure (MIP) and maximal expiratory pressure (MEP). Twenty male subjects with resistance training experience (6.2 ± 3.2 y), in a crossover trial, completed two resistance training protocols (high-volume: 5 sets per exercise; low-volume: 2 sets per exercise) and a control session (no exercise) on 3 separate occasions. MIP and MEP decreased by 13.6% (p < 0.01) and 14.7% (p < 0.01) respectively from pre-session MIP and MEP, following the high-volume session. MIP and MEP were unaffected following the low-volume or the control sessions. MIP returned to pre-session values after 40 minutes, whereas MEP remained significantly reduced after 60 minutes post-session by 9.2% compared to pre-session (p < 0.01). The findings suggest that the high-volume session significantly decreased MIP and MEP post-session, implicating a substantially increased demand on the respiratory muscles and that adequate recovery is mandatory following this mode of training. Key pointsRespiratory muscular strength performance is acutely diminished following a high-volume whole-body resistance training session.Greater ventilatory requirements and generation of IAP during the high-volume resistance training session may have contributed to the increased demand placed on the respiratory muscles.Protracted return of respiratory muscular strength performance to baseline levels may have implications for individuals prior to engaging in subsequent exercise bouts.

  19. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  20. QCD and Multiparticle Production - Proceedings of the XXIX International Symposium on Multiparticle Dynamics

    NASA Astrophysics Data System (ADS)

    Sarcevic, Ina; Tan, Chung-I.

    2000-07-01

    The Table of Contents for the full book PDF is as follows: * Preface * Monday morning session: Hadronic Final States - Conveners: E. de Wolf and J. W. Gary * Session Chairman: J. W. Gary * Inclusive Jets at the Tevatron * Forward Jets, Dijets, and Subjets at the Tevatron * Inclusive Hadron Production and Dijets at HERA * Recent Opal Results on Photon Structure and Interactions * Review of Two-Photon Physics at LEP * Session Chairman: E. de Wolf * An Intriguing Area-Law-Based Hadron Production Scheme in e+e- Annihilation and Its Possible Extensions * Hyperfine Splitting in Hadron Production at High Energies * Event Selection Effects on Multiplicities in Quark and Gluon Jets * Quark and Gluon Jet Properties at LEP * Rapidity Gaps in Quark and Gluon Jets -- A Perturbative Approach * Monday afternoon session: Diffractive and Small-x - Conveners: M. Derrick and A. White * Session Chairman: A. White * Structure Functions: Low x, High y, Low Q2 * The Next-to-Leading Dynamics of the BFKL Pomeron * Renormalization Group Improved BFKL Equation * Session Chairman: G. Briskin * New Experimental Results on Diffraction at HERA * Diffractive Parton Distributions in Light-Cone QCD * The Logarithmic Derivative of the F2 Structure Function and Saturation * Spin Dependence of Diffractive DIS * Monday evening session * Session Chairman: M. Braun * Tests of QCD with Particle Production at HERA: Review and Outlook * Double Parton Scattering and Hadron Structure in Transverse Space * The High Density Parton Dynamics from Eikonal and Dipole Pictures * Hints of Higher Twist Effects in the Slope of the Proton Structure Function * Tuesday morning session: Correlations and Fluctuations - Conveners: R. Hwa and M. Tannenbaum * Session Chairman: A. Giovannini -- Fluctuations and Correlations * Bose-Einstein Results from L3 * Short-Range and Long-Range Correlations in DIS at HERA * Coior Mutation Model, Intermittency, and Erraticity * QCD Queuing and Hadron Multiplicity * Soft and Semi-hard Components in Multiplicity Distributions in the TeV Region * Qualitative Difference Between Particle Production Dynamics in Soft and Hard Processes * Session Chairman: M. Tannenbaum -- Bose-Einstein Correlations * Questions in Bose-Einstein Correlations * The Source Size Dependence on the mhadron Applying Fermi and Bose Statistics and I-Spin Invariance * Signal of Partial UA(1) Symmetry Restoration from Two-Pion Bose-Einstein Correlations * Multiparticle Bose-Einstein Correlations in Heavy-Ion Collisions * Tuesday afternoon session: Heavy Ion Collisions - Conveners: B. Müller and J. Statchel * Session Chairman: J. Stachel * Probing Baryon Freeze-out Density at the AGS with Proton Correlations * Centrality Dependence of Hadronic Observables at CERN SPS * Study of Transverse Momentum Spectra in pp Collisions with a Statistical Model of Hadronisation * Session Chairman: B. Brower * Production of Light (Anti-)Nuclei with E864 at the AGS * QCD Critical Point in Heavy-Ion Collision Experiments * Tuesday evening session * Session Chairman: H. M. Fried * Oscillating Hq, Event Shapes, and QCD * Critical Behavior of Quark-Hadron Phase Transition * Shadowing of Gluons at RHIC and LHC * Parton Distributions in Nuclei at Small x * Wednesday morning session: Diffraction and Small x - Conveners: M. Derrick and A. White * Session Chairman: C. Pajares * High-Energy Effective Action from Scattering of Shock Waves in QCD * The Triangle Anomaly in the Triple-Regge Limit * CDF Results on Hard Diffraction and Rapidity Gap Physics * DØ Results on Hard Diffraction * Interjet Rapidity Gaps in Perturbative QCD * Pomeron: Beyond the Standard Approach * Factorization and Diffractive Production at Collider Energies * Thursday morning session: Heavy Ion Collisions - Conveners: B. Müller and J. B. Stachel * Session Chairman: N. Schmitz * Summary of J/ψ Suppression Data and Preliminary Results on Multiplicity Distributions in PB-PB Collisions from the NA50 Experiment * Duality and Chiral Restoration from Dilepton Production in Relativistic Heavy-Ion Collisions * Session Chairman: I. Sarcevic * Transport-Theoretical Analysis of Reaction Dynamics, Particle Production and Freeze-out at RHIC * Inclusive Particle Spectra and Exotic Particle Searches Using STAR * The First Fermi in a High Energy Nuclear Collision * Probing the Space-Time Evolution of Heavy Ion Collisions with Bremsstrahlung * Thursday afternoon session: Hadronic Final States - Conveners: E. de Wolf and J. Gary * Session Chairman: F. Verbeure * QCD with SLD * QCD at LEP II * Multidimensional Analysis of the Bose-Einstein Correlations at DELPHI * Study of Color Singlet with Gluonic Subsinglet by Color Effective Hamiltonian * Correlations and Fluctuations - Conveners: R. Hwa and M. Tannenbaum * Session Chairman: R. C. Hwa -- Fluctuations in Heavy-Ion Collisions * Scale-Local Statistical Measures and the Multiparticle Final State * Centrality and ET Fluctuations from p + Be to Au + Au at AGS Energies * Order Parameter of Single Event * Multiplicities, Transverse Momenta and Their Correlations from Percolating Colour Strings * Probing the QCD Critical Point in Nuclear Collisions * Event-by-Event Fluctuations in Pb + Pb Collisions at the CERN SPS * Friday morning session: High Energy Collisions and Cosmic-Ray/Astrophysics - Conveners: F. Halzen and T. Stanev * Session Chairman: U. Sukhatme * Rethinking the Eikonal Approximation * QCD and Total Cross-Sections * The Role of Multiple Parton Collisions in Hadron Collisions * Effective Cross Sections and Spatial Structure of the Hadrons * Looking for the Odderon * QCD in Embedded Coordinates * Session Chairman: F. Bopp * Extensive Air Sbowers and Hadronic Interaction Models * Penetration of the Earth by Ultrahigh Energy Neutrinos and the Parton Distributions Inside the Nucleon * Comparison of Prompt Muon Observations to Charm Expectations * Friday afternoon session: Recent Developments - Conveners: R. Brower and I. Sarcevic * Session Chairman: G. Guralnik * The Relation Between Gauge Theories and Gravity * From Black Holes to Pomeron: Tensor Glueball and Pomeron Intercept at Strong Coupling * Summary Talks * Summary of Results of the Ultrarelativistic Heavy Ion Fixed Target Program * Review of Theory Talks * Summary of Experimental Talks * List of Participants

  1. Panel session on "how to meet the challenges for nuclear power".

    PubMed

    Tenforde, Thomas S

    2011-01-01

    This panel session at the 2009 Annual Meeting involved a discussion of views of government, industry, and national research laboratory members on the primary future goals in developing advanced nuclear reactor and nuclear fuel cycle designs, fuel management, and used fuel disposal options. The session at the 2009 NCRP Annual Meeting on "How to Meet the Challenges for Nuclear Power" was chaired by Mary E. Clark of the U.S. Environmental Protection Agency and focused on efforts in the United States and worldwide to expand nuclear capabilities for electric power production in a safe, secure, and environmentally acceptable manner. This paper briefly summarizes the key topics discussed in five presentations during this session of the NCRP Annual Meeting. Copyright © 2010 Health Physics Society

  2. Instructor Debrief Training in SPOT

    NASA Technical Reports Server (NTRS)

    Martin, Lynne; Orasanu, Judith; Villeda, Eric; Conners, Mary M. (Technical Monitor)

    2002-01-01

    One way to enhance the effectiveness of Special Purpose Operational Training' (SPOT) debriefing sessions may be for instructors to make explicit connections between the Crew Resource Management (CRM) concepts a carrier advocates and the behaviors displayed by the crew in question. A tool listing key behaviors from the scenario was devised, accompanied by an instructors' training session in which links were made between the behaviors and the underlying CRM processes they reflect. The aim of the tool is to assist instructors to focus the debriefing on the key SPOT/ CRM issues, in this case on planning. A second tool suggested ways to facilitate the discussion. Fourteen instructors at a major U.S. carrier took part in the training session and used the toolkit in their subsequent debriefs. Pre- and post-training debriefing samples from each instructor were compared to assess whether there were any changes in instructors' approaches to discussions in terms of the topics they covered and how they raised the points.

  3. New FDA draft guidance on immunogenicity.

    PubMed

    Parenky, Ashwin; Myler, Heather; Amaravadi, Lakshmi; Bechtold-Peters, Karoline; Rosenberg, Amy; Kirshner, Susan; Quarmby, Valerie

    2014-05-01

    A "Late Breaking" session was held on May 20 at the 2013 American Association of Pharmaceutical Scientists-National Biotech Conference (AAPS-NBC) to discuss the US Food and Drug Administration's (FDA) 2013 draft guidance on Immunogenicity Assessment for Therapeutic Protein Products. The session was initiated by a presentation from the FDA which highlighted several key aspects of the 2013 draft guidance pertaining to immunogenicity risk, the potential impact on patient safety and product efficacy, and risk mitigation. This was followed by an open discussion on the draft guidance which enabled delegates from biopharmaceutical companies to engage the FDA on topics that had emerged from their review of the draft guidance. The multidisciplinary audience fostered an environment that was conducive to scientific discussion on a broad range of topics such as clinical impact, immune mitigation strategies, immune prediction and the role of formulation, excipients, aggregates, and degradation products in immunogenicity. This meeting report highlights several key aspects of the 2013 draft guidance together with related dialog from the session.

  4. Multi-modality imaging: Bird's-eye view from the 2014 American Heart Association Scientific Sessions.

    PubMed

    AlJaroudi, Wael A; Einstein, Andrew J; Chaudhry, Farooq A; Lloyd, Steven G; Hage, Fadi G

    2015-04-01

    A large number of studies were presented at the 2014 American Heart Association Scientific Sessions. In this review, we will summarize key studies in nuclear cardiology, computed tomography, echocardiography, and cardiac magnetic resonance imaging. This brief review will be helpful for readers of the Journal who are interested in being updated on the latest research covering these imaging modalities.

  5. Investigating the Variables in a Mock Exam Study Session Designed to Improve Student Exam Performance in an Undergraduate Behavior Modification and Therapy Course

    ERIC Educational Resources Information Center

    Dotson, Wesley H.

    2010-01-01

    The purpose of the present study was to identify components of an optional mock exam review session (e.g. requiring students to write answers, providing students grading keys for questions) responsible for improvements in student performance on application-based short-essay exams in an undergraduate behavior modification course. Both…

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    U.S. Bonneville Power Administration

    The 2008 Columbia River Estuary Conference was held at the Liberty Theater in Astoria, Oregon, on April 19-20. The conference theme was ecosystem restoration. The purpose of the conference was to exchange data and information among researchers, policy-makers, and the public, i.e., interrelate science with management. Conference organizers invited presentations synthesizing material on Restoration Planning and Implementation (Session 1), Research to Reduce Restoration Uncertainties (Session 2), Wetlands and Flood Management (Session 3), Action Effectiveness Monitoring (Session 4), and Management Perspectives (Session 5). A series of three plenary talks opened the conference. Facilitated speaker and audience discussion periods were held atmore » the end of each session. Contributed posters conveyed additional data and information. These proceedings include abstracts and notes documenting questions from the audience and clarifying answers from the presenter for each talk. The proceedings also document key points from the discussion periods at the end of each session. The conference program is outlined in the agenda section. Speaker biographies are presented in Appendix A. Poster titles and authors are listed in Appendix B. A list of conference attendees is contained in Appendix C.« less

  7. Bias or equality? Unconscious thought equally integrates temporally scattered information.

    PubMed

    Li, Jiansheng; Gao, Qiyang; Zhou, Jifan; Li, Xinyu; Zhang, Meng; Shen, Mowei

    2014-04-01

    In previous experiments on unconscious thought, information was presented to participants in one continuous session; however, in daily life, information is delivered in a temporally partitioned way. We examined whether unconscious thought could equally integrate temporally scattered information when making overall evaluations. When presenting participants with information in two temporally partitioned sessions, participants' overall evaluation was based on neither the information in the first session (Experiment 1) nor that in the second session (Experiment 2); instead, information in both sessions were equally integrated to reach a final judgment. Conscious thought, however, overemphasized information in the second session. Experiments 3 and 4 further ruled out possible influencing factors including differences in the distributions of positive/negative attributes in the first and second sessions and on-line judgment. These findings suggested that unconscious thought can integrate information from a wider range of periods during an evaluation, while conscious thought cannot. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Understanding the impact of interprofessional collaboration on the quality of care: a case report from a small-scale resource limited health care environment.

    PubMed

    Busari, Jamiu O; Moll, Franka M; Duits, Ashley J

    2017-01-01

    A critical assessment of current health care practices, as well as the training needs of various health care providers, is crucial for improving patient care. Several approaches have been proposed for defining these needs with attention on communication as a key competency for effective collaboration. Taking our cultural context, resource limitations, and small-scale setting into account, we researched the applicability of a mixed focus group approach for analysis of the communication between doctors and nurses, as well as the measures for improvement. Assessment of nurse-physician communication perception in patient care in a Caribbean setting. Focus group sessions consisting of nurses, interns, and medical specialists were conducted using an ethnographic approach, paying attention to existing communication, risk evaluation, and recommendations for improvement. Data derived from the focus group sessions were analyzed by thematic synthesis method with descriptive themes and development of analytic themes. The initial focus group sessions produced an extensive list of key recommendations which could be clustered into three domains (standardization, sustainment, and collaboration). Further discussion of these domains in focus groups showed nurses' and physicians' domain perspectives and effects on patient care to be broadly similar. Risks related to lack of information, knowledge sharing, and professional respect were clearly described by the participants. The described mixed focus group session approach for effectively determining current interprofessional communication and key improvement areas seems suitable for our small-scale, limited resource setting. The impact of the cultural context should be further evaluated by a similar study in a different cultural context.

  9. [Studies Using Text Mining on the Differences in Learning Effects between the KJ and World Café Method as Learning Strategies].

    PubMed

    Yasuhara, Tomohisa; Sone, Tomomichi; Konishi, Motomi; Kushihata, Taro; Nishikawa, Tomoe; Yamamoto, Yumi; Kurio, Wasako; Kohno, Takeyuki

    2015-01-01

    The KJ method (named for developer Jiro Kawakita; also known as affinity diagramming) is widely used in participatory learning as a means to collect and organize information. In addition, the World Café (WC) has recently become popular. However, differences in the information obtained using each method have not been studied comprehensively. To determine the appropriate information selection criteria, we analyzed differences in the information generated by the WC and KJ methods. Two groups engaged in sessions to collect and organize information using either the WC or KJ method and small group discussions were held to create "proposals to improve first-year education". Both groups answered two pre- and post- session questionnaires that asked for free descriptions. Key words were extracted from the results of the two questionnaires and categorized using text mining. In the responses to questionnaire 1, which was directly related to the session theme, a significant increase in the number of key words was observed in the WC group (p=0.0050, Fisher's exact test). However, there was no significant increase in the number of key words in the responses to questionnaire 2, which was not directly related to the session theme (p=0.8347, Fisher's exact test). In the KJ method, participants extracted the most notable issues and progressed to a detailed discussion, whereas in the WC method, various information and problems were spread among the participants. The choice between the WC and KJ method should be made to reflect the educational objective and desired direction of discussion.

  10. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  12. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    PubMed

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  13. Biomedical Challenges Presented by the American Indian, Proceedings of the Special Session of the PAHO Advisory Committee on Medical Research (7th, Washington, D.C., June 25, 1968).

    ERIC Educational Resources Information Center

    Pan American Health Organization, Washington, DC.

    At each meeting of the Pan American Health Organization Advisory Committee on Medical Research, a special 1-day session is held on a topic chosen by the committee as being of particular interest. At the 7th meeting, which convened in June of 1968 in Washington, D.C., the session surveyed the origin, present distribution, and principal biological…

  14. Patient and Genetic Counselor Perceptions of In-person versus Telephone Genetic Counseling for Hereditary Breast/Ovarian Cancer

    PubMed Central

    Jacobs, Aryana S.; Schwartz, Marc D.; Valdimarsdottir, Heiddis; Nusbaum, Rachel H.; Hooker, Gillian W.; DeMarco, Tiffani A.; Heinzmann, Jessica E.; McKinnon, Wendy; McCormick, Shelley R.; Davis, Claire; Forman, Andrea D.; Lebensohn, Alexandra Perez; Dalton, Emily; Tully, Diana Moglia; Graves, Kristi D.; Similuk, Morgan; Kelly, Scott; Peshkin, Beth N.

    2016-01-01

    Telephone genetic counseling (TC) for high-risk women interested in BRCA1/2 testing has been shown to yield positive outcomes comparable to usual care (UC; in-person) genetic counseling. However, little is known about how genetic counselors perceive the delivery of these alternate forms of genetic counseling. As part of a randomized trial of TC versus UC, genetic counselors completed a 5-item genetic counselor process questionnaire (GCQ) assessing key elements of pre-test sessions (information delivery, emotional support, addressing questions and concerns, tailoring of session, and facilitation of decision- making) with the 479 female participants (TC, N=236; UC, N=243). The GCQ scores did not differ for TC vs. UC sessions (t (477) = 0.11, p = 0.910). However, multivariate analysis showed that participant race/ethnicity significantly predicted genetic counselor perceptions (β = 0.172, p<0.001) in that the GCQ scores were lower for minorities in TC and UC. Exploratory analyses suggested that GCQ scores may be associated with patient preference for UC versus TC (t (79) = 2.21, p=0.030). Additionally, we found that genetic counselor ratings of session effectiveness were generally concordant with patient perceptions of the session. These data indicate that genetic counselors perceive that key components of TC can be delivered as effectively as UC, and that these elements may contribute to specific aspects of patient satisfaction. However, undefined process differences may be present which account for lower counselor perceptions about the effectiveness of their sessions with minority women (i.e., those other than non-Hispanic Whites). We discuss other potential clinical and research implications of our findings. PMID:26969308

  15. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  16. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  17. Examining the impact of a school-based fruit and vegetable co-op in the Hispanic community through documentary photography.

    PubMed

    Alcazar, Lani; Raber, Margaret; Lopez, Kimberly; Markham, Christine; Sharma, Shreela

    2017-09-01

    Hispanic families are at elevated risk for certain diet related illnesses including obesity and diabetes. Brighter Bites is a 16-week school-based program that delivers produce and nutrition education to high-need areas. The purpose of this study was to explore the adoption of Brighter Bites healthy eating strategies in low-income Spanish-speaking families as well as barriers to the sustainability of improved dietary behaviors using Photovoice. Two researchers worked with a predominately Hispanic, low-income public school to conduct the project. Spanish speaking parents participating in Brighter Bites were recruited and five mothers completed the study. Participants developed research questions, took documentary photos, attended group analysis sessions, and organized a community event. Photos from participants were gathered at two time points: i) during the Brighter Bites produce distributions, and ii) when the distributions were no longer in session. Participants organized resulting photos into themes during discussion groups that proceeded each photo-taking period. Themes that emerged during the produce distribution period included: cost savings, increased variety and accessibility of fresh produce, and ability to practice healthy eating. Themes that emerged when the weekly produce distributions were no longer in session included: increased costs, lack of variety, the continued effect of Brighter Bites, and innovative ways to cook with produce. Overall, participants were enthusiastic about the benefits they experienced with the program, but noted hardships in accessing nutritious food without the produce distributions in session. Innovative approaches are needed to create sustainable pathways to healthful food access after community nutrition interventions are complete. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Sessional Academic Success: A Distributed Framework for Academic Support and Development

    ERIC Educational Resources Information Center

    Hamilton, Jillian; Fox, Michelle; McEwan, Mitchell

    2013-01-01

    With approximately half of Australian university teaching now performed by Sessional Academics, there has been growing recognition of the contribution they make to student learning. At the same time, sector-wide research and institutional audits continue to raise concerns about academic development, quality assurance, recognition and belonging…

  19. The Computer: Extension of the Human Mind III. Proceedings of the Annual Summer Computer Conference (3rd, Eugene, Oregon, August 1-3, 1984).

    ERIC Educational Resources Information Center

    Oregon Univ., Eugene. Center for Advanced Technology in Education.

    The 13 conference presentations in this proceedings are arranged by general and special interest sessions and listed within each session in the order in which they were presented. These papers are: (1) "Key Issues for the Near Future" (David Moursund); (2) "Educating with Computers: Insights from Cognitive Psychology (and Video Games)" (Morton Ann…

  20. A pilot study of team learning on in-patient rounds.

    PubMed

    Colbert, James; Pelletier, Stephen; Xavier-Depina, Francisca; Shields, Helen

    2016-02-01

    Medical trainees often do not receive structured teaching during in-patient rounds. To assess whether the addition of a collaborative team learning technique would improve the learning experience on a general medicine in-patient team. Eight learners participated in this pilot study. Learning teams consisted of internal medicine residents and third-year medical students on a general medicine in-patient rotation. The experimental curriculum covered four common topics: cardiac stress testing; syncope; pneumonia; and valvular heart disease. Sessions had the following format: (1) each learner answered five self-assessment questions using an immediate feedback technique; (2) learners were divided into groups of two or three to discuss their answers; (3) the teaching doctor led a discussion to clarify and summarise, and also distributed a handout delineating key learning points. Control sessions consisted of the usual teaching rounds. Learners were e-mailed a daily online survey asking them to rate the rounds and handouts on a Likert scale. Medical trainees often do not receive structured teaching during in-patient rounds All of the learners rated the collaborative team learning intervention as either 'excellent' or 'very good'. Learners also indicated that they found the take-away handout valuable, and positive responses were also noted in the survey comments. A novel collaborative team learning technique resulted in high ratings of teaching rounds by medical residents and medical students. Learners found the sessions engaging, high yield, and educationally valuable. This interactive discussion-based teaching method could be used to enhance the learning experience during teaching rounds on medical, surgical and subspecialty services. © 2015 John Wiley & Sons Ltd.

  1. MaROS: Information Management Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Gladden, Roy E.; Wright, Jesse J.; Hy, Franklin H.; Rabideau, Gregg R.; Wallick, Michael N.

    2011-01-01

    This software is provided by the Mars Relay Operations Service (MaROS) task to a variety of Mars projects for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The Information Management Service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such, greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These relay sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This software component is an application process running as a Java virtual machine. The component provides all service interfaces via a Representational State Transfer (REST) protocol over https to external clients. There are two general interaction modes with the service: upload and download of data. For data upload, the service must execute logic specific to the upload data type and trigger any applicable calculations including pass delivery latencies and overflight conflicts. For data download, the software must retrieve and correlate requested information and deliver to the requesting client. The provision of this service enables several key advancements over legacy processes and systems. For one, this service represents the first time that end-to-end relay information is correlated into a single shared repository. The software also provides the first multimission latency calculator; previous latency calculations had been performed on a mission-by-mission basis.

  2. Therapist Use of Socratic Questioning Predicts Session-to-Session Symptom Change in Cognitive Therapy for Depression

    PubMed Central

    Braun, Justin D.; Strunk, Daniel R.; Sasso, Katherine E.; Cooper, Andrew A.

    2015-01-01

    Socratic questioning is a key therapeutic strategy in cognitive therapy (CT) for depression. However, little is known regarding its relation to outcome. In this study, we examine therapist use of Socratic questioning as a predictor of session-to-session symptom change. Participants were 55 depressed adults who participated in a 16-week course of CT (see Adler, Strunk, & Fazio, 2015). Socratic questioning was assessed through observer ratings of the first three sessions. Socratic ratings were disaggregated into scores reflecting within-patient and between-patient variability to facilitate an examination of the relation of within-patient Socratic questioning and session-to-session symptom change. Because we examined within-patient variability in Socratic questioning, the identification of such a relation cannot be attributed to any stable patient characteristics that might otherwise introduce a spurious relation. Within-patient Socratic questioning significantly predicted session-to-session symptom change across the early sessions, with a one standard deviation increase in Socratic-Within predicting a 1.51-point decrease in BDI-II scores in the following session. Within-patient Socratic questioning continued to predict symptom change after controlling for within-patient ratings of the therapeutic alliance (i.e., Relationship and Agreement), suggesting that the relation of Socratic questioning and symptom change was not only independent of stable characteristics, but also within-patient variation in the alliance. Our results provide the first empirical support for a relation of therapist use of Socratic questioning and symptom change in CT for depression. PMID:25965026

  3. Distributed collaborative team effectiveness: measurement and process improvement

    NASA Technical Reports Server (NTRS)

    Wheeler, R.; Hihn, J.; Wilkinson, B.

    2002-01-01

    This paper describes a measurement methodology developed for assessing the readiness, and identifying opportunities for improving the effectiveness, of distributed collaborative design teams preparing to conduct a coccurent design session.

  4. 'Singing with your baby': an evaluation of group singing sessions for women admitted to a specialist mother-baby unit.

    PubMed

    Reilly, Nicole; Turner, Gemma; Taouk, Jamilie; Austin, Marie-Paule

    2018-06-01

    This paper reports on the acceptability, experience of participation and the immediate impact on maternal mood state of group singing sessions, introduced as a routine component of a mother-baby unit (MBU) treatment programme. Data was collected from 27 women who participated in the pilot programme. Results showed that implementation of a singing intervention in this setting is positively appraised by women and is associated with positive changes in self-reported mood state from pre- to post-session. Key facilitators and barriers to the success of the programme and directions for future research are discussed.

  5. Acute Physiological Responses to Strongman Training Compared to Traditional Strength Training.

    PubMed

    Harris, Nigel K; Woulfe, Colm J; Wood, Matthew R; Dulson, Deborah K; Gluchowski, Ashley K; Keogh, Justin B

    2016-05-01

    Strongman training (ST) has become an increasingly popular modality, but data on physiological responses are limited. This study sought to determine physiological responses to an ST session compared to a traditional strength exercise training (RST) session. Ten healthy men (23.6 ± 27.5 years, 85.8 ± 10.3 kg) volunteered in a crossover design, where all participants performed an ST session, an RST session, and a resting session within 7 days apart. The ST consisted of sled drag, farmer's walk, 1 arm dumbbell clean and press, and tire flip at loads eliciting approximately 30 seconds of near maximal effort per set. The RST consisted of squat, deadlift, bench press, and power clean, progressing to 75% of 1 repetition maximum. Sessions were equated for approximate total set duration. Blood lactate and salivary testosterone were recorded immediately before and after training sessions. Heart rate, caloric expenditure, and substrate utilization were measured throughout the resting session, both training protocols and for 80 minutes after training sessions. Analyses were conducted to determine differences in physiological responses within and between protocols. No significant changes in testosterone occurred at any time point for either session. Lactate increased significantly immediately after both sessions. Heart rate, caloric expenditure, and substrate utilization were all elevated significantly during ST and RST. Heart rate and fat expenditure were significantly elevated compared to resting in both sessions' recovery periods; calorie and carbohydrate expenditures were not. Compared to RST, ST represents an equivalent physiological stimulus on key parameters indicative of potential training-induced adaptive responses. Such adaptations could conceivably include cardiovascular conditioning.

  6. Young Men’s Preferences for Design and Delivery of Physical Activity and Nutrition Interventions: A Mixed-Methods Study

    PubMed Central

    Ashton, Lee M.; Morgan, Philip J.; Hutchesson, Melinda J.; Rollo, Megan E.; Collins, Clare E.

    2017-01-01

    Young adult men are under-represented in health research, and little is known about how to reach and engage them in lifestyle interventions. This mixed-methods study aimed to explore young males’ preferences for recruitment strategies, content, format (delivery mode and program duration and frequency), and facilitator characteristics for future physical activity and nutrition interventions. Ten focus groups involving 61 men (aged 18–25 years) in the Hunter region, New South Wales, Australia and an online survey distributed within Australia were completed by 282 males (aged 18–25 years). Key focus group themes included a preference for recruitment via multiple sources, ensuring images and recruiters were relatable; intervention facilitators to be engaging and refrain from discussing negative consequences of being unhealthy. Key program content preferences included skill development and individualized goals and feedback. Focus groups and the survey confirmed a preference for multiple delivery modes, including; face-to-face (group and individual), with support using eHealth technologies. Survey results confirmed the most favored program content as: “healthy eating on a budget,” “quick and easy meals,” and “resistance training.” Focus group responses suggested a program duration of ≥6 months, with 2–3 combined face-to-face and supportive eHealth sessions per week. Survey intervention duration preference was 3 months with 4 face-to-face sessions per month. Findings can guide the design, conduct, and evaluation of relevant contemporary physical activity and or nutrition interventions for young men. There is a need to identify the most effective ways to address young men’s individual preferences in intervention research. PMID:28675118

  7. Pre-deployment Heat Acclimatization Guidelines for Disaster Responders.

    PubMed

    Brearley, Matt B

    2016-02-01

    Minimal preparation time is a feature of responding to sudden onset disasters. While equipment and supplies are prepared for deployment at short notice, less is known of the physical preparation of medical responders. With many disaster-prone areas classified as tropical regions, there is potential for responders to endure a combination of high ambient temperatures and relative humidity during deployment. Heat acclimatization, defined as the physiological and perceptual adaptations to frequent elevations of core body temperature (Tc), is a key strategy to improve tolerance of hot conditions by medical responders. Pre-deployment heat acclimatization guidelines were developed based upon the duration of physical training and the subjective rate of perceived exertion (session RPE). An objective of individual training sessions was the perception of body temperature as warm to hot. The guidelines were implemented for Team Bravo (2nd rotation) of the Australian Medical Assistance Team (AusMAT) deployed to Tacloban, Philippines following Typhoon Haiyan in November 2013. The guidelines were distributed electronically five to seven days prior to deployment and were followed by a consultation. A group training session in hot conditions was undertaken prior to departure. The AusMAT responders to utilize the guidelines were based in cool or temperate climates that required extra layers of clothing, training during warmer parts of the days, or warm indoor conditions to achieve session objectives. Responders reported the guidelines were simple to use, applicable to their varied training regimens, and had improved their confidence to work in the heat despite not completing the entire 14 day period. The pre-deployment heat acclimatization guidelines provided AusMAT responders the ability to quantify their physical training and promoted physiological adaptations to maximize health, safety, and performance during deployment. While maintaining year-round heat acclimatization is considered essential for medical responders, these guidelines may facilitate beneficial adaptations once notified of deployment.

  8. In Vitro Exposure Systems and Dosimetry Assessment Tools ...

    EPA Pesticide Factsheets

    In 2009, the passing of The Family Smoking Prevention and Tobacco Control Act facilitated the establishment of the FDA Center for Tobacco Products (CTP) and gave it regulatory authority over the marketing, manufacture and distribution of tobacco products, including those termed “modified risk”. On 4-6 April 2016, the Institute for In Vitro Sciences, Inc. (IIVS) convened a workshop conference titled “In Vitro Exposure Systems and Dosimetry Assessment Tools for Inhaled Tobacco Products” to bring together stakeholders representing regulatory agencies, academia, and industry to address the research priorities articulated by the FDA CTP. Specific topics were covered to assess the status of current in vitro smoke and aerosol/vapor exposure systems, as well as the various approaches and challenges to quantifying the complex exposures, in in vitro pulmonary models developed for evaluating adverse pulmonary events resulting from tobacco product exposures. The four core topics covered were, 1) Tobacco Smoke And E-Cigarette Aerosols, 2) Air-Liquid Interface-In Vitro Exposure Systems, 3) Dosimetry Approaches For Particles And Vapors; In Vitro Dosimetry Determinations and 4) Exposure Microenvironment/Physiology Of Cells. The two and a half day workshop included presentations from 20 expert speakers, poster sessions, networking discussions, and breakout sessions which identified key findings and provided recommendations to advance these technologies. Here, we will re

  9. Proceedings of the Seventh International Conference on Mars

    NASA Technical Reports Server (NTRS)

    2007-01-01

    The oral and poster sessions of the SEVENTH INTERNATIONAL CONFERENCE ON MARS included; The Distribution and Context of Water-related Minerals on Mars; Poster Session: Mars Geology; Geology of the Martian Surface: Lithologic Variation, Composition, and Structure; Water Through Mars' Geologic History; Poster Session: Mars Water and the Martian Interior; Volatiles and Interior Evolution; The Martian Climate and Atmosphere: Variations in Time and Space; Poster Session: The Martian Climate and Current Processes; Modern Mars: Weather, Atmospheric Chemistry, Geologic Processes, and Water Cycle; Public Lecture: Mars Reconnaissance Orbiter's New View of the Red Planet; The North and South Polar Layered Deposits, Circumpolar Regions, and Changes with Time; Poster Session: Mars Polar Science, Astrobiology, Future Missions/Instruments, and Other Mars Science; Mars Astrobiology and Upcoming Missions; and Martian Stratigraphy and Sedimentology: Reading the Sedimentary Record.

  10. Using just-in-time teaching and peer instruction in a residency program's core curriculum: enhancing satisfaction, engagement, and retention.

    PubMed

    Schuller, Mary C; DaRosa, Debra A; Crandall, Marie L

    2015-03-01

    To assess use of the combined just-in-time teaching (JiTT) and peer instruction (PI) instructional strategy in a residency program's core curriculum. In 2010-2011, JiTT/PI was piloted in 31 core curriculum sessions taught by 22 faculty in the Northwestern University Feinberg School of Medicine's general surgery residency program. JiTT/PI required preliminary and categorical residents (n=31) to complete Web-based study questions before weekly specialty topic sessions. Responses were examined by faculty members "just in time" to tailor session content to residents' learning needs. In the sessions, residents answered multiple-choice questions (MCQs) using clickers and engaged in PI. Participants completed surveys assessing their perceptions of JiTT/PI. Videos were coded to assess resident engagement time in JiTT/PI sessions versus prior lecture-based sessions. Responses to topic session MCQs repeated in review sessions were evaluated to study retention. More than 70% of resident survey respondents indicated that JiTT/PI aided in the learning of key points. At least 90% of faculty survey respondents reported positive perceptions of aspects of the JiTT/PI strategy. Resident engagement time for JiTT/PI sessions was significantly greater than for prior lecture-based sessions (z=-2.4, P=.016). Significantly more review session MCQ responses were correct for residents who had attended corresponding JiTT/PI sessions than for residents who had not (chi-square=13.7; df=1; P<.001). JiTT/PI increased learner participation, learner retention, and the amount of learner-centered time. JiTT/PI represents an effective approach for meaningful and active learning in core curriculum sessions.

  11. Acquisition of delayed matching in the pigeon.

    PubMed

    Berryman, R; Cumming, W W; Nevin, J A

    1963-01-01

    Pigeons were exposed to three successive matching-to-sample procedures. On a given trial, the sample (red, green or blue light) appeared on a center key; observing responses to this key produced the comparison stimuli on two side keys. Seven different experimental conditions could govern the temporal relations between the sample and comparison stimuli. In the "simultaneous" condition, the center key response was followed immediately by illumination of the side key comparison stimuli, with the center key remaining on. In "zero delay" the center key response simultaneously turned the side keys on and the center key off, while in the "variable delay" conditions, intervals of 1, 2, 4, 10, and 24 sec were interposed between the offset of the sample and the appearance of the comparison stimuli on the side keys. In all conditions, a response to the side key of matching hue produced reinforcement, while a response to the non-matching side key was followed by a blackout. In procedure I all seven experimental conditions were presented in randomly permutated order. After nine sessions of exposure (at 191 trials per session, for a total of 1719 trials) the birds gave no evidence of acquisition in any of the conditions. They were therefore transferred to Procedure II, which required them to match only in the "simultaneous" condition, with both the sample and comparison stimuli present at the same time. With the exception of one bird, all subjects acquired this performance to near 100% levels. Next, in Procedure III, they were once more exposed to presentation of all seven experimental conditions in random order. In contrast to Procedure I, they now acquired the delay performance, and were able to match effectively at delays of about 4 sec.

  12. Therapist use of Socratic questioning predicts session-to-session symptom change in cognitive therapy for depression.

    PubMed

    Braun, Justin D; Strunk, Daniel R; Sasso, Katherine E; Cooper, Andrew A

    2015-07-01

    Socratic questioning is a key therapeutic strategy in cognitive therapy (CT) for depression. However, little is known regarding its relation to outcome. In this study, we examine therapist use of Socratic questioning as a predictor of session-to-session symptom change. Participants were 55 depressed adults who participated in a 16-week course of CT (see Adler, Strunk, & Fazio, 2015). Socratic questioning was assessed through observer ratings of the first three sessions. Socratic ratings were disaggregated into scores reflecting within-patient and between-patient variability to facilitate an examination of the relation of within-patient Socratic questioning and session-to-session symptom change. Because we examined within-patient variability in Socratic questioning, the identification of such a relation cannot be attributed to any stable patient characteristics that might otherwise introduce a spurious relation. Within-patient Socratic questioning significantly predicted session-to-session symptom change across the early sessions, with a one standard deviation increase in Socratic-Within predicting a 1.51-point decrease in BDI-II scores in the following session. Within-patient Socratic questioning continued to predict symptom change after controlling for within-patient ratings of the therapeutic alliance (i.e., Relationship and Agreement), suggesting that the relation of Socratic questioning and symptom change was not only independent of stable characteristics, but also within-patient variation in the alliance. Our results provide the first empirical support for a relation of therapist use of Socratic questioning and symptom change in CT for depression. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Security analysis and enhanced user authentication in proxy mobile IPv6 networks

    PubMed Central

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621

  14. From the Lab to the Dorm Room: Metacognitive Awareness and Use of Spaced Study

    ERIC Educational Resources Information Center

    Susser, Jonathan A.; McCabe, Jennifer

    2013-01-01

    Laboratory studies have demonstrated the long-term memory benefits of studying material in multiple distributed sessions as opposed to one massed session, given an identical amount of overall study time (i.e., the "spacing effect"). The current study goes beyond the laboratory to investigate whether undergraduates know about the advantage of…

  15. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... Maritime Intelligence Center and in open session at the American Bureau of Shipping, 1400 Key Blvd., Suite... Guard to continue deliberations and make forward progress regarding multiple maritime security...

  16. An Open Trial of a Smartphone-Assisted, Adjunctive Intervention to Improve Treatment Adherence in Bipolar Disorder

    PubMed Central

    Wenze, Susan J.; Armey, Michael F.; Weinstock, Lauren M.; Gaudiano, Brandon A.; Miller, Ivan W.

    2016-01-01

    We evaluated the feasibility and acceptability of a novel, 12 week, adjunctive, smartphone-assisted intervention to improve treatment adherence in bipolar disorder (BD). Eight participants completed 4 in-person individual therapy sessions over the course of a month, followed by 60 days of twice-daily ecological momentary intervention (EMI) sessions, with a fifth in-person session after 30 days and a sixth in-person session after 60 days. Perceived credibility of the intervention and expectancy for change were adequate at baseline, and satisfaction on completion of the intervention was very high. Participants demonstrated good adherence to the intervention overall, including excellent adherence to the in-person component and fair adherence to the smartphone-facilitated component. Qualitative feedback revealed very high satisfaction with the in-person sessions and suggested a broad range of ways in which the EMI sessions were helpful. Participants also provided suggestions for improving the intervention, which primarily related to the structure and administration of the EMI (smartphone-administered) sessions. Although this study was not designed to evaluate treatment efficacy, most key outcome variables changed in the expected directions from pre- to post-treatment, and several variables changed significantly over the course of the in-person sessions or during the EMI phase. These findings add to the small but growing body of literature suggesting that EMIs are feasible and acceptable for use in populations with BD. PMID:27824786

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Gary E.; Sutherland, G. Bruce

    The 2008 Columbia River Estuary Conference was held at the Liberty Theater in Astoria, Oregon, on April 19-20. The conference theme was ecosystem restoration. The purpose of the conference was to exchange data and information among researchers, policy-makers, and the public, i.e., interrelate science with management. Conference organizers invited presentations synthesizing material on Restoration Planning and Implementation (Session 1), Research to Reduce Restoration Uncertainties (Session 2), Wetlands and Flood Management (Session 3), Action Effectiveness Monitoring (Session 4), and Management Perspectives (Session 5). A series of three plenary talks opened the conference. Facilitated speaker and audience discussion periods were held atmore » the end of each session. Contributed posters conveyed additional data and information. These proceedings include abstracts and notes documenting questions from the audience and clarifying answers from the presenter for each talk. The proceedings also document key points from the discussion periods at the end of each session. The conference program is outlined in the agenda section. Speaker biographies are presented in Appendix A. Poster titles and authors are listed in Appendix B. A list of conference attendees is contained in Appendix C. A compact disk, attached to the back cover, contains material in hypertext-markup-language from the conference website (http://cerc.labworks.org/) and the individual presentations.« less

  18. Focus is key: Panic-focused interpretations are associated with symptomatic improvement in panic-focused psychodynamic psychotherapy.

    PubMed

    Keefe, John R; Solomonov, Nili; Derubeis, Robert J; Phillips, Alexander C; Busch, Fredric N; Barber, Jacques P; Chambless, Dianne L; Milrod, Barbara L

    2018-04-18

    This study examines whether, in panic-focused psychodynamic psychotherapy (PFPP), interpretations of conflicts that underlie anxiety (panic-focused or PF-interpretations) are specifically associated with subsequent panic disorder (PD) symptom improvement, over and above the provision of non-symptom-focused interpretations. Technique use in Sessions 2 and 10 of a 24-session PFPP protocol was assessed for the 65 patients with complete outcome data randomized to PFPP in a two-site trial of psychotherapies for PD. Sessions were rated in 15-min segments for therapists' use of PF-interpretations, non-PF-interpretations, and PF-clarifications. Robust regressions were conducted to examine the relationship between these interventions and symptom change subsequent to the sampled session. Interpersonal problems were examined as a moderator of the relationship of PF-interpretations to symptom change. At Session 10, but not at Session 2, patients who received a higher degree of PF-interpretations experienced greater subsequent improvement in panic symptoms. Non-PF-interpretations were not predictive. Patients with more interpersonal distress benefitted particularly from the use of PF-interpretations at Session 10. By the middle phase of PFPP, panic-focused interpretations may drive subsequent improvements in panic symptoms, especially among patients with higher interpersonal distress. Interpretations of conflict absent a panic focus may not be especially helpful.

  19. On the invariance of EEG-based signatures of individuality with application in biometric identification.

    PubMed

    Yunqi Wang; Najafizadeh, Laleh

    2016-08-01

    One of the main challenges in EEG-based biometric systems is to extract reliable signatures of individuality from recorded EEG data that are also invariant against time. In this paper, we investigate the invariability of features that are extracted based on the spatial distribution of the spectral power of EEG data corresponding to 2-second eyes-closed resting-state (ECRS) recording, in different scenarios. Eyes-closed resting-state EEG signals in 4 healthy adults are recorded in two different sessions with an interval of at least one week between sessions. The performance in terms of correct recognition rate (CRR) is examined when the training and testing datasets are chosen from the same recording session, and when the training and testing datasets are chosen from different sessions. It is shown that an CRR of 92% can be achieved based on the proposed features when the training and testing datasets are taken from different sessions. To reduce the number of recording channels, principal component analysis (PCA) is also employed to identify channels that carry the most discriminatory information across individuals. High CRR is obtained based on the data from channels mostly covering the occipital region. The results suggest that features based on the spatial distribution of the spectral power of the short-time (e.g. 2 seconds) ECRS recordings can have great potentials in EEG-based biometric identification systems.

  20. Multimedia consultation session recording and playback using Java-based browser in global PACS

    NASA Astrophysics Data System (ADS)

    Martinez, Ralph; Shah, Pinkesh J.; Yu, Yuan-Pin

    1998-07-01

    The current version of the Global PACS software system uses a Java-based implementation of the Remote Consultation and Diagnosis (RCD) system. The Java RCD includes a multimedia consultation session between physicians that includes text, static image, image annotation, and audio data. The JAVA RCD allows 2-4 physicians to collaborate on a patient case. It allows physicians to join the session via WWW Java-enabled browsers or stand alone RCD application. The RCD system includes a distributed database archive system for archiving and retrieving patient and session data. The RCD system can be used for store and forward scenarios, case reviews, and interactive RCD multimedia sessions. The RCD system operates over the Internet, telephone lines, or in a private Intranet. A multimedia consultation session can be recorded, and then played back at a later time for review, comments, and education. A session can be played back using Java-enabled WWW browsers on any operating system platform. The JAVA RCD system shows that a case diagnosis can be captured digitally and played back with the original real-time temporal relationships between data streams. In this paper, we describe design and implementation of the RCD session playback.

  1. Schedule for CT image guidance in treating prostate cancer with helical tomotherapy

    PubMed Central

    Beldjoudi, G; Yartsev, S; Bauman, G; Battista, J; Van Dyk, J

    2010-01-01

    The aim of this study was to determine the effect of reducing the number of image guidance sessions and patient-specific target margins on the dose distribution in the treatment of prostate cancer with helical tomotherapy. 20 patients with prostate cancer who were treated with helical tomotherapy using daily megavoltage CT (MVCT) imaging before treatment served as the study population. The average geometric shifts applied for set-up corrections, as a result of co-registration of MVCT and planning kilovoltage CT studies over an increasing number of image guidance sessions, were determined. Simulation of the consequences of various imaging scenarios on the dose distribution was performed for two patients with different patterns of interfraction changes in anatomy. Our analysis of the daily set-up correction shifts for 20 prostate cancer patients suggests that the use of four fractions would result in a population average shift that was within 1 mm of the average obtained from the data accumulated over all daily MVCT sessions. Simulation of a scenario in which imaging sessions are performed at a reduced frequency and the planning target volume margin is adapted provided significantly better sparing of organs at risk, with acceptable reproducibility of dose delivery to the clinical target volume. Our results indicate that four MVCT sessions on helical tomotherapy are sufficient to provide information for the creation of personalised target margins and the establishment of the new reference position that accounts for the systematic error. This simplified approach reduces overall treatment session time and decreases the imaging dose to the patient. PMID:19505966

  2. Evaluating the Effects of Massed and Distributed Practice on Acquisition and Maintenance of Tacts and Textual Behavior with Typically Developing Children

    ERIC Educational Resources Information Center

    Haq, Shaji S.; Kodak, Tiffany

    2015-01-01

    This study evaluated the effects of massed and distributed practice on the acquisition of tacts and textual behavior in typically developing children. We compared the effects of massed practice (i.e., consolidating all practice opportunities during the week into a single session) and distributed practice (i.e., distributing all practice…

  3. Listeners are maximally flexible in updating phonetic beliefs over time.

    PubMed

    Saltzman, David; Myers, Emily

    2018-04-01

    Perceptual learning serves as a mechanism for listenexrs to adapt to novel phonetic information. Distributional tracking theories posit that this adaptation occurs as a result of listeners accumulating talker-specific distributional information about the phonetic category in question (Kleinschmidt & Jaeger, 2015, Psychological Review, 122). What is not known is how listeners build these talker-specific distributions; that is, if they aggregate all information received over a certain time period, or if they rely more heavily upon the most recent information received and down-weight older, consolidated information. In the present experiment, listeners were exposed to four interleaved blocks of a lexical decision task and a phonetic categorization task in which the lexical decision blocks were designed to bias perception in opposite directions along a "s"-"sh" continuum. Listeners returned several days later and completed the identical task again. Evidence was consistent with listeners using a relatively short temporal window of integration at the individual session level. Namely, in each individual session, listeners' perception of a "s"-"sh" contrast was biased by the information in the immediately preceding lexical decision block, and there was no evidence that listeners summed their experience with the talker over the entire session. Similarly, the magnitude of the bias effect did not change between sessions, consistent with the idea that talker-specific information remains flexible, even after consolidation. In general, results suggest that listeners are maximally flexible when considering how to categorize speech from a novel talker.

  4. Macromechanics of hearing: The unknown known

    NASA Astrophysics Data System (ADS)

    Shera, Christopher A.

    2015-12-01

    The following summarizes the key points addressed during a tutorial session on the Macromechanics of Hearing that took place at the 12th International Workshop on the Mechanics of Hearing held at Cape Sounio, Greece, in June 2014. The tutorial was intended to present an overview of basic ideas and to address topics of current interest relevant to the Workshop. The session was recorded, and the audio file and accompanying visual content of the presentation can be found in the Mechanics of Hearing Digital Library (www.mechanicsofhearing.org).

  5. Micromechanics of hearing

    NASA Astrophysics Data System (ADS)

    Hudspeth, A. J.

    2015-12-01

    The following summarizes the key points addressed during a tutorial session on the Micromechanics of Hearing that took place at the 12th International Workshop on the Mechanics of Hearing held at Cape Sounio, Greece, in June 2014. The tutorial was intended to present an overview of basic ideas and to address topics of current interest relevant to the Workshop. The session was recorded, and the audio file and accompanying visual content of the presentation can be found in the Mechanics of Hearing Digital Library (www.mechanicsofhearing.org).

  6. Design of Linear Quadratic Regulators and Kalman Filters

    NASA Technical Reports Server (NTRS)

    Lehtinen, B.; Geyser, L.

    1986-01-01

    AESOP solves problems associated with design of controls and state estimators for linear time-invariant systems. Systems considered are modeled in state-variable form by set of linear differential and algebraic equations with constant coefficients. Two key problems solved by AESOP are linear quadratic regulator (LQR) design problem and steady-state Kalman filter design problem. AESOP is interactive. User solves design problems and analyzes solutions in single interactive session. Both numerical and graphical information available to user during the session.

  7. An Experimental Study of Scheduling and Duration of "Tier 2" First-Grade Reading Intervention

    ERIC Educational Resources Information Center

    Denton, Carolyn A.; Cirino, Paul T.; Barth, Amy E.; Romain, Melissa; Vaughn, Sharon; Wexler, Jade; Francis, David J.; Fletcher, Jack M.

    2011-01-01

    This study compared the effects on reading outcomes of delivering supplemental, small-group intervention to first-grade students at risk for reading difficulties randomly assigned to one of three different treatment schedules: extended (4 sessions per week, 16 weeks; n = 66), concentrated (4 sessions per week, 8 weeks; n = 64), or distributed (2…

  8. Effects of strategic versus tactical instructions on adaptation to changing contingencies in children with adhd.

    PubMed

    Bicard, David E; Neef, Nancy A

    2002-01-01

    This study examined the effects of two types of instructions on the academic responding of 4 children with attention deficit hyperactivity disorder. Tactical instructions specified how to distribute responding between two concurrently available sets of math problems associated with different variable-interval schedules of reinforcement. Strategic instructions provided a strategy to determine the best way to distribute responding. Instruction conditions were counterbalanced in an ABAB/BABA reversal design nested within a multiple baseline across participants design. Experimental sessions consisted of a learning session in which participants were provided with one type of instruction, followed by a test session in which no instruction was provided. The schedules of reinforcement were subsequently reversed during test sessions. When learning and test schedules were identical, the responding of all 4 participants closely matched the reinforcement schedules. When tactical instructions were provided and schedules were subsequently changed, responding often remained under the control of the instructions. When strategic instructions were provided, responding more quickly adapted to the changed contingencies. Analysis of postsession verbal reports indicated correspondence between the participants' verbal descriptions (whether accurate or inaccurate) and their nonverbal patterns of responding.

  9. Facial Expression Training Optimises Viewing Strategy in Children and Adults

    PubMed Central

    Pollux, Petra M. J.; Hall, Sophie; Guo, Kun

    2014-01-01

    This study investigated whether training-related improvements in facial expression categorization are facilitated by spontaneous changes in gaze behaviour in adults and nine-year old children. Four sessions of a self-paced, free-viewing training task required participants to categorize happy, sad and fear expressions with varying intensities. No instructions about eye movements were given. Eye-movements were recorded in the first and fourth training session. New faces were introduced in session four to establish transfer-effects of learning. Adults focused most on the eyes in all sessions and increased expression categorization accuracy after training coincided with a strengthening of this eye-bias in gaze allocation. In children, training-related behavioural improvements coincided with an overall shift in gaze-focus towards the eyes (resulting in more adult-like gaze-distributions) and towards the mouth for happy faces in the second fixation. Gaze-distributions were not influenced by the expression intensity or by the introduction of new faces. It was proposed that training enhanced the use of a uniform, predominantly eyes-biased, gaze strategy in children in order to optimise extraction of relevant cues for discrimination between subtle facial expressions. PMID:25144680

  10. Accurate monitoring leads to effective control and greater learning of patient education materials.

    PubMed

    Rawson, Katherine A; O'Neil, Rochelle; Dunlosky, John

    2011-09-01

    Effective management of chronic diseases (e.g., diabetes) can depend on the extent to which patients can learn and remember disease-relevant information. In two experiments, we explored a technique motivated by theories of self-regulated learning for improving people's learning of information relevant to managing a chronic disease. Materials were passages from patient education booklets on diabetes from NIDDK. Session 1 included an initial study trial, Session 2 included self-regulated restudy, and Session 3 included a final memory test. The key manipulation concerned the kind of support provided for self-regulated learning during Session 2. In Experiment 1, participants either were prompted to self-test and then evaluate their learning before selecting passages to restudy, were shown the prompt questions but did not overtly self-test or evaluate learning prior to selecting passages, or were not shown any prompts and were simply given the menu for selecting passages to restudy. Participants who self-tested and evaluated learning during Session 2 had a small but significant advantage over the other groups on the final test. Secondary analyses provided evidence that the performance advantage may have been modest because of inaccurate monitoring. Experiment 2 included a group who also self-tested but who evaluated their learning using idea-unit judgments (i.e., by checking their responses against a list of key ideas from the correct response). Participants who self-tested and made idea-unit judgments exhibited a sizable advantage on final test performance. Secondary analyses indicated that the performance advantage was attributable in part to more accurate monitoring and more effective self-regulated learning. An important practical implication is that learning of patient education materials can be enhanced by including appropriate support for learners' self-regulatory processes. (c) 2011 APA, all rights reserved.

  11. Distributive Marketing Education: Innovative Instructional Techniques in Distributive Marketing Education.

    ERIC Educational Resources Information Center

    Office of Education (DHEW), Washington, DC.

    The conference featured more than 40 presentations representing existing and planned innovative programs in all levels of distributive marketing education in six States. In addition to the presentations (not reproduced in their entirety in the report), there were sessions and workshops for secondary, post secondary, and adult levels and for city…

  12. Distributed Retrieval Practice Promotes Superior Recall of Anatomy Information

    ERIC Educational Resources Information Center

    Dobson, John L.; Perez, Jose; Linderholm, Tracy

    2017-01-01

    Effortful retrieval produces greater long-term recall of information when compared to studying (i.e., reading), as do learning sessions that are distributed (i.e., spaced apart) when compared to those that are massed together. Although the retrieval and distributed practice effects are well-established in the cognitive science literature, no…

  13. Evaluating the effects of massed and distributed practice on acquisition and maintenance of tacts and textual behavior with typically developing children.

    PubMed

    Haq, Shaji S; Kodak, Tiffany

    2015-01-01

    This study evaluated the effects of massed and distributed practice on the acquisition of tacts and textual behavior in typically developing children. We compared the effects of massed practice (i.e., consolidating all practice opportunities during the week into a single session) and distributed practice (i.e., distributing all practice opportunities across 4 sessions during the week) on the acquisition of textual behavior in English, tacting pictures of common nouns in Spanish, and textual behavior in Spanish using an adapted alternating treatments design embedded within a multiple probe design. We also examined correct responding during probes that (a) excluded prompts and reinforcement and (b) occurred 48 hr after training each week. The results indicated that distributed practice was the more efficient training format. Maintenance data collected up to 4 weeks after training also indicated that the participants consistently displayed higher levels of correct responding to targets that had been trained in distributed format. We discuss implications for practice and potential areas for future research. © Society for the Experimental Analysis of Behavior.

  14. Physical restraint produces rapid acquisition of the pigeon's key peck

    PubMed Central

    Locurto, C. M.; Travers, Tania; Terrace, H. S.; Gibbon, John

    1980-01-01

    The acquisition and maintenance of autoshaped key pecking in pigeons was studied as a function of intertrial interval. At each of six intervals, which ranged from 12 seconds to 384 seconds, four pigeons were physically restrained during training while four other pigeons were not restrained. Restrained subjects acquired key pecking faster and with less intragroup variability at each interval. The effects of restraint were specific to acquisition and were not evident in maintained responding after five postacquisition sessions. PMID:16812175

  15. Wyoming Landscape Conservation Initiative Science Workshop Proceedings, May 15-17, 2007

    USGS Publications Warehouse

    D'Erchia, Frank

    2008-01-01

    The U.S. Geological Survey (USGS) hosted a Wyoming Landscape Conservation Initiative (WLCI) Science Workshop at the University of Wyoming on May 15, 16, and 17, 2007. The goal of the workshop was to gather information from stakeholders about research needs and existing data resources to help develop the USGS WLCI science plan. The workshop focused on six research and management needs identified by WLCI partners prior to the workshop: *evaluate the cumulative effects of development activities; *identify key drivers of change; *identify condition and distribution of key wildlife species, habitat, and species habitat requirements; *evaluate wildlife and livestock responses to development; *develop an integrated inventory and monitoring strategy; and *develop a data clearinghouse and an information-management framework. These topics correlated to six plenary panels and discussions and six breakout sessions. Several collective needs were identified: *create a long-term, accessible information database; *identify key habitats, indicator species; *collect and research missing critical baseline data; *begin on-the-ground projects as soon as possible; and *implement a monitoring program to assist with adaptive management techniques. Several concerns were expressed repeatedly: *secure adequate and long-term funding; *meeting the WLCI workload with agencies that are already understaffed; *assess cumulative effects as an analysis approach; *perform offsite mitigation in a way that is valuable and effective; *focus all research on providing practical applications; and *involve the public in WLCI proceedings.

  16. Using Authentic Science in the Classroom: NASA's Coordinated Efforts to Enhance STEM Education

    NASA Astrophysics Data System (ADS)

    Lawton, B.; Schwerin, T.; Low, R.

    2015-11-01

    A key NASA education goal is to attract and retain students in science, technology engineering, and mathematics (STEM) disciplines. When teachers engage students in the examination of authentic data derived from NASA satellite missions, they simultaneously build 21st century technology skills as well as core content knowledge about the Earth and space. In this session, we highlight coordinated efforts by NASA Science Mission Directorate (SMD) Education and Public Outreach (EPO) programs to enhance educator accessibility to data resources, distribute state-of -the-art data tools and expand pathways for educators to find and use data resources. The group discussion explores how NASA SMD EPO efforts can further improve teacher access to authentic NASA data, identifies the types of tools and lessons most requested by the community, and explores how communication and collaboration between product developers and classroom educators using data tools and products can be enhanced.

  17. GRACE Follow-On and Potential Successors: Mission Options for the Upcoming Decadaes

    NASA Astrophysics Data System (ADS)

    Watkins, M. M.

    2017-12-01

    The GRACE Follow-On mission is currently scheduled to launch in the first quarter of 2018, providing a successor to GRACE for ongoing critical measurements of Earth's time varying mass distribution for the coming decade. As noted in the literature (and in several talks in this session), there are also several possible mission proposals and technologies to either augment or succeed GRACE FO for extended and improved measurements. Various scientific, programmatic, and technical issues drive each of these potential missions and these factors will be important in determining which will ultimately be selected for flight. These issues include accuracy requirements based on science goals, technical maturity, cost, and international partnership options. In this talk, we will provide a final detailed update before launch on the GRACE Follow-On status and expectations, and we will outline several of the key options for future missions after GRACE FO.

  18. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  19. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  20. Developing a high-performance team training framework for internal medicine residents: the ABC'S of teamwork.

    PubMed

    Carbo, Alexander R; Tess, Anjala V; Roy, Christopher; Weingart, Saul N

    2011-06-01

    Effective teamwork and communication can prevent error and mitigate harm. High-performance team training was developed in the aviation industry for flight crews and is being incorporated in health care settings, such as emergency departments, operating rooms, and labor and delivery suites. We translated and adapted high-performance teamwork and communication principles from other industries and other disciplines to an inpatient internal medicine environment. We selected key principles from aviation and anesthesia crew training programs in 2004 and organized them into the ABC'S of teamwork. These included appropriate Assertiveness, effective Briefings, Callback and verification, Situational awareness, and Shared mental models. Based on this content, we developed a training session for internal medicine residents and faculty, and evaluated learners' patient safety attitudes and knowledge before and after training with a written survey. More than 50 residents participated in the module. The percentage of correct answers on a question related to key teamwork principles increased from 35% before training to 67% after training (P = 0.03). Before training, 65% of the residents reported that they "would feel comfortable telling a senior clinician his/her plan was unsafe"; this increased to 94% after training (P = 0.005). After the training session, residents were able to provide examples from their clinical practice that emphasized all of the ABC'S of teamwork. Teamwork principles can be adapted from other disciplines and applied to internal medicine. After a single session, residents displayed greater knowledge of teamwork principles and reported changed attitudes toward key teamwork behaviors.

  1. Aeropropulsion 1987. Session 6: High-Speed Propulsion Technology

    NASA Technical Reports Server (NTRS)

    1987-01-01

    NASA is conducting aeronautical research over a broad range of Mach numbers. In addition to the advanced CTOL propulsion research described in a separate session, the Lewis Research Center has intensified its efforts towards propulsion technology for selected high-speed flight applications. In a companion program, the Langley Research Center has also accomplished excellent research in Supersonic Combustion Ramjet (SCRAM) propulsion. What is presented in this session is an unclassified review of some of the propulsion research results that are applicable for supersonic to hypersonic vehicles. Not only is a review provided for several key work areas, it also presents a viewpoint on future research directions by calling attention to cycles, components, and facilities involved in this rapidly expanding field of work.

  2. Direction and Integration of Experimental Ground Test Capabilities and Computational Methods

    NASA Technical Reports Server (NTRS)

    Dunn, Steven C.

    2016-01-01

    This paper groups and summarizes the salient points and findings from two AIAA conference panels targeted at defining the direction, with associated key issues and recommendations, for the integration of experimental ground testing and computational methods. Each panel session utilized rapporteurs to capture comments from both the panel members and the audience. Additionally, a virtual panel of several experts were consulted between the two sessions and their comments were also captured. The information is organized into three time-based groupings, as well as by subject area. These panel sessions were designed to provide guidance to both researchers/developers and experimental/computational service providers in defining the future of ground testing, which will be inextricably integrated with the advancement of computational tools.

  3. Integrating Lesbian, Gay, Bisexual, and Transgender (LGBT) Content Into Undergraduate Medical School Curricula: A Qualitative Study.

    PubMed

    Sequeira, Gina M; Chakraborti, Chayan; Panunti, Brandy A

    2012-01-01

    The lesbian, gay, bisexual, and transgender (LGBT) community is a diverse, underserved, and often stigmatized group that faces many barriers to accessing quality healthcare. Not only are few practicing physicians knowledgeable about and sensitive to the needs of LGBT patients, but medical school curricula include limited LGBT-related content. Our goals were to use LGBT-related educational sessions to gauge undergraduate medical students' interest and their perceptions of relevance and to eventually incorporate this topic into the curriculum. We provided 4 educational sessions to preclinical medical students at the Tulane University School of Medicine: 3 optional, 1-hour didactic sessions and 1 standardized patient encounter. Following sessions 1-3, students completed electronic feedback forms; we then analyzed their responses thematically. THE THEMATIC ANALYSIS OF STUDENT RESPONSES IDENTIFIED KEY THEMES: a current lack of exposure to LGBT content, agreement that LGBT material is applicable to students' work as future physicians, and the relevance of including such information in the medical school curriculum. The study validated the underlying assumption that LGBT educational sessions are meaningful to and valued by medical students.

  4. Enhancing patient navigation to improve intervention session attendance and viral load suppression of persons with HIV and substance use: a secondary post hoc analysis of the Project HOPE study.

    PubMed

    Stitzer, Maxine; Matheson, Tim; Cunningham, Colin; Sorensen, James L; Feaster, Daniel J; Gooden, Lauren; Hammond, Alexis S; Fitzsimons, Heather; Metsch, Lisa R

    2017-06-27

    Interventions are needed to improve viral suppression rates among persons with HIV and substance use. A 3-arm randomized multi-site study (Metsch et al. in JAMA 316:156-70, 2016) was conducted to evaluate the effect on HIV outcomes of usual care referral to HIV and substance use services (N = 253) versus patient navigation delivered alone (PN: N = 266) or together with contingency management (PN + CM; N = 271) that provided financial incentives targeting potential behavioral mediators of viral load suppression. This secondary analysis evaluates the effects of financial incentives on attendance at PN sessions and the relationship between session attendance and viral load suppression at end of the intervention. Frequency of sessions attended was analyzed over time and by distribution of individual session attendance frequency (PN vs PN + CM). Percent virally suppressed (≤200 copies/mL) at 6 months was compared for low, medium and high rate attenders. In PN + CM a total of $220 could be earned for attendance at 11 PN sessions over the 6-month intervention with payments ranging from $10 to $30 under an escalating schedule. The majority (74%) of PN-only participants attended 6 or more sessions but only 28% attended 10 or more and 16% attended all eleven sessions. In contrast, 90% of PN + CM attended 6 or more visits, 69% attended 10 or more and 57% attended all eleven sessions (attendance distribution χ 2 [11] = 105.81; p < .0001). Overall (PN and PN + CM participants combined) percent with viral load suppression at 6-months was 15, 38 and 54% among those who attended 0-5, 6-9 and 10-11 visits, respectively (χ 2 (2) = 39.07, p < .001). In this secondary post hoc analysis, contact with patient navigators was increased by attendance incentives. Higher rates of attendance at patient navigation sessions was associated with viral suppression at the 6-month follow-up assessment. Study results support use of attendance incentives to improve rates of contact between service providers and patients, particularly patients who are difficult to engage in care. Trial Registration clinicaltrials.govIdentifier: NCT01612169.

  5. Design and implementation of a distributed large-scale spatial database system based on J2EE

    NASA Astrophysics Data System (ADS)

    Gong, Jianya; Chen, Nengcheng; Zhu, Xinyan; Zhang, Xia

    2003-03-01

    With the increasing maturity of distributed object technology, CORBA, .NET and EJB are universally used in traditional IT field. However, theories and practices of distributed spatial database need farther improvement in virtue of contradictions between large scale spatial data and limited network bandwidth or between transitory session and long transaction processing. Differences and trends among of CORBA, .NET and EJB are discussed in details, afterwards the concept, architecture and characteristic of distributed large-scale seamless spatial database system based on J2EE is provided, which contains GIS client application, web server, GIS application server and spatial data server. Moreover the design and implementation of components of GIS client application based on JavaBeans, the GIS engine based on servlet, the GIS Application server based on GIS enterprise JavaBeans(contains session bean and entity bean) are explained.Besides, the experiments of relation of spatial data and response time under different conditions are conducted, which proves that distributed spatial database system based on J2EE can be used to manage, distribute and share large scale spatial data on Internet. Lastly, a distributed large-scale seamless image database based on Internet is presented.

  6. Pharmaceutical HIV prevention technologies in the UK: six domains for social science research.

    PubMed

    Keogh, Peter; Dodds, Catherine

    2015-01-01

    The development of pharmaceutical HIV prevention technologies (PPTs) over the last five years has generated intense interest from a range of stakeholders. There are concerns that these clinical and pharmaceutical interventions are proceeding with insufficient input of the social sciences. Hence key questions around implementation and evaluation remain unexplored whilst biomedical HIV prevention remains insufficiently critiqued or theorised from sociological as well as other social science perspectives. This paper presents the results of an expert symposium held in the UK to explore and build consensus on the role of the social sciences in researching and evaluating PPTs in this context. The symposium brought together UK social scientists from a variety of backgrounds. A position paper was produced and distributed in advance of the symposium and revised in the light this consultation phase. These exchanges and the emerging structure of this paper formed the basis for symposium panel presentations and break-out sessions. Recordings of all sessions were used to further refine the document which was also redrafted in light of ongoing comments from symposium participants. Six domains of enquiry for the social sciences were identified and discussed: self, identity and personal narrative; intimacy, risk and sex; communities, resistance and activism; systems, structures and institutions; economic considerations and analyses; and evaluation and outcomes. These are discussed in depth alongside overarching consensus points for social science research in this area as it moves forward.

  7. Comparison of medical students' learning approaches between electronic and hard copy team-based learning.

    PubMed

    Sharaf, Fawzy; Alnohair, Sultan

    2017-01-01

    To compare the students' perception of team-based learning (TBL): The paper (hard copy) compared with the e-copy (electronic copy) in the family medicine course of the fifth year medical students, Qassim University College of Medicine. A cross-sectional study was conducted during the family medicine course in 2015-2016 to compare the hard copy and the e-copy TBL sessions. We used Google drive to distribute, collect and analyze the questionnaire. The results of the e-copy TBL are shown and displayed directly with each session to the students, which was not the same as practiced with hard copy. We used also SPSS (version 17 for Windows) for more statistical analysis. The total number of respondents of students in each was 96; a phase of TBL phase 1 (hard copy) and phase 2 (e-copy). Male were 64 (66.7%) and females 32 (33.3%). The first three knowledge questions showed no difference between the mean score between paper and e-copy TBL, but of the perception questions showed a significant difference between the paper and e-copy TBL. The results of the survey showed that the students prefer e-copy TBL as a course format, as it was an attraction for most of the students and making them even more successful in the key exam and e-copy TBL develop the skills needed to work productively in task-groups.

  8. EPRI steam turbine and generator NDE, life assessment, and maintenance workshop. [Electric Power Research Institute (EPRI), NonDestructive Evaluation (NDE)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nottingham, L.D.; Sabourin, P.F.

    1992-10-01

    On July 16--19, 1991, the EPRI NDE Center hosted the second EPRI Steam Turbine and Generator NDE, Life Assessment and Maintenance Workshop. This workshop was co-sponsored by the Nuclear Power and the Generation and Storage Divisions of EPRI. Attendees represented all sectors of the industry including utilities, equipment manufacturers, forging suppliers, service organizations, government organizations, insurancecarriers, and consultants from the United States and abroad. Domestic utility presence was again strong, with 105 representatives from 44 utilities in attendance. Australia, Canada, England, Finland, France, Germany, Italy, Japan, Korea, New Zealand, Spain, Sweden and Switzerland were represented in the international contingent. Amore » key and integral part of the workshop was a vendor equipment fair, in which some 23 organizations displayed and demonstrated equipment and services that they offer. Formal presentation of 53 technical papers made up the technical portion of the agenda, which also included two breakout discussion sessions on topical subjects. To provide optimum opportunity for participants to hear all presentations on closely related topics, the sessions were set such that a NDE session ran parallel to the life assessment session. The first NDE session included turbine related topics while the first life assessment session addressed generator issues. The last sessions of the workshop were just reversed with turbine topics being addressed in the life assessment session while generator issues were presented in the NDE session. Presentations on maintenance topics and on monitoring and diagnostics topics were also presented in parallel sessions. These proceedings contain the texts of the papers presented at the workshop. Individual papers in indexed separately.« less

  9. Does the Timing of Measurement Alter Session-RPE in Boxers?

    PubMed

    Uchida, Marco C; Teixeira, Luis F M; Godoi, Vladmir J; Marchetti, Paulo H; Conte, Marcelo; Coutts, Aaron J; Bacurau, Reury F P

    2014-01-01

    The purpose of this study was to compare the influence of measuring the overall session rating of perceived exertion (session-RPE) at 10 vs. 30 minutes following exercise. Eight boxers completed three different standardized training sessions of different intensities (easy, moderate and hard) in a matchedpairs, randomized research design. Exercise intensity was assessed during each bout by measuring heart rate, blood lactate concentration and session-RPE. To assess the effect of measurement timing on session-RPE, RPE data were collected either 10 or 30 minutes post-exercise. There was no significant effect of measurement time on session-RPE values following easy (10 minutes: session-RPE = 1.3 ± 1.0 Arbitrary Unit (AU), %Heart Rate Reserve (HRR) = 49.5 ± 11.1, and ∆Blood lactate = -2.3 ± 16.3%; 30 minutes: session-RPE = 1.7 ± 1.0 AU, %HRR = 51.3 ± 10.8, and ∆Blood lactate = 0.7 ± 25.2%), moderate (10 minutes: session-RPE = 2.7 ± 1.6 AU, %HRR = 67.2 ± 10.8, and ∆Blood lactate = 2.2 ± 19%; 30 minutes: session-RPE = 2.5 ± 0.9 AU, %HRR = 67.2 ± 5.9, and ∆Blood lactate = 24.5 ± 17.1%) and hard (10 minutes: session-RPE = 5.7 ± 1.0 AU, %HRR = 88.1 ± 6.3, and ∆Blood lactate = 146.3 ± 87.9%; 30 minutes: session-RPE = 5.8 ± 1.9 AU, %HRR> = 83.3 ± 8.0, and ∆Blood lactate = 91.6 ± 39%) sessions. In conclusion, our findings suggest that session-RPE can be used in boxing training routines across a range of intensities and accurate measurements can be determined as early as 10 minutes after exercise. Key PointsIt is difficult to quantify and monitoring the external training load in martial arts (e.g. Aikido, Kung Fu, Judo) and physical combat sports (e.g. Boxing, Muay Thai), session RPE method appears to be a reliable method to quantifying training load in those sports.For many athletes it is impractical to wait 30 minutes after training session to provide a session-RPE. The present findings show that collecting ses-sion-RPE measures at 10 min following exercise ses-sions of various intensities (i.e. easy, moderate, and hard) provide similar values as if taken 30 min fol-lowing the session.Our data have significant practical benefit and fur-ther support the practical usefulness of session-RPE for measuring internal training load in sport.

  10. EXPLICIT: a feasibility study of remote expert elicitation in health technology assessment.

    PubMed

    Grigore, Bogdan; Peters, Jaime; Hyde, Christopher; Stein, Ken

    2017-09-04

    Expert opinion is often sought to complement available information needed to inform model-based economic evaluations in health technology assessments. In this context, we define expert elicitation as the process of encoding expert opinion on a quantity of interest, together with associated uncertainty, as a probability distribution. When availability for face-to-face expert elicitation with a facilitator is limited, elicitation can be conducted remotely, overcoming challenges of finding an appropriate time to meet the expert and allowing access to experts situated too far away for practical face-to-face sessions. However, distance elicitation is associated with reduced response rates and limited assistance for the expert during the elicitation session. The aim of this study was to inform the development of a remote elicitation tool by exploring the influence of mode of elicitation on elicited beliefs. An Excel-based tool (EXPLICIT) was developed to assist the elicitation session, including the preparation of the expert and recording of their responses. General practitioners (GPs) were invited to provide expert opinion about population alcohol consumption behaviours. They were randomised to complete the elicitation by either a face-to-face meeting or email. EXPLICIT was used in the elicitation sessions for both arms. Fifteen GPs completed the elicitation session. Those conducted by email were longer than the face-to-face sessions (13 min 30 s vs 10 min 26 s, p = 0.1) and the email-elicited estimates contained less uncertainty. However, the resulting aggregated distributions were comparable. EXPLICIT was useful in both facilitating the elicitation task and in obtaining expert opinion from experts via email. The findings support the opinion that remote, self-administered elicitation is a viable approach within the constraints of HTA to inform policy making, although poor response rates may be observed and additional time for individual sessions may be required.

  11. Spaced sessions of avoidance extinction reduce spontaneous recovery and promote infralimbic cortex activation.

    PubMed

    Tapias-Espinosa, Carles; Kádár, Elisabet; Segura-Torres, Pilar

    2018-01-15

    Extinction-based therapies (EBT) are the psychological treatments of choice for certain anxiety disorders, such as post-traumatic stress disorder. However, some patients relapse and suffer spontaneous recovery (SR) of anxiety symptoms and persistence of avoidance behaviour, which underlines the need for improving EBT. In rats, recent evidence has highlighted the relevance of the temporal distribution of extinction sessions in reducing SR of auditory fear conditioning, although it has seldom been studied in procedures involving proactive avoidance responses, such as two-way active avoidance conditioning (TWAA). We examined whether the temporal distribution of two extinction sessions separated by 24h or 7days (contiguous versus spaced extinction paradigms, respectively), influences SR after 28days of a TWAA task. c-Fos expression, as a marker of neuronal activation, was also measured by immunohistochemistry 90min after the SR test in the amygdala and the medial prefrontal cortex. The temporal distribution of extinction sessions did not affect the degree of extinction learning. However, only the rats that underwent the 7-day spaced extinction paradigm maintained the level of extinction in the long term, showing no SR in TWAA. This behavioural finding was consistent with a greater number of c-Fos-labelled neurons in the infralimbic cortex in the 7-day group, and in the Lateral and Central nuclei of the amygdala in the 24-hour group. These findings show that a time-spaced extinction paradigm reduces the spontaneous recovery of active avoidance behaviour, and that this behavioural advantage appears to be related to the activation of the infralimbic cortex. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Laboratory E-Notebooks: A Learning Object-Based Repository

    ERIC Educational Resources Information Center

    Abari, Ilior; Pierre, Samuel; Saliah-Hassane, Hamadou

    2006-01-01

    During distributed virtual laboratory experiment sessions, a major problem is to be able to collect, store, manage and share heterogeneous data (intermediate results, analysis, annotations, etc) manipulated simultaneously by geographically distributed teammates composing a virtual team. The electronic notebook is a possible response to this…

  13. Interactive pediatric emergency checklists to the palm of your hand - How the Pedi Crisis App traveled around the world.

    PubMed

    Gálvez, Jorge A; Lockman, Justin L; Schleelein, Laura E; Simpao, Allan F; Ahumada, Luis M; Wolf, Bryan A; Shah, Maully J; Heitmiller, Eugenie; Rehman, Mohamed

    2017-08-01

    Cognitive aids help clinicians manage critical events and have been shown to improve outcomes by providing critical information at the point of care. Critical event guidelines, such as the Society of Pediatric Anesthesia's Critical Events Checklists described in this article, can be distributed globally via interactive smartphone apps. From October 1, 2013 to January 1, 2014, we performed an observational study to determine the global distribution and utilization patterns of the Pedi Crisis cognitive aid app that the Society for Pediatric Anesthesia developed. We analyzed distribution and utilization metrics of individuals using Pedi Crisis on iOS (Apple Inc., Cupertino, CA) devices worldwide. We used Google Analytics software (Google Inc., Mountain View, CA) to monitor users' app activity (eg, screen views, user sessions). The primary outcome measurement was the number of user-sessions and geographic locations of Pedi Crisis user sessions. Each user was defined by the use of a unique Apple ID on an iOS device. Google Analytics correlates session activity with geographic location based on local Internet service provider logs. Pedi Crisis had 1 252 active users (both new and returning) and 4 140 sessions across 108 countries during the 3-month study period. Returning users used the app longer and viewed significantly more screens that new users (mean screen views: new users 1.3 [standard deviation +/-1.09, 95% confidence interval 1.22-1.55]; returning users 7.6 [standard deviation +/-4.19, 95% confidence interval 6.73-8.39]P<.01) CONCLUSIONS: Pedi Crisis was used worldwide within days of its release and sustained utilization beyond initial publication. The proliferation of handheld electronic devices provides a unique opportunity for professional societies to improve the worldwide dissemination of guidelines and evidence-based cognitive aids. © 2017 John Wiley & Sons Ltd.

  14. Empirical Analysis of Optical Attenuator Performance in Quantum Key Distribution Systems Using a Particle Model

    DTIC Science & Technology

    2012-03-01

    EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution

  15. Influence of ambient music on perceived exertion during a pulmonary rehabilitation session: a randomized crossover study.

    PubMed

    Reychler, Gregory; Mottart, Florian; Boland, Maelle; Wasterlain, Emmanuelle; Pieters, Thierry; Caty, Gilles; Liistro, Giuseppe

    2015-05-01

    Pulmonary rehabilitation is a key element in the treatment of COPD. Music has been shown to have a positive effect on parameters related to a decrease in exercise tolerance. The aim of this study was to evaluate the effect of listening to ambient music on perceived exertion during a pulmonary rehabilitation session for COPD subjects. COPD subjects randomly performed a session of pulmonary rehabilitation with or without ambient music. Perceived exertion (Borg scales), anxiety (Hospital Anxiety and Depression Scale-Anxiety Subscale), dyspnea (visual analog scale), and cardiorespiratory parameters were compared at the end of both sessions. Forty-one subjects were analyzed. The characteristics of the COPD subjects were as follows: age, 70.5 ± 8.4 y; body mass index, 22.7 ± 3.9 kg/m(2); and FEV1, 38.6 ± 12.5 % predicted. Perceived exertion was not modified by ambient music, but anxiety was improved (P = .02). Dyspnea, fatigue and cardiorespiratory parameters were not influenced by music during a typical session of the pulmonary rehabilitation program. This study demonstrates that perceived exertion during one pulmonary rehabilitation session was not influenced by ambient music. However, a positive effect on anxiety was observed. (ClinicalTrials.gov registration NCT01833260.). Copyright © 2015 by Daedalus Enterprises.

  16. Caffeine: Friend or Foe?

    PubMed

    Doepker, Candace; Lieberman, Harris R; Smith, Andrew Paul; Peck, Jennifer D; El-Sohemy, Ahmed; Welsh, Brian T

    2016-01-01

    The debate on the safety of and regulatory approaches for caffeine continues among various stakeholders and regulatory authorities. This decision-making process comes with significant challenges, particularly when considering the complexities of the available scientific data, making the formulation of clear science-based regulatory guidance more difficult. To allow for discussions of a number of key issues, the North American Branch of the International Life Sciences Institute (ILSI) convened a panel of subject matter experts for a caffeine-focused session entitled "Caffeine: Friend or Foe?," which was held during the 2015 ILSI Annual Meeting. The panelists' expertise covered topics ranging from the natural occurrence of caffeine in plants and interindividual metabolism of caffeine in humans to specific behavioral, reproductive, and cardiovascular effects related to caffeine consumption. Each presentation highlighted the potential risks, benefits, and challenges that inform whether caffeine exposure warrants concern. This paper aims to summarize the key topics discussed during the session.

  17. Continuous bioprocessing: The real thing this time?

    PubMed Central

    Farid, Suzanne S; Thompson, Bill; Davidson, Andrew

    2014-01-01

    The Annual bioProcessUK Conference has acted as the key networking event for bioprocess scientists and engineers in the UK for the past 10 years. The following article is a report from the sessions that focused on continuous bioprocessing during the 10th Annual bioProcessUK Conference (London, December 2013). These sessions were organized by the ‘EPSRC Centre for Innovative Manufacturing in Emergent Macromolecular Therapies’ hosted at University College London. A plenary lecture and workshop provided a forum for participants to debate topical issues in roundtable discussions with industry and academic experts from institutions such as Genzyme, Janssen, Novo Nordisk, Pfizer, Merck, GE Healthcare and University College London. The aim of these particular sessions was to understand better the challenges and opportunities for continuous bioprocessing in the bioprocessing sector. PMID:25484060

  18. One NASA: Sharing Knowledge Through an Agency-wide Process Asset Library (PAL)

    NASA Technical Reports Server (NTRS)

    Truss, Baraka J.

    2006-01-01

    This poster session will cover the key purpose and components behind implementing the NASA PAL website. This session will present the current results, describing the process used to create the website, the current usage measure, and will demonstrate how NASA is truly becoming ONE. The target audience for the poster session includes those currently implementing the CMMI model and looking for PAL adoption techniques. To continue to be the leader in space, science and technology, NASA is using this agency-wide PAL to share knowledge, work products and lessons learned through this website. Many organizations have failed to recognize how the efforts of process improvement fit into overall organizational effort. However, NASA as an agency has adopted the benefits of process improvement by the creation of this website to foster communication between its ten centers. The poster session will cover the following, topics outlined below: 1) Website purpose; 2) Characteristics of the website; 3) User accounts status; 4) Website content size; and 5) Usage percentages.

  19. Stock optimizing: maximizing reinforcers per session on a variable-interval schedule.

    PubMed Central

    Silberberg, A; Bauman, R; Hursh, S

    1993-01-01

    In Experiment 1, 2 monkeys earned their daily food ration by pressing a key that delivered food according to a variable-interval 3-min schedule. In Phases 1 and 4, sessions ended after 3 hr. In Phases 2 and 3, sessions ended after a fixed number of responses that reduced food intake and body weights from levels during Phases 1 and 4. Monkeys responded at higher rates and emitted more responses per food delivery when the food earned in a session was reduced. In Experiment 2, monkeys earned their daily food ration by depositing tokens into the response panel. Deposits delivered food according to a variable-interval 3-min schedule. When the token supply was unlimited (Phases 1, 3, and 5), sessions ended after 3 hr. In Phases 2 and 4, sessions ended after 150 tokens were deposited, resulting in a decrease in food intake and body weight. Both monkeys responded at lower rates and emitted fewer responses per food delivery when the food earned in a session was reduced. Experiment 1's results are consistent with a strength account, according to which the phases that reduced body weights increased food's value and therefore increased subjects' response rates. The results of Experiment 2 are consistent with an optimizing strategy, because lowering response rates when food is restricted defends body weight on variable-interval schedules. These contrasting results may be attributed to the discriminability of the contingency between response number and the end of a session being greater in Experiment 2 than in Experiment 1. In consequence, subjects lowered their response rates in order to increase the number of reinforcers per session (stock optimizing). PMID:8454960

  20. Creating psychological connections between intervention recipients: development and focus group evaluation of a group singing session for people with aphasia

    PubMed Central

    Tarrant, Mark; Warmoth, Krystal; Code, Chris; Dean, Sarah; Goodwin, Victoria A; Stein, Ken; Sugavanam, Thavapriya

    2016-01-01

    Objectives The study sought to identify key design features that could be used to create a new framework for group-based health interventions. We designed and tested the first session of a group intervention for stroke survivors with aphasia which was aimed at nurturing new psychological connections between group members. Setting The intervention session, a participant focus group and interviews with intervention facilitators were held in a local community music centre in the South West of England. Participants A convenience sample of 10 community-dwelling people with poststroke aphasia participated in the session. Severity of aphasia was not considered for inclusion. Intervention Participants took part in a 90-min group singing session which involved singing songs from a specially prepared song book. Musical accompaniment was provided by the facilitators. Primary and secondary outcome measures Participants and group facilitators reported their experiences of participating in the session, with a focus on activities within the session related to the intervention aims. Researcher observations of the session were also made. Results Two themes emerged from the analysis, concerning experiences of the session (‘developing a sense of group belonging’) and perceptions of its design and delivery (‘creating the conditions for engagement’). Participants described an emerging sense of shared social identity as a member of the intervention group and identified fixed (eg, group size, session breaks) and flexible (eg, facilitator responsiveness) features of the session which contributed to this emergence. Facilitator interviews and researcher observations corroborated and expanded participant reports. Conclusions Engagement with health intervention content may be enhanced in group settings when intervention participants begin to establish positive and meaningful psychological connections with other group members. Understanding and actively nurturing these connections should be a core feature of a general framework for the design and delivery of group interventions. PMID:26908519

  1. Creating psychological connections between intervention recipients: development and focus group evaluation of a group singing session for people with aphasia.

    PubMed

    Tarrant, Mark; Warmoth, Krystal; Code, Chris; Dean, Sarah; Goodwin, Victoria A; Stein, Ken; Sugavanam, Thavapriya

    2016-02-23

    The study sought to identify key design features that could be used to create a new framework for group-based health interventions. We designed and tested the first session of a group intervention for stroke survivors with aphasia which was aimed at nurturing new psychological connections between group members. The intervention session, a participant focus group and interviews with intervention facilitators were held in a local community music centre in the South West of England. A convenience sample of 10 community-dwelling people with poststroke aphasia participated in the session. Severity of aphasia was not considered for inclusion. Participants took part in a 90-min group singing session which involved singing songs from a specially prepared song book. Musical accompaniment was provided by the facilitators. Participants and group facilitators reported their experiences of participating in the session, with a focus on activities within the session related to the intervention aims. Researcher observations of the session were also made. Two themes emerged from the analysis, concerning experiences of the session ('developing a sense of group belonging') and perceptions of its design and delivery ('creating the conditions for engagement'). Participants described an emerging sense of shared social identity as a member of the intervention group and identified fixed (eg, group size, session breaks) and flexible (eg, facilitator responsiveness) features of the session which contributed to this emergence. Facilitator interviews and researcher observations corroborated and expanded participant reports. Engagement with health intervention content may be enhanced in group settings when intervention participants begin to establish positive and meaningful psychological connections with other group members. Understanding and actively nurturing these connections should be a core feature of a general framework for the design and delivery of group interventions. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. Psychosocial needs of perinatally HIV-infected youths in Thailand: lessons learnt from instructive counseling.

    PubMed

    Manaboriboon, B; Lolekha, R; Chokephaibulkit, K; Leowsrisook, P; Naiwatanakul, T; Tarugsa, J; Durier, Y; Aunjit, N; Punpanich Vandepitte, W; Boon-Yasidhi, V

    2016-12-01

    Identifying psychosocial needs of perinatally HIV-infected (pHIV) youth is a key step in ensuring good mental health care. We report psychosocial needs of pHIV youth identified using the "Youth Counseling Needs Survey" (YCS) and during individual counseling (IC) sessions. pHIV youth receiving care at two tertiary-care hospitals in Bangkok or at an orphanage in Lopburi province were invited to participate IC sessions. The youths' psychosocial needs were assessed using instructive IC sessions in four main areas: general health, reproductive health, mood, and psychosocial concerns. Prior to the IC session youth were asked to complete the YCS in which their concerns in the four areas were investigated. Issues identified from the YCS and the IC sessions were compared. During October 2010-July 2011, 150 (68.2%) of 220 eligible youths participated in the IC sessions and completed the YCS. Median age was 14 (range 11-18) years and 92 (61.3%) were female. Mean duration of the IC sessions was 36.5 minutes. One-hundred and thirty (86.7%) youths reported having at least one psychosocial problem discovered by either the IC session or the YCS. The most common problems identified during the IC session were poor health attitude and self-care (48.0%), lack of life skills (44.0%), lack of communication skills (40.0%), poor antiretroviral (ARV) adherence (38.7%), and low self-value (34.7%). The most common problems identified by the YCS were lack of communication skills (21.3%), poor health attitude and self-care (14.0%), and poor ARV adherence (12.7%). Youth were less likely to report psychosocial problems in the YCS than in the IC session. Common psychosocial needs among HIV-infected youth were issues about life skills, communication skills, knowledge on self-care, ARV adherence, and self-value. YCS can identify pHIV youths' psychosocial needs but might underestimate issues. Regular IC sessions are useful to detect problems and provide opportunities for counseling.

  3. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  4. Reflective practice as a tool to teach digital professionalism.

    PubMed

    Kung, Justin W; Eisenberg, Ronald L; Slanetz, Priscilla J

    2012-11-01

    Digital professionalism is increasingly being integrated into postgraduate medical education. We developed a small-group, reflective practice-based session incorporating radiology-specific cases to heighten residents' awareness about digital professionalism. Case-based, radiology-specific scenarios were created for a small-group, reflective practice-based session on digital professionalism. Anonymous pre- and postsession surveys evaluating residents' use of social media and their thoughts about the session were administered to the radiology residents. Twenty-five of 38 (66%) residents responded to the presession survey with 40% (10/25) reporting daily social media use; 50% (12/24) witnessing an unprofessional posting on Facebook; and 8% (2/25) posting something unprofessional themselves. Of the 21 residents who attended the session, 13 (62%) responded to the postsession survey. Residents reported that the session added to their understanding of professionalism 3.92, 95% CI (3.57-4.27). As a result of the session, residents stated that they were more aware of protecting patient privacy and confidentiality on social media sites 3.92, 95% CI (3.47-4.37), and would take a more active role in ensuring professional use of social media as it relates to patient care 4.00, 95% CI (3.66-4.34). Residents favorably viewed the reflective case-based session on digital professionalism as a means to be more aware of ways to avoid unprofessional interactions on the internet. Our results suggest that such reflective sessions are an effective method to educate residents on key concepts regarding digital professionalism. Copyright © 2012 AUR. Published by Elsevier Inc. All rights reserved.

  5. No Additional Benefits of Block- Over Evenly-Distributed High-Intensity Interval Training within a Polarized Microcycle

    PubMed Central

    McGawley, Kerry; Juudas, Elisabeth; Kazior, Zuzanna; Ström, Kristoffer; Blomstrand, Eva; Hansson, Ola; Holmberg, Hans-Christer

    2017-01-01

    Introduction: The current study aimed to investigate the responses to block- versus evenly-distributed high-intensity interval training (HIT) within a polarized microcycle. Methods: Twenty well-trained junior cross-country skiers (10 males, age 17.6 ± 1.5 and 10 females, age 17.3 ± 1.5) completed two, 3-week periods of training (EVEN and BLOCK) in a randomized, crossover-design study. In EVEN, 3 HIT sessions (5 × 4-min of diagonal-stride roller-skiing) were completed at a maximal sustainable intensity each week while low-intensity training (LIT) was distributed evenly around the HIT. In BLOCK, the same 9 HIT sessions were completed in the second week while only LIT was completed in the first and third weeks. Heart rate (HR), session ratings of perceived exertion (sRPE), and perceived recovery (pREC) were recorded for all HIT and LIT sessions, while distance covered was recorded for each HIT interval. The recovery-stress questionnaire for athletes (RESTQ-Sport) was completed weekly. Before and after EVEN and BLOCK, resting saliva and muscle samples were collected and an incremental test and 600-m time-trial (TT) were completed. Results: Pre- to post-testing revealed no significant differences between EVEN and BLOCK for changes in resting salivary cortisol, testosterone, or IgA, or for changes in muscle capillary density, fiber area, fiber composition, enzyme activity (CS, HAD, and PFK) or the protein content of VEGF or PGC-1α. Neither were any differences observed in the changes in skiing economy, V˙O2max or 600-m time-trial performance between interventions. These findings were coupled with no significant differences between EVEN and BLOCK for distance covered during HIT, summated HR zone scores, total sRPE training load, overall pREC or overall recovery-stress state. However, 600-m TT performance improved from pre- to post-training, irrespective of intervention (P = 0.003), and a number of hormonal and muscle biopsy markers were also significantly altered post-training (P < 0.05). Discussion: The current study shows that well-trained junior cross-country skiers are able to complete 9 HIT sessions within 1 week without compromising total work done and without experiencing greater stress or reduced recovery over a 3-week polarized microcycle. However, the findings do not support block-distributed HIT as a superior method to a more even distribution of HIT in terms of enhancing physiological or performance adaptions. PMID:28659826

  6. No Additional Benefits of Block- Over Evenly-Distributed High-Intensity Interval Training within a Polarized Microcycle.

    PubMed

    McGawley, Kerry; Juudas, Elisabeth; Kazior, Zuzanna; Ström, Kristoffer; Blomstrand, Eva; Hansson, Ola; Holmberg, Hans-Christer

    2017-01-01

    Introduction: The current study aimed to investigate the responses to block- versus evenly-distributed high-intensity interval training (HIT) within a polarized microcycle. Methods: Twenty well-trained junior cross-country skiers (10 males, age 17.6 ± 1.5 and 10 females, age 17.3 ± 1.5) completed two, 3-week periods of training (EVEN and BLOCK) in a randomized, crossover-design study. In EVEN, 3 HIT sessions (5 × 4-min of diagonal-stride roller-skiing) were completed at a maximal sustainable intensity each week while low-intensity training (LIT) was distributed evenly around the HIT. In BLOCK, the same 9 HIT sessions were completed in the second week while only LIT was completed in the first and third weeks. Heart rate (HR), session ratings of perceived exertion (sRPE), and perceived recovery (pREC) were recorded for all HIT and LIT sessions, while distance covered was recorded for each HIT interval. The recovery-stress questionnaire for athletes (RESTQ-Sport) was completed weekly. Before and after EVEN and BLOCK, resting saliva and muscle samples were collected and an incremental test and 600-m time-trial (TT) were completed. Results: Pre- to post-testing revealed no significant differences between EVEN and BLOCK for changes in resting salivary cortisol, testosterone, or IgA, or for changes in muscle capillary density, fiber area, fiber composition, enzyme activity (CS, HAD, and PFK) or the protein content of VEGF or PGC-1α. Neither were any differences observed in the changes in skiing economy, [Formula: see text] or 600-m time-trial performance between interventions. These findings were coupled with no significant differences between EVEN and BLOCK for distance covered during HIT, summated HR zone scores, total sRPE training load, overall pREC or overall recovery-stress state. However, 600-m TT performance improved from pre- to post-training, irrespective of intervention ( P = 0.003), and a number of hormonal and muscle biopsy markers were also significantly altered post-training ( P < 0.05). Discussion: The current study shows that well-trained junior cross-country skiers are able to complete 9 HIT sessions within 1 week without compromising total work done and without experiencing greater stress or reduced recovery over a 3-week polarized microcycle. However, the findings do not support block-distributed HIT as a superior method to a more even distribution of HIT in terms of enhancing physiological or performance adaptions.

  7. More than 10 million steps in the right direction: results from the first American Heart Association scientific sessions walking challenge.

    PubMed

    Harrington, Robert A; Arena, Ross; Després, Jean-Pierre; Ciarochi, Amy; Croll, Elizabeth; Bloch, Kenneth D

    2015-01-01

    In 2013, the Global Congress theme at the American Heart Association (AHA) Annual Scientific Sessions was Physical Activity (PA). As a key component of the Congress, iHealth working in collaboration with AHA provided a Bluetooth-enabled wireless PA and sleep tracker to up to 2,000 Scientific Sessions attendees. Approximately 1850 Scientific Sessions attendees registered for, received a PA tracker and participated in the Walking Challenge. More than 10 million steps were walked by participants (10,703,504) during the 2.5 days of the Walking Challenge. This translates into almost 6000 miles walked (5976.3 miles) and 656,716 calories burned by participants during the Challenge. The Global Congress of PA held at Scientific Sessions 2013 not only extensively reviewed the science of PA as a powerful/independent and, most importantly, modifiable cardiovascular risk factor, but it also provided evidence from a fun and entertaining challenge that PA as a risk behavior can be assessed and targeted. We just took 10 million steps in the right direction. Join us and make your steps count! Copyright © 2014 Elsevier Inc. All rights reserved.

  8. Hearings Before the Select Committee on Nutrition and Human Needs of the United States Senate, Ninety-Second Congress, First Session on Nutrition and Human Needs. Part 8A--Food Distribution Program. Hearings Held Washington, D.C., September 15-16, 1971.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Select Committee on Nutrition and Human Needs.

    The Senate Select Committee on Nutrition and Human Needs held hearings on the "Food Distribution Program." The Program--often referred to as the "commodity distribution,""surplus distribution," or "direct distribution program"--has the dual purpose of alleviating farm surpluses and helping the poor. It presently feeds about 3.6 million Americans…

  9. Effects of Acute and Chronic Flunitrazepam on Delay Discounting in Pigeons

    PubMed Central

    Eppolito, Amy K; France, Charles P; Gerak, Lisa R

    2011-01-01

    Delay to delivery of a reinforcer can decrease responding for that reinforcer and increase responding for smaller reinforcers that are available concurrently and delivered without delay; acute administration of drugs can alter responding for large, delayed reinforcers, although the impact of chronic treatment on delay discounting is not well understood. In this experiment, the effects of repeated administration of the benzodiazepine flunitrazepam were studied in 6 pigeons responding on one key to receive food that was delivered immediately and on a second key to receive a larger amount of food that was delivered following delays which increased across a single session. Pigeons responded predominantly for the large reinforcer when there were no delays and when delays were short; however, as delays increased, responding for the large reinforcer decreased. Acutely, flunitrazepam (0.32, 1.0 and 3.2 mg/kg) dose-dependently increased responding for the large reinforcer, shifting the discounting curve rightward and upward. Repeated administration of flunitrazepam (0.32, 1.0 and 3.2 mg/kg, each for six sessions, separated by one session during which vehicle was administered) did not markedly alter its effects on responding for the large reinforcer, indicating that the development of tolerance to this effect of flunitrazepam is modest under these conditions. PMID:21541119

  10. AES based secure low energy adaptive clustering hierarchy for WSNs

    NASA Astrophysics Data System (ADS)

    Kishore, K. R.; Sarma, N. V. S. N.

    2013-01-01

    Wireless sensor networks (WSNs) provide a low cost solution in diversified application areas. The wireless sensor nodes are inexpensive tiny devices with limited storage, computational capability and power. They are being deployed in large scale in both military and civilian applications. Security of the data is one of the key concerns where large numbers of nodes are deployed. Here, an energy-efficient secure routing protocol, secure-LEACH (Low Energy Adaptive Clustering Hierarchy) for WSNs based on the Advanced Encryption Standard (AES) is being proposed. This crypto system is a session based one and a new session key is assigned for each new session. The network (WSN) is divided into number of groups or clusters and a cluster head (CH) is selected among the member nodes of each cluster. The measured data from the nodes is aggregated by the respective CH's and then each CH relays this data to another CH towards the gateway node in the WSN which in turn sends the same to the Base station (BS). In order to maintain confidentiality of data while being transmitted, it is necessary to encrypt the data before sending at every hop, from a node to the CH and from the CH to another CH or to the gateway node.

  11. Proceedings from the 9th Annual Meeting of International Society for Medical Publication Professionals Roundtable Session: key insights.

    PubMed

    Simcoe, Donna; Juneja, Renu; Scott, Gayle Nicholas; Sridharan, Kanaka; Williams-Hughes, Celeste

    2014-03-01

    During the 9th Annual Meeting of the International Society for Medical Publication Professionals (ISMPP, April 29-May 1, 2013 in Baltimore, MD), ∼650 participants attended two of 13 available roundtable sessions. Participants included medical publication professionals from industry, communication agencies, and journals. DISCUSSION TOPICS: Roundtable participants discussed how to best interpret and implement various guidances, such as Good Publication Practices 2 (GPP2), the International Committee of Medical Journal Editors (ICMJE) guidelines, and the Physician Payment Sunshine Act. The impact of and compliance with Corporate Integrity agreements (CIAs) on medical publication planning practices was debated. Roundtable participants also discussed ways of advancing both advocacy for the medical publication professional field and internal and external collaborations. The development of review manuscripts, publications from regions newly emerging in publication planning, medical devices publications, and real-world experience publications were discussed. Participants also considered the benefits and uncertainties of new technologies in medical publications such as multimedia and social media. This is the first ever article to be published following the well-attended ISMPP roundtable sessions. The objective of this manuscript is to summarize key learnings that will aid continued discussions about challenges and opportunities facing medical publication professionals.

  12. The Training Characteristics of the World's Most Successful Female Cross-Country Skier

    PubMed Central

    Solli, Guro S.; Tønnessen, Espen; Sandbakk, Øyvind

    2017-01-01

    The main aim of this study was to investigate the training characteristics of the most successful female cross-country skier ever during the best period of her career. The participant won six gold medals at the Olympic Games, 18 gold medals at the World Championship, and 110 World Cup victories. Day-to-day training diary data, interviews, and physiological tests were analyzed. Training data was systemized by training form (endurance, strength, and speed), intensity [low- (LIT), moderate- (MIT), and high-intensity training (HIT)], and mode (running, cycling, and skiing/roller skiing), followed by a division into different periodization phases. Specific sessions utilized in the various periodization periods and the day-to-day periodization of training, in connection with altitude camps and tapering toward major championships, were also analyzed. Following a 12-year nonlinear increase in training load, the annual training volume during the five consecutive successful years stabilized at 937 ± 25 h, distributed across 543 ± 9 sessions. During these 5 years, total training time was distributed as 90.6% endurance-, 8.0% strength-, and 1.4% speed-training, with endurance-training time consisting of 92.3 ± 0.3% LIT, 2.9 ± 0.5% MIT, and 4.8 ± 0.5% HIT. Total LIT-time consisted of 21% warm-up, 14% sessions <90 min, and 65% long-duration sessions >90 min. While the total number of LIT sessions remained stable across phases (32 sessions), total LIT-time was reduced from GP (76 h/month) to SP (68 h/month) and CP (55 h/month). MIT-time decreased from GP (2.8 h/month) to SP (2.2 h/month) and CP (1 h/month). HIT-time increased from GP (2.8 h/month) to SP (3.2 h/month) and CP (4.7 h/month). Altitude training accounted for 18–25% of annual training volume and performed across relatively short training camps (≤16 days) with a clear reduction of HIT training, but increased total and LIT volume compared to sea-level training. Training before international championships included a 2-week increase in LIT and strength volume followed by a gradual reduction of training volume and increased HIT during the last week. This study provides unique data on the world's most successful female cross-country skier's long-term training process, including novel information about the distribution of and interplay between sessions of different forms, intensities, and exercise modes throughout the annual season. PMID:29326603

  13. The Training Characteristics of the World's Most Successful Female Cross-Country Skier.

    PubMed

    Solli, Guro S; Tønnessen, Espen; Sandbakk, Øyvind

    2017-01-01

    The main aim of this study was to investigate the training characteristics of the most successful female cross-country skier ever during the best period of her career. The participant won six gold medals at the Olympic Games, 18 gold medals at the World Championship, and 110 World Cup victories. Day-to-day training diary data, interviews, and physiological tests were analyzed. Training data was systemized by training form (endurance, strength, and speed), intensity [low- (LIT), moderate- (MIT), and high-intensity training (HIT)], and mode (running, cycling, and skiing/roller skiing), followed by a division into different periodization phases. Specific sessions utilized in the various periodization periods and the day-to-day periodization of training, in connection with altitude camps and tapering toward major championships, were also analyzed. Following a 12-year nonlinear increase in training load, the annual training volume during the five consecutive successful years stabilized at 937 ± 25 h, distributed across 543 ± 9 sessions. During these 5 years, total training time was distributed as 90.6% endurance-, 8.0% strength-, and 1.4% speed-training, with endurance-training time consisting of 92.3 ± 0.3% LIT, 2.9 ± 0.5% MIT, and 4.8 ± 0.5% HIT. Total LIT-time consisted of 21% warm-up, 14% sessions <90 min, and 65% long-duration sessions >90 min. While the total number of LIT sessions remained stable across phases (32 sessions), total LIT-time was reduced from GP (76 h/month) to SP (68 h/month) and CP (55 h/month). MIT-time decreased from GP (2.8 h/month) to SP (2.2 h/month) and CP (1 h/month). HIT-time increased from GP (2.8 h/month) to SP (3.2 h/month) and CP (4.7 h/month). Altitude training accounted for 18-25% of annual training volume and performed across relatively short training camps (≤16 days) with a clear reduction of HIT training, but increased total and LIT volume compared to sea-level training. Training before international championships included a 2-week increase in LIT and strength volume followed by a gradual reduction of training volume and increased HIT during the last week. This study provides unique data on the world's most successful female cross-country skier's long-term training process, including novel information about the distribution of and interplay between sessions of different forms, intensities, and exercise modes throughout the annual season.

  14. Improvement of Young and Elderly Patient’s Knowledge of Heart Failure After an Educational Session

    PubMed Central

    Roncalli, Jérôme; Perez, Laurence; Pathak, Atul; Spinazze, Laure; Mazon, Sandrine; Lairez, Olivier; Curnier, Daniel; Fourcade, Joëlle; Elbaz, Meyer; Carrié, Didier; Puel, Jacques; Fauvel, Jean-Marie; Galinier, Michel

    2009-01-01

    Background: Interest in the role of patient education sessions for optimizing the management of heart failure (HF) is increasing. We determined whether improvements in young and elderly patients’ knowledge of HF and self-care behavior could be analyzed by administering a knowledge test before and after an educational session. Methods: Stable heart failure patients (n = 115) were enrolled in a prospective cohort study from our Heart Failure educational centre in a university hospital. Patient knowledge of six major HF-related topics was assessed via a questionnaire distributed once before an educational session and twice afterward. Each answer was assigned a numerical value and the final score for each topic could range from 0 to 20. Scores ≥ 15/20 were considered representative of a good level of knowledge. Results: The level of knowledge was low (9.7/20) before the educational session but was significantly higher (16.3/20) during the 1st quarter after the session, and this benefit was maintained for up to 12 months (16.6/20). Knowledge levels increased in both younger and elderly patients, and the number of patients who had a good level of knowledge also increased after the educational session. Conclusion: This study confirms that an HF knowledge test is feasible and that educational sessions improve the knowledge and self-management of both younger and elderly patients. PMID:20508766

  15. Teaching Cardiac Examination Skills

    PubMed Central

    Smith, Christopher A; Hart, Avery S; Sadowski, Laura S; Riddle, Janet; Evans, Arthur T; Clarke, Peter M; Ganschow, Pamela S; Mason, Ellen; Sequeira, Winston; Wang, Yue

    2006-01-01

    OBJECTIVE To determine if structured teaching of bedside cardiac examination skills improves medical residents' examination technique and their identification of key clinical findings. DESIGN Firm-based single-blinded controlled trial. SETTING Inpatient service at a university-affiliated public teaching hospital. PARTICIPANTS Eighty Internal Medicine residents. METHODS The study assessed 2 intervention groups that received 3-hour bedside teaching sessions during their 4-week rotation using either: (1) a traditional teaching method, “demonstration and practice” (DP) (n=26) or (2) an innovative method, “collaborative discovery” (CD) (n=24). The control group received their usual ward teaching sessions (n=25). The main outcome measures were scores on examination technique and correct identification of key clinical findings on an objective structured clinical examination (OSCE). RESULTS All 3 groups had similar scores for both their examination technique and identification of key findings in the preintervention OSCE. After teaching, both intervention groups significantly improved their technical examination skills compared with the control group. The increase was 10% (95% confidence interval [CI] 4% to 17%) for CD versus control and 12% (95% CI 6% to 19%) for DP versus control (both P<.005) equivalent to an additional 3 to 4 examination skills being correctly performed. Improvement in key findings was limited to a 5% (95% CI 2% to 9%) increase for the CD teaching method, CD versus control P=.046, equivalent to the identification of an additional 2 key clinical findings. CONCLUSIONS Both programs of bedside teaching increase the technical examination skills of residents but improvements in the identification of key clinical findings were modest and only demonstrated with a new method of teaching. PMID:16423116

  16. Choice with frequently changing food rates and food ratios.

    PubMed

    Baum, William M; Davison, Michael

    2014-03-01

    In studies of operant choice, when one schedule of a concurrent pair is varied while the other is held constant, the constancy of the constant schedule may exert discriminative control over performance. In our earlier experiments, schedules varied reciprocally across components within sessions, so that while food ratio varied food rate remained constant. In the present experiment, we held one variable-interval (VI) schedule constant while varying the concurrent VI schedule within sessions. We studied five conditions, each with a different constant left VI schedule. On the right key, seven different VI schedules were presented in seven different unsignaled components. We analyzed performances at several different time scales. At the longest time scale, across conditions, behavior ratios varied with food ratios as would be expected from the generalized matching law. At shorter time scales, effects due to holding the left VI constant became more and more apparent, the shorter the time scale. In choice relations across components, preference for the left key leveled off as the right key became leaner. Interfood choice approximated strict matching for the varied right key, whereas interfood choice hardly varied at all for the constant left key. At the shortest time scale, visit patterns differed for the left and right keys. Much evidence indicated the development of a fix-and-sample pattern. In sum, the procedural difference made a large difference to performance, except for choice at the longest time scale and the fix-and-sample pattern at the shortest time scale. © Society for the Experimental Analysis of Behavior.

  17. Key Issues in the Networking Field Today. Proceedings of the Library of Congress Network Advisory Committee Meeting (Washington, DC, May 6-8, 1985). Network Planning Paper No. 12.

    ERIC Educational Resources Information Center

    Library of Congress, Washington, DC. Network Development Office.

    The May 1985 program session of the Library of Congress Network Advisory Committee focused on the identification of key issues in the networking field. Presentations included discussions of major network developments in the last two decades, the changing network players, the impact of technology on networks, and library networks and the law. The…

  18. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  19. Space Solar Power Technical Interchange Meeting 2: SSP TIM 2

    NASA Technical Reports Server (NTRS)

    Sanders, Jim; Hawk, Clark W.

    1998-01-01

    The 2nd Space Solar Power Technical Interchange Meeting (SSP TIM 2) was conducted September 21st through 24th with the first part consisting of a Plenary session. The summary results of this Plenary session are contained in part one of this report. The attendees were then organized into Working Breakout Sessions and Integrated Product Team (IPT) Sessions for the purpose of conducting in-depth discussions in specific topic areas and developing a consensus as to appropriate study plans and actions to be taken. The Second part covers the Plenary Summary Session, which contains the summary results of the Working Breakout Sessions and IPT Sessions. The appendix contains the list of attendees. The ob'jective was to provide an update for the study teams and develop plans for subsequent study activities. This SSP TIM 2 was initiated and the results reported electronically over the Internet. The International Space Station (ISS) could provide the following opportunities for conducting research and technology (R&T) which are applicable to SSP: (1) Automation and Robotics, (2) Advanced Power Generation, (3) Advanced Power Management & Distribution (PMAD), (4) Communications Systems and Networks, (5) Energy Storage, (6) In Space Propulsion (ISP), (7) Structural Dynamics and Control, and Assembly and (8) Wireless Power Transmission.

  20. Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)

    DTIC Science & Technology

    2012-03-01

    SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY

  1. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  2. Cracking induction in health libraries: is there a right way?

    PubMed

    Forgham-Healey, Nicola

    2017-06-01

    In most instances, inductions are the first time that users will be introduced to health library services. The time available in which to deliver library orientation sessions within a broader, Trust induction programme is often limited, and this can present challenges for health librarians. Inductions are a great marketing tool, and it is important that induction sessions make the right impact. Within a brief window of opportunity, the health librarian must impart key information to the inductees whilst ensuring the session is relevant and memorable. In this article, guest writer Nicola Healey, Library Manager of North Somerset Healthcare Library, discusses the range of approaches she and her colleagues have explored in delivering library inductions, explaining what worked, what did not and what areas still remain for development. H. S. © 2017 Health Libraries Group.

  3. Continuous bioprocessing: the real thing this time? 10(th) Annual bioProcessUK Conference, December 3-4, 2013, London, UK.

    PubMed

    Farid, Suzanne S; Thompson, Bill; Davidson, Andrew

    2014-01-01

    The Annual bioProcessUK Conference has acted as the key networking event for bioprocess scientists and engineers in the UK for the past 10 years. The following article is a report from the sessions that focused on continuous bioprocessing during the 10(th) Annual bioProcessUK Conference (London, December 2013). These sessions were organized by the 'EPSRC Centre for Innovative Manufacturing in Emergent Macromolecular Therapies' hosted at University College London. A plenary lecture and workshop provided a forum for participants to debate topical issues in roundtable discussions with industry and academic experts from institutions such as Genzyme, Janssen, Novo Nordisk, Pfizer, Merck, GE Healthcare and University College London. The aim of these particular sessions was to understand better the challenges and opportunities for continuous bioprocessing in the bioprocessing sector.

  4. Adaptation of Timing Behavior to a Regular Change in Criterion

    PubMed Central

    Sanabria, Federico; Oldenburg, Liliana

    2013-01-01

    This study examined how operant behavior adapted to an abrupt but regular change in the timing of reinforcement. Pigeons were trained on a fixed interval (FI) 15-s schedule of reinforcement during half of each experimental session, and on an FI 45-s (Experiment 1), FI 60-s (Experiment 2), or extinction schedule (Experiment 3) during the other half. FI performance was well characterized by a mixture of two gamma-shaped distributions of responses. When a longer FI schedule was in effect in the first half of the session (Experiment 1), a constant interference by the shorter FI was observed. When a shorter FI schedule was in effect in the first half of the session (Experiments 1, 2, and 3), the transition between schedules involved a decline in responding and a progressive rightward shift in the mode of the response distribution initially centered around the short FI. These findings are discussed in terms of the constraints they impose to quantitative models of timing, and in relation to the implications for information-based models of associative learning. PMID:23962672

  5. Professional changes induced by a redesigned immunization supply chain in the Comé Health Zone, Benin.

    PubMed

    Guillermet, Elise; Alfa, Daleb Abdoulaye; Gbodja, Romule; Jaillard, Philippe

    2017-04-19

    At the end of 2013, the Government of Benin and Agence de Médecine Préventive (AMP) launched a demonstration project in Comé Health Zone (HZ) to optimize the vaccine supply chain. A key part of the demonstration project was the creation of an "informed push model" of vaccine distribution supported by a new logistician position at the health zone (district) level. At the conclusion of the demonstration project in 2015, the authors conducted an anthropological study consisting of semi-structured interviews with 62 participants to assess how the new model changed the professional identities, roles, responsibilities, and practices of personnel involved in vaccine management during and just after the demonstration project end in Comé HZ. The study found that health workers considered the logistician as a key player in enabling them to perform their public health mission, notably by improving knowledge and practices in vaccine management, providing supportive supervision, and improving the availability of vaccines and other supplies so that immunization sessions could occur more reliably and professionally within the communities they served. The demonstration project was widely accepted among study participants. The study was approved by the Cotonou Ethics Committee (CER-ISBA No. 56 dated 09/04/2015). Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. [Impact of a disaster preparedness training program on health staff].

    PubMed

    Parra Cotanda, Cristina; Rebordosa Martínez, Mónica; Trenchs Sainz de la Maza, Victoria; Luaces Cubells, Carles

    2016-09-01

    The aim of this study is to evaluate the effectiveness of a disaster preparedness training program in a Paediatric Emergency Department (PED). A quasi-experimental study was conducted using an anonymous questionnaire that was distributed to health care providers of a PED in a tertiary paediatric hospital. The questions concerned the disaster plan (DP), including theoretical and practical aspects. Questionnaires were distributed and completed in January 2014 (period 1) and November 2014 (period 2). The disaster training program includes theoretical and practical sessions. A total of 110 questionnaires were collected in period 1, and 80 in period 2. Almost three-quarters (71.3%) of PED staff attended the theoretical sessions, and 43.8% attended the practical sessions. The application of this training program significantly improved knowledge about the DP, but no improvement was observed in the practical questions. PED staff felt more prepared to face a disaster after the training program (15.5% vs. 41.8%, P<.001). The training program improved some knowledge about the disaster plan, but it has not improved responses in practical situations, which may be due to the low attendance at practical sessions and the time between the training program and the questionnaires. Copyright © 2015 Asociación Española de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.

  7. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  8. Cloud Engineering Principles and Technology Enablers for Medical Image Processing-as-a-Service.

    PubMed

    Bao, Shunxing; Plassard, Andrew J; Landman, Bennett A; Gokhale, Aniruddha

    2017-04-01

    Traditional in-house, laboratory-based medical imaging studies use hierarchical data structures (e.g., NFS file stores) or databases (e.g., COINS, XNAT) for storage and retrieval. The resulting performance from these approaches is, however, impeded by standard network switches since they can saturate network bandwidth during transfer from storage to processing nodes for even moderate-sized studies. To that end, a cloud-based "medical image processing-as-a-service" offers promise in utilizing the ecosystem of Apache Hadoop, which is a flexible framework providing distributed, scalable, fault tolerant storage and parallel computational modules, and HBase, which is a NoSQL database built atop Hadoop's distributed file system. Despite this promise, HBase's load distribution strategy of region split and merge is detrimental to the hierarchical organization of imaging data (e.g., project, subject, session, scan, slice). This paper makes two contributions to address these concerns by describing key cloud engineering principles and technology enhancements we made to the Apache Hadoop ecosystem for medical imaging applications. First, we propose a row-key design for HBase, which is a necessary step that is driven by the hierarchical organization of imaging data. Second, we propose a novel data allocation policy within HBase to strongly enforce collocation of hierarchically related imaging data. The proposed enhancements accelerate data processing by minimizing network usage and localizing processing to machines where the data already exist. Moreover, our approach is amenable to the traditional scan, subject, and project-level analysis procedures, and is compatible with standard command line/scriptable image processing software. Experimental results for an illustrative sample of imaging data reveals that our new HBase policy results in a three-fold time improvement in conversion of classic DICOM to NiFTI file formats when compared with the default HBase region split policy, and nearly a six-fold improvement over a commonly available network file system (NFS) approach even for relatively small file sets. Moreover, file access latency is lower than network attached storage.

  9. Optimizing Distributed Practice: Theoretical Analysis and Practical Implications

    ERIC Educational Resources Information Center

    Cepeda, Nicholas J.; Coburn, Noriko; Rohrer, Doug; Wixted, John T.; Mozer, Michael C,; Pashler, Harold

    2009-01-01

    More than a century of research shows that increasing the gap between study episodes using the same material can enhance retention, yet little is known about how this so-called distributed practice effect unfolds over nontrivial periods. In two three-session laboratory studies, we examined the effects of gap on retention of foreign vocabulary,…

  10. The Building of Multimedia Communications Network based on Session Initiation Protocol

    NASA Astrophysics Data System (ADS)

    Yuexiao, Han; Yanfu, Zhang

    In this paper, we presented a novel design for a distributed multimedia communications network. We introduced the distributed tactic, flow procedure and particular structure. We also analyzed its scalability, stability, robustness, extension, and transmission delay of this architecture. Finally, the result shows our framework is suitable for very large scale communications.

  11. STS-114 Mission Management Team Meeting

    NASA Image and Video Library

    2005-08-04

    JSC2005-E-32012 (4 August 2005) --- John Muratore, Manager of Space Shuttle Systems Engineering & Integration Office, discusses a key STS-114 issue during the Mission Management Team (MMT) session of the afternoon of August 4. The MMT meets daily in Houston's Mission Control Center.

  12. Averting the Homework Crisis.

    ERIC Educational Resources Information Center

    Glazer, Neil T.; Williams, Sharron

    2001-01-01

    Key ingredients for achieving academic success include being prepared, taking responsibility for one's learning, making an effort, and completing homework every day. At Shaker Heights (Ohio) Middle School, after-school programs (academic sessions, a homework center, a homework hotline, and a university tutorial program) help students complete…

  13. Tracking patterns of needs during a telephone follow-up programme for family caregivers of persons with stroke.

    PubMed

    Bakas, Tamilyn; Jessup, Nenette M; McLennon, Susan M; Habermann, Barbara; Weaver, Michael T; Morrison, Gwendolyn

    2016-09-01

    Programmes that address stroke family caregiver needs and skill-building are recommended based on the literature and patient care guidelines for stroke rehabilitation. The purpose of this study was to explore patterns of perceived needs and skill-building during a stroke caregiver intervention programme. Descriptive statistics were used to analyse data from 123 stroke caregivers enrolled in the intervention group of a randomised controlled clinical trial. Caregivers received eight weekly telephone sessions, with a booster session a month later. At each session, the Caregiver Needs and Concerns Checklist (CNCC) was used to identify and prioritise current needs that were then addressed through skill-building strategies. Perceived needs changed over time. Information about stroke was the highest priority need during Session 1. Managing survivor emotions and behaviours was the highest priority for Sessions 2 through 4. Caregivers generally waited until Sessions 5 through 9 to address their own emotional and physical health needs. Physical and instrumental care needs were relatively low but stable across all nine sessions. Skill-building was consistently high, though it peaked during Sessions 2 and 3. Tracking patterns of needs and skill-building suggest appropriate timing for targeting different types of family caregiver support during stroke rehabilitation. Implications for Rehabilitation Family caregivers of stroke survivors play an essential role in the rehabilitation process of the stroke survivor. Identifying and addressing the priority needs and concerns of stroke caregivers during the early discharge period enables caregivers to provide sustained support for the stroke survivor. Rehabilitation professionals are in a key position to address evolving caregiver needs and concerns as they transition to home settings with follow-up care.

  14. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  15. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  16. Scale-out of a community-based behavioral intervention for childhood obesity: pilot implementation evaluation.

    PubMed

    Heerman, William J; Schludnt, David; Harris, Dawn; Teeters, Leah; Apple, Rachel; Barkin, Shari L

    2018-04-13

    Expanding the use of evidence-based behavioral interventions in community settings has met with limited success in various health outcomes as fidelity and dose of clinical interventions are often diluted when translated to communities. We conducted a pilot implementation study to examine adoption of the rigorously evaluated Healthier Families Program by Parks and Recreation centers in 3 cities across the country (MI, GA, NV) with diverse socio-cultural environments. Using the RE-AIM framework, we evaluated the program both quantitatively (pre/post surveys of health behavior change; attendance & fidelity) and qualitatively (interviews with Parks and Recreation staff and participants following the program). The 3 partner sites recruited a total of 26 parent-child pairs. Among the 24 participants who completed pre/post surveys, 62.5% were 25-34 years old, and average child age was 3.6 (SD 0.7) years. The distribution of self-reported race/ethnicity was 54% non-Hispanic White, 38% non-Hispanic Black, and 8% Latino. Qualitative interviews with participants demonstrated increased use of the built environment for physical activity and continued use of key strategies for health behavior change. Three of five (60%) collaborating sites proceeded with implementation of the program. The average attendance for the 12-week program was 7.6 (SD 3.9) sessions, with 71% attending > 50% of sessions. Average fidelity for the 12 weekly sessions was 25.2 (SD 1.2; possible range 9-27). All 3 partner sites continued offering the program after grant funding was complete. This pilot is among the first attempts to scale-out an evidence-based childhood obesity intervention in community Parks and Recreation centers. While this pilot was not intended to confirm the efficacy of the original trial on Body Mass Index (BMI) reduction, the effective and sustained behavior change among a geographically and ethnically diverse population with high attendance and fidelity demonstrates an effective approach on which to base future large-scale implementation efforts to reduce childhood obesity in community settings.

  17. [Training of residents in obstetrics and gynecology: Assessment of an educational program including formal lectures and practical sessions using simulators].

    PubMed

    Jordan, A; El Haloui, O; Breaud, J; Chevalier, D; Antomarchi, J; Bongain, A; Boucoiran, I; Delotte, J

    2015-01-01

    Evaluate an educational program in the training of residents in gynecology-obstetrics (GO) with a theory session and a practical session on simulators and analyze their learning curve. Single-center prospective study, at the university hospital (CHU). Two-day sessions were leaded in April and July 2013. An evaluation on obstetric and gynecological surgery simulator was available to all residents. Theoretical knowledge principles of obstetrics were evaluated early in the session and after formal lectures was taught to them. At the end of the first session, a satisfaction questionnaire was distributed to all participants. Twenty residents agreed to participate to the training sessions. Evaluation of theoretical knowledge: at the end of the session, the residents obtained a significant improvement in their score on 20 testing knowledge. Obstetrical simulator: a statistically significant improvement in scores on assessments simulator vaginal delivery between the first and second session. Subjectively, a larger increase feeling was seen after breech delivery simulation than for the cephalic vaginal delivery. However, the confidence level of the resident after breech delivery simulation has not been improved at the end of the second session. Simulation in gynecological surgery: a trend towards improvement in the time realized on the peg-transfer between the two sessions was noted. In the virtual simulation, no statistically significant differences showed, no improvement for in salpingectomy's time. Subjectively, the residents felt an increase in the precision of their gesture. Satisfaction: All residents have tried the whole program. They considered the pursuit of these sessions on simulators was necessary and even mandatory. The approach chosen by this structured educational program allowed a progression for the residents, both objectively and subjectively. This simulation program type for the resident's training would use this tool in assessing their skills and develop learning curves. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  18. Exploring SETAC's roles in the global dialogue on sustainability--an opening debate.

    PubMed

    McCormick, Ron; Kapustka, Larry; Stahl, Cynthia; Fava, Jim; Lavoie, Emma; Robertson, Cory; Sanderson, Hans; Scott, Heidi; Seager, Tom; Vigon, Bruce

    2013-01-01

    A combination platform-debate session was held at the Society of Environmental Toxicology and Chemistry (SETAC) North America annual meeting in Boston (November 2011). The session was organized by members of the Advisory Group on Sustainability, newly formed and approved as a global entity by the SETAC World Council just prior to the meeting. The platform portion of the session provided a historical backdrop for the debate that was designed to explore SETAC's role in the sustainability dialogue. The debate portion presented arguments for and against the proposition that "Science is the primary contribution of SETAC to the global dialogue on sustainability." Although the debate was not designed to achieve a definitive sustainability policy for SETAC, the audience clearly rejected the proposition, indicating a desire from the SETAC membership for an expanded role in global sustainability forums. This commentary details the key elements of the session, identifies the contribution the Advisory Group will have at the World Congress in Berlin (May 2012), and invites interested persons to become active in the Advisory Group. Copyright © 2012 SETAC.

  19. Trajectories of change across outcomes in intensive treatment for adolescent panic disorder and agoraphobia.

    PubMed

    Gallo, Kaitlin P; Cooper-Vince, Christine E; Hardway, Christina L; Pincus, Donna B; Comer, Jonathan S

    2014-01-01

    Much remains to be learned about typical and individual growth trajectories across treatment for adolescent panic disorder with and without agoraphobia and about critical treatment points associated with key changes. The present study examined the rate and shape of change across an 8-day intensive cognitive behavioral therapy for adolescent panic disorder with and without agoraphobia (N = 56). Participants ranged in age from 12 to 17 (M = 15.14, SD = 1.70; 58.9% female, 78.6% Caucasian). Multilevel modeling evaluated within-treatment linear and nonlinear changes across three treatment outcomes: panic severity, fear, and avoidance. Overall panic severity showed linear change, decreasing throughout treatment. In contrast, fear and avoidance ratings both showed cubic change, peaking slightly at the first session of treatment, starting to decrease at the second session of treatment, and with large gains continuing then plateauing at the fourth session. Findings are considered with regard to the extent to which they may elucidate critical treatment components and sessions for adolescents with panic disorder with and without agoraphobia.

  20. [Training, the key to improving eHealth literacy of upper secondary school students].

    PubMed

    Hernández-Rabanal, Carme; Vall, Aurora; Boter, Clara

    To explore whether training on strategies to identify and assess health-related information online has a positive impact on students' perception of their own eHealth literacy. The validated eHealth Literacy Scale (eHEALS) was administered to a sample of upper secondary school students, aged 15-18. One week later, they attended a training session on how to search and identify reliable health-related information and resources online. The eHEALS was administered again at the end of this session. Information about gender and school year was collected in both sessions. Perceived eHealth literacy was assessed by comparing the scores obtained before and after the session. Bivariate and multiple linear regressions were completed. Of the 298 students enrolled in upper secondary school (Bachillerato), 285 were included in the study. Approximately 52.28% (149) were female, and 47.72% (136) were male. The mean eHEALS score before the session was 24.19 (range: 8-40), and was 28.54 after it. The training was associated with higher perceived eHealth literacy scores (p <0,0001). Health literacy was positively associated with the usefulness and importance students give the Internet. Attendance at a training session on strategies to identify and assess health-related resources online is associated with higher levels of perceived eHealth literacy. Implementing specific training sessions on eHealth literacy in upper secondary school is a promising approach for enhancing students' eHealth literacy. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  1. A Community-based Healthy Living Promotion Program Improved Self-esteem Among Minority Children.

    PubMed

    Wong, William W; Ortiz, Christina L; Stuff, Janice E; Mikhail, Carmen; Lathan, Debra; Moore, Louis A; Alejandro, Mercedes E; Butte, Nancy F; Smith, Elliot O'Brian

    2016-07-01

    Improving self-esteem, dietary habits, and physical activity is essential for long-term success in childhood obesity prevention. The aim is to evaluate the effects of a healthy living promotion program, Healthy Kids-Houston, on BMI, dietary habits, self-esteem, and physical activity among minority children. The after-school program was implemented at community centers in low-income neighborhoods with close proximity to public schools. The program consisted of 3 6-week sessions. Each week, children attended 2 2-hour sessions. Each 2-hour session in the intervention included 90 minutes of structured physical activities and 30 minutes of nutrition and healthy habit lessons. The control group received typical enrichment programs. Outcomes were measured before the intervention and at the end of each 6-week session. We enrolled 877 children (age 10.2 ± 0.1 years (mean ± SE); body mass index z score: 1.49 ± 0.1; 52.0% boys; 72.6% Hispanic) in the program with 524 children received the intervention at 14 community centers and 353 children served as control at 10 community centers. The intervention led to no improvements in BMI z score (P = 0.78) and dietary habits (P = 0.46). Significant improvements (P ≤ 0.02) were detected in the amount of exercise that a child perceived to be required to offset a large meal and in several key self-esteem scores. No improvements were detected in physical activities (P ≥ 0.21). The improvement in some key self-esteem scores and nutrition knowledge may act as a mediator to motivate these children to adopt a healthier lifestyle in the future.

  2. Three-dimensional sinus imaging as an adjunct to two-dimensional imaging to accelerate education and improve spatial orientation.

    PubMed

    Yao, William C; Regone, Rachel M; Huyhn, Nancy; Butler, E Brian; Takashima, Masayoshi

    2014-03-01

    Develop a novel three-dimensional (3-D) anatomical model to assist in improving spatial knowledge of the skull base, paranasal sinuses, and adjacent structures, and validate the utilization of 3-D reconstruction to augment two-dimensional (2-D) computed tomography (CT) for the training of medical students and otolaryngology-head and neck surgery residents. Prospective study. A study of 18 subjects studying sinus anatomy was conducted at a tertiary academic center during the 2011 to 2012 academic year. An image processing and 3-D modeling program was used to create a color coded 3-D scalable/layerable/rotatable model of key paranasal and skull base structures from a 2-D high-resolution sinus CT scan. Subjects received instruction of the sinus anatomy in two sessions, first through review of a 2-D CT sinus scan, followed by an educational module of the 3-D reconstruction. After each session, subjects rated their knowledge of the sinus and adjacent structures on a self-assessment questionnaire. Significant improvement in the perceived understanding of the anatomy was noted after the 3-D educational module session when compared to the 2-D CT session alone (P < .01). Every subject believed the addition of 3-D imaging accelerated their education of sinus anatomy and recommended its use to others. The impression of the learners was that a 3-D educational module, highlighting key structures, is a highly effective tool to enhance the education of medical students and otolaryngology residents in sinus and skull base anatomy and its adjacent structures, specifically in conceptualizing the spatial orientation of these structures. © 2013 The American Laryngological, Rhinological and Otological Society, Inc.

  3. Ankle Sprain Injuries: A 2-Year Prospective Cohort Study in Female Greek Professional Basketball Players

    PubMed Central

    Kofotolis, Nikolaos; Kellis, Eleftherios

    2007-01-01

    Context: Ankle sprains are a common basketball injury. Therefore, examination of risk factors for injury in female professional basketball players is worthwhile. Objective: To examine rates of ankle sprains, associated time missed from participation, and risk factors for injury during 2 consecutive seasons. Design: Prospective cohort study. Setting: Eighteen professional basketball facilities. Patients or Other Participants: We observed 204 players from 18 female professional basketball teams for 2 consecutive seasons during a 2-year period. Main Outcome Measure(s): Using questionnaires, we recorded the incidence of ankle sprains, participation time missed, and mechanisms of injury in games and practice sessions. Potential risk factors, such as age, body mass, height, training experience, and history of ankle sprain, were examined using multivariate logistic regression. Results: Fifty of the 204 participants sustained ankle injuries; injuries included 32 ankle sprains, which translated to an ankle sprain rate of 1.12 per 1000 hours of exposure to injury. The 32 players missed 224.4 training and game sessions and an average of 7.01 sessions per injury. Most injuries occurred in the key area of the basketball court and were the result of contact. Injury rates during games were higher than injury rates during practice sessions. Centers, followed by guards and forwards, had the highest rate of injury. Players who did not wear an external ankle support had an odds ratio of 2.481 for sustaining an ankle sprain. Conclusions: Female professional basketball athletes who did not wear an external ankle support, who played in the key area, or who functioned as centers had a higher risk for ankle sprain than did other players. PMID:18059995

  4. Short-term effects of electronic and tobacco cigarettes on exhaled nitric oxide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marini, Sara, E-mail: s.marini@unicas.it; Buonanno, Giorgio; Queensland University of Technology, Brisbane

    The objective of this study was to compare the short-term respiratory effects due to the inhalation of electronic and conventional tobacco cigarette-generated mainstream aerosols through the measurement of the exhaled nitric oxide (eNO). To this purpose, twenty-five smokers were asked to smoke a conventional cigarette and to vape an electronic cigarette (with and without nicotine), and an electronic cigarette without liquid (control session). Electronic and tobacco cigarette mainstream aerosols were characterized in terms of total particle number concentrations and size distributions. On the basis of the measured total particle number concentrations and size distributions, the average particle doses deposited inmore » alveolar and tracheobronchial regions of the lungs for a single 2-s puff were also estimated considering a subject performing resting (sitting) activity. Total particle number concentrations in the mainstream resulted equal to 3.5 ± 0.4 × 10{sup 9}, 5.1 ± 0.1 × 10{sup 9}, and 3.1 ± 0.6 × 10{sup 9} part. cm{sup −3} for electronic cigarettes without nicotine, with nicotine, and for conventional cigarettes, respectively. The corresponding alveolar doses for a resting subject were estimated equal to 3.8 × 10{sup 10}, 5.2 × 10{sup 10} and 2.3 × 10{sup 10} particles. The mean eNO variations measured after each smoking/vaping session were equal to 3.2 ppb, 2.7 ppb and 2.8 ppb for electronic cigarettes without nicotine, with nicotine, and for conventional cigarettes, respectively; whereas, negligible eNO changes were measured in the control session. Statistical tests performed on eNO data showed statistically significant differences between smoking/vaping sessions and the control session, thus confirming a similar effect on human airways whatever the cigarette smoked/vaped, the nicotine content, and the particle dose received. - Highlights: • Electronic cigarettes (with and without nicotine) mainstream aerosols were analyzed; • Particle number concentrations and size distributions were measured; • Nitric oxide exhaled by smokers before and after smoking/vaping was evaluated; • Alveolar and tracheobronchial doses of particle for a single puff were estimated; • Comparisons with conventional cigarette were made.« less

  5. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  6. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  7. Bringing memory fMRI to the clinic: comparison of seven memory fMRI protocols in temporal lobe epilepsy.

    PubMed

    Towgood, Karren; Barker, Gareth J; Caceres, Alejandro; Crum, William R; Elwes, Robert D C; Costafreda, Sergi G; Mehta, Mitul A; Morris, Robin G; von Oertzen, Tim J; Richardson, Mark P

    2015-04-01

    fMRI is increasingly implemented in the clinic to assess memory function. There are multiple approaches to memory fMRI, but limited data on advantages and reliability of different methods. Here, we compared effect size, activation lateralisation, and between-sessions reliability of seven memory fMRI protocols: Hometown Walking (block design), Scene encoding (block design and event-related design), Picture encoding (block and event-related), and Word encoding (block and event-related). All protocols were performed on three occasions in 16 patients with temporal lobe epilepsy (TLE). Group T-maps showed activity bilaterally in medial temporal lobe for all protocols. Using ANOVA, there was an interaction between hemisphere and seizure-onset lateralisation (P = 0.009) and between hemisphere, protocol and seizure-onset lateralisation (P = 0.002), showing that the distribution of memory-related activity between left and right temporal lobes differed between protocols and between patients with left-onset and right-onset seizures. Using voxelwise intraclass Correlation Coefficient, between-sessions reliability was best for Hometown and Scenes (block and event). The between-sessions spatial overlap of activated voxels was also greatest for Hometown and Scenes. Lateralisation of activity between hemispheres was most reliable for Scenes (block and event) and Words (event). Using receiver operating characteristic analysis to explore the ability of each fMRI protocol to classify patients as left-onset or right-onset TLE, only the Words (event) protocol achieved a significantly above-chance classification of patients at all three sessions. We conclude that Words (event) protocol shows the best combination of between-sessions reliability of the distribution of activity between hemispheres and reliable ability to distinguish between left-onset and right-onset patients. © 2015 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.

  8. The usefulness of mobile insulator sheets for the optimisation of deep heating area for regional hyperthermia using a capacitively coupled heating method: phantom, simulation and clinical prospective studies.

    PubMed

    Tomura, Kyosuke; Ohguri, Takayuki; Mulder, Hendrik Thijmen; Murakami, Motohiro; Nakahara, Sota; Yahara, Katsuya; Korogi, Yukunori

    2017-11-20

    To evaluate the feasibility and efficacy of deep regional hyperthermia with the use of mobile insulator sheets in a capacitively coupled heating device. The heat was applied using an 8-MHz radiofrequency-capacitive device. The insulator sheet was inserted between the regular bolus and cooled overlay bolus in each of upper and lower side of the electrode. Several settings using the insulator sheets were investigated in an experimental study using an agar phantom to evaluate the temperature distributions. The specific absorption rate (SAR) distributions in several organs were also computed for the three-dimensional patient model. In a clinical prospective study, a total of five heating sessions were scheduled for the pelvic tumours, to assess the thermal parameters. The conventional setting was used during the first, third and fifth treatment sessions, and insulator sheets were used during the second and fourth treatment sessions. In the phantom study, the higher heating area improved towards the centre when the mobile insulator sheets were used. The subcutaneous fat/target ratios for the averaged SARs in the setting with the mobile insulator (median, 2.5) were significantly improved compared with those in the conventional setting (median, 3.4). In the clinical study, the thermal dose parameters of CEM43°CT90 in the sessions with the mobile insulator sheets (median, 1.9 min) were significantly better than those in the sessions using a conventional setting (median, 1.0 min). Our novel heating method using mobile insulator sheets was thus found to improve the thermal dose parameters. Further investigations are expected.

  9. Patient Blood Management: An International Perspective.

    PubMed

    Eichbaum, Quentin; Murphy, Michael; Liu, Yu; Kajja, Isaac; Hajjar, Ludhmila Abrahao; Smit Sibinga, Cees Th; Shan, Hua

    2016-12-01

    This article describes practices in patient blood management (PBM) in 4 countries on different continents that may provide insights for anesthesiologists and other physicians working in global settings. The article has its foundation in the proceedings of a session at the 2014 AABB annual meeting during which international experts from England, Uganda, China, and Brazil presented the programs and implementation strategies in PBM developed in their respective countries. To systematize the review and enhance the comparability between these countries on different continents, authors were requested to respond to the same set of 6 key questions with respect to their country's PBM program(s). Considerable variation exists between these country regions that is driven both by differences in health contexts and by disparities in resources. Comparing PBM strategies from low-, middle-, and high-income countries, as described in this article, allows them to learn bidirectionally from one another and to work toward implementing innovative and preferably evidence-based strategies for improvement. Sharing and distributing knowledge from such programs will ultimately also improve transfusion outcomes and patient safety.

  10. Water and fire safety issues addressed.

    PubMed

    Arrowsmith, Mike

    2014-11-01

    One of the four conference streams at last month's Healthcare Estates 2014 event focused on some of the key engineering challenges and opportunities facing healthcare estates managers and healthcare engineers. Mike Arrowsmith, HEJ's technical editor, provides an overview of the engineering sessions at this year's IHEEM conference.

  11. Policy Update. IDRA Focus.

    ERIC Educational Resources Information Center

    IDRA Newsletter, 1995

    1995-01-01

    This theme issue focuses on the drastic revision of the Texas education code undertaken during the 1995 state legislative session. "Education Policy Reform: Key Points for Districts" (Albert Cortez, Mikki Symonds) outlines critical issues in the legislation that have an impact on educational quality: charter schools exempt from state…

  12. High-Intensity Training and Salivary Immunoglobulin A Responses in Professional Top-Level Soccer Players: Effect of Training Intensity.

    PubMed

    Owen, Adam L; Wong, Del P; Dunlop, Gordon; Groussard, Carole; Kebsi, Wiem; Dellal, Alexandre; Morgans, Ryland; Zouhal, Hassane

    2016-09-01

    Owen, AL, Wong, DP, Dunlop, G, Groussard, C, Kebsi, W, Dellal, A, Morgans, R, and Zouhal, H. High-intensity training and salivary immunoglobulin A responses in professional top-level soccer players: Effect of training intensity. J Strength Cond Res 30(9): 2460-2469, 2016-This study aimed (a) to test the hypothesis that salivary immunoglobulin A (s-IgA) would vary with training intensity sessions (low-intensity [LI] vs. high-intensity sessions [HI]) during a traditional training program divided into 4 training periods and (b) to identify key variables (e.g., GPS data, rating of perceived exertion [RPE], and training duration), which could affect s-IgA. Saliva samples of 10 elite professional soccer players were collected (a) before the investigation started to establish the baseline level and (b) before and after each 4 training sessions (LI vs. HI). Training intensity was monitored as internal (through heart rate responses and RPE) and external (through GPS) loads. High-intensity sessions were associated with higher external load (GPS) and with higher RPE. Baseline and pretraining s-IgA did not differ between the 4 training sessions both for HI and LI. Post-training s-IgA were not different (in absolute value and in percentage of change) between HI and LI sessions at the first 3 periods. However, at the fourth period, s-IgA concentration for HI session was significantly lower (p ≤ 0.05) than the LI session. The percentage change between s-IgA post-training and s-IgA baseline concentrations differ significantly (p ≤ 0.05) between HI and LI training sessions. Significant correlations between s-IgA and training intensity were also noted. High-intensity soccer training sessions might cause a significant decrease in s-IgA values during the postexercise window as compared with LI sessions. This study encourages coaches to monitor s-IgA in routine, particularly during HI training periods, to take precautions to avoid upper respiratory tract infection in highly trained soccer players.

  13. A Logical Design of a Session Services Control Layer of a Distributed Network Architecture for SPLICE (Stock Point Logistics Integrated Communication Environment).

    DTIC Science & Technology

    1984-06-01

    Eacn stock point is autonomous witn respect to how it implements data processing support, as long as it accommodates the Navy Supply Systems Command...has its own data elements, files, programs , transactions, users, reports, and some have additional hardware. To augment them all and not force redesign... programs are written to request session establishments among them using only logical addressing names (mailboxes) whicn are independent from physical

  14. Better Care Teams: A Stepwise Skill Reinforcement Model.

    PubMed

    Christopher, Beth-Anne; Grantner, Mary; Coke, Lola A; Wideman, Marilyn; Kwakwa, Francis

    2016-06-01

    The Building Healthy Urban Communities initiative presents a path for organizations partnering to improve patient outcomes with continuing education (CE) as a key component. Components of the CE initiative included traditional CE delivery formats with an essential element of adaptability and new methods, with rigorous evaluation over time that included evaluation prior to the course, immediately following the CE session, 6 to 8 weeks after the CE session, and then subsequent monthly "testlets." Outcome measures were designed to allow for ongoing adaptation of content, reinforcement of key learning objectives, and use of innovative concordant testing and retrieval practice techniques. The results after 1 year of programming suggest the stepwise skill reinforcement model is effective for learning and is an efficient use of financial and human resources. More important, its design is one that could be adopted at low cost by organizations willing to work in close partnership. J Contin Educ Nurs. 2016;47(6):283-288. Copyright 2016, SLACK Incorporated.

  15. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century

    PubMed Central

    Wang, Y. Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O’Carroll, Patrick

    2017-01-01

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0. PMID:28880837

  16. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century.

    PubMed

    DeSalvo, Karen B; Wang, Y Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O'Carroll, Patrick

    2017-09-07

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0.

  17. Music interventions and group participation skills of preschoolers with visual impairments: raising questions about music, arousal, and attention.

    PubMed

    Robb, Sheri L

    2003-01-01

    The purposes of this pilot study were two-fold: First, to document and compare attentive behavior during music and play-based group instructional sessions and second, to document and compare 4 group participation behaviors during music and play-based sessions. The 4 group participation behaviors included facing a central speaker, following onestep directions, manipulating objects according to their function, and remaining seated. Six of the 12 children enrolled completed the study, with all participants enrolled in an early intervention program due to visual impairments. Study participants were between the ages of 4 and 6 years inclusively. Children participated in 4, 30-minute instructional sessions. Two instructional sessions were music-based and two were play-based with the 4 sessions equally distributed across a 2-week period. An ABBA design was used to control for possible order effects. Each session was videotaped to facilitate collection of behavioral data. Statistical analysis of these data revealed that attentive behavior was significantly higher during music based-sessions (t(5) = 5.81; p =.002). Mean scores for the remaining group participation behaviors were higher in the music condition, but these differences were not statistically significant. Discussion regarding differential outcomes among participants, as well as an exploration of theories related to music, arousal, and attention are discussed in an effort to guide future research.

  18. Anaerobic soil volume as a major controlling factor for soil denitrification and respiration

    NASA Astrophysics Data System (ADS)

    Reent Köster, Jan; Tong, Bingxin; Grosz, Balázs; Burkart, Stefan; Ruoss, Nicolas; Well, Reinhard

    2017-04-01

    Gas diffusion in soil is a key variable to control denitrification and its N2O to N2 product ratio since it affects two major proximal denitrification factors, i.e. the concentrations of O2 and of N2O. Gas diffusivity is governed by the structure and the state of water saturation of the pore system. At a given O2 consumption rate decreasing diffusivity causes an enhanced anaerobic soil volume where denitrification can occur. Gas diffusivity is generally quantified as bulk diffusion coefficients that represent the lineal diffusive gas flux through the soil matrix. However, the spatial distribution of respiratory O2 consumption and denitrification - and hence the local concentration of O2 and N2O - is highly non-homogeneous. Knowledge of the anaerobic soil volume fraction (ansvf) has been proposed as a key control on denitrification, and has subsequently been used in many denitrification models. The ansvf has previously been quantified by direct measurement of O2 distribution in individual soil aggregates using microsensors. The measured ansvf corresponded to modelled values based on measured aggregate diffusivity and respiration, but was not yet correlated with measured denitrification rates. In the present ongoing study, we are incubating soil cores amended with nitrate and organic litter in an automated mesocosm system under aerobic as well as anaerobic conditions. An N2 depleted incubation atmosphere and the 15N labeled soil nitrate pool facilitate quantification of the N2 production in the soil by IRMS, and fluxes of N2O and CO2 are monitored via gas chromatography. The ansvf and the measured denitrification and respiration rates will then be used for model validation. During the session we will present first results of this study.

  19. Stakeholders' views on the ethical challenges of pragmatic trials investigating pharmaceutical drugs.

    PubMed

    Kalkman, Shona; van Thiel, Ghislaine J M W; Grobbee, Diederick E; Meinecke, Anna-Katharina; Zuidgeest, Mira G P; van Delden, Johannes J M

    2016-08-22

    We explored the views of key stakeholders to identify the ethical challenges of pragmatic trials investigating pharmaceutical drugs. A secondary aim was to capture stakeholders' attitudes towards the implementation of pragmatic trials in the drug development process. We conducted semistructured, in-depth interviews among individuals from different key stakeholder groups (academia and independent research institutions, the pharmaceutical industry, regulators, Health Technology Assessment (HTA) agencies and patients' organizations) through telephone or face-to-face sessions. Interviews were structured around the question "what challenges were experienced or perceived during the design, conduct and/or review of pragmatic trials." Respondents were additionally asked about their views on implementation of pragmatic trials in the drug development process. Thematic analysis was used to identify the ethically relevant features across data sets. We interviewed 34 stakeholders in 25 individual sessions and four group sessions. The four perceived challenges of ethical relevance were: (1) less controlled conditions creating safety concerns, (2) comparison with usual care potentially compromising clinical equipoise, (3) tailored or waivers of informed consent affecting patient autonomy, and (4) minimal interference with "real-world" practice reducing the knowledge value of trial results. We identified stakeholder concerns regarding risk assessment, use of suboptimal usual care as a comparator, tailoring of informed consent procedures and ensuring the social value of pragmatic trials. These concerns increased when respondents were asked about pragmatic trials conducted before market authorization.

  20. Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification

    DTIC Science & Technology

    2014-09-18

    and full/scale experimental verifications towards ground/ satellite quantum key distribution0 Oat Qhotonics 4235>9+7,=5;9!អ \\58^ Zin K. Dao Z. Miu T...Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification DISSERTATION Jeffrey D. Morris... QUANTUM KEY DISTRIBUTION SIMULATION FRAMEWORK USING THE DISCRETE EVENT SYSTEM SPECIFICATION DISSERTATION Presented to the Faculty Department of Systems

  1. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, H.K.; Chau, H.F.

    1998-03-24

    A secure method for distributing a random cryptographic key with reduced data loss is disclosed. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically. 23 figs.

  2. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, Hoi-Kwong; Chau, Hoi Fung

    1998-01-01

    A secure method for distributing a random cryptographic key with reduced data loss. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically.

  3. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    PubMed

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  4. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    PubMed Central

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280

  5. Security Analysis of Session Initiation Protocol

    DTIC Science & Technology

    2010-06-01

    traffic as Bob@biloxi.com), a VPN was established with OpenVPN 2.1_rc19 between all relevant entities. Configuration files used by the clients and...static key is created by running the command ’ openvpn --genkey --secret static.key.’ By 22 rerouting all SIP traffic through VPNs as needed, a network... OpenVPN , and VM 2’s routing table is modified so that all IP packets except those addressed to VM 1’s publicly facing IP are routed through the OpenVPN

  6. Security of Distributed-Phase-Reference Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas

    2012-12-01

    Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.

  7. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  8. Marketing the Uniqueness of Small Towns. Revised.

    ERIC Educational Resources Information Center

    Dunn, Douglas; Hogg, David H.

    The key to marketing a town is determining and promoting the town's "differential advantage" or uniqueness that would make people want to visit or live there. Exercises to help communities gain important insights into the town's competitive edge include a brainstorming session with knowledgeable community members, a visitor…

  9. Multi-modality imaging: Bird's eye view from the 2016 American Heart Association Scientific Sessions.

    PubMed

    AlJaroudi, Wael A; Lloyd, Steven G; Chaudhry, Farooq A; Hage, Fadi G

    2017-06-01

    This review summarizes key imaging studies that were presented in the American Heart Association Scientific Sessions 2016 related to the fields of nuclear cardiology, cardiac computed tomography, cardiac magnetic resonance, and echocardiography. This bird's eye view will inform readers about multiple studies from these different modalities. We hope that this general overview will be useful for those that did not attend the conference as well as to those that did since it is often difficult to get exposure to many abstracts at large meetings. The review, therefore, aims to help readers stay updated on the newest imaging studies presented at the meeting.

  10. Instrumented SSH

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Campbell, Scott; Campbell, Scott

    NERSC recently undertook a project to access and analyze Secure Shell (SSH) related data. This includes authentication data such as user names and key fingerprints, interactive session data such as keystrokes and responses, and information about noninteractive sessions such as commands executed and files transferred. Historically, this data has been inaccessible with traditional network monitoring techniques, but with a modification to the SSH daemon, this data can be passed directly to intrusion detection systems for analysis. The instrumented version of SSH is now running on all NERSC production systems. This paper describes the project, details about how SSH was instrumented,more » and the initial results of putting this in production.« less

  11. Guest Editor's introduction: Selected papers from the 4th USENIX Conference on Object-Oriented Technologies and Systems

    NASA Astrophysics Data System (ADS)

    Sventek, Joe

    1998-12-01

    Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA 94304, USA Introduction The USENIX Conference on Object-Oriented Technologies and Systems (COOTS) is held annually in the late spring. The conference evolved from a set of C++ workshops that were held under the auspices of USENIX, the first of which met in 1989. Given the growing diverse interest in object-oriented technologies, the C++ focus of the workshop eventually became too narrow, with the result that the scope was widened in 1995 to include object-oriented technologies and systems. COOTS is intended to showcase advanced R&D efforts in object-oriented technologies and software systems. The conference emphasizes experimental research and experience gained by using object-oriented techniques and languages to build complex software systems that meet real-world needs. COOTS solicits papers in the following general areas: application of, and experiences with, object-oriented technologies in particular domains (e.g. financial, medical, telecommunication); the architecture and implementation of distributed object systems (e.g. CORBA, DCOM, RMI); object-oriented programming and specification languages; object-oriented design and analysis. The 4th meeting of COOTS was held 27 - 30 April 1998 at the El Dorado Hotel, Santa Fe, New Mexico, USA. Several tutorials were given. The technical program proper consisted of a single track of six sessions, with three paper presentations per session. A keynote address and a provocative panel session rounded out the technical program. The program committee reviewed 56 papers, selecting the best 18 for presentation in the technical sessions. While we solicit papers across the spectrum of applications of object-oriented technologies, this year there was a predominance of distributed, object-oriented papers. The accepted papers reflected this asymmetry, with 15 papers on distributed objects and 3 papers on object-oriented languages. The papers in this special issue are the six best distributed object papers (in the opinion of the program committee). They represent the diversity of research in this particular area, and should give the reader a good idea of the types of papers presented at COOTS as well as the calibre of the work so presented. The papers The paper by Jain, Widoff and Schmidt explores the suitability of Java for writing performance-sensitive distributed applications. Despite the popularity of Java, there are many concerns about its efficiency; in particular, networking and computation performance are key concerns when considering the use of Java to develop performance-sensitive distributed applications. This paper makes three contributions to the study of Java for these applications: it describes an architecture using Java and the Web to develop MedJava, which is a distributed electronic medical imaging system with stringent networking and computation requirements; it presents benchmarks of MedJava image processing and compares the results to the performance of xv, which is an equivalent image processing application written in C; it presents performance benchmarks using Java as a transport interface to exchange large medical images over high-speed ATM networks. The paper by Little and Shrivastava covers the integration of several important topics: transactions, distributed systems, Java, the Internet and security. The usefulness of this paper lies in the synthesis of an effective solution applying work in different areas of computing to the Java environment. Securing applications constructed from distributed objects is important if these applications are to be used in mission-critical situations. Delegation is one aspect of distributed system security that is necessary for such applications. The paper by Nagaratnam and Lea describes a secure delegation model for Java-based, distributed object environments. The paper by Frølund and Koistinen addresses the topical issue of providing a common way for describing Quality-of-Service (QoS) features in distributed, object-oriented systems. They present a general QoS language, QML, that can be used to capture QoS properties as part of a design. They also show how to extend UML to support QML concepts. The paper by Szymaszek, Uszok and Zielinski discusses the important issue of efficient implementation and usage of fine-grained objects in CORBA-based applications. Fine-grained objects can have serious ramifications on overall application performance and scalability, and the paper suggests that such objects should not be treated as first-class CORBA objects, proposing instead the use of collections and smart proxies for efficient implementation. The paper by Milojicic, LaForge and Chauhan describes a mobile objects and agents infrastructure. Their particular research has focused on communication support across agent migration and extensive resource control. The paper also discusses issues regarding interoperation between agent systems. Acknowledgments The editor wishes to thank all of the authors, reviewers and publishers. Without their excellent work, and the contribution of their valuable time, this special issue would not have been possible.

  12. Adaptations to Short, Frequent Sessions of Endurance and Strength Training Are Similar to Longer, Less Frequent Exercise Sessions When the Total Volume Is the Same.

    PubMed

    Kilen, Anders; Hjelvang, Line B; Dall, Niels; Kruse, Nanna L; Nordsborg, Nikolai B

    2015-11-01

    The hypothesis that the distribution of weekly training across several short sessions, as opposed to fewer longer sessions, enhances maximal strength gain without compromising maximal oxygen uptake was evaluated. Twenty-nine subjects completed an 8-week controlled parallel-group training intervention. One group ("micro training" [MI]: n = 21) performed nine 15-minute training sessions weekly, whereas a second group ("classical training" [CL]: n = 8) completed exactly the same training on a weekly basis but as three 45-minute sessions. For each group, each session comprised exclusively strength, high-intensity cardiovascular training or muscle endurance training. Both groups increased shuttle run performance (MI: 1,373 ± 133 m vs. 1,498 ± 126 m, p ≤ 0.05; CL: 1,074 ± 213 m vs. 1,451 ± 202 m, p < 0.001). In contrast to CL, MI increased peak oxygen uptake (3,744 ± 615 mL·min⁻¹ vs. 3,963 ± 753 mL·min⁻¹, p ≤ 0.05), maximal voluntary isometric (MVC) force of the knee extensors (646 ± 135 N vs. 659 ± 209 N, p < 0.001), MVC of the finger flexors (408 ± 109 N vs. 441 ± 131 N, p ≤ 0.05), and number of lunges performed in 2 minutes (65 ± 3 vs. 73 ± 2, p < 0.001). However, there were no significant differences between MI and CL on any measured parameters before or after the training intervention. In conclusion, similar training adaptations can be obtained with short, frequent exercise sessions or longer, less frequent sessions where the total volume of weekly training performed is the same.

  13. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  14. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  15. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  16. Deterministic MDI QKD with two secret bits per shared entangled pair

    NASA Astrophysics Data System (ADS)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  17. EDITORIAL: Focus on Quantum Cryptography: Theory and Practice FOCUS ON QUANTUM CRYPTOGRAPHY: THEORY AND PRACTICE

    NASA Astrophysics Data System (ADS)

    Lütkenhaus, N.; Shields, A. J.

    2009-04-01

    Quantum cryptography, and especially quantum key distribution (QKD), is steadily progressing to become a viable tool for cryptographic services. In recent years we have witnessed a dramatic increase in the secure bit rate of QKD, as well as its extension to ever longer fibre- and air-based links and the emergence of metro-scale trusted networks. In the foreseeable future even global-scale communications may be possible using quantum repeaters or Earth-satellite links. A handful of start-ups and some bigger companies are already active in the field. The launch of an initiative to form industrial standards for QKD, under the auspices of the European Telecommunication Standards Institute, described in the paper by Laenger and Lenhart in this Focus Issue, can be taken as a sign of the growing commercial interest. Recent progress has seen an increase in the secure bit rate of QKD links, by orders of magnitude, to over 1 Mb s-1. This has resulted mainly from an improvement in the detection technology. Here changes in the way conventional semiconductor detectors are gated, as well as the development of novel devices based on non-linear processes and superconducting materials, are leading the way. Additional challenges for QKD at GHz clock rates include the design of high speed electronics, remote synchronization and high rate random number generation. Substantial effort is being devoted to increasing the range of individual links, which is limited by attenuation and other losses in optical fibres and air links. An important advance in the past few years has been the introduction of protocols with the same scaling as an ideal single-photon set-up. The good news is that these schemes use standard optical devices, such as weak laser pulses. Thanks to these new protocols and improvements in the detection technology, the range of a single fibre link can exceed a few hundred km. Outstanding issues include proving the unconditional security of some of the schemes. Much of the work done to date relates to point-to-point links. Another recent advance has been the development of trusted networks for QKD. This is important for further increasing the range of the technology, and for overcoming denial-of-service attacks on an individual link. It is interesting to see that the optimization of QKD devices differs for point-to-point and network applications. Network operation is essential for widespread adoption of the technology, as it can dramatically reduce the deployment costs and allow connection flexibility. Also important is the multiplexing of the quantum signals with conventional network traffic. For the future, quantum repeaters should be developed for longer range links. On the theoretical side, different approaches to security proofs have recently started to converge, offering several paradigms of the same basic idea. Our improved theoretical understanding places more stringent demands on the QKD devices. We are aware by now that finite size effects in key generation arise not only from parameter estimation. It will not be possible to generate a key from just a few hundred received signals. It is a stimulating challenge for the theory of security proofs to develop lean proof strategies that work with finite signal block sizes. As QKD advances to a real-world cryptographic solution, side channel attacks must be carefully analysed. Theoretical security proofs for QKD schemes are so far based on physical models of these devices. It is in the nature of models that any real implementation will deviate from this model, creating a potential weakness for an eavesdropper to exploit. There are two solutions to this problem: the traditional path of refining the models to reduce the deviations, or the radically different approach of device-independent security proofs, in which none or only a few well controlled assumptions about the devices are made. Clearly, it is desirable to find security proofs that require only minimal or fairly general model descriptions and are based on observable tests during the run of QKD sessions. It is now 25 years since the first proposal for QKD was published and 20 since the first experimental realization. The intervening years have brought several technological and theoretical advances, which have driven new insights into the application of quantum theory to the wider field of information technology. We are looking forward to the new twists and turns this field will take in the next 25 years! Focus on Quantum Cryptography: Theory and Practice Contents Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space A Leverrier, E Karpov, P Grangier and N J Cerf Optical networking for quantum key distribution and quantum communications T E Chapuran, P Toliver, N A Peters, J Jackel, M S Goodman, R J Runser, S R McNown, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, C G Peterson, K T Tyagi, L Mercer and H Dardy Proof-of-concept of real-world quantum key distribution with quantum frames I Lucio-Martinez, P Chan, X Mo, S Hosier and W Tittel Composability in quantum cryptography Jörn Müller-Quade and Renato Renner Distributed authentication for randomly compromised networks Travis R Beals, Kevin P Hynes and Barry C Sanders Feasibility of 300 km quantum key distribution with entangled states Thomas Scheidl, Rupert Ursin, Alessandro Fedrizzi, Sven Ramelow, Xiao-Song Ma, Thomas Herbst, Robert Prevedel, Lothar Ratschbacher, Johannes Kofler, Thomas Jennewein and Anton Zeilinger Decoy-state quantum key distribution with both source errors and statistical fluctuations Xiang-Bin Wang, Lin Yang, Cheng-Zhi Peng and Jian-Wei Pan High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres D Stucki, N Walenta, F Vannel, R T Thew, N Gisin, H Zbinden, S Gray, C R Towery and S Ten Topological optimization of quantum key distribution networks R Alléaume, F Roueff, E Diamanti and N Lütkenhaus The SECOQC quantum key distribution network in Vienna M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, T Debuisschert, E Diamanti, M Dianati, J F Dynes, S Fasel, S Fossier, M Fürst, J-D Gautier, O Gay, N Gisin, P Grangier, A Happe, Y Hasani, M Hentschel, H Hübel, G Humer, T Länger, M Legré, R Lieger, J Lodewyck, T Lorünser, N Lütkenhaus, A Marhold, T Matyus, O Maurhart, L Monat, S Nauerth, J-B Page, A Poppe, E Querasser, G Ribordy, S Robyr, L Salvail, A W Sharpe, A J Shields, D Stucki, M Suda, C Tamas, T Themel, R T Thew, Y Thoma, A Treiber, P Trinkler, R Tualle-Brouri, F Vannel, N Walenta, H Weier, H Weinfurter, I Wimberger, Z L Yuan, H Zbinden and A Zeilinger Stable quantum key distribution with active polarization control based on time-division multiplexing J Chen, G Wu, L Xu, X Gu, E Wu and H Zeng Controlling passively quenched single photon detectors by bright light Vadim Makarov Information leakage via side channels in freespace BB84 quantum cryptography Sebastian Nauerth, Martin Fürst, Tobias Schmitt-Manderbach, Henning Weier and Harald Weinfurter Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger and Gaby Lenhart Entangled quantum key distribution with a biased basis choice Chris Erven, Xiongfeng Ma, Raymond Laflamme and Gregor Weihs Finite-key analysis for practical implementations of quantum key distribution Raymond Y Q Cai and Valerio Scarani Field test of a continuous-variable quantum key distribution prototype S Fossier, E Diamanti, T Debuisschert, A Villing, R Tualle-Brouri and P Grangier Physics and application of photon number resolving detectors based on superconducting parallel nanowires F Marsili, D Bitauld, A Gaggero, S Jahanmirinejad, R Leoni, F Mattioli and A Fiore Device-independent quantum key distribution secure against collective attacks Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar and Valerio Scarani 1310 nm differential-phase-shift QKD system using superconducting single-photon detectors Lijun Ma, S Nam, Hai Xu, B Baek, Tiejun Chang, O Slattery, A Mink and Xiao Tang Practical gigahertz quantum key distribution based on avalanche photodiodes Z L Yuan, A R Dixon, J F Dynes, A W Sharpe and A J Shields Simple security proof of quantum key distribution based on complementarity M Koashi Feasibility of satellite quantum key distribution C Bonato, A Tomaello, V Da Deppo, G Naletto and P Villoresi Programmable instrumentation and gigahertz signaling for single-photon quantum communication systems Alan Mink, Joshua C Bienfang, Robert Carpenter, Lijun Ma, Barry Hershman, Alessandro Restelli and Xiao Tang Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation G B Xavier, N Walenta, G Vilela de Faria, G P Temporão, N Gisin, H Zbinden and J P von der Weid Feasibility of free space quantum key distribution with coherent polarization states D Elser, T Bartley, B Heim, Ch Wittmann, D Sych and G Leuchs A fully automated entanglement-based quantum cryptography system for telecom fiber networks Alexander Treiber, Andreas Poppe, Michael Hentschel, Daniele Ferrini, Thomas Lorünser, Edwin Querasser, Thomas Matyus, Hannes Hübel and Anton Zeilinger Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt and K T Tyagi Clock synchronization by remote detection of correlated photon pairs Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Megabits secure key rate quantum key distribution Q Zhang, H Takesue, T Honjo, K Wen, T Hirohata, M Suyama, Y Takiguchi, H Kamada, Y Tokura, O Tadanaga, Y Nishida, M Asobe and Y Yamamoto Practical long-distance quantum key distribution system using decoy levels D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T Tyagi, K P McCabe, S Nam, B Baek, R H Hadfield, R J Hughes and J E Nordholt Detector decoy quantum key distribution Tobias Moroder, Marcos Curty and Norbert Lütkenhaus Daylight operation of a free space, entanglement-based quantum key distribution system Matthew P Peloso, Ilja Gerhardt, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes Benjamin Miquel and Hiroki Takesue

  18. Teacher candidates' mastery of phoneme-grapheme correspondence: massed versus distributed practice in teacher education.

    PubMed

    Sayeski, Kristin L; Earle, Gentry A; Eslinger, R Paige; Whitenton, Jessy N

    2017-04-01

    Matching phonemes (speech sounds) to graphemes (letters and letter combinations) is an important aspect of decoding (translating print to speech) and encoding (translating speech to print). Yet, many teacher candidates do not receive explicit training in phoneme-grapheme correspondence. Difficulty with accurate phoneme production and/or lack of understanding of sound-symbol correspondence can make it challenging for teachers to (a) identify student errors on common assessments and (b) serve as a model for students when teaching beginning reading or providing remedial reading instruction. For students with dyslexia, lack of teacher proficiency in this area is particularly problematic. This study examined differences between two learning conditions (massed and distributed practice) on teacher candidates' development of phoneme-grapheme correspondence knowledge and skills. An experimental, pretest-posttest-delayed test design was employed with teacher candidates (n = 52) to compare a massed practice condition (one, 60-min session) to a distributed practice condition (four, 15-min sessions distributed over 4 weeks) for learning phonemes associated with letters and letter combinations. Participants in the distributed practice condition significantly outperformed participants in the massed practice condition on their ability to correctly produce phonemes associated with different letters and letter combinations. Implications for teacher preparation are discussed.

  19. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  20. Balanced Expertise Distribution in Remote Ultrasound Imaging Aboard The International Space Station (ISS)

    NASA Technical Reports Server (NTRS)

    Sargsyan, Ashot; Dulchavsky, Scott; Hamilton, Douglas; Melton, Shannon; Martin, David

    2004-01-01

    Astronaut training for ISS operations usually ensures independent performance. With small crew size same crews also conduct all science work onboard. With diverse backgrounds, a good "match" between the existing and required skills can only be anecdotal. Furthermore, full proficiency in most of the complex tasks can be attained only through long training and practice, which may not be justified and may be impossible given the scarcity of training time. To enable a number of operational and science advancements, authors have developed a new approach to expertise distribution in time and among the space and ground personnel. Methods: As part of NASA Operational Ultrasound Project (1998-2003) and the NASA-solicited experiment "Advanced Diagnostic Ultrasound in Microgravity-ADUM" (P.I. -S.D., ongoing), the authors have created a "Balanced Expertise Distribution" approach to perform complex ultrasound imaging tasks on ISS for both operational and science use. The four components of expertise are a) any pre-existing pertinent expertise; b) limited preflight training c) adaptive onboard proficiency enhancement tools; d) real-time ' guidance from the ground. Throughout the pre-flight training and flight time preceding the experiments, the four components are shaped in a dynamic fashion to meet in an optimum combination during the experiment sessions. Results: Procedure validation sessions and feasibility studies have given encouraging results. While several successful real-time remote guidance sessions have been conducted on ISS, Expedition 8 is the first to use an "on-orbit proficiency enhancement" tool. Conclusions: In spite of severely limited training time, daring peer-reviewed research and operational enhancements are feasible through a balanced distribution of expertise in time, as well as among the crewmembers and ground personnel. This approach shows great promise for biomedical research, but may be applicable for other areas of micro gravity-based science

  1. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  2. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  3. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  4. Space 2000 Symposium

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The purpose of the Space 2000 Symposium is to present the creativity and achievements of key figures of the 20th century. It offers a retrospective discussion on space exploration. It considers the future of the enterprise, and the legacy that will be left for future generations. The symposium includes panel discussions, smaller session meetings with some panelists, exhibits, and displays. The first session entitled "From Science Fiction to Science Facts" commences after a brief overview of the symposium. The panel discussions include talks on space exploration over many decades, and the missions of the millennium to search for life on Mars. The second session, "Risks and Rewards of Human Space Exploration," focuses on the training and health risks that astronauts face on their exploratory mission to space. Session three, "Messages and Messengers Informing and Inspire Space Exploration and the Public," focuses on the use of TV medium by educators and actors to inform and inspire a wide variety of audiences with adventures of space exploration. Session four, "The Legacy of Carl Sagan," discusses the influences made by Sagan to scientific research and the general public. In session five, "Space Exploration for a new Generation," two student speakers and the NASA Administrator Daniel S. Goldin address the group. Session six, "Destiny or Delusion? -- Humankind's Place in the Cosmos," ends the symposium with issues of space exploration and some thought provoking questions. Some of these issues and questions are: what will be the societal implications if we discover the origin of the universe, stars, or life; what will be the impact if scientists find clear evidence of life outside the domains of the Earth; should there be limits to what humans can or should learn; and what visionary steps should space-faring people take now for future generations.

  5. Experiencing Variation: Learning Opportunities in Doctoral Supervision

    ERIC Educational Resources Information Center

    Kobayashi, Sofie; Berge, Maria; Grout, Brian W. W.; Rump, Camilla Østerberg

    2017-01-01

    This study contributes towards a better understanding of learning dynamics in doctoral supervision by analysing how learning opportunities are created in the interaction between supervisors and PhD students, using the notion of experiencing variation as a key to learning. Empirically, we have based the study on four video-recorded sessions, with…

  6. Sharing Time: An Oral Preparation for Literacy.

    ERIC Educational Resources Information Center

    Michaels, Sarah

    This paper attempts to identify key, recurring discourse activities and to develop hypotheses about ethnic or subgroup differences in discourse style that could lead to adverse educational outcomes. Data are drawn from ethnographic observation of 50 sharing time ("show and tell") sessions held in a first grade classroom. Different…

  7. Consensus Building: A Key to School Transformation

    ERIC Educational Resources Information Center

    Baron, Daniel

    2008-01-01

    Consensus-based decision making can turn faculty meetings into meaningful and productive work sessions in which faculty members know that their input is respected and valued and important decisions are made. Reaching consensus has different meanings in different contexts. Decisions are made "by consensus" when the decision affects the entire…

  8. Training Mentors as Educational Advisors for Adult Learners. Process Manual.

    ERIC Educational Resources Information Center

    Singer, Elizabeth W.

    Materials used by the director of a project designed to assist key personnel in businesses, industries, and agencies with the educational counseling of their employees are presented. The objectives of the project, "Training Mentors as Educational Advisors of Adult Learners," were to: (1) provide two training sessions in educational…

  9. Stop, Look, and Listen: Children Ahead.

    ERIC Educational Resources Information Center

    Stirling, Nora

    This play, commissioned by Project Head Start, is designed to stimulate discussion and deepen understanding of key issues surrounding the confusion and conflicts that often arise when parents and professionals become entangled in disputes over "who is in charge" of the Head Start program. Guidelines for a discussion session following presentation…

  10. 75 FR 53015 - Public Listening Session

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-30

    ... commercial motor vehicles (CMVs) and saving lives. In carrying out its safety mandate to reduce crashes.... Following are some of the key issues that the Agency hopes public comments will address. In addition to.../mission of improving the safety of commercial motor vehicles (CMV) and saving lives as it relates to some...

  11. Engineering Education in Research-Intensive Universities

    ERIC Educational Resources Information Center

    Alpay, E.; Jones, M. E.

    2012-01-01

    The strengths and weaknesses of engineering education in research-intensive institutions are reported and key areas for developmental focus identified. The work is based on a questionnaire and session summaries used during a two-day international conference held at Imperial College London. The findings highlight several common concerns, such as…

  12. What I Learned at the NCSS Annual Meeting

    ERIC Educational Resources Information Center

    Risinger, C. Frederick

    2007-01-01

    With nearly four decades of National Council for the Social Studies conferences under his belt, the author reflects on the valuable networking and stimulating sessions he attended, and highlights key educational websites from the increasingly technologically-adept exhibits. Here, he describes five websites that can be useful resources for…

  13. What Learning Environments Help Improve Decision-Making?

    ERIC Educational Resources Information Center

    O'Connor, Donna; Larkin, Paul; Williams, A. Mark

    2017-01-01

    Background: Decision-making is a key component of performance in sport. However, there has been minimal investigation of how coaches may adapt practice sessions to specifically develop decision-making. Purpose: The aim in this exploratory study was to investigate the pedagogical approaches coaches use to develop decision-making in soccer. Method:…

  14. Non-invasive brain stimulation and computational models in post-stroke aphasic patients: single session of transcranial magnetic stimulation and transcranial direct current stimulation. A randomized clinical trial.

    PubMed

    Santos, Michele Devido Dos; Cavenaghi, Vitor Breseghello; Mac-Kay, Ana Paula Machado Goyano; Serafim, Vitor; Venturi, Alexandre; Truong, Dennis Quangvinh; Huang, Yu; Boggio, Paulo Sérgio; Fregni, Felipe; Simis, Marcel; Bikson, Marom; Gagliardi, Rubens José

    2017-01-01

    Patients undergoing the same neuromodulation protocol may present different responses. Computational models may help in understanding such differences. The aims of this study were, firstly, to compare the performance of aphasic patients in naming tasks before and after one session of transcranial direct current stimulation (tDCS), transcranial magnetic stimulation (TMS) and sham, and analyze the results between these neuromodulation techniques; and secondly, through computational model on the cortex and surrounding tissues, to assess current flow distribution and responses among patients who received tDCS and presented different levels of results from naming tasks. Prospective, descriptive, qualitative and quantitative, double blind, randomized and placebo-controlled study conducted at Faculdade de Ciências Médicas da Santa Casa de São Paulo. Patients with aphasia received one session of tDCS, TMS or sham stimulation. The time taken to name pictures and the response time were evaluated before and after neuromodulation. Selected patients from the first intervention underwent a computational model stimulation procedure that simulated tDCS. The results did not indicate any statistically significant differences from before to after the stimulation.The computational models showed different current flow distributions. The present study did not show any statistically significant difference between tDCS, TMS and sham stimulation regarding naming tasks. The patients'responses to the computational model showed different patterns of current distribution.

  15. Distributed Learning: Revitalizing Anesthesiology Training in Resource-Limited Ethiopia.

    PubMed

    Patel, Krupa B; Dooley, Morgan; Abate, Ananya; Moll, Vanessa

    2017-01-01

    Ethiopia has a significant paucity of available health-care workers. Despite the increasing number of medical schools, there are not enough physician instructors. Furthermore, availability and standardization of postgraduate training are lacking. Modalities of e-learning have been shown to be successful when used to impart medical education in other resource-limited countries. The Emory University and Addis Ababa University (AAU) Departments of Anesthesiology have formed a collaboration with the intent of improving the AAU Anesthesiology residency program, one of two postgraduate training programs for anesthesiology in Ethiopia. An initial educational needs assessment identified areas in the existing training program that required improvement. In this pilot study, we describe how the current classroom-based curriculum is augmented by the introduction of interactive educational sessions and distributed learning in the form of video lectures. Video lectures covered topics based on areas identified by Ethiopian residents and faculty. Interactive sessions included hands-on ultrasound workshops and epidural placement practicums, a journal club, problem-based learning sessions, and a mock code simulation. Assessment of the additions of the newly introduced blended learning technique was conducted via pre- and posttests on the topics presented. Pre- to posttest score averages increased from 54.5% to 83.6%. An expansion of educational resources and modes of didactics are needed to fill the gaps that exist in Ethiopian anesthesiology training. Incorporating distributed learning into the existing didactic structure may lead to more efficacious instruction resulting in a higher retention rate of information.

  16. The effect of intracortical bone pin application on kinetics and tibiocalcaneal kinematics of walking gait.

    PubMed

    Maiwald, Christian; Arndt, Anton; Nester, Chris; Jones, Richard; Lundberg, Arne; Wolf, Peter

    2017-02-01

    Bone anchored markers using intracortical bone pins are one of the few available methods for analyzing skeletal motion during human gait in-vivo without errors induced by soft tissue artifacts. However, bone anchored markers require local anesthesia and may alter the motor control and motor output during gait. The purpose of this study was to examine the effect of local anesthesia and the use of bone anchored markers on typical gait analysis variables. Five subjects were analyzed in two different gait analysis sessions. In the first session, a protocol with skin markers was used. In the second session, bone anchored markers were added after local anesthesia was applied. For both sessions, three dimensional infrared kinematics of the calcaneus and tibia segments, ground reaction forces, and plantar pressure data were collected. 95% confidence intervals and boxplots were used to compare protocols and assess the data distribution and data variability for each subject. Although considerable variation was found between subjects, within-subject comparison of the two protocols revealed non-systematic effects on the target variables. Two of the five subjects walked at reduced gait speed during the bone pin session, which explained the between-session differences found in kinetic and kinematic variables. The remaining three subjects did not systematically alter their gait pattern between the two sessions. Results support the hypothesis that local anesthesia and the presence of bone pins still allow a valid gait pattern to be analyzed. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Body expression skills training in a communication course for dental students.

    PubMed

    Riga, Vassiliki; Kossioni, Anastassia

    2014-01-01

    In the health professions, competency in communication skills is necessary for the development of a satisfactory physician-patient interaction. Body expression is an important domain of the communication process, often not adequately addressed. The aim of this study was to describe the methodology and content of a pilot introductory training session in body expression for dental students before the beginning of their clinical training. The educational methods were based on experiential learning and embodied training, where the session's content focused on five themes representing different phases of the dental treatment session. A questionnaire was distributed before and after the session to assess any changes in students' self-perceptions in communication skills. There were statistically significant improvements in the total values of the students self-perceptions of their communication skills obtained before and after the training and in specific elements such as small group situations, performing an interview, understanding the feelings of others and expressing one's own feelings. The dental students in the present study felt that this preclinical experiential learning session improved their communication skills. The feedback from this training experience will enable further development of an effective communication course for clinical dentistry.

  18. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa

    2006-12-01

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  19. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  20. Radiation: Physical Characterization and Environmental Measurements

    NASA Technical Reports Server (NTRS)

    1997-01-01

    In this session, Session WP4, the discussion focuses on the following topics: Production of Neutrons from Interactions of GCR-Like Particles; Solar Particle Event Dose Distributions, Parameterization of Dose-Time Profiles; Assessment of Nuclear Events in the Body Produced by Neutrons and High-Energy Charged Particles; Ground-Based Simulations of Cosmic Ray Heavy Ion Interactions in Spacecraft and Planetary Habitat Shielding Materials; Radiation Measurements in Space Missions; Radiation Measurements in Civil Aircraft; Analysis of the Pre-Flight and Post-Flight Calibration Procedures Performed on the Liulin Space Radiation Dosimeter; and Radiation Environment Monitoring for Astronauts.

  1. Body Fluid Regulation and Hemopoiesis in Space Flight

    NASA Technical Reports Server (NTRS)

    1997-01-01

    In this session, Session JA2, the discussion focuses on the following topics: Bodymass and Fluid Distribution During Longterm Spaceflight with and without Countermeasures; Plasma Volume, Extracellular Fluid Volume, and Regulatory Hormones During Long-Term Space Flight; Effect of Microgravity and its Ground-Based Models on Fluid Volumes and Hemocirculatory Volumes; Seventeen Weeks of Horizontal Bed Rest, Lower Body Negative Pressure Testing, and the Associated Plasma Volume Response; Evaporative Waterloss in Space Theoretical and Experimental Studies; Erythropoietin Under Real and Simulated Micro-G Conditions in Humans; and Vertebral Bone Marrow Changes Following Space Flight.

  2. Number of pulses or number of sessions? An open-label study of trajectories of improvement for once-vs. twice-daily dorsomedial prefrontal rTMS in major depression.

    PubMed

    Schulze, Laura; Feffer, Kfir; Lozano, Christopher; Giacobbe, Peter; Daskalakis, Zafiris J; Blumberger, Daniel M; Downar, Jonathan

    Repetitive transcranial magnetic stimulation (rTMS) shows efficacy in the treatment of major depressive episodes (MDEs), but can require ≥4-6 weeks for maximal effect. Recent studies suggest that multiple daily sessions of rTMS can accelerate response without reducing therapeutic efficacy. However, it is unresolved whether therapeutic effects track cumulative number of pulses, or cumulative number of sessions. This open-label study reviewed clinical outcomes over a 20-30 session course of high-frequency bilateral dorsomedial prefrontal cortex (DMPFC)-rTMS among patients receiving 6000 pulses/day delivered either in twice-daily sessions 80 min apart (at 20 Hz) or single, longer, once-daily sessions (at 10 Hz). A retrospective chart review identified 130 MDD patients who underwent 20-30 daily sessions of bilateral DMPFC-rTMS (Once-daily, n = 65; Twice-daily, n = 65) at a single Canadian clinic. Mixed-effects modeling revealed significantly faster improvement (group-by-time interaction) for twice-daily versus once-daily DMPFC-rTMS. Across both groups, the pace of improvement showed a consistent relationship with number of cumulative sessions, but not with cumulative number of pulses. Although the twice-daily group completed treatment in half as many days, final clinical outcomes did not differ significantly between groups on dichotomous measures (response/remission rates: once-daily, 35.4%/33.8%; twice-daily, 41.5%/35.4%), or continuous measures, or on overall response distribution. Twice-daily rTMS appears feasible, tolerable, and capable of achieving comparable results to once-daily rTMS, while also reducing course length approximately twofold. Therapeutic gains tracked the cumulative number of sessions, not pulses. Future randomized studies comparing once-daily to multiple-daily rTMS sessions, while controlling for number of pulses, may be warranted. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  3. A Knowledge Transfer Study of the Utility of the Nova Scotia Seniors’ Mental Health Network in Implementing Seniors’ Mental Health National Guidelines

    PubMed Central

    Bosma, Mark; Cassidy, Keri-Leigh; Le Clair, J Kenneth; Helsdingen, Sherri; Devichand, Pratima

    2011-01-01

    Background The Canadian Coalition for Seniors’ Mental Health (CCSMH) developed national best-practice guidelines in seniors’ mental health. Promoting adoption of new guidelines is challenging, as paper dissemination alone has limited impact on practice change. Purpose We hypothesized that the existing knowledge transfer (KT) mechanisms of the Nova Scotia Seniors’ Mental Health Network would prove useful in transferring the CCSMH best-practice guidelines. Methods In this observational KT study, CCSMH best-practice guidelines were delivered through two interactive, case-based teaching modules on Depression & Suicide, and Delirium via a provincial tele-education program and local face-to-face sessions. Usefulness of KT was measured using self-report evaluations of material quality and learning. Evaluation results from the two session topics and from tele-education versus face-to-face sessions were compared. Results Sessions were well attended (N = 347), with a high evaluation return rate (287, 83%). Most participants reported enhanced knowledge in seniors’ mental health and intended to apply knowledge to practice. Ratings did not differ significantly between KT session topics or modes of delivery. Conclusions The KT mechanisms of a provincial seniors’ mental health network facilitated knowledge acquisition and the intention of using national guidelines on seniors’ mental health among Nova Scotian clinicians. Key elements of accelerating KT used in this initiative are discussed. PMID:23251305

  4. Learning how to rate video-recorded therapy sessions: a practical guide for trainees and advanced clinicians.

    PubMed

    McCullough, Leigh; Bhatia, Maneet; Ulvenes, Pal; Berggraf, Lene; Osborn, Kristin

    2011-06-01

    Watching and rating psychotherapy sessions is an important yet often overlooked component of psychotherapy training. This article provides a simple and straightforward guide for using one Website (www.ATOStrainer.com) that provides an automated training protocol for rating of psychotherapy sessions. By the end of the article, readers will be able to have the knowledge to go to the Website and begin using this training method as soon as they have a recorded session to view. This article presents, (a) an overview of the Achievement of Therapeutic Objectives Scale (ATOS; McCullough et al., 2003a), a research tool used to rate psychotherapy sessions; (b) a description of APA training tapes, available for purchase from APA Books, that have been rated and scored by ATOS trained clinicians and posted on the Website; (c) step-by-step procedures on how ratings can be done; (d) an introduction to www.ATOStrainer.com where ratings can be entered and compared with expert ratings; and (e) first-hand personal experiences of the authors using this training method and the benefits it affords both trainees and experienced therapists. This psychotherapy training Website has the potential to be a key resource tool for graduate students, researchers, and clinicians. Our long-range goal is to promote the growth of our understanding of psychotherapy and to improve the quality of psychotherapy provided for patients.

  5. Does motivational interviewing counseling time influence HIV-positive persons' self-efficacy to practice safer sex?

    PubMed

    Chariyeva, Zulfiya; Golin, Carol E; Earp, Jo Anne; Suchindran, Chirayath

    2012-04-01

    This study examined the impact of motivational interviewing (MI) counseling time on self-efficacy to practice safer sex for people living with HIV/AIDS (PLWHA). In 4 month intervals we followed a cohort of 490 PLWHA for 12 months. We conducted hierarchical linear regression models to examine changes in safer sex self-efficacy when participants received zero, low to moderate (5-131 min) and high (132-320 min) doses of MI time. We conducted a similar analysis using number of counseling sessions as the predictor variable. Participants with low to moderate doses of MI counseling had 0.26 higher self-efficacy scores than participants with zero MI time (p=0.01). Also, they had 0.26 lower self-efficacy scores than participants with high amounts of MI time (p=0.04). Participants with high doses of MI had a 0.5 higher self-efficacy score than participants with zero amount of MI time (p<0.0001). Participants who received 3-4 counseling sessions had 0.41 greater self-efficacy scores than participants who did not receive any sessions (p<0.0001) but did not differ from participants receiving 1-2 sessions. MI time is a key to enhancing safer sex self-efficacy among PLWHA. Safer sex self-efficacy improves the more MI counseling time and sessions PLWHA receive. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  6. Digestive disease management in Japan: a report on the 6th diagnostic pathology summer fest in 2012.

    PubMed

    Ichikawa, Kazuhito; Fujimori, Takahiro; Moriya, Takuya; Ochiai, Atsushi; Yoshinaga, Shigetaka; Kushima, Ryouji; Nagahama, Ryuji; Ohkura, Yasuo; Tanaka, Shinji; Ajioka, Yoichi; Hirata, Ichiro; Tanaka, Masanori; Hoshihara, Yoshio; Kinoshita, Yoshikazu; Sasano, Hironobu; Iwashita, Akinori; Tomita, Shigeki; Hirota, Seiichi; Yao, Takashi; Fujii, Shigehiko; Matsuda, Takahisa; Ueno, Hideki; Ishikawa, Yuichi; Takubo, Kaiyo; Fukushima, Noriyoshi; Sugai, Tamotsu; Iwafuchi, Mitsuya; Imura, Jhoji; Manabe, Toshiaki; Fukayama, Masahisa

    2013-01-01

    The 6th Diagnostic Pathology Summer Fest, held in Tokyo on August 25-26, 2012, opened its gates for everyone in the medical profession. Basic pathology training can contribute to the improvement of algorithms for diagnosis and treatment. The 6th Summer Fest with the theme 'Pathology and Clinical Treatment of Gastrointestinal Diseases' was held at the Ito International Research Center, The University of Tokyo. On August 25, 'Treatment of Early Gastrointestinal Cancer and New Guidelines' was discussed in the first session, followed by 'Biopsy Diagnosis of Digestive Tract: Key Points of Pathological Diagnosis for Inflammation and Their Clinical Significance' in the second session. On August 26, cases were discussed in the third session, and issues on pathological diagnosis and classification of neuroendorcrine tumor in the fourth session. The summaries of speeches and discussions are introduced along with the statements of each speaker. This meeting was not a formal evidence-based consensus conference, and 20 experts gave talks on their areas of specialty. Discussion was focused on how the management strategy should be standardized on the algorithm of patient care. © 2013 S. Karger AG, Basel.

  7. One Step Quantum Key Distribution Based on EPR Entanglement.

    PubMed

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  8. Quantum cryptography and applications in the optical fiber network

    NASA Astrophysics Data System (ADS)

    Luo, Yuhui

    2005-09-01

    Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement. In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton entanglement with a new protocol is proposed. Its advantages are: a larger information capacity can be obtained with a longer transmission distance and the detection of multiple photons is easier than that of a single photon. The security and attacks pertaining to such a system are also studied. Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part. Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate. Lastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications.

  9. The North American yoga therapy workforce survey.

    PubMed

    Sullivan, Marlysa; Leach, Matthew; Snow, James; Moonaz, Steffany

    2017-04-01

    To describe the personal, professional, practice, service and consumer characteristics of the North American yoga therapy workforce. Cross-sectional, descriptive survey developed and informed by the contemporary workforce literature. A link to the e-survey was distributed to members of the International Association of Yoga Therapists. 367 members responded (∼20% of eligible participants). Most were aged 40-69 years (88%) and female (91%). Almost half (42%) identified as a "seasoned yoga therapist" and few (9%) graduated from an accredited 800-h yoga therapy program. An average of 8h/week was spent in clinical practice with many (41%) earning an annual income of

  10. Summary of ADTT Website Functionality and Features

    NASA Technical Reports Server (NTRS)

    Hawke, Veronica; Duong, Trang; Liang, Lawrence; Gage, Peter; Lawrence, Scott (Technical Monitor)

    2001-01-01

    This report summarizes development of the ADTT web-based design environment by the ELORET team in 2000. The Advanced Design Technology Testbed had been in development for several years, with demonstration applications restricted to aerodynamic analyses of subsonic aircraft. The key changes achieved this year were improvements in Web-based accessibility, evaluation of collaborative visualization, remote invocation of geometry updates and performance analysis, and application to aerospace system analysis. Significant effort was also devoted to post-processing of data, chiefly through comparison of similar data for alternative vehicle concepts. Such comparison is an essential requirement for designers to make informed choices between alternatives. The next section of this report provides more discussion of the goals for ADTT development. Section 3 provides screen shots from a sample session in the ADTT environment, including Login and navigation to the project of interest, data inspection, analysis execution and output evaluation. The following section provides discussion of implementation details and recommendations for future development of the software and information technologies that provide the key functionality of the ADTT system. Section 5 discusses the integration architecture for the system, which links machines running different operating systems and provides unified access to data stored in distributed locations. Security is a significant issue for this system, especially for remote access to NAS machines, so Section 6 discusses several architectural considerations with respect to security. Additional details of some aspects of ADTT development are included in Appendices.

  11. Farmworkers in Rural America, 1971-1972: Part 3C, Land Ownership, Use, and Distribution. Hearings Before the Subcommittee on Migratory Labor of the Committee on Labor and Public Welfare, United States Senate, 92d Congress, 1st and 2d Sessions, January 13, 1972 San Francisco, Calif.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Labor and Public Welfare.

    On January 13, 1972, the subcommittee resumed its hearings on land ownership, agribusiness, and agrigovernment in California. Witnesses testified on: (1) the impact of land use, ownership, and distribution on farmworkers, farmers, and consumers; (2) the national policy of land ownership and distribution; (3) California's water project and…

  12. Counterfactual quantum key distribution with high efficiency

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-Yan

    2010-11-01

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  13. Counterfactual quantum key distribution with high efficiency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun Ying; Beijing Electronic Science and Technology Institute, Beijing 100070; Wen Qiaoyan

    2010-11-15

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  14. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology

    PubMed Central

    Winata, Doni

    2018-01-01

    The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399

  15. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.

    PubMed

    Yohan, Alexander; Lo, Nai-Wei; Winata, Doni

    2018-03-25

    The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.

  16. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  17. A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

    PubMed Central

    Moon, Soo Young; Cho, Tae Ho

    2014-01-01

    Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649

  18. Post-action staff support for the Concerns of Police Survivors Organization (COPS).

    PubMed

    Mitchell, Jeffrey T

    2010-01-01

    This concept article presents an overview of a post-action staff support (PASS) session that has been effective in meeting many of the emotional needs of a large, diverse group of volunteers who serve as support personnel for grieving family members, significant others, and co-workers at the annual National Police Survivors Conference in the Washington, DC area. This particular approach to the PASS process is not a fixed, rigid approach. Instead, it is adaptable and flexible and it can be altered as necessary to suit specific populations with special needs. The key elements of the two-hour PASS session have evolved over many years to the current form presented in this article.

  19. Current research in aging: a report from the 2015 Ageing Summit.

    PubMed

    Moyse, Emmanuel; Lahousse, Lies; Krantic, Slavica

    2015-01-01

    Ageing Summit, London, UK, 10-12 February 2015 The Ageing Summit 2015 held on 10-12 February 2015 in London (UK) provided an extensive update to our knowledge of the 'Biology of Ageing' and a forum to discuss the participants' latest research progress. The meeting was subdivided into four thematic sessions: cellular level research including the aging brain; slowing down progression, rejuvenation and self-repair; genetic and epigenetic regulation; and expression and pathology of age-related diseases. Each session included multiple key presentations, three to five short research communications and ongoing poster presentations. The meeting provided an exciting multidisciplinary overview of the aging process from cellular and molecular mechanisms to medico-social aspects of human aging.

  20. 2012 ARPA-E Energy Innovation Summit: Fireside Chat with Steven Chu and Bill Gates

    ScienceCinema

    Chu, Steven; Gates, Bill; Podesta, John

    2018-05-14

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. This video captures a session called Fireside Chat that featured Steven Chu, the Secretary of Energy, and Bill Gates, Chairman of Microsoft Corporation. The session is moderated by John Podesta, Chair of the Center for American Progress. Energy Secretary Steven Chu and Microsoft Founder and Chairman Bill Gates exchanged ideas about how small businesses and innovators can overcome the challenges that face many startups.

  1. Bridging medicine and biomedical technology: enhance translation of fundamental research to patient care

    PubMed Central

    Raff, Adam B.; Seiler, Theo G.; Apiou-Sbirlea, Gabriela

    2017-01-01

    The ‘Bridging medicine and biomedical technology’ special all-congress session took place for the first time at the OSA Biophotonics Congress: Optics in Life Sciences in 2017 (http://www.osa.org/enus/meetings/osa_meetings/optics_in_the_life_sciences/bridging_medicine_and_biomedical_technology_specia/). The purpose was to identify key challenges the biomedical scientists in academia have to overcome to translate their discoveries into clinical practice through robust collaborations with industry and discuss best practices to facilitate and accelerate the process. Our paper is intended to complement the session by providing a deeper insight into the concept behind the structure and the content we developed. PMID:29296473

  2. Analytic process and dreaming about analysis.

    PubMed

    Sirois, François

    2016-12-01

    Dreams about the analytic session feature a manifest content in which the analytic setting is subject to distortion while the analyst appears undisguised. Such dreams are a consistent yet infrequent occurrence in most analyses. Their specificity consists in never reproducing the material conditions of the analysis as such. This paper puts forward the following hypothesis: dreams about the session relate to some aspects of the analyst's activity. In this sense, such dreams are indicative of the transference neurosis, prefiguring transference resistances to the analytic elaboration of key conflicts. The parts taken by the patient and by the analyst are discussed in terms of their ability to signal a deepening of the analysis. Copyright © 2016 Institute of Psychoanalysis.

  3. Distributed GIS Systems, Open Specifications and Interoperability: How do They Relate to the Sustainable Management of Natural Resources?

    Treesearch

    Rafael Moreno-Sanchez

    2006-01-01

    The aim of this is paper is to provide a conceptual framework for the session: “The role of web-based Geographic Information Systems in supporting sustainable management.” The concepts of sustainability, sustainable forest management, Web Services, Distributed Geographic Information Systems, interoperability, Open Specifications, and Open Source Software are defined...

  4. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  5. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  6. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.

    PubMed

    Leverrier, Anthony; Grangier, Philippe

    2009-05-08

    We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.

  7. Sixth New Zealand Computer Conference (Auckland 78). Volume II, The Proceedings.

    ERIC Educational Resources Information Center

    New Zealand Computer Society, Auckland.

    Speeches made by five keynote speakers, summaries of five forum sessions, and one paper are included in this collection of presentations at a conference on the application of computer technology in New Zealand. The keynote addresses include "Analysis of Key Factors for Motivation of Data Processing Professionals," by J. Daniel Couger;…

  8. Perceptions of Quality Life in Hamilton's Neighbourhood Hubs: A Qualitative Analysis

    ERIC Educational Resources Information Center

    Eby, Jeanette; Kitchen, Peter; Williams, Allison

    2012-01-01

    This paper examines perceptions of quality of life in Hamilton, Ontario, Canada from the perspective of residents and key community stakeholders. A series of eight focus groups were conducted. Six sessions were held with residents of neighbourhood "hubs", areas characterized by high levels of poverty. The following themes were…

  9. New York State Forum for Information Resource Management: 1998-1999 Annual Report.

    ERIC Educational Resources Information Center

    New York State Forum for Information Resource Management.

    This annual report of the New York State Forum for Information Resource Management begins with a section that summarizes key activities for 1998-99, including partnerships with other organizations, sessions on the use of information in government and information security, programs on the challenges of electronic commerce for government,…

  10. Four Key Themes in Perkins III Reauthorization: A Political Analysis

    ERIC Educational Resources Information Center

    Lakes, Richard D.

    2007-01-01

    The Carl D. Perkins Vocational and Technical Education Act of 1998 (Perkins III) has been reauthorized in the first session of the 109th Congress, but not without strong opposition from the Bush Administration and allied neoconservative school reformers. This paper will detail four neoconservative rationales--modernization, competition, alignment,…

  11. A Seven-Year Retrospective View of a Course in Epidemiology and Biostatistics.

    ERIC Educational Resources Information Center

    Mulvihill, Michael N.; And Others

    1980-01-01

    Modifications of a course in epidemiology and biostatistics, designed to facilitate the presentation of difficult material in a clinically relevant manner, are described. Key strategies include seminar sessions devoted to methods of epidemiology and the critique of pairs of published studies, and the use of a course-specific syllabus. (JMD)

  12. Sustainable ecological systems: Implementing an ecological approach to land management

    Treesearch

    W. Wallace Covington; Leonard F. DeBano

    1994-01-01

    This conference brought together scientiests and managers from federal, state, and local agencies, along with private-sector interests, to examine key concepts involving sustainable ecological systems, and ways in which to apply these concepts to ecosystem management. Session topics were: ecological consequenses of land and water use changes, biology of rare and...

  13. Taking control of work-life balance.

    PubMed

    2016-05-21

    For veterinary professionals, a key component of maintaining good wellbeing is being able to get to the end of a day feeling happy, content and in control. This, however, can prove challenging to achieve. Kristy Ebanks reports on a series of sessions from this year's BSAVA congress which focused on improving wellbeing. British Veterinary Association.

  14. New Horizons: An Empowerment Program for Egyptian Adolescent Girls.

    ERIC Educational Resources Information Center

    Swanson, Julie Hanson

    New Horizons is a nonschool program that demystifies and communicates essential information on basic life skills and reproductive health to Egyptian girls and young women aged 9-20. The program consists of 100 hour-long sessions, each including an introduction to a specific topic, review of group knowledge level, discussion around key points…

  15. A Vision of Change for America.

    ERIC Educational Resources Information Center

    Clinton, William J.

    This report was prepared to accompany President Clinton's first address to a Joint Session of Congress. It describes in detail the comprehensive economic plan being proposed by the new administration for the nation. The plan has three key elements: economic stimulus to create jobs now while laying the foundation for long-term economic growth; long…

  16. From a United Nations Study: The Climatic and Other Global Effects of Nuclear War.

    ERIC Educational Resources Information Center

    Environment, 1988

    1988-01-01

    Presents excerpts from the first chapter of a report presented to the General Assembly of the United Nations during the Special Session on Disarmament. Discussed are key scientific issues regarding the global effects of nuclear war, and the findings and conclusions presented in the report. (CW)

  17. Violence Prevention. A Center Quick Training Aid.

    ERIC Educational Resources Information Center

    California Univ., Los Angeles. Center for Mental Health in Schools.

    Safe schools, violence prevention, and conflict resolution are all major concerns in addressing barriers to learning. This quick training aid presents a brief set of resources to guide those providing an in-service training session on violence prevention in schools. The packet contains a brief introduction to the topic with key talking points,…

  18. RUASN: a robust user authentication framework for wireless sensor networks.

    PubMed

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  19. Water quality issues associated with agricultural drainage in semiarid regions

    NASA Astrophysics Data System (ADS)

    Sylvester, Marc A.

    High incidences of mortality, birth defects, and reproductive failure in waterfowl using Kesterson Reservoir in the San Joaquin Valley, Calif., have occurred because of the bioaccumulation of selenium from irrigation drainage. These circumstances have prompted concern about the quality of agriculture drainage and its potential effects on human health, fish and wildlife, and beneficial uses of water. The U.S. Geological Survey (USGS) and Lawrence Berkeley Laboratory, University of California (Berkeley, Calif.) organized a 1-day session at the 1986 AGU Fall Meeting in San Francisco, Calif., to provide an interdisciplinary forum for hydrologists, geochemists, and aquatic chemists to discuss the processes controlling the distribution, mobilization, transport, and fate of trace elements in source rocks, soils, water, and biota in semiarid regions in which irrigated agriculture occurs. The focus of t h e session was the presentation of research results on the source, distribution, movement, and fate of selenium in agricultural drainage.

  20. Scalability Analysis and Use of Compression at the Goddard DAAC and End-to-End MODIS Transfers

    NASA Technical Reports Server (NTRS)

    Menasce, Daniel A.

    1998-01-01

    The goal of this task is to analyze the performance of single and multiple FTP transfer between SCF's and the Goddard DAAC. We developed an analytic model to compute the performance of FTP sessions as a function of various key parameters, implemented the model as a program called FTP Analyzer, and carried out validations with real data obtained by running single and multiple FTP transfer between GSFC and the Miami SCF. The input parameters to the model include the mix to FTP sessions (scenario), and for each FTP session, the file size. The network parameters include the round trip time, packet loss rate, the limiting bandwidth of the network connecting the SCF to a DAAC, TCP's basic timeout, TCP's Maximum Segment Size, and TCP's Maximum Receiver's Window Size. The modeling approach used consisted of modeling TCP's overall throughput, computing TCP's delay per FTP transfer, and then solving a queuing network model that includes the FTP clients and servers.

  1. 2010 Plant Molecular Biology Gordon Research Conference

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michael Sussman

    The Plant Molecular Biology Conference has traditionally covered a breadth of exciting topics and the 2010 conference will continue in that tradition. Emerging concerns about food security have inspired a program with three main themes: (1) genomics, natural variation and breeding to understand adaptation and crop improvement, (2) hormonal cross talk, and (3) plant/microbe interactions. There are also sessions on epigenetics and proteomics/metabolomics. Thus this conference will bring together a range of disciplines, will foster the exchange of ideas and enable participants to learn of the latest developments and ideas in diverse areas of plant biology. The conference provides anmore » excellent opportunity for individuals to discuss their research because additional speakers in each session will be selected from submitted abstracts. There will also be a poster session each day for a two-hour period prior to dinner. In particular, this conference plays a key role in enabling students and postdocs (the next generation of research leaders) to mingle with pioneers in multiple areas of plant science.« less

  2. Comparative effectiveness of instructional methods: oral and pharyngeal cancer examination.

    PubMed

    Clark, Nereyda P; Marks, John G; Sandow, Pamela R; Seleski, Christine E; Logan, Henrietta L

    2014-04-01

    This study compared the effectiveness of different methods of instruction for the oral and pharyngeal cancer examination. A group of thirty sophomore students at the University of Florida College of Dentistry were randomly assigned to three training groups: video instruction, a faculty-led hands-on instruction, or both video and hands-on instruction. The training intervention involved attending two sessions spaced two weeks apart. The first session used a pretest to assess students' baseline didactic knowledge and clinical examination technique. The second session utilized two posttests to assess the comparative effectiveness of the training methods on didactic knowledge and clinical technique. The key findings were that students performed the clinical examination significantly better with the combination of video and faculty-led hands-on instruction (p<0.01). All students improved their clinical exam skills, knowledge, and confidence in performing the oral and pharyngeal cancer examination independent of which training group they were assigned. Utilizing both video and interactive practice promoted greater performance of the clinical technique on the oral and pharyngeal cancer examination.

  3. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  4. One Step Quantum Key Distribution Based on EPR Entanglement

    PubMed Central

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-01-01

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865

  5. Public participation in IRP process: A short note paper summarizing a panel session at the July 1994 summer power meeting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fisher, C.; Esteb, N.; Greene, E.R. Jr.

    1996-11-01

    Times are changing in the utility industry and public groups are taking a more active role in the Integrated Resource Planning Process by presenting their advice and consultation on matters of public concerns as evidenced by the following abstracts that summarize the panel session held during the 1994 Summer Power Meeting in San Francisco, California. Carol Fisher, ABB Systems Control, Automated Distribution Division, chaired the session; while Nancy Esteb of Pacificorp, Earl Greene, Jr. of Florida Power Corporation and Benjamin Hobbs of Case Western Reserve University were the panelists. Each panelist presented a different perspective on public participation in themore » IRP process with examples of how their companies developed and implemented this process. The papers summarize the individual presentations and discussions.« less

  6. Short-term effects of electronic and tobacco cigarettes on exhaled nitric oxide.

    PubMed

    Marini, Sara; Buonanno, Giorgio; Stabile, Luca; Ficco, Giorgio

    2014-07-01

    The objective of this study was to compare the short-term respiratory effects due to the inhalation of electronic and conventional tobacco cigarette-generated mainstream aerosols through the measurement of the exhaled nitric oxide (eNO). To this purpose, twenty-five smokers were asked to smoke a conventional cigarette and to vape an electronic cigarette (with and without nicotine), and an electronic cigarette without liquid (control session). Electronic and tobacco cigarette mainstream aerosols were characterized in terms of total particle number concentrations and size distributions. On the basis of the measured total particle number concentrations and size distributions, the average particle doses deposited in alveolar and tracheobronchial regions of the lungs for a single 2-s puff were also estimated considering a subject performing resting (sitting) activity. Total particle number concentrations in the mainstream resulted equal to 3.5±0.4×10(9), 5.1±0.1×10(9), and 3.1±0.6×10(9) part. cm(-3) for electronic cigarettes without nicotine, with nicotine, and for conventional cigarettes, respectively. The corresponding alveolar doses for a resting subject were estimated equal to 3.8×10(10), 5.2×10(10) and 2.3×10(10) particles. The mean eNO variations measured after each smoking/vaping session were equal to 3.2ppb, 2.7ppb and 2.8ppb for electronic cigarettes without nicotine, with nicotine, and for conventional cigarettes, respectively; whereas, negligible eNO changes were measured in the control session. Statistical tests performed on eNO data showed statistically significant differences between smoking/vaping sessions and the control session, thus confirming a similar effect on human airways whatever the cigarette smoked/vaped, the nicotine content, and the particle dose received. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  8. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  9. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. Design and implementation of a flipped classroom learning environment in the biomedical engineering context.

    PubMed

    Corrias, Alberto; Cho Hong, James Goh

    2015-01-01

    The design and implementation of a learning environment that leverages on the use of various technologies is presented. The context is an undergraduate core engineering course within the biomedical engineering curriculum. The topic of the course is data analysis in biomedical engineering problems. One of the key ideas of this study is to confine the most mathematical and statistical aspects of data analysis in prerecorded video lectures. Students are asked to watch the video lectures before coming to class. Since the classroom session does not need to cover the mathematical theory, the time is spent on a selected real world scenario in the field of biomedical engineering that exposes students to an actual application of the theory. The weekly cycle is concluded with a hands-on tutorial session in the computer rooms. A potential problem would arise in such learning environment if the students do not follow the recommendation of watching the video lecture before coming to class. In an attempt to limit these occurrences, two key instruments were put in place: a set of online self-assessment questions that students are asked to take before the classroom session and a simple rewards system during the classroom session. Thanks to modern learning analytics tools, we were able to show that, on average, 57.9% of students followed the recommendation of watching the video lecture before class. The efficacy of the learning environment was assessed through various means. A survey was conducted among the students and the gathered data support the view that the learning environment was well received by the students. Attempts were made to quantify the impacts on learning of the proposed measures by taking into account the results of selected questions of the final examination of the course. Although the presence of confounding factors demands caution in the interpretation, these data seem to indicate a possible positive effect of the use of video lectures in this technologically enhanced learning environment.

  11. Prospective and retrospective timing by pigeons.

    PubMed

    Fetterman, J Gregor; Killeen, P Richard

    2010-05-01

    Pigeons discriminated between two pairs of durations: a short set (2.5 and 5 sec) and a long set (5 and 10 sec). The pairs were intermixed within sessions and identified by the colors on the signal and choice keys. Once the task was learned, the pigeons experienced the following three conditions seriatim: (1) The signal key was made ambiguous about the test change, but the choice keys were informative (retrospective); (2) the signal key identified the test range, but the choice keys did not (prospective); (3) probe trials were introduced in which the color of the center key signaled one test range, but the color of the choice keys signaled the other test range (inconsistent). Accuracy of choice decreased in the retrospective condition and, returned to baseline levels, was higher under the prospective condition than under the retrospective condition. In a final condition, referred to as conflict trials, the center-key color signified one test range and the choice-key colors the other range. The results from these conflict-inconsistent tests indicate that choice behavior was largely controlled by the signal-key color and not by the choice-key color. We relate these findings to different approaches to timing in animals.

  12. Evaluation of interventions on road traffic injuries in Peru: a qualitative approach

    PubMed Central

    2012-01-01

    Background Evaluation of interventions on road traffic injuries (RTI) going beyond the assessment of impact to include factors underlying success or failure is an important complement to standard impact evaluations. We report here how we used a qualitative approach to assess current interventions implemented to reduce RTIs in Peru. Methods We performed in-depth interviews with policymakers and technical officers involved in the implementation of RTI interventions to get their insight on design, implementation and evaluation aspects. We then conducted a workshop with key stakeholders to analyze the results of in-depth interviews, and to further discuss and identify key programmatic considerations when designing and implementing RTI interventions. We finally performed brainstorming sessions to assess potential system-wide effects of a selected intervention (Zero Tolerance), and to identify adaptation and redesign needs for this intervention. Results Key programmatic components were consistently identified that should be considered when designing and implementing RTI interventions. They include effective and sustained political commitment and planning; sufficient and sustained budget allocation; training, supervision, monitoring and evaluation of implemented policies; multisectoral participation; and strong governance and accountability. Brainstorming sessions revealed major negative effects of the selected intervention on various system building blocks. Conclusions Our approach revealed substantial caveats in current RTI interventions in Peru, and fundamental negative effects on several components of the sectors and systems involved. It also highlighted programmatic issues that should be applied to guarantee an effective implementation and evaluation of these policies. The findings from this study were discussed with key stakeholders for consideration in further designing and planning RTI control interventions in Peru. PMID:22269578

  13. Evaluation of interventions on road traffic injuries in Peru: a qualitative approach.

    PubMed

    Huicho, Luis; Adam, Taghreed; Rosales, Edmundo; Paca-Palao, Ada; López, Luis; Luna, Diego; Miranda, J Jaime

    2012-01-23

    Evaluation of interventions on road traffic injuries (RTI) going beyond the assessment of impact to include factors underlying success or failure is an important complement to standard impact evaluations. We report here how we used a qualitative approach to assess current interventions implemented to reduce RTIs in Peru. We performed in-depth interviews with policymakers and technical officers involved in the implementation of RTI interventions to get their insight on design, implementation and evaluation aspects. We then conducted a workshop with key stakeholders to analyze the results of in-depth interviews, and to further discuss and identify key programmatic considerations when designing and implementing RTI interventions. We finally performed brainstorming sessions to assess potential system-wide effects of a selected intervention (Zero Tolerance), and to identify adaptation and redesign needs for this intervention. Key programmatic components were consistently identified that should be considered when designing and implementing RTI interventions. They include effective and sustained political commitment and planning; sufficient and sustained budget allocation; training, supervision, monitoring and evaluation of implemented policies; multisectoral participation; and strong governance and accountability. Brainstorming sessions revealed major negative effects of the selected intervention on various system building blocks. Our approach revealed substantial caveats in current RTI interventions in Peru, and fundamental negative effects on several components of the sectors and systems involved. It also highlighted programmatic issues that should be applied to guarantee an effective implementation and evaluation of these policies. The findings from this study were discussed with key stakeholders for consideration in further designing and planning RTI control interventions in Peru.

  14. 77 FR 35097 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-12

    ... redemption procedures, fees, portfolio holdings, disclosure policies, distributions, and taxes can be found... calculated by the Trust's fund accountant and determined as of the close of the regular trading session on...

  15. Monitoring the marketing, distribution, and use of Sprinkles micronutrient powders in rural western Kenya.

    PubMed

    Suchdev, Parminder S; Ruth, Laird; Obure, Alfredo; Were, Vincent; Ochieng, Cliff; Ogange, Lorraine; Owuor, Mercy; Ngure, Frances; Quick, Robert; Juliao, Patricia; Jung, Christina; Teates, Kathryn; Cruz, Kari; Jefferds, Maria Elena D

    2010-06-01

    In 2007, the US Centers for Disease Control and Prevention partnered with local Kenyan institutions to implement the Nyando Integrated Child Health and Education Project, an effectiveness study that used social marketing and a community-based distribution program to promote the sale of Sprinkles and other health products. To describe monitoring of wholesale sales, household demand, promotional strategies, and perceived factors influencing Sprinkles sales among vendors. Ongoing quantitative and qualitative monitoring of Sprinkles sales began in May 2007 in 30 intervention villages. Data sources included baseline and follow-up cross-sectional surveys; office records of Sprinkles sales to vendors; biweekly household monitoring of Sprinkles use; and qualitative data collection, including vendor focus groups and key informant interviews. A total of 550 children aged 6 to 35 months were enrolled at baseline, and 451 were available at 12-month follow-up. During this period, nearly 160,000 sachets were sold wholesale to vendors, with variability in sales influenced by the social, political, and economic context. Vendors living closer to the wholesale office purchased more Sprinkles, so a second office was opened closer to remote vendors. On average, 33% of households purchased Sprinkles during household monitoring visits. Training sessions and community launches were important for community support and raising awareness about Sprinkles. Vendor incentives motivated vendors to sell Sprinkles, and consumer incentives promoted purchases. Sprinkles program monitoring in Kenya was critically important for understanding sales and distribution trends and vendor perceptions. Understanding these trends led to strategic changes to the intervention over time.

  16. Spatiotemporal radiotherapy planning using a global optimization approach

    NASA Astrophysics Data System (ADS)

    Adibi, Ali; Salari, Ehsan

    2018-02-01

    This paper aims at quantifying the extent of potential therapeutic gain, measured using biologically effective dose (BED), that can be achieved by altering the radiation dose distribution over treatment sessions in fractionated radiotherapy. To that end, a spatiotemporally integrated planning approach is developed, where the spatial and temporal dose modulations are optimized simultaneously. The concept of equivalent uniform BED (EUBED) is used to quantify and compare the clinical quality of spatiotemporally heterogeneous dose distributions in target and critical structures. This gives rise to a large-scale non-convex treatment-plan optimization problem, which is solved using global optimization techniques. The proposed spatiotemporal planning approach is tested on two stylized cancer cases resembling two different tumor sites and sensitivity analysis is performed for radio-biological and EUBED parameters. Numerical results validate that spatiotemporal plans are capable of delivering a larger BED to the target volume without increasing the BED in critical structures compared to conventional time-invariant plans. In particular, this additional gain is attributed to the irradiation of different regions of the target volume at different treatment sessions. Additionally, the trade-off between the potential therapeutic gain and the number of distinct dose distributions is quantified, which suggests a diminishing marginal gain as the number of dose distributions increases.

  17. PowerON: the use of instant message counseling and the Internet to facilitate HIV/STD education and prevention.

    PubMed

    Moskowitz, David A; Melton, Dan; Owczarzak, Jill

    2009-10-01

    In recent years, Internet-based or online counseling has emerged as an effective way to assess psychological disorders and discuss destructive behaviors with individuals or groups of individuals. This study explores the application of online counseling to HIV/STD risk-taking behavior among men who have sex with men (MSM). PowerON, an organization that provides sexual health information to MSM exclusively online, used instant message technology to counsel MSM in real time through computer-mediated means. A sample of 279 transcripts of instant message exchanges between PowerON counselors and Gay.com users were recorded and qualitatively analyzed. Approximately 43% of the instant message sessions discussed information about HIV/STD testing. Risk-taking behaviors were addressed in 39% of the sessions. Information about HIV/STDs and general counseling were given in 23% and 18% of the counseling sessions, respectively. The data showed these instant message sessions to be a potentially feasible forum for HIV/STD counseling. Information ordinarily disseminated at health clinics could be successfully distributed through the Internet to MSM. 2009 Elsevier Ireland Ltd.

  18. PowerON: The use of instant message counseling and the Internet to facilitate HIV/STD education and prevention

    PubMed Central

    Moskowitz, David A.; Melton, Dan; Owczarzak, Jill

    2015-01-01

    Objective In recent years, Internet-based or online counseling has emerged as an effective way to assess psychological disorders and discuss destructive behaviors with individuals or groups of individuals. This study explores the application of online counseling to HIV/STD risk-taking behavior among men who have sex with men (MSM). Methods PowerON, an organization that provides sexual health information to MSM exclusively online, used instant message technology to counsel MSM in real time through computer-mediated means. A sample of 279 transcripts of instant message exchanges between PowerON counselors and Gay.com users were recorded and qualitatively analyzed. Results Approximately 43% of the instant message sessions discussed information about HIV/STD testing. Risk-taking behaviors were addressed in 39% of the sessions. Information about HIV/STDs and general counseling were given in 23% and 18% of the counseling sessions respectively. Conclusion The data showed these instant message sessions to be a potentially feasible forum for HIV/STD counseling. Practice Implications Information ordinarily disseminated at health clinics could be successfully distributed through the Internet to MSM. PMID:19217742

  19. Results of a Community-Based Randomized Trial to Increase Colorectal Cancer Screening Among Filipino Americans

    PubMed Central

    Bastani, Roshan; Danao, Leda L.; Antonio, Cynthia; Garcia, Gabriel M.; Crespi, Catherine M.

    2010-01-01

    Objectives. We conducted 1 of the first community-based trials to develop a multicomponent intervention that would increase colorectal cancer screening among an Asian American population. Methods. Filipino Americans (n = 548) nonadherent to colorectal cancer (CRC) screening guidelines were randomized into an intervention group that received an education session on CRC screening and free fecal occult blood test (FOBT) kits; a second intervention group that received an education session but no free FOBT kits; and a control group that received an education session on the health benefits of physical activity. Results. Self-reported CRC screening rates during the 6-month follow-up period were 30%, 25%, and 9% for participants assigned to intervention with FOBT kit, intervention without the kit, and control group, respectively. Participants in either of the 2 intervention groups were significantly more likely to report screening at follow-up than were participants in the control group. Conclusions. A multicomponent intervention that includes an educational group session in a community setting can significantly increase CRC screening among Filipino Americans, even when no free FOBT kits are distributed. PMID:20864724

  20. Comparison of Select Analytes in Exhaled Aerosol from E-Cigarettes with Exhaled Smoke from a Conventional Cigarette and Exhaled Breaths

    PubMed Central

    Long, Gerald A.

    2014-01-01

    Exhaled aerosols were collected following the use of two leading U.S. commercial electronic cigarettes (e-cigarettes) and a conventional cigarette by human subjects and analyzed for phenolics, carbonyls, water, glycerin and nicotine using a vacuum-assisted filter pad capture system. Exhaled breath blanks were determined for each subject prior to each product use and aerosol collection session. Distribution and mass balance of exhaled e-cigarette aerosol composition was greater than 99.9% water and glycerin, and a small amount (<0.06%) of nicotine. Total phenolic content in exhaled e-cigarette aerosol was not distinguishable from exhaled breath blanks, while total phenolics in exhaled cigarette smoke were significantly greater than in exhaled e-cigarette aerosol and exhaled breaths, averaging 66 µg/session (range 36 to 117 µg/session). The total carbonyls in exhaled e-cigarette aerosols were also not distinguishable from exhaled breaths or room air blanks. Total carbonyls in exhaled cigarette smoke was significantly greater than in exhaled e-cigarette aerosols, exhaled breath and room air blanks, averaging 242 µg/session (range 136 to 352 µg/session). These results indicate that exhaled e-cigarette aerosol does not increase bystander exposure for phenolics and carbonyls above the levels observed in exhaled breaths of air. PMID:25350011

  1. An experimental analysis of ongoing verbal behavior: Reinforcement, verbal operants, and superstitious behavior

    PubMed Central

    Leigland, Sam

    1996-01-01

    Four adult humans were asked to asked to “find” and talk about a particular topic to a person in an adjoining room, and were instructed that they would hear a short beep (the only form of reply from the other person) when they were talking about the topic, or were “close” to the topic. In Session 1, the experimenter in the adjoining room presented the beeps in the manner of shaping, or the differential reinforcement of successive approximations, “toward” the designated topic. In Session 2, the same conditions were in effect but the experimenter was unable to hear the subject and the beeps were presented noncontingently in a way that roughly matched the frequency and distribution of presentations in Session 1. In Session 3, shaping conditions were again in effect but with a different topic than that designated for Session 1. Audio recordings were transcribed in a way that was designed to show the progress of shaping over time. These and additional forms of supporting data and accompanying rationale are presented and discussed in detail. Issues raised by the methodology and results of the experiment include the nature of the verbal operant, superstitious verbal behavior, and a variety of methodological issues relevant to the experimental analysis of ongoing or continuous verbal behavior. PMID:22477112

  2. Comparison of select analytes in exhaled aerosol from e-cigarettes with exhaled smoke from a conventional cigarette and exhaled breaths.

    PubMed

    Long, Gerald A

    2014-10-27

    Exhaled aerosols were collected following the use of two leading U.S. commercial electronic cigarettes (e-cigarettes) and a conventional cigarette by human subjects and analyzed for phenolics, carbonyls, water, glycerin and nicotine using a vacuum-assisted filter pad capture system. Exhaled breath blanks were determined for each subject prior to each product use and aerosol collection session. Distribution and mass balance of exhaled e-cigarette aerosol composition was greater than 99.9% water and glycerin, and a small amount (<0.06%) of nicotine. Total phenolic content in exhaled e-cigarette aerosol was not distinguishable from exhaled breath blanks, while total phenolics in exhaled cigarette smoke were significantly greater than in exhaled e-cigarette aerosol and exhaled breaths, averaging 66 µg/session (range 36 to 117 µg/session). The total carbonyls in exhaled e-cigarette aerosols were also not distinguishable from exhaled breaths or room air blanks. Total carbonyls in exhaled cigarette smoke was significantly greater than in exhaled e-cigarette aerosols, exhaled breath and room air blanks, averaging 242 µg/session (range 136 to 352 µg/session). These results indicate that exhaled e-cigarette aerosol does not increase bystander exposure for phenolics and carbonyls above the levels observed in exhaled breaths of air.

  3. Getting something out of nothing in the measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tan, Yong-Gang; Cai, Qing-Yu; Yang, Hai-Feng; Hu, Yao-Hua

    2015-11-01

    Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcomes are generated from the dark counts, no entanglement is actually obtained. However, secure key bits can still be proven to be generated from these measurement outcomes. Especially, we will give numerical studies on the contributions of dark counts to the key generation rate in practical decoy state MDI-QKD where a signal source, a weaker decoy source and a vacuum decoy source are used by either legitimate key distributer.

  4. An Empirical Analysis of the Cascade Secret Key Reconciliation Protocol for Quantum Key Distribution

    DTIC Science & Technology

    2011-09-01

    performance with the parity checks within each pass increasing and as a result, the processing time is expected to increase as well. A conclusion is drawn... timely manner has driven efforts to develop new key distribution methods. The most promising method is Quantum Key Distribution (QKD) and is...thank the QKD Project Team for all of the insight and support they provided in such a short time period. Thanks are especially in order for my

  5. Cloud Engineering Principles and Technology Enablers for Medical Image Processing-as-a-Service

    PubMed Central

    Bao, Shunxing; Plassard, Andrew J.; Landman, Bennett A.; Gokhale, Aniruddha

    2017-01-01

    Traditional in-house, laboratory-based medical imaging studies use hierarchical data structures (e.g., NFS file stores) or databases (e.g., COINS, XNAT) for storage and retrieval. The resulting performance from these approaches is, however, impeded by standard network switches since they can saturate network bandwidth during transfer from storage to processing nodes for even moderate-sized studies. To that end, a cloud-based “medical image processing-as-a-service” offers promise in utilizing the ecosystem of Apache Hadoop, which is a flexible framework providing distributed, scalable, fault tolerant storage and parallel computational modules, and HBase, which is a NoSQL database built atop Hadoop’s distributed file system. Despite this promise, HBase’s load distribution strategy of region split and merge is detrimental to the hierarchical organization of imaging data (e.g., project, subject, session, scan, slice). This paper makes two contributions to address these concerns by describing key cloud engineering principles and technology enhancements we made to the Apache Hadoop ecosystem for medical imaging applications. First, we propose a row-key design for HBase, which is a necessary step that is driven by the hierarchical organization of imaging data. Second, we propose a novel data allocation policy within HBase to strongly enforce collocation of hierarchically related imaging data. The proposed enhancements accelerate data processing by minimizing network usage and localizing processing to machines where the data already exist. Moreover, our approach is amenable to the traditional scan, subject, and project-level analysis procedures, and is compatible with standard command line/scriptable image processing software. Experimental results for an illustrative sample of imaging data reveals that our new HBase policy results in a three-fold time improvement in conversion of classic DICOM to NiFTI file formats when compared with the default HBase region split policy, and nearly a six-fold improvement over a commonly available network file system (NFS) approach even for relatively small file sets. Moreover, file access latency is lower than network attached storage. PMID:28884169

  6. Development and Evaluation of vetPAL, a Student-Led, Peer-Assisted Learning Program.

    PubMed

    Bates, Lucy S W; Warman, Sheena; Pither, Zoe; Baillie, Sarah

    Based on an idea from a final-year student, Bristol Veterinary School introduced vetPAL, a student-led, peer-assisted learning program. The program involved fifth-year (final-year) students acting as tutors and leading sessions for fourth-year students (tutees) in clinical skills and revision (review) topics. The initiative aimed to supplement student learning while also providing tutors with opportunities to further develop a range of skills. All tutors received training and the program was evaluated using questionnaires collected from tutees and tutors after each session. Tutees' self-rated confidence increased significantly in clinical skills and for revision topics. Advantages of being taught by students rather than staff included the informal atmosphere, the tutees' willingness to ask questions, and the relatability of the tutors. The small group size and the style of learning in the revision sessions (i.e., group work, discussions, and interactivity) were additional positive aspects identified by both tutees and tutors. Benefits for tutors included developing their communication and teaching skills. The training sessions were considered key in helping tutors feel prepared to lead sessions, although the most difficult aspects were the lack of teaching experience and time management. Following the successful pilot of vetPAL, plans are in place to make the program permanent and sustainable, while incorporating necessary changes based on the evaluation and the student leader's experiences running the program. A vetPAL handbook has been created to facilitate organization of the program for future years.

  7. Rehabilitation and transition after lung transplantation in children.

    PubMed

    Burton, J H; Marshall, J M; Munro, P; Moule, W; Snell, G I; Westall, G P

    2009-01-01

    We describe the key components of an outpatient pediatric recovery and rehabilitation program set up within the adult lung transplant service at the Alfred Hospital, Melbourne. Following discharge, pediatric lung transplant recipients and their families participated in an intensive 3-month outpatient rehabilitation program. Weekly sessions included education regarding transplant issues, physiotherapy, and occupational therapy sessions. The overall aim of the program was to comprehensively address physical rehabilitation and psychosocial and educational needs. Sessions tailored to meet the individual needs of the child were presented at an appropriate cognitive level. Education sessions for both the children and parents focused on medications, identification of infection and rejection, nutrition, physiotherapy/rehabilitation, occupational roles and stress management, donor issues, psychosocial readjustment, and transition issues. Physiotherapy included a progressive aerobic and strength training program, postural reeducation, and core stability. We incorporate Age-appropriate play activities: running, dancing, jumping, ball skills, and so on. Occupational therapy sessions addressed the primary roles of patient, students, and player. Transitions such as returning to school, friends, and the community were explored. Issues discussed included adjustment to new health status, strategies to manage side effects of medications, and altered body image issues. Weekly multidisciplinary team meetings were used to discuss and plan the rehabilitation progress. School liaison and visits occurred prior to school commencement with follow-up offered to review the ongoing transition process. Both patients and parents have reported a high level of satisfaction with the rehabilitation program. We plan to formally evaluate the program in the future.

  8. A case-control study of the health and well-being benefits of allotment gardening.

    PubMed

    Wood, Carly J; Pretty, Jules; Griffin, Murray

    2016-09-01

    Allotments in the UK are popular and waiting lists long. There is, however, little evidence on the health benefits of allotment gardening. The aims of this study were to determine the impacts of a session of allotment gardening on self-esteem and mood and to compare the mental well-being of allotment gardeners with non-gardeners. Self-esteem, mood and general health were measured in 136 allotment gardeners pre- and post- an allotment session, and 133 non-gardener controls. Allotment gardeners also detailed the time spent on their allotment in the current session and previous 7 days, and their length of tenure. Paired t-tests revealed a significant improvement in self-esteem (P < 0.05) and mood (P < 0.001) as a result of one allotment session. Linear regression revealed that neither the time spent on the allotment in the current session, the previous 7 days or the length of tenure affected the impacts on self-esteem and mood (P > 0.05). One-way ANCOVA revealed that allotment gardeners had a significantly better self-esteem, total mood disturbance and general health (P < 0.001), experiencing less depression and fatigue and more vigour (P < 0.0083). Allotment gardening can play a key role in promoting mental well-being and could be used as a preventive health measure. © The Author 2015. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  10. 2012 ARPA-E Energy Innovation Summit: Profiling City University of New York (CUNY): Reinventing Batteries for Grid Storage (Performer Video)

    ScienceCinema

    None Available

    2017-12-09

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. A few videos were selected for showing during the Summit to attendees. These 'performer videos' highlight innovative research that is ongoing and related to the main topics of the Summit's sessions. Featured in this video are Sanjoy Banerjee, Director of CUNY Energy Institute and Dan Steingart (Assistant Professor of Chemical Engineering, CUNY). The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.

  11. 2012 ARPA-E Energy Innovation Summit: Profiling City University of New York (CUNY): Reinventing Batteries for Grid Storage (Performer Video)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Banerjee, Sanjoy; Steingart, Dan

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. A few videos were selected for showing during the Summit to attendees. These "performer videos" highlight innovative research that is ongoing and related to the main topics of the Summit's sessions. Featured in this video are Sanjoy Banerjee, Director of CUNY Energy Institute and Dan Steingart (Assistant Professor of Chemical Engineering,more » CUNY). The City University of New York's Energy Institute, with the help of ARPA-E funding, is creating safe, low cost, rechargeable, long lifecycle batteries that could be used as modular distributed storage for the electrical grid. The batteries could be used at the building level or the utility level to offer benefits such as capture of renewable energy, peak shaving and microgridding, for a safer, cheaper, and more secure electrical grid.« less

  12. Adaptive error correction codes for face identification

    NASA Astrophysics Data System (ADS)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  13. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less

  14. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  15. Advanced Technologies for Robotic Exploration Leading to Human Exploration: Results from the SpaceOps 2015 Workshop

    NASA Technical Reports Server (NTRS)

    Lupisella, Mark L.; Mueller, Thomas

    2016-01-01

    This paper will provide a summary and analysis of the SpaceOps 2015 Workshop all-day session on "Advanced Technologies for Robotic Exploration, Leading to Human Exploration", held at Fucino Space Center, Italy on June 12th, 2015. The session was primarily intended to explore how robotic missions and robotics technologies more generally can help lead to human exploration missions. The session included a wide range of presentations that were roughly grouped into (1) broader background, conceptual, and high-level operations concepts presentations such as the International Space Exploration Coordination Group Roadmap, followed by (2) more detailed narrower presentations such as rover autonomy and communications. The broader presentations helped to provide context and specific technical hooks, and helped lay a foundation for the narrower presentations on more specific challenges and technologies, as well as for the discussion that followed. The discussion that followed the presentations touched on key questions, themes, actions and potential international collaboration opportunities. Some of the themes that were touched on were (1) multi-agent systems, (2) decentralized command and control, (3) autonomy, (4) low-latency teleoperations, (5) science operations, (6) communications, (7) technology pull vs. technology push, and (8) the roles and challenges of operations in early human architecture and mission concept formulation. A number of potential action items resulted from the workshop session, including: (1) using CCSDS as a further collaboration mechanism for human mission operations, (2) making further contact with subject matter experts, (3) initiating informal collaborative efforts to allow for rapid and efficient implementation, and (4) exploring how SpaceOps can support collaboration and information exchange with human exploration efforts. This paper will summarize the session and provide an overview of the above subjects as they emerged from the SpaceOps 2015 Workshop session.

  16. Therapeutic alliance in dietetic practice for weight loss: Insights from health coaching.

    PubMed

    Nagy, Annaliese; McMahon, Anne; Tapsell, Linda; Deane, Frank; Arenson, Danielle

    2018-02-13

    The psychological construct of 'therapeutic alliance' can be used to better understand the effectiveness of consultations, particularly goal setting for weight management. We analysed audio-recorded health coaching sessions during a weight loss trial to explore relationships between therapeutic alliance and various contextual factors. Audio recordings of 50 health coaching sessions were analysed. After assessing fidelity to the protocol, therapeutic alliance was measured using an adapted Working Alliance Inventory Observer-rated Short Version (WAI-O-S), and examined by (i) identifying relationships between contextual factors and WAI-O-S scores (Spearman's coefficients); (ii) testing the impact of preparatory exercises and body mass index on WAI-O-S scores (one-way analysis of variance and least-squared differences tests) and (iii) comparing differences in WAI-O-S scores based on relationship status, gender and follow-up session completion (independent samples t-tests). Fidelity was high (mean 88%). WAI-O-S total scores ranged from 55 to 70 (out of 84). Session duration was significantly correlated with WAI-O-S component of 'Bond' (r = 0.42, P = 0.002). Those who completed preparatory exercises had significantly higher total WAI-O-S scores, 'Goal' and 'Task' scores. Participants who completed the follow-up session scored significantly higher for 'Goal' compared to no follow-up. Spending more time in a session appears related to increased bonding, a key component of therapeutic alliance. Preparatory work may help build therapeutic alliance and agreement on goals appears to influence follow-up completion. These exploratory findings provide directions for research addressing the professional relationship in dietetic consultations for weight loss. © 2018 Dietitians Association of Australia.

  17. Delivering services to incarcerated teen fathers: a pilot intervention to increase the quality of father-infant interactions during visitation.

    PubMed

    Barr, Rachel; Morin, Marisa; Brito, Natalie; Richeda, Benjamin; Rodriguez, Jennifer; Shauffer, Carole

    2014-02-01

    The absence of a father figure has been linked to very poor developmental outcomes for the child. During incarceration, there are limited opportunities for visitation between fathers and their children. The Baby Elmo Program provides incarcerated teen fathers with parenting training and visitation with their children with the stated goal of enhancing father-child interactional quality. Forty-one incarcerated teen fathers and their infants ranging from 1 to 15 months of age participated in the present study. During individual sessions, a trained facilitator prepared fathers for visits with their children by introducing key concepts such as following the child's lead, using developmentally appropriate media to illustrate those concepts. After each training session, the incarcerated teen father interacted with his infant and the visit was video recorded. Analysis of the visit sessions focused on father's time use on different activities, the quality of father-infant interactions, and father's integration of target skills introduced in the intervention. The time-use analysis revealed that time use changed as a function of infant age. Growth linear modeling indicated that there were significant positive increases in the amount of parent support and infant engagement as a function of the number of sessions. Follow-up analyses indicated that changes between specific sessions mapped onto the target skills discussed during specific training sessions. This study's preliminary findings suggest that an intervention integrating visitation and appropriate media may be effective for incarcerated teen fathers. Due to the lack of a randomized control group, the present findings are exploratory and are discussed with a focus on further program development. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  18. Enhancing Children's Growth and Development. Training Guides for the Head Start Learning Community.

    ERIC Educational Resources Information Center

    Aspen Systems Corp., Rockville, MD.

    This training guide is designed to enhance the skills of Head Start education staff in applying knowledge of how children grow and develop to planning, implementing, and evaluating activities and experiences in the center, at home, and during group socialization sessions. Each of the guide's modules details module outcomes, key concepts, and…

  19. Resistance to Extinction Following Variable-Interval Reinforcement: Reinforcer Rate and Amount

    ERIC Educational Resources Information Center

    Shull, Richard L.; Grimes, Julie A.

    2006-01-01

    Rats obtained food-pellet reinforcers by nose poking a lighted key. Experiment 1 examined resistance to extinction following single-schedule training with different variable-interval schedules, ranging from a mean interval of 16 min to 0.25 min. That is, for each schedule, the rats received 20 consecutive daily baseline sessions and then a session…

  20. Engendering Behavior Change through Single-Session Workshops: Lessons Learned from Extension's Private well Initiative

    ERIC Educational Resources Information Center

    McCann, Alyson; Gold, Arthur J.

    2012-01-01

    Based on a follow-up mail survey conducted in 2009, we found that structured, one-time workshops can influence and impact participant behavior change. Survey results suggest that brief workshops, staffed by key resource personnel, can have a powerful influence on participant behavior change and fill an important gap in rural drinking water…

  1. Group Work and Whole-Class Teaching with 11- to 14-Year-Olds Compared

    ERIC Educational Resources Information Center

    Galton, Maurice; Hargreaves, Linda; Pell, Tony

    2009-01-01

    This article compares the academic performance and classroom behaviour of pupils when taught new concepts or engaged in problem solving in sessions organised either as cooperative group work or whole class, teacher directed instruction. Comparisons of attainment were made in classes of pupils aged 11 to 14 years (Key Stage 3) in English,…

  2. Variable Differential Reinforcement of Other Behavior (VDRO): Its Effectiveness as a Modification Procedure.

    ERIC Educational Resources Information Center

    Reuter, Katherine E.; LeBlanc, Judith M.

    Two groups of five preschool children were trained to press a key for marbles for four sessions of variable ratio reinforcement (VR6). Subsequently, response decrement for the groups was compared during conditions of fixed and variable differential reinforcement of other behavior (DRO and VDRO). Fixed DRO was more effective for decreasing response…

  3. Teaching CSD Graduate Students to Think Critically, Apply Evidence, and Write Professionally

    ERIC Educational Resources Information Center

    Grillo, Elizabeth U.; Koenig, Mareile A.; Gunter, Cheryl D.; Kim, Sojung

    2015-01-01

    The purpose of this study was to assess the effectiveness of teaching modules designed to enhance the use of critical thinking (CT), evidence-based practice (EBP), and professional writing (PW) skills by graduate students in communication sciences and disorders. Three single-session teaching modules were developed to highlight key features of CT,…

  4. Introduction: attachment theory and psychotherapy.

    PubMed

    Levy, Kenneth N

    2013-11-01

    In this introduction to the JCLP: In Session 69(11) issue on attachment theory and psychotherapy, the key points of attachment theory (Bowlby, , , 1981) and its relevance to psychotherapy are briefly described. The aim of this issue is to provide case illustrations of how an attachment theory perspective and principles can expand our understanding of psychotherapy practice. © 2013 Wiley Periodicals, Inc.

  5. If We Could Plan the Next 10 Years in Science Education...

    ERIC Educational Resources Information Center

    Mansell, Warwick

    2013-01-01

    Two major sessions at the 2013 ASE Summer Celebration Conference in Hatfield offered teachers (and other educators) the chance to debate and define the key issues facing science education over the next 10 years. Participants were asked to suggest the important issues. Then those with similar proposals were put into groups to develop the idea ready…

  6. Healthy Connections. A Training Program for Volunteers Working with At-Risk Pregnant Women. Leader's Manual.

    ERIC Educational Resources Information Center

    Harris, Carolyn DeMeyer; McKinney, David D., Ed.

    This leader's manual, keyed to an accompanying videotape, contains step-by-step instructions for conducting a training session for volunteers who are preparing to work with young unmarried pregnant women. The manual, which includes transparency masters of handouts, is laid out with the outside column of each page containing instructions to the…

  7. FBI Director Mueller Cites Partnerships as Key to Combating Crime and Terrorism

    ERIC Educational Resources Information Center

    Blake, Christopher G.

    2008-01-01

    At the Public Policy General Session held June 30 during IACLEA's 50th Anniversary Annual Conference, FBI Director Robert S. Mueller told the audience that through its partnerships with IACLEA and other law enforcement organizations and agencies, the FBI has made great strides in combating both crime and terrorism in the communities and on…

  8. Risky Choice in Pigeons: Preference for Amount Variability Using a Token-Reinforcement System

    ERIC Educational Resources Information Center

    Lagorio, Carla H.; Hackenberg, Timothy D.

    2012-01-01

    Pigeons were given repeated choices between variable and fixed numbers of token reinforcers (stimulus lamps arrayed above the response keys), with each earned token exchangeable for food. The number of tokens provided by the fixed-amount option remained constant within blocks of sessions, but varied parametrically across phases, assuming values of…

  9. Virtual Training for Virtual Success: Michigan State University Extension's Virtual Conference

    ERIC Educational Resources Information Center

    Vandenberg, Lela; Reese, Luke

    2011-01-01

    Michigan State University Extension conducted its first virtual conference, attended by more than 600 staff, with a weeklong menu of over 100 online meetings and learning sessions. Providing multiple types of pre-conference hands-on training to small groups using Adobe Connect Pro was an important key to success. Other success factors were pre and…

  10. The Enhancement of Musical and Other Learning for Both Teachers and Students through a Weekly Choir Session

    ERIC Educational Resources Information Center

    Heyning, Lyndell

    2010-01-01

    Primary schools are such busy demanding places. Educators are concerned with a crowded curriculum and high emphasis placed on the development and cultivation of literacy and numeracy concepts. Teachers are generally concerned with the delivery and teaching expectations of all key learning areas of the primary school curriculum. However, the…

  11. Motivation for Learning and Performance. Symposium 3. [Concurrent Symposium Session at AHRD Annual Conference, 2000.

    ERIC Educational Resources Information Center

    2000

    This document contains three papers from a symposium on motivation for learning and performance that was conducted as part of a conference on human resource development (HRD). "A Holistic Approach towards Motivation To Learn" (Constantine Kontoghiorghes) reports on a study that identified the following key variables within and outside…

  12. A Social Competence Intervention for Young Children with High Functioning Autism and Asperger Syndrome: A Pilot Study

    ERIC Educational Resources Information Center

    Minne, Elizabeth Portman; Semrud-Clikeman, Margaret

    2012-01-01

    The key features of Asperger Syndrome (AS) and high functioning autism (HFA) include marked and sustained impairment in social interactions. A multi-session, small group program was developed to increase social perception based on the assumption perceptual or interpretive problems underlying these social difficulties. Additionally, the group…

  13. Long-Term Cognitive and Behavioral Therapies, Combined with Augmentative Communication, Are Related to Uncinate Fasciculus Integrity in Autism

    ERIC Educational Resources Information Center

    Pardini, Matteo; Elia, Maurizio; Garaci, Francesco G.; Guida, Silvia; Coniglione, Filadelfo; Krueger, Frank; Benassi, Francesca; Gialloreti, Leonardo Emberti

    2012-01-01

    Recent evidence points to white-matter abnormalities as a key factor in autism physiopathology. Using Diffusion Tensor Imaging, we studied white-matter structural properties in a convenience sample of twenty-two subjects with low-functioning autism exposed to long-term augmentative and alternative communication, combined with sessions of cognitive…

  14. Keys to the Future of American Business. Proceedings from the Creativity, Innovation & Entrepreneurship Symposium (2nd, Washington, D.C., March 21-22, 1985).

    ERIC Educational Resources Information Center

    Solomon, George T., Ed.; Whiting, Bruce G., Ed.

    These proceedings present 5 keynote addresses and 28 session papers focusing on creation of environments for stimulating entrepreneurial activities. The keynote addresses are "Entrepreneurial Leadership--A Performing Art" (Gordon L. Lippitt); "Innovation & Entrepreneurship at Work in a Large Company" (George F. Troy);…

  15. A Simple Laboratory Practical to Illustrate RNA Mediated Gene Interference Using Drosophila Cell Culture

    ERIC Educational Resources Information Center

    Buluwela, Laki; Kamalati, Tahereh; Photiou, Andy; Heathcote, Dean A.; Jones, Michael D.; Ali, Simak

    2010-01-01

    RNA mediated gene interference (RNAi) is now a key tool in eukaryotic cell and molecular biology research. This article describes a five session laboratory practical, spread over a seven day period, to introduce and illustrate the technique. During the exercise, students working in small groups purify PCR products that encode "in vitro"…

  16. Solar Technical Assistance Team 2012 Webinars | State, Local, and Tribal

    Science.gov Websites

    sessions are available: What a Successful Solar Market Can Do for You Solar Economics for Policymakers Market? Policy Environments That Draw Manufacturers and Create Jobs Regulatory Strategies for Driving the Distributed Solar Market

  17. 40 CFR 86.096-38 - Maintenance instructions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and distributing the information, excluding any research and development costs incurred in designing... available through, for example, generic aftermarket tools, a pass-through device, or inexpensive... dealerships, whichever is earlier. The index shall describe the title of the course or instructional session...

  18. 40 CFR 86.1808-01 - Maintenance instructions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and distributing the information, excluding any research and development costs incurred in designing... available through, for example, generic aftermarket tools, a pass-through device, or inexpensive... dealerships, whichever is earlier. The index shall describe the title of the course or instructional session...

  19. Counseling activity in single-session online counseling with adolescents: an adherence study.

    PubMed

    Chardon, Lydia; Bagraith, Karl S; King, Robert John

    2011-09-01

    While online counseling is increasingly utilized, little is known about what counseling work takes place in the online environment. The aim of this study was to quantify online counseling activity by determining counselors' adherence to the widely used model in which they had been trained. Transcripts (n=85) of online counseling with adolescents were evaluated, using a standardized and psychometrically sound instrument. We found that, while counseling in 53% of transcripts progressed through each of the key stages of counseling, the focus of most sessions was information gathering; and goal exploration and action planning were typically superficial and often absent. Possible reasons for low counseling depth are discussed and recommendations made for the further development of online counseling.

  20. Termination in cognitive-behavioral therapy with children, adolescents, and parents.

    PubMed

    Vidair, Hilary B; Feyijinmi, Grace O; Feindler, Eva L

    2017-03-01

    The process of terminating cognitive-behavioral therapy (CBT) with families has been largely neglected in the literature, with the limited research focused on premature termination. This article describes the natural termination process in CBT with children, adolescents, and their parents. Based on existing theories, we describe a cognitive-behavioral model for: (a) initiating and engaging in discussion of termination, (b) processing the termination of treatment and the therapeutic relationship, (c) key aspects of the termination process in the final session, and (d) the very end of the final session (saying goodbye). For each of the 4 components, we review relevant theories, provide clinical exchanges to demonstrate techniques, and provide related research support. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. 2012 ARPA-E Energy Innovation Summit: Fireside Chat with Steven Chu and Bill Gates

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Steven; Gates, Bill; Podesta, John

    2012-02-28

    The third annual ARPA-E Energy Innovation Summit was held in Washington D.C. in February, 2012. The event brought together key players from across the energy ecosystem - researchers, entrepreneurs, investors, corporate executives, and government officials - to share ideas for developing and deploying the next generation of energy technologies. This video captures a session called Fireside Chat that featured Steven Chu, the Secretary of Energy, and Bill Gates, Chairman of Microsoft Corporation. The session is moderated by John Podesta, Chair of the Center for American Progress. Energy Secretary Steven Chu and Microsoft Founder and Chairman Bill Gates exchanged ideas aboutmore » how small businesses and innovators can overcome the challenges that face many startups.« less

  2. Evaluation of user interface and workflow design of a bedside nursing clinical decision support system.

    PubMed

    Yuan, Michael Juntao; Finley, George Mike; Long, Ju; Mills, Christy; Johnson, Ron Kim

    2013-01-31

    Clinical decision support systems (CDSS) are important tools to improve health care outcomes and reduce preventable medical adverse events. However, the effectiveness and success of CDSS depend on their implementation context and usability in complex health care settings. As a result, usability design and validation, especially in real world clinical settings, are crucial aspects of successful CDSS implementations. Our objective was to develop a novel CDSS to help frontline nurses better manage critical symptom changes in hospitalized patients, hence reducing preventable failure to rescue cases. A robust user interface and implementation strategy that fit into existing workflows was key for the success of the CDSS. Guided by a formal usability evaluation framework, UFuRT (user, function, representation, and task analysis), we developed a high-level specification of the product that captures key usability requirements and is flexible to implement. We interviewed users of the proposed CDSS to identify requirements, listed functions, and operations the system must perform. We then designed visual and workflow representations of the product to perform the operations. The user interface and workflow design were evaluated via heuristic and end user performance evaluation. The heuristic evaluation was done after the first prototype, and its results were incorporated into the product before the end user evaluation was conducted. First, we recruited 4 evaluators with strong domain expertise to study the initial prototype. Heuristic violations were coded and rated for severity. Second, after development of the system, we assembled a panel of nurses, consisting of 3 licensed vocational nurses and 7 registered nurses, to evaluate the user interface and workflow via simulated use cases. We recorded whether each session was successfully completed and its completion time. Each nurse was asked to use the National Aeronautics and Space Administration (NASA) Task Load Index to self-evaluate the amount of cognitive and physical burden associated with using the device. A total of 83 heuristic violations were identified in the studies. The distribution of the heuristic violations and their average severity are reported. The nurse evaluators successfully completed all 30 sessions of the performance evaluations. All nurses were able to use the device after a single training session. On average, the nurses took 111 seconds (SD 30 seconds) to complete the simulated task. The NASA Task Load Index results indicated that the work overhead on the nurses was low. In fact, most of the burden measures were consistent with zero. The only potentially significant burden was temporal demand, which was consistent with the primary use case of the tool. The evaluation has shown that our design was functional and met the requirements demanded by the nurses' tight schedules and heavy workloads. The user interface embedded in the tool provided compelling utility to the nurse with minimal distraction.

  3. Paired-housing selectively facilitates within-session extinction of avoidance behavior, and increases c-Fos expression in the medial prefrontal cortex, in anxiety vulnerable Wistar-Kyoto rats.

    PubMed

    Smith, Ian M; Pang, Kevin C H; Servatius, Richard J; Jiao, Xilu; Beck, Kevin D

    2016-10-01

    The perseveration of avoidance behavior, even in the absence of once threatening stimuli, is a key feature of anxiety and related psychiatric conditions. This phenomenon can be observed in the Wistar-Kyoto (WKY) rat which, in comparison to outbred controls, demonstrates impaired extinction of avoidance behavior. Also characteristic of the WKY rat is abnormalities of the neurocircuitry and neuroplasticity of the medial prefrontal cortex (mPFC). One means of reducing physiological responses to anxiety, and conditioned fear, in social species is the presence of a conspecific animal. The current study investigates whether or not pair-housed WKY rats would show facilitated extinction of avoidance in comparison to individual-housed WKY rats, and whether or not pair-housing influences mPFC activation during lever-press avoidance. Male WKY rats were assigned to individual-housed and pair-housed conditions. Rats were trained in lever-press avoidance. Each session of lever-press avoidance consisted of 20 trials, where pressing a lever in response to a warning tone prevented foot-shocks. Rats received 12 acquisition sessions over 4weeks; followed by 6 extinction sessions over 2weeks, where foot-shocks ceased to be delivered. Brains were harvested 90min after trials 1 and 10 of extinction sessions 1 and 6, and mPFC sections underwent c-Fos staining as a measure of activation. Pair-housed rats showed facilitated lever-press avoidance extinction rates, but the main cause for this overall difference was a selective facilitation of within-session extinction. Similar to individual-housed rats, pair-housed rats continued to avoid during trial 1 of extinction even when the avoidance responding had been significantly reduced by the end of the previous session. Pair-housed rats sacrificed on trial 1 showed greater c-Fos expression in the anterior cingulate cortex and prelimbic cortex subregions of the mPFC compared individual-housed rats sacrificed on trial 1. This data shows pair-housing to facilitate the extinction of avoidance, and to influence activity of the mPFC, in WKY rats. Despite this environmental manipulation, the pair-housed WKY rats continued to show avoidance responding on trial 1 of extinction sessions. This demonstrates that within-session extinction can be dissociated from between-session extinction-resistance in WKY rats. Furthermore, it suggests the individual-housing of WKY rats selectively slows within-session extinction, possibly by reducing neuronal activity of the mPFC during the testing situation. Published by Elsevier Inc.

  4. Tracking motor units longitudinally across experimental sessions with high‐density surface electromyography

    PubMed Central

    Martinez‐Valdes, E.; Negro, F.; Laine, C. M.; Falla, D.; Mayer, F.

    2017-01-01

    Key points Classic motor unit (MU) recording and analysis methods do not allow the same MUs to be tracked across different experimental sessions, and therefore, there is limited experimental evidence on the adjustments in MU properties following training or during the progression of neuromuscular disorders.We propose a new processing method to track the same MUs across experimental sessions (separated by weeks) by using high‐density surface electromyography.The application of the proposed method in two experiments showed that individual MUs can be identified reliably in measurements separated by weeks and that changes in properties of the tracked MUs across experimental sessions can be identified with high sensitivity.These results indicate that the behaviour and properties of the same MUs can be monitored across multiple testing sessions.The proposed method opens new possibilities in the understanding of adjustments in motor unit properties due to training interventions or the progression of pathologies. Abstract A new method is proposed for tracking individual motor units (MUs) across multiple experimental sessions on different days. The technique is based on a novel decomposition approach for high‐density surface electromyography and was tested with two experimental studies for reliability and sensitivity. Experiment I (reliability): ten participants performed isometric knee extensions at 10, 30, 50 and 70% of their maximum voluntary contraction (MVC) force in three sessions, each separated by 1 week. Experiment II (sensitivity): seven participants performed 2 weeks of endurance training (cycling) and were tested pre–post intervention during isometric knee extensions at 10 and 30% MVC. The reliability (Experiment I) and sensitivity (Experiment II) of the measured MU properties were compared for the MUs tracked across sessions, with respect to all MUs identified in each session. In Experiment I, on average 38.3% and 40.1% of the identified MUs could be tracked across two sessions (1 and 2 weeks apart), for the vastus medialis and vastus lateralis, respectively. Moreover, the properties of the tracked MUs were more reliable across sessions than those of the full set of identified MUs (intra‐class correlation coefficients ranged between 0.63—0.99 and 0.39–0.95, respectively). In Experiment II, ∼40% of the MUs could be tracked before and after the training intervention and training‐induced changes in MU conduction velocity had an effect size of 2.1 (tracked MUs) and 1.5 (group of all identified motor units). These results show the possibility of monitoring MU properties longitudinally to document the effect of interventions or the progression of neuromuscular disorders. PMID:28032343

  5. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  6. Electrical actuation technology bridging, volume 1

    NASA Astrophysics Data System (ADS)

    Hammond, Monica S.; Doane, George B., III

    1993-01-01

    This document contains the proceedings from the conference. The workshop addressed key technologies bridging the entire field of electrical actuation including systems methodology, control electronics, power source systems, reliability, maintainability, and vehicle health management with special emphasis on thrust vector control (TVC) applications on NASA launch vehicles. Speakers were drawn primarily from industry with participation from universities and government. In addition, prototype hardware demonstrations were held at the MSFC Propulsion Laboratory each afternoon. Splinter sessions held on the final day afforded the opportunity to discuss key issues and to provide overall recommendations. Presentations are included in this document.

  7. A dynamic re-partitioning strategy based on the distribution of key in Spark

    NASA Astrophysics Data System (ADS)

    Zhang, Tianyu; Lian, Xin

    2018-05-01

    Spark is a memory-based distributed data processing framework, has the ability of processing massive data and becomes a focus in Big Data. But the performance of Spark Shuffle depends on the distribution of data. The naive Hash partition function of Spark can not guarantee load balancing when data is skewed. The time of job is affected by the node which has more data to process. In order to handle this problem, dynamic sampling is used. In the process of task execution, histogram is used to count the key frequency distribution of each node, and then generate the global key frequency distribution. After analyzing the distribution of key, load balance of data partition is achieved. Results show that the Dynamic Re-Partitioning function is better than the default Hash partition, Fine Partition and the Balanced-Schedule strategy, it can reduce the execution time of the task and improve the efficiency of the whole cluster.

  8. Distributed metadata in a high performance computing environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Zhang, Zhenhua

    A computer-executable method, system, and computer program product for managing meta-data in a distributed storage system, wherein the distributed storage system includes one or more burst buffers enabled to operate with a distributed key-value store, the co computer-executable method, system, and computer program product comprising receiving a request for meta-data associated with a block of data stored in a first burst buffer of the one or more burst buffers in the distributed storage system, wherein the meta data is associated with a key-value, determining which of the one or more burst buffers stores the requested metadata, and upon determination thatmore » a first burst buffer of the one or more burst buffers stores the requested metadata, locating the key-value in a portion of the distributed key-value store accessible from the first burst buffer.« less

  9. Intervention Fidelity: Aspects of Complementary and Alternative Medicine (CAM) Research

    PubMed Central

    Wyatt, Gwen; Sikorskii, Alla; Rahbar, Mohammad Hossein; Victorson, David; Adams, Lora

    2010-01-01

    Background The Treatment Fidelity Workgroup (TFW) established by the National Institutes of Health (NIH) provides a 5-point structure for intervention fidelity: dosing, interventionists’ consistency, intervention delivery, receipt and enactment of the intervention. Using our reflexology trial, we apply the first three points. Objectives Study objectives are to: 1) evaluate key dosage dimensions associated with CAM research; 2) evaluate approaches to interventionists’ consistency of delivery of CAM protocols; and 3) evaluate and discuss data that reflect CAM intervention fidelity. Intervention Women with late stage breast cancer (N=318) were randomly assigned to either 4 weeks of reflexology, placebo, or standard care. Results Dosing consists of three dimensions: frequency (4-sessions), duration (30 minutes), and interval between sessions (5–9 days). Interventionist consistency revealed over a 90% accuracy rate in following the protocol; 84% and 89% completion rate of the 4 session in the reflexology and placebo groups respectively; and no differences in attrition after randomization between reflexology and placebo groups (17% and 15%, respectively). Intervention delivery, examined through debriefing data, indicated a significantly higher rate of correct guesses on group assignment in the reflexology group as compared to the placebo (82% versus 46%, p-value=.0002). Conclusions This study points out the relevance of dosing, interventionists’ consistency, and delivery data within a CAM clinical trial, as well as the challenges of blinding. Implications Monitoring intervention fidelity by using the key areas identified by the BCC ensures that findings from a clinical trial are meaningful and have the potential to be translated to clinical practice. PMID:20467309

  10. Training-Load Distribution in Endurance Runners: Objective Versus Subjective Assessment.

    PubMed

    Manzi, Vincenzo; Bovenzi, Antonio; Castagna, Carlo; Sinibaldi Salimei, Paola; Volterrani, Maurizio; Iellamo, Ferdinando

    2015-11-01

    To assess the distribution of exercise intensity in long-distance recreational athletes (LDRs) preparing for a marathon and to test the hypothesis that individual perception of effort could provide training responses similar to those provided by standardized training methodologies. Seven LDRs (age 36.5 ± 3.8 y) were followed during a 5-mo training period culminating with a city marathon. Heart rate at 2.0 and 4.0 mmol/L and maximal heart rate were used to establish 3 intensity training zones. Internal training load (TL) was assessed by training zones and TRIMPi methods. These were compared with the session-rating-of-perceived-exertion (RPE) method. Total time spent in zone 1 was higher than in zones 2 and 3 (76.3% ± 6.4%, 17.3% ± 5.8%, and 6.3% ± 0.9%, respectively; P = .000 for both, ES = 0.98, ES = 0.99). TL quantified by session-RPE provided the same result. The comparison between session-RPE and training-zones-based methods showed no significant difference at the lowest intensity (P = .07, ES = 0.25). A significant correlation was observed between TL RPE and TL TRIMPi at both individual and group levels (r = .79, P < .001). There was a significant correlation between total time spent in zone 1 and the improvement at the running speed of 2 mmol/L (r = .88, P < .001). A negative correlation was found between running speed at 2 mmol/L and the time needed to complete the marathon (r = -.83, P < .001). These findings suggest that in recreational LDRs most of the training time is spent at low intensity and that this is associated with improved performances. Session-RPE is an easy-to-use training method that provides responses similar to those obtained with standardized training methodologies.

  11. Asking the difficult questions: Building the capacity of community paediatricians to routinely enquire and respond to family violence.

    PubMed

    Gibbons, Claire L; Holmes, Hilary; Bragg, Judith; Neeman, Teresa

    2018-03-01

    To enhance the confidence and capacity of community paediatricians and paediatric trainees to identify and respond to family violence, through a series of education sessions and evidence-based recommendations. The action research methodology included a literature search to review the data on family violence education programmes and evidence-based family violence screening tools. Six education sessions were then developed and held for physicians at the Community Paediatric and Child Health Service (CPCHS). An audit was performed on the charts of all new referrals to the CPCHS for a period of 18 months prior to the education sessions and 5 months following the education sessions. A questionnaire was distributed at the first and final education sessions to gauge physician comfort with enquiry into family violence. The documented rate of enquiry into family violence at CPCHS was 24% in the retrospective chart audit. Following the series of education sessions, the documented rate of enquiry increased to 60% (P < 0.05, odds ratio 4.7, confidence interval 2.7-8.4). The documented rate of disclosure of family violence also increased from 13% of all new patients in the retrospective chart audit to 24% in the prospective arm of the study (P < 0.05, odds ratio 2.1, confidence interval 1.0-4.0). Following the education sessions, all participants agreed that they routinely enquired about family violence and were comfortable enquiring about family violence. This study demonstrates that clinician education about family violence supports routine enquiry about family violence in community paediatric consultations. © 2017 Paediatrics and Child Health Division (The Royal Australasian College of Physicians).

  12. Gastroenterology training in a resource-limited setting: Zambia, Southern Africa

    PubMed Central

    Asombang, Akwi W; Turner-Moss, Eleanor; Seetharam, Anil; Kelly, Paul

    2013-01-01

    AIM: To evaluate need for and efficacy of a structured gastroenterology didactic session in expanding awareness and understanding of digestive disorders. METHODS: A four-day symposium was developed with didactic sessions (days 1, 2) and practical endoscopy (days 3, 4). Didactic sessions included case presentations highlighting pathophysiology and management. One nurse and four practicing gastroenterologists from the United Kingdom led lectures and supervised workshops with audience participation. Practical endoscopy focused on diagnostic and therapeutic procedures and their application to diagnosis and treatment of ailments of the gastrointestinal tract. Pre- and post-workshop questionnaires were distributed to participants during didactic sessions. A pre-workshop questionnaire gauged expectations and identified objectives to be met at the symposium. Post-workshop questionnaires were administered to assess efficacy of each session. Participants graded sessions from 1 (poor) to 5 (excellent) on quality of case presentations, knowledge, clarity and mode of presentation. We assessed if time allotted to each topic was sufficient, value of sessions, impact on practice and interest in future symposiums. RESULTS: There were 46 attendees on day 1: 41% undergraduates, 41% residents, 11% consultants and 4% unspecified. Day 2 (a Saturday) had 24 participants: 17% undergraduates, 71% residents, 9% consultants, 4% unspecified. Primary pre-workshop symposium expectation was to gain knowledge in: general gastroenterology (55.5%), practical endoscopy (13.8%), pediatric gastroenterology (5%), epidemiology of gastrointestinal disorders specific to Zambia (6%), and interaction with international speakers (6%). The post-symposium questionnaire was answered by 19 participants, of whom 95% felt specific aims were met; all would attend future conferences and recommend to others. CONCLUSION: The beneficial effect of a structured symposium in developing countries warrants further attention as a mechanism to improve disease awareness in areas where resources are limited. PMID:23840144

  13. Gastroenterology training in a resource-limited setting: Zambia, Southern Africa.

    PubMed

    Asombang, Akwi W; Turner-Moss, Eleanor; Seetharam, Anil; Kelly, Paul

    2013-07-07

    To evaluate need for and efficacy of a structured gastroenterology didactic session in expanding awareness and understanding of digestive disorders. A four-day symposium was developed with didactic sessions (days 1, 2) and practical endoscopy (days 3, 4). Didactic sessions included case presentations highlighting pathophysiology and management. One nurse and four practicing gastroenterologists from the United Kingdom led lectures and supervised workshops with audience participation. Practical endoscopy focused on diagnostic and therapeutic procedures and their application to diagnosis and treatment of ailments of the gastrointestinal tract. Pre- and post-workshop questionnaires were distributed to participants during didactic sessions. A pre-workshop questionnaire gauged expectations and identified objectives to be met at the symposium. Post-workshop questionnaires were administered to assess efficacy of each session. Participants graded sessions from 1 (poor) to 5 (excellent) on quality of case presentations, knowledge, clarity and mode of presentation. We assessed if time allotted to each topic was sufficient, value of sessions, impact on practice and interest in future symposiums. There were 46 attendees on day 1: 41% undergraduates, 41% residents, 11% consultants and 4% unspecified. Day 2 (a Saturday) had 24 participants: 17% undergraduates, 71% residents, 9% consultants, 4% unspecified. Primary pre-workshop symposium expectation was to gain knowledge in: general gastroenterology (55.5%), practical endoscopy (13.8%), pediatric gastroenterology (5%), epidemiology of gastrointestinal disorders specific to Zambia (6%), and interaction with international speakers (6%). The post-symposium questionnaire was answered by 19 participants, of whom 95% felt specific aims were met; all would attend future conferences and recommend to others. The beneficial effect of a structured symposium in developing countries warrants further attention as a mechanism to improve disease awareness in areas where resources are limited.

  14. Sustainable Outreach: Lessons Learned from Space Update and Discovery Dome

    NASA Astrophysics Data System (ADS)

    Reiff, P. H.; Sumners, C.; Law, C. C.

    2009-12-01

    A sustainable program lives on past its initial funding cycle, and develops a network of users that ensures continued life, either by fees, advertising revenue, or by making the program more successful in later sponsored grants. Teachers like free things, so having a sponsor for products such as lithographs or CD-Roms is key to wide distribution. In 1994 we developed “Space Update®”, under the NASA “Public Use of the Internet” program. It has new editions annually, with over 40,000 distributed so far (many purchased but most free at teacher and student workshops). In 1996 we created a special edition “Space Weather®”, which includes the space weather module from Space Update plus other resources. Initially developed with funding from the IMAGE mission, it is now sponsored by Cluster and MMS. A new edition is published annually and distributed in the “Sun-Earth Day” packet; total distribution now exceeds 180,000. “Earth Update” was created in 1999 under cooperative agreement “Museums Teaching Planet Earth”. It now has a total distribution of over 20,000. Both Earth Update and Space Update were developed to be museum kiosk software, and more than 15 museums have them on display. Over 4,000 users are active in our e-Teacher network and 577 in our museum educator network. Although these can certainly be considered successful because of their longevity and user base, we have had a far more dramatic sustainable program arise in the last six years… the “Discovery Dome®”. Invented at HMNS and developed under NASA Cooperative Agreement “Immersive Earth”, this dome was the first digital portable planetarium that also showed fulldome movies with an interactive interface (first shown to the public at the Dec 2003 AGU meeting). The Discovery Dome network (tinyurl.com/DiscDome) has spun those initial 6 NASA-funded domes into over 90 installations in 22 states and 23 countries. Creating high quality content is quite expensive and so needs sponsors, but the customers (typically school districts or museums) will pay a reasonable price for quality equipment to show them on. Creating an innovative, exciting product at an affordable price is certainly key to sustainability. If space permits, we will put up a dome as a demo in the poster session. The software and the dome will be on view at the "Exploration Station" the Sunday before AGU.

  15. Oversight of Food and Nutrition Service Programs: Food Stamps, Child Nutrition, and Commodity Distribution. Hearing before the Committee on Agriculture, Nutrition, and Forestry, United States Senate, Ninety-Eighth Congress, Second Session, April 25, 1984.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Agriculture, Nutrition, and Forestry.

    The Federal government's oversight of its food and nutrition programs is discussed in this transcript of a Senate hearing. Testimony is presented regarding food stamps, the school lunch program, problems of targeting the needy, the Special Supplemental Food Program for Women, Infants, and Children (WIC), commodity distribution, surplus dairy…

  16. Military Objective and Collateral Damage: Their Dynamics and Relationship

    DTIC Science & Technology

    2002-04-01

    LOAN DOCUMENT___ PHOTOGRAPH 1113SMWr DOCUMENTWIENTIMCATION A DISTRIBUTION STATEMENT A N Approved for Public Release Distribution Unlimited D...16, paras. 1951, 2017 . 39 Id. para. 2020. 40 Id. para. 2021. ൱ OFFICE OF THE JUDGE ADVOCATE GENERAL, CANADIAN FORCES, THE LAW OF ARMED CONFLICT AT...27-10, THE LAW OF LAND WARFARE Change 1 para. 40 (c) ( July 1956 with 15 July 1976 Change No. 1). 75 Michael J. Matheson, Session One: The United

  17. Hearings Before the Select Committee on Nutrition and Human Needs of the United States Senate, Ninety-Second Congress, First Session on Nutrition and Human Needs. Part 8B--Food Distribution Program.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Select Committee on Nutrition and Human Needs.

    This is the third hearing in a series of four conducted to exercise con- gressional oversight of the Food Distribution Program of the Department of Agriculture. The following witnesses presented testimony, statements, and exhibits pertinent to this purpose: Honorable Efrain Santiago, Secretary of Social Services, Commonwealth of Puerto Rico;…

  18. Distributed metadata servers for cluster file systems using shared low latency persistent key-value metadata store

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Pedone, Jr., James M.

    A cluster file system is provided having a plurality of distributed metadata servers with shared access to one or more shared low latency persistent key-value metadata stores. A metadata server comprises an abstract storage interface comprising a software interface module that communicates with at least one shared persistent key-value metadata store providing a key-value interface for persistent storage of key-value metadata. The software interface module provides the key-value metadata to the at least one shared persistent key-value metadata store in a key-value format. The shared persistent key-value metadata store is accessed by a plurality of metadata servers. A metadata requestmore » can be processed by a given metadata server independently of other metadata servers in the cluster file system. A distributed metadata storage environment is also disclosed that comprises a plurality of metadata servers having an abstract storage interface to at least one shared persistent key-value metadata store.« less

  19. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  20. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  1. Novel secret key generation techniques using memristor devices

    NASA Astrophysics Data System (ADS)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  2. Patient Crying in Psychotherapy: Who Cries and Why?

    PubMed

    Capps, Kristen L; Fiori, Katherine; Mullin, Anthony S J; Hilsenroth, Mark J

    2015-01-01

    The aim of the present study is to further the understanding of who cries in therapy and the relation of technique with crying behaviour in therapy. Psychological assessment feedback sessions, prior to the initiation of formal therapy for 52 patients beginning psychotherapy at a university-based clinic were coded for discrete crying segments. Data about patient characteristics and the process of the session were collected at the time of the session. Therapist's interventions were recorded verbatim and independently rated. The number of times a patient cried during their session correlated negatively with global assessment of functioning scores and positively with measures of borderline personality disorder pathology as well as a measure of severity of childhood sexual abuse. Patients' crying behaviour demonstrated significant negative correlations with the overall experience of the session (bad/good), smoothness and positivity. Group differences between criers and non-criers reflected these trends as well. No significant correlations or group differences were found with regard to patient-rated or therapist-rated alliance as it relates to crying behaviour. Analysis indicates that therapist intervention prior to patient crying most often encouraged the exploration and expression of difficult affect, new perspectives on key issues or the patient's fantasies and wishes. Our study addresses a significant gap in the clinical literature on crying. Crying behaviour seems to be related to certain clinical variables and has a negative impact on patient experience of the session in which they cry, although the alliance remained unaffected. Small sample, outpatients with mild/moderate psychopathology and graduate trainees provided therapy. Patients with greater problems in emotional dysregulation, borderline personality disorder symptoms and greater severity of childhood sexual abuse are more likely to display greater affective intensity during the beginning of treatment. Results suggest that the alliance may remain strong despite patients experiencing a session in which they cried as difficult. Therapeutic interventions that focus on affect, new understanding of old patterns and patient fantasies with outpatient clinical populations appeared to be associated with crying in session. Copyright © 2013 John Wiley & Sons, Ltd.

  3. SYMPOSIUM SESSION PROPOSAL: INCORPORATION OF MODE OF ACTION INTO MECHANISTICALLY-BASED QUANTITATIVE MODELS

    EPA Science Inventory

    The biological processes by which environmental pollutants induce adverse health effects is most likely regulated by complex interactions dependent upon the route of exposure, dose, kinetics of distribution, and multiple cellular responses. To further complicate deciphering thes...

  4. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.

    PubMed

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-11-30

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  5. Changes to Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Sakai, Yasuyuki; Tanaka, Hidema

    Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure. We also have many cryptographic tools that are based on “modern cryptography” at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.

  6. Tumor Stiffening, a Key Determinant of Tumor Progression, is Reversed by Nanomaterial-Induced Photothermal Therapy

    PubMed Central

    Marangon, Iris; Silva, Amanda A. K.; Guilbert, Thomas; Kolosnjaj-Tabi, Jelena; Marchiol, Carmen; Natkhunarajah, Sharuja; Chamming's, Foucault; Ménard-Moyon, Cécilia; Bianco, Alberto; Gennisson, Jean-Luc; Renault, Gilles; Gazeau, Florence

    2017-01-01

    Tumor stiffening, stemming from aberrant production and organization of extracellular matrix (ECM), has been considered a predictive marker of tumor malignancy, non-invasively assessed by ultrasound shear wave elastography (SWE). Being more than a passive marker, tumor stiffening restricts the delivery of diagnostic and therapeutic agents to the tumor and per se could modulate cellular mechano-signaling, tissue inflammation and tumor progression. Current strategies to modify the tumor extracellular matrix are based on ECM-targeting chemical agents but also showed deleterious systemic effects. On-demand excitable nanomaterials have shown their ability to perturb the tumor microenvironment in a spatiotemporal-controlled manner and synergistically with chemotherapy. Here, we investigated the evolution of tumor stiffness as well as tumor integrity and progression, under the effect of mild hyperthermia and thermal ablation generated by light-exposed multi-walled carbon nanotubes (MWCNTs) in an epidermoid carcinoma mouse xenograft. SWE was used for real-time mapping of the tumor stiffness, both during the two near infrared irradiation sessions and over the days after the treatment. We observed a transient and reversible stiffening of the tumor tissue during laser irradiation, which was lowered at the second session of mild hyperthermia or photoablation. In contrast, over the days following photothermal treatment, the treated tumors exhibited a significant softening together with volume reduction, whereas non-treated growing tumors showed an increase of tumor rigidity. The organization of the collagen matrix and the distribution of CNTs revealed a spatio-temporal correlation between the presence of nanoheaters and the damages on collagen and cells. This study highlights nanohyperthermia as a promising adjuvant strategy to reverse tumor stiffening and normalize the mechanical tumor environment. PMID:28042338

  7. Detection of infusate leakage in the brain using real-time imaging of convection-enhanced delivery.

    PubMed

    Varenika, Vanja; Dickinson, Peter; Bringas, John; LeCouteur, Richard; Higgins, Robert; Park, John; Fiandaca, Massimo; Berger, Mitchel; Sampson, John; Bankiewicz, Krystof

    2008-11-01

    The authors have shown that convection-enhanced delivery (CED) of gadoteridol-loaded liposomes (GDLs) into different regions of normal monkey brain results in predictable, widespread distribution of this tracking agent as detected by real-time MR imaging. They also have found that this tracking technique allows monitoring of the distribution of similar nanosized agents such as therapeutic liposomes and viral vectors. A limitation of this procedure is the unexpected leakage of liposomes out of targeted parenchyma or malignancies into sulci and ventricles. The aim of the present study was to evaluate the efficacy of CED after the onset of these types of leakage. The authors documented this phenomenon in a study of 5 nonhuman primates and 7 canines, comprising 54 CED infusion sessions. Approximately 20% of these infusions resulted in leakage into cerebral ventricles or sulci. All of the infusions and leakage events were monitored with real-time MR imaging. The authors created volume-distributed versus volume-infused graphs for each infusion session. These graphs revealed the rate of distribution of GDL over the course of each infusion and allowed the authors to evaluate the progress of CED before and after leakage. The distribution of therapeutics within the target structure ceased to increase or resulted in significant attenuation after the onset of leakage. An analysis of the cases in this study revealed that leakage undermines the efficacy of CED. These findings reiterate the importance of real-time MR imaging visualization during CED to ensure an accurate, robust distribution of therapeutic agents.

  8. 99mTc-MAA/ 90Y-Bremsstrahlung SPECT/CT after simultaneous Tc-MAA/90Y-microsphere injection for immediate treatment monitoring and further therapy planning for radioembolization.

    PubMed

    Ahmadzadehfar, Hojjat; Sabet, Amir; Muckle, Marianne; Wilhelm, Kai; Reichmann, Karl; Biersack, Hans-Jürgen; Ezziddin, Samer

    2011-07-01

    An angiographic evaluation combined with (99m)Tc-macroaggregated albumin (Tc-MAA) scanning should precede the treatment of any selected candidates for radioembolization (RE) of the liver. If the tumours in one liver lobe have not been targeted in the test angiogram, it should be repeated. However, in a few cases treatment of one liver lobe or at least some segments is safe and feasible and performing a repeated test angiogram with Tc-MAA (Re-MAA) in a separate session leads to more radiation exposure and could be time consuming. Our aim was to evaluate the feasibility of concurrent RE of a part of the liver and therapy planning for another region by simultaneous injection of the Tc-MAA and (90)Y-microspheres in two different locations in the therapy session. Tc-MAA and bremsstrahlung (BS) single photon emission computed tomography (SPECT)/CT were performed separately in an effort to distinguish between the distributions of these two different radiopharmaceuticals. RE was combined with a simultaneous second test angiogram of another lobe or segments in the same session in six patients [44-70 years; five women (83%)]. Five patients suffered from colorectal carcinoma (CRC) and one from ovarian cancer. Tc-MAA and BS SPECT/CT were performed for all cases. Post-therapeutic Tc-MAA SPECT/CT showed in all patients only the distribution of Tc-MAA without any detectable BS. Evaluation of (90)Y-microsphere distribution was not always possible in the post-therapeutic BS scan performed 24 h later due to remaining Tc-MAA radiation. However, scans performed at 48 h post-intervention no longer showed any Tc-MAA "contamination". Combining RE and Re-MAA is feasible in appropriately selected patients.

  9. Exploring example models of cross-sector, sessional employment of pharmacists to improve medication management and pharmacy support in rural hospitals.

    PubMed

    Tan, Amy Cw; Emmerton, Lynne M; Hattingh, Laetitia; La Caze, Adam

    2015-01-01

    Many rural hospitals in Australia are not large enough to sustain employment of a full-time pharmacist, or are unable to recruit or retain a full-time pharmacist. The absence of a pharmacist may result in hospital nurses undertaking medication-related roles outside their scope of practice. A potential solution to address rural hospitals' medication management needs is contracted part-time ('sessional') employment of a local pharmacist external to the hospital ('cross-sector'). The aim of this study was to explore the roles and experiences of pharmacists in their provision of sessional services to rural hospitals with no on-site pharmacist and explore how these roles could potentially address shortfalls in medication management in rural hospitals. A qualitative study was conducted to explore models with pharmacists who had provided sessional services to a rural hospital. A semi-structured interview guide was informed by a literature review, preliminary research and stakeholder consultation. Participants were recruited via advertisement and personal contacts. Consenting pharmacists were interviewed between August 2012 and January 2013 via telephone or Skype for 40-55 minutes. Thirteen pharmacists with previous or ongoing hospital sessional contracts in rural communities across Australia and New Zealand participated. Most commonly, the pharmacists provided weekly services to rural hospitals. All believed the sessional model was a practical solution to increase hospital access to pharmacist-mediated support and to address medication management gaps. Roles perceived to promote quality use of medicines were inpatient consultation services, medicines information/education to hospital staff, assistance with accreditation matters and system reviews, and input into pharmaceutical distribution activities. This study is the first to explore the concept of sessional rural hospital employment undertaken by pharmacists in Australia and New Zealand. Insights from participants revealed that their sessional employment model increased access to pharmacist-mediated medication management support in rural hospitals. The contracting arrangements and scope of services may be evaluated and adapted in other rural hospitals.

  10. Biodanza Reduces Acute Pain Severity in Women with Fibromyalgia.

    PubMed

    Segura-Jiménez, Víctor; Gatto-Cardia, Claudia M; Martins-Pereira, Clélia M; Delgado-Fernández, Manuel; Aparicio, Virginia A; Carbonell-Baeza, Ana

    2017-10-01

    Biodanza is a useful therapy for the fibromyalgia management; however, there is no evidence of its effectiveness on acute pain. The objectives of the present study were: to determine the changes of a 3-month Biodanza program on acute pain severity (before vs. after session) and cumulative pain severity in women with fibromyalgia; and to check the associations of acute pain severity reduction with presession pain severity, body fat percentage, and satisfaction with the session. This was a 3-month low-moderate intensity (rate of perceived exertion around 12, based on a 6-20 point scale) Biodanza intervention study (1 session/week). Twenty-seven women with fibromyalgia (54.2 ± 6.2 years) participated. Pain severity was assessed before and after each single session with a visual analog scale. There were immediate changes in all sessions (p = .001-.028), except in the first, second, and fourth sessions. An overall 16% decrease of acute pain severity before and after each session was noted (mean presession pain vs. postsession pain, 5.8 ± 2.1 vs. 4.9 ± 2.4; respectively). There was an independent association of pain severity reduction (presession-postsession) with presession pain severity (unstandardized coefficient B = .21 ± .05; standardized coefficient β = .25; p < .001), body fat percentage (B = -.05 ± .02; β = -.18; p = .003), and satisfaction with the session (B = .40 ± .15; β = .16; p = .007). There was a significant cumulative effect decrease in postsession pain severity (p < .001; 95% confidence interval [CI] = -.14, -.05) and presession-postsession pain severity (p = .007; 95% CI = .02, .12) along the 3-month intervention. No significant cumulative effect in presession pain severity was identified (p > .05). In conclusion, Biodanza is an alternative therapy that reduced acute pain severity in women with fibromyalgia. The intervention also yielded cumulative pain severity reduction, which were higher in those women with fibromyalgia presenting higher presession pain severity and lower body fat percentage. The satisfaction with the session was also a key factor positively associated with pain reduction. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  11. Air Force Handbook: 108th Congress First Session

    DTIC Science & Technology

    2003-01-01

    are eliminated with the exception of mental health . • FY2003 NDAA authorized expansion of TRICARE Prime Remote to eligible family members who do not...System is also in place to nurture their emotional/ mental health . Discussion • AFMS is a key to the Air Force’s Integrated Deliver System that unites...14 Deployment Health Surveillance .............. 16 Depot Maintenance Strategy and Master Plan

  12. Staff Report on the Hispanic Access to Higher Education of the Committee on Education and Labor. House of Representatives, Ninety-Ninth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Education and Labor.

    Key issues affecting Hispanic participation in higher education are evaluated, with attention to access, retention, and transfer. Societal factors influencing access are also covered: migration, technology, employment and income levels, and secondary schooling. In addition, postsecondary education in Puerto Rico is addressed. Hispanics constitute…

  13. Comparison of Syntax Training for Students with Developmental Disabilities Utilizing Clinician-Directed versus Self-Determined Session Paradigms

    ERIC Educational Resources Information Center

    Kleinert, Jane O'Regan; Gonzalez, Lori; Schuster, John W.; Huebner, Ruth

    2007-01-01

    The ability to make choices, plan, and self-evaluate are among the primary skills included in the development of self-determination. This study was designed to determine if a teaching paradigm, which incorporates key elements of self-determination, is as effective and more efficient in teaching syntax than a traditional, clinician-directed…

  14. 77 FR 30508 - Open Meeting To Obtain Input for 2013 DoD 10 Key State Issues Impacting Service Members and Their...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-23

    ... State Issues Impacting Service Members and Their Families AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The public is invited to attend an open session to consider issues impacting Service members and their families that can best be resolved by state governments. Additionally, the public is invited to...

  15. Stability and Variability in Young Children's Understanding of Floating and Sinking during One Single-Task Session

    ERIC Educational Resources Information Center

    Meindertsma, Heidi B.; van Dijk, Marijn W. G.; Steenbeek, Henderien W.; van Geert, Paul L. C.

    2014-01-01

    Intraindividual variability is a key component in explaining children's development and learning. Studying this type of variability on the micro-timescale can help us understand real-time constructive processes and the subsequent long-term development. The aim of this article is to study the process of children's understanding of…

  16. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    PubMed Central

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  17. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS.

    PubMed

    Kim, Hyunsung

    2014-12-10

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  18. Interactions of numerical and temporal stimulus characteristics on the control of response location by brief flashes of light.

    PubMed

    Fetterman, J Gregor; Killeen, P Richard

    2011-09-01

    Pigeons pecked on three keys, responses to one of which could be reinforced after 3 flashes of the houselight, to a second key after 6, and to a third key after 12. The flashes were arranged according to variable-interval schedules. Response allocation among the keys was a function of the number of flashes. When flashes were omitted, transitions occurred very late. Increasing flash duration produced a leftward shift in the transitions along a number axis. Increasing reinforcement probability produced a leftward shift, and decreasing reinforcement probability produced a rightward shift. Intermixing different flash rates within sessions separated allocations: Faster flash rates shifted the functions sooner in real time, but later in terms of flash count, and conversely for slower flash rates. A model of control by fading memories of number and time was proposed.

  19. Relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: molotkov@issp.ac.ru

    2011-03-15

    A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.

  20. Developing social interaction and understanding in individuals with autism spectrum disorder: a groupwork intervention.

    PubMed

    Mackay, Tommy; Knott, Fiona; Dunlop, Aline-Wendy

    2007-12-01

    Difficulties with social interaction and understanding lie at the heart of the communication disorder that characterises the autism spectrum. This study sought to improve social communication for individuals with autism spectrum disorder (ASD) by means of a groupwork intervention focusing on social and emotional perspective-taking, conversation skills, and friendship skills. It also aimed to address some of the limitations of previous interventions, including a lack of generalisation to other settings, so as to maximise inclusion in the community. A group of 46 high functioning children and adolescents with ASD (38 boys, 8 girls, age range 6-16 years) were allocated to one of 6 intervention groups. Each group met over a period of 12-16 weeks for a minimum of one 1(1/2)-hour weekly session aimed at promoting key areas of social interaction and understanding, supported by home-based practice. Significant gains were achieved in comparison with a normative population, and individual parent ratings showed marked and sustained changes in the key areas targeted in the group sessions. Social communication in children and adolescents with ASD can be enhanced through the use of a groupwork intervention addressing social interaction and understanding.

  1. Stakeholders' views on ethical issues in the practice of in-vitro fertilisation and embryo transfer in Nigeria.

    PubMed

    Ajayi, R A; Dibosa-Osadolor, O J

    2011-09-01

    The provision of IVF for the specialized treatment of infertility has grown very rapidly in Nigeria in recent times, especially within the private sector. The objective of this study was to document the views of key stakeholders regarding salient ethical issues relating to the practice of in-vitro fertilisation (IVF) in Nigeria. A think-tank session was convened with participants drawn from different backgrounds and disciplines to deliberate on ethical issues in IVF. Ten key issues were discussed at this inaugural session. It was unanimously agreed that there are no right or wrong answers when considering the ethics and morality of IVF as these are principally dependent on choice and circumstances. However within the legal and socio-cultural dictates of the Nigerian society, right and wrong may be clearly determined on some issues. With the expansion of the IVF industry and technology in Nigeria, the need to address related ethical issues have become paramount. The forum recommended that it is important that regulatory guidelines are put in place to regulate the practice of IVF in Nigeria and to protect patients' rights and safety.

  2. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    PubMed Central

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888

  3. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  4. Is social exclusion pushing the Pakistani Hijras (Transgenders) towards commercial sex work? a qualitative study

    PubMed Central

    2012-01-01

    Background The Hijra is a distinct type of gender role in South Asia where men act like women. This group of people is socially excluded by the general community, in terms of attainment of an opportunity for a socially productive life. Often this sort of deprivation forces these individuals towards professions like sex trade, in pursuit of sustenance, which as a consequence places them as a key block in the puzzle of an impending generalized HIV epidemic in Pakistan. Methods This study is a qualitative study, which involved 8 in-depth interviews and four focus group discussions, conducted in Rawalpindi and Islamabad (Pakistan) from February to April 2012. The data was audio taped and transcribed. Key themes were identified and built upon. The respondents were contacted through a gate keeper Hijra who was a member of the hijra community. Multiple interview sessions were conducted with each respondent. Results Two key categories of the Hijras were identified as Khusrapan and Zananapan, during the in-depth interview sessions. This initial information paved way for the four focus group discussions. The data was presented using key themes which were identified. The study participants explained their life histories to us which made it obvious that they had been socially excluded at many stages of their lives from performing normal social functions. This lack of occupational and educational opportunities pushed them towards entering the risky business of selling sex. Conclusion The transgender community is socially excluded by the Pakistani society which is leading them to indulge in commercial sex and putting their lives at risk. Prudent measures are needed to form community based organizations managed and led by hijra community and addressing their social exclusion and risky behaviors. PMID:23163979

  5. Assessing the Key to Effective Coaching in Parent-Child Interaction Therapy: The Therapist-Parent Interaction Coding System

    PubMed Central

    Barnett, Miya L.; Niec, Larissa N.; Acevedo-Polakovich, I. David

    2013-01-01

    This paper describes the initial evaluation of the Therapist-Parent Interaction Coding System (TPICS), a measure of in vivo therapist coaching for the evidence-based behavioral parent training intervention, parent-child interaction therapy (PCIT). Sixty-one video-recorded treatment sessions were coded with the TPICS to investigate (1) the variety of coaching techniques PCIT therapists use in the early stage of treatment, (2) whether parent skill-level guides a therapist’s coaching style and frequency, and (3) whether coaching mediates changes in parents’ skill levels from one session to the next. Results found that the TPICS captured a range of coaching techniques, and that parent skill-level prior to coaching did relate to therapists’ use of in vivo feedback. Therapists’ responsive coaching (e.g., praise to parents) was a partial mediator of change in parenting behavior from one session to the next for specific child-centered parenting skills; whereas directive coaching (e.g., modeling) did not relate to change. The TPICS demonstrates promise as a measure of coaching during PCIT with good reliability scores and initial evidence of construct validity. PMID:24839350

  6. Environmental awareness -- An interactive multimedia CD-ROM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huntelmann, A.; Petruk, M.W.

    1998-07-01

    As corporations move to new and innovative ways of structuring high-performance work teams, effective training is being recognized as a key to insuring success. Time and scheduling constraints tend to limit the effectiveness of traditional approaches to training. This has led Edmonton Power Inc. to explore the use of CD-ROM based multimedia as a means of delivering individualized instruction in an effective and timely manner. This session will demonstrate a multimedia CD-ROM based course on Environmental Awareness designed for workers in the electrical utilities industry. The objective of the course is to make workers aware of their roles and responsibilitiesmore » with respect to their impact on the environment. This session will also describe the instructional design strategy underlying this approach to training and will present some preliminary findings with respect to the effectiveness of this approach. Individuals who are interested in improving the effectiveness of their environmental training program as well as individuals who are interested in understanding the strengths of multimedia CD-ROM based training will find this session useful and informative.« less

  7. Building an outpatient imaging center: A case study at genesis healthcare system, part 2.

    PubMed

    Yanci, Jim

    2006-01-01

    In the second of 2 parts, this article will focus on process improvement projects utilizing a case study at Genesis HealthCare System located in Zanesville, OH. Operational efficiency is a key step in developing a freestanding diagnostic imaging center. The process improvement projects began with an Expert Improvement Session (EIS) on the scheduling process. An EIS session is a facilitated meeting that can last anywhere from 3 hours to 2 days. Its intention is to take a group of people involved with the problem or operational process and work to understand current failures or breakdowns in the process. Recommendations are jointly developed to overcome any current deficiencies, and a work plan is structured to create ownership over the changes. A total of 11 EIS sessions occurred over the course of this project, covering 5 sections: Scheduling/telephone call process, Pre-registration, Verification/pre-certification, MRI throughput, CT throughput. Following is a single example of a project focused on the process improvement efforts. All of the process improvement projects utilized a quasi methodology of "DMAIC" (Define, Measure, Analyze, Improve, and Control).

  8. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  9. Long-distance practical quantum key distribution by entanglement swapping.

    PubMed

    Scherer, Artur; Sanders, Barry C; Tittel, Wolfgang

    2011-02-14

    We develop a model for practical, entanglement-based long-distance quantum key distribution employing entanglement swapping as a key building block. Relying only on existing off-the-shelf technology, we show how to optimize resources so as to maximize secret key distribution rates. The tools comprise lossy transmission links, such as telecom optical fibers or free space, parametric down-conversion sources of entangled photon pairs, and threshold detectors that are inefficient and have dark counts. Our analysis provides the optimal trade-off between detector efficiency and dark counts, which are usually competing, as well as the optimal source brightness that maximizes the secret key rate for specified distances (i.e. loss) between sender and receiver.

  10. ASIST 2001. Information in a Networked World: Harnessing the Flow. Part III: Poster Presentations.

    ERIC Educational Resources Information Center

    Proceedings of the ASIST Annual Meeting, 2001

    2001-01-01

    Topics of Poster Presentations include: electronic preprints; intranets; poster session abstracts; metadata; information retrieval; watermark images; video games; distributed information retrieval; subject domain knowledge; data mining; information theory; course development; historians' use of pictorial images; information retrieval software;…

  11. Historiography and History of Information Science (SIG HFIS)

    ERIC Educational Resources Information Center

    Breitenstein, Mikel

    2000-01-01

    Presents abstracts of papers for a planned session dealing with the historiography and history of information science. Highlights include probability distributions underlying the use of library materials, particularly scientific journals; the temporal and historical orientation of the rhetoric of information science; and concepts of information…

  12. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  13. NELS 2.0 - A general system for enterprise wide information management

    NASA Technical Reports Server (NTRS)

    Smith, Stephanie L.

    1993-01-01

    NELS, the NASA Electronic Library System, is an information management tool for creating distributed repositories of documents, drawings, and code for use and reuse by the aerospace community. The NELS retrieval engine can load metadata and source files of full text objects, perform natural language queries to retrieve ranked objects, and create links to connect user interfaces. For flexibility, the NELS architecture has layered interfaces between the application program and the stored library information. The session manager provides the interface functions for development of NELS applications. The data manager is an interface between session manager and the structured data system. The center of the structured data system is the Wide Area Information Server. This system architecture provides access to information across heterogeneous platforms in a distributed environment. There are presently three user interfaces that connect to the NELS engine; an X-Windows interface, and ASCII interface and the Spatial Data Management System. This paper describes the design and operation of NELS as an information management tool and repository.

  14. Quantum cryptography for secure free-space communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up usingmore » the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.« less

  15. Secure communications using quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit ofmore » an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.« less

  16. Theory of single-photon detectors employing smart strategies of detection

    NASA Astrophysics Data System (ADS)

    Silva, João Batista Rosa; Ramos, Rubens Viana

    2005-11-01

    Single-photon detectors have become more important with the advent of set-ups for optical communication using single-photon pulses, mainly quantum key distribution. The performance of quantum key distribution systems depends strongly on the performance of single-photon detectors. In this paper, aiming to overcome the afterpulsing that limits strongly the maximal transmission rate of quantum key distribution systems, three smart strategies for single-photon detection are discussed using analytical and numerical procedures. The three strategies are: hold-off time conditioned to avalanche presence, termed the Norwegian strategy, using one avalanche photodiode, using two raffled avalanche photodiodes and using two switched avalanche photodiodes. Finally we give examples using these strategies in a quantum key distribution set-up.

  17. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  18. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  19. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  20. Developing physical activity interventions for adults with spinal cord injury. Part 2: motivational counseling and peer-mediated interventions for people intending to be active.

    PubMed

    Latimer-Cheung, Amy E; Arbour-Nicitopoulos, Kelly P; Brawley, Lawrence R; Gray, Casey; Justine Wilson, A; Prapavessis, Harry; Tomasone, Jennifer R; Wolfe, Dalton L; Martin Ginis, Kathleen A

    2013-08-01

    The majority of people with spinal cord injury (SCI) do not engage in sufficient leisure-time physical activity (LTPA) to attain fitness benefits; however, many have good intentions to be active. This paper describes two pilot interventions targeting people with SCI who are insufficiently active but intend to be active (i.e., "intenders"). Study 1 examined the effects of a single, telephone-based counseling session on self-regulatory efficacy, intentions, and action plans for LTPA among seven men and women with paraplegia or tetraplegia. Study 2 examined the effects of a home-based strength-training session, delivered by a peer and a fitness trainer, on strength-training task self-efficacy, intentions, action plans, and behavior. Participants were 11 men and women with paraplegia. The counseling session (Study 1) yielded medium- to large-sized increases in participants' confidence to set LTPA goals and intentions to be active. The home visit (Study 2) produced medium- to large-sized increases in task self-efficacy, barrier self-efficacy, intentions, action planning, and strength-training behavior from baseline to 4 weeks after the visit. Study 1 findings provide preliminary evidence that a single counseling session can impact key determinants of LTPA among intenders with SCI. Study 2 findings demonstrate the potential utility of a peer-mediated, home-based strength training session for positively influencing social cognitions and strength-training behavior. Together, these studies provide evidence and resources for intervention strategies to promote LTPA among intenders with SCI, a population for whom LTPA interventions and resources are scarcely available.

  1. Starting With Lucy: Focusing on Human Similarities Rather Than Differences to Address Health Care Disparities.

    PubMed

    Clementz, Laura; McNamara, Megan; Burt, Nicole M; Sparks, Matthew; Singh, Mamta K

    2017-09-01

    Multicultural or cultural competence education to address health care disparities using the traditional categorical approach can lead to inadvertent adverse consequences. Nontraditional approaches that address these drawbacks while promoting humanistic care are needed. In September 2014, the Cleveland VA Medical Center's Center of Excellence in Primary Care Education Transforming Outpatient Care (CoEPCE-TOPC) collaborated with the Cleveland Museum of Natural History (CMNH) to develop the Original Identity program, which uses a biocultural anthropologic framework to help learners recognize and address unconscious bias and starts with a discussion of humans' shared origins. The program comprises a two-hour initial learning session at the CMNH (consisting of an educational tour in a museum exhibit, a didactic and discussion section, and patient case studies) and a one-hour wrap-up session at the Louis Stokes Cleveland VA Medical Center. The authors delivered the complete Original Identity program four times between March and November 2015, with 30 CoEPCE-TOPC learners participating. Learners' mean ratings (n = 29; response rate: 97%) for the three initial learning session questions were consistently high (4.2-4.6) using a five-point scale. Comments to an open-ended question and during the audio-recorded wrap-up sessions also addressed the program objectives and key elements (e.g., bias, assumptions, stereotyping). The authors are completing additional qualitative analysis on the wrap-up session transcriptions to clarify factors that make the program successful, details of learners' experience, and any interprofessional differences in interpreting content. The authors believe this innovative addition to health care education warrants further research.

  2. Fidelity to the Cognitive Processing Therapy Protocol: Evaluation of Critical Elements.

    PubMed

    Farmer, Courtney C; Mitchell, Karen S; Parker-Guilbert, Kelly; Galovski, Tara E

    2017-03-01

    The contributions of individual therapy elements to the overall efficacy of evidence-based practices for the treatment of posttraumatic stress disorder (PTSD) are not well-understood. This study first examined the extent to which theoretically important treatment components of Cognitive Processing Therapy (CPT; i.e., skill in Socratic questioning; prioritizing assimilation; attention to practice assignments; emphasis on expression of natural affect) were successfully administered across the course of therapy for 68 PTSD-positive survivors of interpersonal trauma. Therapist fidelity in the administration of these four elements was evaluated in 533 taped CPT sessions of study participants included in one of two randomized controlled CPT treatment trials. Second, we examined therapist fidelity to these components as a predictor of session-to-session PTSD and depression symptom change. Third, follow-up analyses examined the influence of high therapist competence for these four components across an entire course of therapy on symptom change from pre- to posttreatment. Results showed consistently high adherence and more variable competence for these four treatment components. There were no significant effects of therapist fidelity on session-to-session symptom change. However, results showed that overall high therapist competence for "skill in Socratic questioning" and "prioritizing assimilation before overaccommodation" were related to greater client improvement in PTSD severity, but "attention to practice assignments" and "emphasis on expression of natural affect" were not. Overall competence ratings for the four components were not significantly associated with improvement in depressive symptoms. Findings contribute to increased understanding of the relationship between the key treatment components of CPT and symptom change. Copyright © 2016. Published by Elsevier Ltd.

  3. Teaching and Learning the Elements of Argumentation

    NASA Astrophysics Data System (ADS)

    Untereiner, Brian

    Kim, Department of Curriculum and Instruction Departmental Member iii Abstract Supervisory Committee Dr. Robert Anthony, Department of Curriculum and Instruction Supervisor Dr. Mijung Kim, Department of Curriculum and Instruction Departmental Member In this study I investigated the interactions of 25 Grade 8 science students as they learned how to construct oral arguments using the Toulmin Argumentation Pattern framework. I collected the data during three recorded small group discussion sessions during a five week Earth Science unit between February and March of 2011. The first session recorded the students' discussions prior to receiving either argumentation instruction or the science concept instruction. The second session recorded their discussions after receiving an introduction to argumentation and a scaffold, but not concept instruction. During the three weeks preceding the third session, the students received additional argumentation instruction and completed one-third of the Earth Science unit. The results showed the students collectively made more arguments during each subsequent session. The students' individual arguments showed a correspondence between their purportedly most familiar topics and the most discussed topics. I also found that when students made counter arguments and/or invited or challenged group members to participate, their discussions contained comparatively more argument elements (claims, data and warrants) than discussions containing predominantly collaborative assertions. The key outcome of this study for developing students' use of the elements of argumentation during classroom discussions was to recognize and incorporate opportunities for the students to tap into their prior-knowledge. To engage students in this process, the results indicate the importance of creating time for discussions relevant to the curriculum and to the students.

  4. Integrative Reiki for cancer patients: a program evaluation.

    PubMed

    Fleisher, Kimberly A; Mackenzie, Elizabeth R; Frankel, Eitan S; Seluzicki, Christina; Casarett, David; Mao, Jun J

    2014-01-01

    This mixed methods study sought to evaluate the outcomes of an integrative Reiki volunteer program in an academic medical oncology center setting. We used de-identified program evaluation data to perform both quantitative and qualitative analyses of participants' experiences of Reiki sessions. The quantitative data were collected pre- and postsession using a modified version of the distress thermometer. The pre- and postsession data from the distress assessment were analyzed using a paired Student's : test. The qualitative data were derived from written responses to open-ended questions asked after each Reiki session and were analyzed for key words and recurring themes. Of the 213 pre-post surveys of first-time sessions in the evaluation period, we observed a more than 50% decrease in self-reported distress (from 3.80 to 1.55), anxiety (from 4.05 to 1.44), depression (from 2.54 to 1.10), pain (from 2.58 to 1.21), and fatigue (from 4.80 to 2.30) with P < .001 for all. Using conservative estimates that treat missing data as not endorsing Reiki, we found 176 (82.6%) of participants liked the Reiki session, 176 (82.6%) found the Reiki session helpful, 157 (73.7%) plan to continue using Reiki, and 175 (82.2%) would recommend Reiki to others. Qualitative analyses found that individuals reported that Reiki induced relaxation and enhanced spiritual well-being. An integrative Reiki volunteer program shows promise as a component of supportive care for cancer patients. More research is needed to evaluate and understand the impact that Reiki may have for patients, caregivers, and staff whose lives have been affected by cancer.

  5. Using Movies to Strengthen Learning of the Humanistic Aspects of Medicine.

    PubMed

    Shankar, Pathiyil Ravi; Rose, Christopher; Balasubramanium, Ramanan; Nandy, Atanu; Friedmann, Alberto

    2016-01-01

    Movie screening and activities have been used during the last two semesters (spring and summer 2015) to strengthen the learning of communication skills, empathy, professionalism, and greater understanding of the process and death and dying at the Xavier University School of Medicine. The present manuscript describes the movie screening and activities. Student feedback regarding the sessions is also mentioned. The activity was conducted among basic science undergraduate medical students and student feedback was obtained. A cross-sectional study design was used. Feedback was obtained towards the end of June 2015 using a questionnaire designed by the authors. Participants were asked to rate their degree of agreement with the set of statements and provide an overall rating for the sessions. No demographic information was collected. Cronbach's alpha was calculated as a measure of internal consistency. The normality of distribution of the scores of individual statements and of the overall rating was determined using one sample Kolmogorov-Smirnov test. The average scores were calculated. Free text comments were tabulated. Forty-nine of the 63 students (77.8%) participated in the study. Cronbach's alpha was 0.868 indicating a high level of internal consistency. The median scores indicating the degree of agreement with most statements ranged from 3 to 5. The mean participant rating of the sessions was 7.10 (maximum possible score 10). A few participants provided free text comments regarding the sessions. Student feedback about the session was positive. Impact of the session on humanistic issues, professionalism and death and dying should be studied in future.

  6. Role and challenges of simulation in undergraduate curriculum.

    PubMed

    Nuzhat, Ayesha; Salem, Raneem Osama; Al Shehri, Fatimah Nasser; Al Hamdan, Nasser

    2014-04-01

    Medical simulation is relatively a novel technology widely utilized for teaching and assessing students clinical skills. Students and faculty face many challenges when simulation sessions are introduced into undergraduate curriculum. The aim of this study is to obtain the opinion of undergraduate medical students and our faculty regarding the role of simulation in undergraduate curriculum, the simulation modalities used, and the perceived barriers in implementing simulation sessions. A self-administered pilot tested questionnaire with 18 items using a 5-point Likert scale was distributed to undergraduate male (n = 125) and female students (n = 70) as well as to the faculty members (n = 14) at King Fahad Medical City, King Saud Bin Abdul Aziz University of Health Sciences, Saudi Arabia, to respond. Survey elements addressed the role of simulation, simulation modalities used, and perceived challenges to implementation of simulation sessions. Various learning outcomes are achieved and improved through the technology enhanced simulation sessions such as communication skills, diagnostic skills, procedural skills, self-confidence, and integration of basic and clinical sciences. The use of high fidelity simulators, simulated patients and task trainers was more desirable by our students and faculty for teaching and learning as well as an evaluation tool. According to most of the students', institutional support in terms of resources, staff and duration of sessions was adequate. However, motivation to participate in the sessions and provision of adequate feedback by the staff was a constraint. The use of simulation laboratory is of great benefit to the students and a great teaching tool for the staff to ensure students learn various skills.

  7. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    NASA Astrophysics Data System (ADS)

    Gleim, A. V.; Nazarov, Yu. V.; Egorov, V. I.; Smirnov, S. V.; Bannik, O. I.; Chistyakov, V. V.; Kynev, S. M.; Anisimov, A. A.; Kozlov, S. A.; Vasiliev, V. N.

    2015-09-01

    In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  8. Experience-Related Changes in Place Cell Responses to New Sensory Configuration That Does Not Occur in the Natural Environment in the Rat Hippocampus

    PubMed Central

    Zou, Dan; Nishimaru, Hiroshi; Matsumoto, Jumpei; Takamura, Yusaku; Ono, Taketoshi; Nishijo, Hisao

    2017-01-01

    The hippocampal formation (HF) is implicated in a comparator that detects sensory conflict (mismatch) among convergent inputs. This suggests that new place cells encoding the new configuration with sensory mismatch develop after the HF learns to accept the new configuration as a match. To investigate this issue, HF CA1 place cell activity in rats was analyzed after the adaptation of the rats to the same sensory mismatch condition. The rats were placed on a treadmill on a stage that was translocated in a figure 8-shaped pathway. We recorded HF neuronal activities under three conditions; (1) an initial control session, in which both the stage and the treadmill moved forward, (2) a backward (mismatch) session, in which the stage was translocated backward while the rats locomoted forward on the treadmill, and (3) the second control session. Of the 161 HF neurons, 56 place-differential activities were recorded from the HF CA1 subfield. These place-differential activities were categorized into four types; forward-related, backward-related, both-translocation-related, and session-dependent. Forward-related activities showed predominant spatial firings in the forward sessions, while backward-related activities showed predominant spatial firings in the backward sessions. Both-translocation-related activities showed consistent spatial firings in both the forward and backward conditions. On the other hand, session-dependent activities showed different spatial firings across the sessions. Detailed analyses of the place fields indicated that mean place field sizes were larger in the forward-related, backward-related, and both-translocation-related activities than in the session-dependent activities. Furthermore, firing rate distributions in the place fields were negatively skewed and asymmetric, which is similar to place field changes that occur after repeated experience. These results demonstrate that the HF encodes a naturally impossible new configuration of sensory inputs after adaptation, suggesting that the HF is capable of updating its stored memory to accept a new configuration as a match by repeated experience. PMID:28878682

  9. The Northwest's Hot Topics in Preparedness forum: a novel distance-learning collaborative.

    PubMed

    Shield, Margaret; Wiesner, Paul; Curran, Connie; Stark, Greg; Rauch, Steve; Stergachis, Andy; Thompson, Jack

    2005-11-01

    The Northwest Center for Public Health Practice at the University of Washington hosts a training forum, called Hot Topics in Preparedness, that is delivered via a synchronous, Web conferencing system. These monthly, 1-hour sessions focus on key topics related to emergency preparedness for public health professionals and their emergency response partners in the Northwest region. This distance learning series was conceived and implemented as a regional collaborative, overseen by an advisory board representing state, local, and tribal health agencies. Results of session evaluations, challenges, and lessons learned from the first year of the Hot Topics in Preparedness forum are reported. Web conferencing is a popular, convenient, and effective strategy for delivering training in the rapidly changing field of preparedness across a large geographic region.

  10. Multi-modality imaging: Bird's eye view from the 2017 American Heart Association Scientific Sessions.

    PubMed

    AlJaroudi, Wael A; Lloyd, Steven G; Hage, Fadi G

    2018-04-01

    This review summarizes key imaging studies that were presented in the American Heart Association Scientific Sessions 2017 related to the fields of nuclear cardiology, cardiac computed tomography, cardiac magnetic resonance, and echocardiography. The aim of this bird's eye view is to inform readers about multiple studies reported at the meeting from these different imaging modalities. While such a review is most useful for those that did not attend the conference, we find that a general overview may also be useful to those that did since it is often difficult to get exposure to many abstracts at large meetings. The review, therefore, aims to help readers stay updated on the newest imaging studies presented at the meeting and will hopefully stimulate new ideas for future research in imaging.

  11. Transforming a Liability Into An Asset-Creating a Market for CO2-based Products

    NASA Astrophysics Data System (ADS)

    David, B. J.

    2016-12-01

    This session will discuss converting CO2 from a liability into an asset. It will specifically discuss how at least 25 products can be created using CO2 as a feedstock and deployed in the market at large scale. Focus will be on products that can both achieve scale from a market standpoint as well as climate significance in use of CO2 as a feedstock. The session will describe the market drivers supporting and inhibiting commercial deployment of CO2-based products. It will list key barriers and risks in the various CO2-based product segments. These barriers/risks could occur across technology, policy, institutional, economic, and other dimensions. The means to mitigate each barrier and the likelihood for such means to be deployed will be discussed.

  12. Nutrition and Supplements for Elite Open-Weight Rowing.

    PubMed

    Boegman, Susan; Dziedzic, Christine E

    2016-01-01

    Competitive rowing events are raced over 2,000 m requiring athletes to have highly developed aerobic and anaerobic systems. Elite rowers therefore undertake training sessions focused on lactate tolerance, strength and power as well as aerobic and anaerobic capacity development, that can amount to a 24-h training week. The training stimuli and consequent metabolic demands of each session in a rowing training program differ depending on type, length, and intensity. Nutrition guidelines for endurance- and power-based sports should be drawn upon; however, individualized and flexible nutrition plans are critical to successfully meet the daily, weekly, and cyclic nutrient requirements of a rower. This review will provide an overview of key nutritional strategies to optimize training and enhance adaptation, and briefly discuss supplement strategies that may support health and enhance performance in elite rowing.

  13. Retesting personality in employee selection: implications of the context, sample, and setting.

    PubMed

    Holladay, Courtney L; David, Emily; Johnson, Stefanie K

    2013-04-01

    The present study sought to assess when and how actual job applicants change their responses when filling out an unproctored personality selection assessment for a second time. It was predicted feedback would be a key contextual motivator associated with how much applicants change their answers during the second administration. Mediation results showed that individuals receiving feedback that showed a low score on the personality assessment was the reason they did not get the job were more likely to employ faking response strategies in the second testing session, predicting the highest change in scores between the first and second testing sessions. Individuals receiving no feedback and those not experimentally motivated to fake (i.e., a comparison group of students) showed less change in responses across administrations.

  14. Effects of cooperative learning groups during social studies for students with autism and fourth-grade peers.

    PubMed Central

    Dugan, E; Kamps, D; Leonard, B

    1995-01-01

    We investigated the use of cooperative learning groups as an instructional strategy for integrating 2 students with autism into a fourth-grade social studies class. Baseline consisted of 40 min of teacher-led sessions including lecture, questions and discussion with students, and the use of maps. The intervention condition consisted of 10 min of teacher introduction of new material, followed by cooperative learning groups that included tutoring on key words and facts, a team activity, and a whole class wrap-up and review. An ABAB design showed increases for target students and peers for the number of items gained on weekly pretests and posttests, the percentage of academic engagement during sessions, and durations of student interaction during the intervention. PMID:7601803

  15. Learning Curves of Virtual Mastoidectomy in Distributed and Massed Practice.

    PubMed

    Andersen, Steven Arild Wuyts; Konge, Lars; Cayé-Thomasen, Per; Sørensen, Mads Sølvsten

    2015-10-01

    Repeated and deliberate practice is crucial in surgical skills training, and virtual reality (VR) simulation can provide self-directed training of basic surgical skills to meet the individual needs of the trainee. Assessment of the learning curves of surgical procedures is pivotal in understanding skills acquisition and best-practice implementation and organization of training. To explore the learning curves of VR simulation training of mastoidectomy and the effects of different practice sequences with the aim of proposing the optimal organization of training. A prospective trial with a 2 × 2 design was conducted at an academic teaching hospital. Participants included 43 novice medical students. Of these, 21 students completed time-distributed practice from October 14 to November 29, 2013, and a separate group of 19 students completed massed practice on May 16, 17, or 18, 2014. Data analysis was performed from June 6, 2014, to March 3, 2015. Participants performed 12 repeated virtual mastoidectomies using a temporal bone surgical simulator in either a distributed (practice blocks spaced in time) or massed (all practice in 1 day) training program with randomization for simulator-integrated tutoring during the first 5 sessions. Performance was assessed using a modified Welling Scale for final product analysis by 2 blinded senior otologists. Compared with the 19 students in the massed practice group, the 21 students in the distributed practice group were older (mean age, 25.1 years), more often male (15 [62%]), and had slightly higher mean gaming frequency (2.3 on a 1-5 Likert scale). Learning curves were established and distributed practice was found to be superior to massed practice, reported as mean end score (95% CI) of 15.7 (14.4-17.0) in distributed practice vs. 13.0 (11.9-14.1) with massed practice (P = .002). Simulator-integrated tutoring accelerated the initial performance, with mean score for tutored sessions of 14.6 (13.9-15.2) vs. 13.4 (12.8-14.0) for corresponding nontutored sessions (P < .01) but at the cost of a drop in performance once tutoring ceased. The performance drop was less with distributed practice, suggesting a protective effect when acquired skills were consolidated over time. The mean performance of the nontutored participants in the distributed practice group plateaued on a score of 16.0 (15.3-16.7) at approximately the ninth repetition, but the individual learning curves were highly variable. Novices can acquire basic mastoidectomy competencies with self-directed VR simulation training. Training should be organized with distributed practice, and simulator-integrated tutoring can be useful to accelerate the initial learning curve. Practice should be deliberate and toward a standard set level of proficiency that remains to be defined rather than toward the mean learning curve plateau.

  16. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  17. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bonior, Jason D; Evans, Philip G; Sheets, Gregory S

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  18. RETAIL ORGANIZATION, A SUGGESTED ADULT DISTRIBUTIVE EDUCATION COURSE OUTLINE.

    ERIC Educational Resources Information Center

    MAURO, RALPH N.; AND OTHERS

    THIS SUGGESTED OUTLINE FOR A COURSE ON RETAIL ORGANIZATION IS PLANNED FOR FIVE 2-HOUR SESSIONS ON (1) EVOLUTION OF RETAIL ORGANIZATIONAL STRUCTURE, (2) ORGANIZATION, INCLUDING CONCEPTS, PRINCIPLES, AND PRACTICES, (3) TYPICAL RETAIL ORGANIZATION PATTERNS, (4) ORGANIZATIONAL AND FUNCTIONAL ANAYSIS, INCLUDING MERCHANDISING, SALES PROMOTION, AND…

  19. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  20. Twentieth workshop on geothermal reservoir engineering: Proceedings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    1995-01-26

    PREFACE The Twentieth Workshop on Geothermal Reservoir Engineering, dedicated to the memory of Professor Hank Ramey, was held at Stanford University on January 24-26, 1995. There were ninety-five registered participants. Participants came from six foreign countries: Japan, Mexico, England, Italy, New Zealand and Iceland. The performance of many geothermal reservoirs outside the United States was described in several of the papers. Professor Roland N. Horne opened the meeting and welcomed visitors to the campus. The key note speaker was Marshall Reed, who gave a brief overview of the Department of Energy's current plan. Thirty-two papers were presented in the technicalmore » sessions of the workshop. Technical papers were organized into eleven sessions concerning: field development, modeling, well tesubore, injection, geoscience, geochemistry and field operations. Session chairmen were major contributors to the workshop, and we thank: Ben Barker, Bob Fournier, Mark Walters, John Counsil, Marcelo Lippmann, Keshav Goyal, Joel Renner and Mike Shook. In addition to the technical sessions, a panel discussion was held on ''What have we learned in 20 years?'' Panel speakers included Patrick Muffler, George Frye, Alfred Truesdell and John Pritchett. The subject was further discussed by Subir Sanyal, who gave the post-dinner speech at the banquet. The Workshop was organized by the Stanford Geothermal Program faculty, staff, and graduate students. We wish to thank our students who operated the audiovisual equipment. Shaun D. Fitzgerald Program Manager« less

  1. Economics, ecologics, and mechanics: The dynamics of responding under conditions of varying motivation

    PubMed Central

    Killeen, Peter R.

    1995-01-01

    The mechanics of behavior developed by Killeen (1994) is extended to deal with deprivation and satiation and with recovery of arousal at the beginning of sessions. The extended theory is validated against satiation curves and within-session changes in response rates. Anomalies, such as (a) the positive correlation between magnitude of an incentive and response rates in some contexts and a negative correlation in other contexts and (b) the greater prominence of incentive effects when magnitude is varied within the session rather than between sessions, are explained in terms of the basic interplay of drive and incentive motivation. The models are applied to data from closed economies in which changes of satiation levels play a key role in determining the changes in behavior. Relaxation of various assumptions leads to closed-form models for response rates and demand functions in these contexts, ones that show reasonable accord with the data and reinforce arguments for unit price as a controlling variable. The central role of deprivation level in this treatment distinguishes it from economic models. It is argued that traditional experiments should be redesigned to reveal basic principles, that ecologic experiments should be redesigned to test the applicability of those principles in more natural contexts, and that behavioral economics should consist of the applications of these principles to economic contexts, not the adoption of economic models as alternatives to behavioral analysis. PMID:16812776

  2. IYA Tabloid in Your Community

    NASA Astrophysics Data System (ADS)

    Harvey, Janice; Michaud, P.

    2008-05-01

    Gemini PIO would like to offer suggestions on how to approach your local newspaper with the possibility of a tabloid for your community being published during IYA 2009. Local government support, astronomer's articles, advertisers, and someone within your organization to manage the content will be discussed. We will explain the timeline required, number of personnel hours required, developmental stages and income your local newspaper would have to generate in order to produce a quality, table-top tabloid. In 2003 "Stars Over Mauna Kea", a special supplement/tabloid was produced and distributed in the local newspapers in Hilo, Hawaii with over 30,000 copies printed and distributed. The publication, 48 pages in total, featured profiles of observatories on Mauna Kea, stories about the geology and legends of Mauna Kea, and historical information about the evolution of astronomy in Hawaii. In addition the publication included a series of essays titled "In their own words". These were articles written by key members of the astronomy community. In 2005 60,000 copies of "Stars Over Mauna Kea II” were printed as a follow-up to the first edition. An article on `Imiloa Astronomy Education Center, explanations of what types of telescopes sit atop Mauna Kea, and columns written by scientists about the fascinating and significant discoveries being made were featured. Personal stories about careers in astronomy were highlighted. In Chile, a similar tabloid, 8 pages in length was published and 5,000 copies were distributed throughout the country. The 2005 tabloid featured Gemini, CTIO and SOAR telescopes. In 2009 Gemini PIO will again produce a tabloid for IYA. Potential NSF funding has been requested for a tabloid template for localization and adaptation for the IYA program promotion in local markets. This session will include an update on other Visitors/Science Centers, Observatories and Planetaria Working Group initiatives for the IYA.

  3. The Blue Dot Workshop: Spectroscopic Search for Life on Extrasolar Planets

    NASA Technical Reports Server (NTRS)

    Des Marais, David J. (Editor)

    1997-01-01

    This workshop explored the key questions and challenges associated with detecting life on an extrasolar planet. The final product will be a NASA Conference Publication which includes the abstracts from 21 talks, summaries of key findings, and recommendations for future research. The workshop included sessions on three related topics: the biogeochemistry of biogenic gases in the atmosphere, the chemistry and spectroscopy of planetary atmospheres, and the remote sensing of planetary atmospheres and surfaces. With the observation that planetary formation is probably a common phenomenon, together with the advent of the technical capability to locate and describe extrasolar planets, this research area indeed has an exciting future.

  4. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  5. Free-Space Quantum Key Distribution using Polarization Entangled Photons

    NASA Astrophysics Data System (ADS)

    Kurtsiefer, Christian

    2007-06-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).

  6. Present and future free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.

    2002-04-01

    Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.

  7. A Mismatch Between Athlete Practice and Current Sports Nutrition Guidelines Among Elite Female and Male Middle- and Long-Distance Athletes.

    PubMed

    Heikura, Ida A; Stellingwerff, Trent; Mero, Antti A; Uusitalo, Arja Leena Tuulia; Burke, Louise M

    2017-08-01

    Contemporary nutrition guidelines promote a variety of periodized and time-sensitive recommendations, but current information regarding the knowledge and practice of these strategies among world-class athletes is limited. The aim of this study was to investigate this theme by implementing a questionnaire on dietary periodization practices in national/international level female (n = 27) and male (n = 21) middle- and long-distance runners/race-walkers. The questionnaire aimed to gain information on between and within-day dietary choices, as well as timing of pre- and posttraining meals and practices of training with low or high carbohydrate (CHO) availability. Data are shown as percentage (%) of all athletes, with differences in responses between subgroups (sex or event) shown as Chi-square x 2 when p < .05. Nearly two-thirds of all athletes reported that they aim to eat more food on, or after, hard training days. Most athletes said they focus on adequate fueling (96%) and adequate CHO and protein (PRO) recovery (87%) around key sessions. Twenty-six percent of athletes (11% of middle vs 42% of long-distance athletes [x 2 (1, n = 46) = 4.308, p = .038, phi = 0.3])) reported to undertake training in the fasted state, while 11% said they periodically restrict CHO intake, with 30% ingesting CHO during training sessions. Our findings show that elite endurance athletes appear to execute pre- and post-key session nutrition recovery recommendations. However, very few athletes deliberately undertake some contemporary dietary periodization approaches, such as training in the fasted state or periodically restricting CHO intake. This study suggests mismatches between athlete practice and current and developing sports nutrition guidelines.

  8. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  9. Reprising the Home Language Survey: Summary of a National Working Session on Policies, Practices, and Tools for Identifying Potential English Learners

    ERIC Educational Resources Information Center

    Linquanti, Robert; Bailey, Alison L.

    2014-01-01

    This document is the first in a series of working papers that elaborate on a framework of four key stages in moving toward a common definition of English learner (EL), as described in the Council of Chief State School Officers (CCSSO) publication, "Toward a "Common Definition of English Learner": A Brief Defining Policy and…

  10. Institutional Research: Coming of Age. General Session Presentations [at the] Annual Forum [of the] Association for Institutional Research (30th, Louisville, Kentucky, May 13-16, 1990).

    ERIC Educational Resources Information Center

    Endo, Jean J., Ed.

    Synopses of six conference presentations are provided in this pamphlet, dealing with the theme of leadership and professional standards in university settings and the influence of social and technological challenges. In "Leadership and Team Building: Key Ingredients to the Institutional Research Role of the Future," Robert L. Taylor…

  11. Improving Music Experiences for Emotionally Handicapped Children in Public School Programs. Proceedings of a Special Study Institute (Rochester, New York, October 23-25, 1969).

    ERIC Educational Resources Information Center

    New York State Education Dept., Albany.

    Included in the proceedings of the study institute on Improving Music Experiences for Emotionally Handicapped Children in Public School Programs are statements of greeting (Charles Matkowski, Harvey Granite), an overview by Donald Hayden, and the key note address by Mrs. Theresa Goodell. From the second session are included statements from three…

  12. Peer Feedback Mediates the Impact of Self-Regulation Procedures on Strategy Use and Reading Comprehension in Reciprocal Teaching Groups

    ERIC Educational Resources Information Center

    Schünemann, Nina; Spörer, Nadine; Völlinger, Vanessa A.; Brunstein, Joachim C.

    2017-01-01

    The goal of this research was to highlight the role social regulatory processes play in making students' teamwork in reciprocal teaching (RT) groups (a classroom activity in which students take the teacher's role in small group reading sessions) effective. In addition to teamwork quality, we expected peer feedback to be a key factor in enhancing…

  13. The Importance of Emotional Insight in Cognitive Behaviour Therapy for Anorexia Nervosa: An Adolescent Case Study

    ERIC Educational Resources Information Center

    Rupa, Megha; Girimaji, Satish; Muthuswamy, Selvi; Jacob, Preeti; Ravi, Malavika

    2013-01-01

    Anorexia nervosa is a rare but sever psychiatric disorder in adolescence, with chronicity and death being the most feared consequence. Emotional Insight into one's problem is considered a key determinant of success in therapy. The following case study of a 14-year-old client, describes the process of therapy as it unfolded across 45 sessions. An…

  14. Productivity--A Key to Survival in the 1980's. Proceedings of the 1980 CAUSE National Conference (Phoenix, Arizona, December 7-10, 1980).

    ERIC Educational Resources Information Center

    Skarulis, Patricia C., Ed.; Thomas, Charles R., Ed.

    The 1980 CAUSE conference focused on how the management information systems area can add to the efficiency and effectiveness of the higher education institution. After acknowledgements and brief notes on general session topics, the papers are presented in six groups: (1) issues in higher education (futures planning, strategic decision-making, and…

  15. Effects of a Signaled Delay to Reinforcement in the Previous and Upcoming Ratios on Between-Ratio Pausing in Fixed-Ratio Schedules

    ERIC Educational Resources Information Center

    Harris, Aimee; Foster, T. Mary; Levine, Joshua; Temple, William

    2012-01-01

    Domestic hens responded under multiple fixed-ratio fixed-ratio schedules with equal fixed ratios. One component provided immediate reinforcement and the other provided reinforcement after a delay, signaled by the offset of the key light. The components were presented quasi-randomly so that all four possible transitions occurred in each session.…

  16. Environmental Regulation of Plant Gene Expression: An Rt-qPCR Laboratory Project for an Upper-Level Undergraduate Biochemistry or Molecular Biology Course

    ERIC Educational Resources Information Center

    Eickelberg, Garrett J.; Fisher, Alison J.

    2013-01-01

    We present a novel laboratory project employing "real-time" RT-qPCR to measure the effect of environment on the expression of the "FLOWERING LOCUS C" gene, a key regulator of floral timing in "Arabidopsis thaliana" plants. The project requires four 3-hr laboratory sessions and is aimed at upper-level undergraduate…

  17. Reference Performance Level Descriptors: Outcome of a National Working Session on Defining an "English Proficient" Performance Standard

    ERIC Educational Resources Information Center

    Cook, H. Gary; MacDonald, Rita

    2014-01-01

    This document is the second in a series of working papers that elaborate on a framework of four key stages in moving toward a common definition of English learner (EL), as described in the Council of Chief State School Officers (CCSSO) publication, "Toward a 'Common Definition of English Learner': Guidance for States and State Assessment…

  18. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  20. Quantum key distribution using gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

  1. Trojan horse attacks on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan

    2016-04-01

    There has been much interest in ;counterfactual quantum cryptography; (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.

  2. Experimental demonstration of counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ren, M.; Wu, G.; Wu, E.; Zeng, H.

    2011-04-01

    Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.

  3. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  4. Collaborative Control of Media Playbacks in SCDNs

    ERIC Educational Resources Information Center

    Fortino, Giancarlo; Russo, Wilma; Palau, Carlos E.

    2006-01-01

    In this paper we present a CDN-based system, namely the COMODIN system, which is a media on-demand platform for synchronous cooperative work which supports an explicitly-formed cooperative group of distributed users with the following integrated functionalities: request of an archived multimedia session, sharing of its playback, and collaboration…

  5. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

    PubMed Central

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-01-01

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396

  6. Pilot test of a peer-led small-group video intervention to promote mammography screening among Chinese American immigrants

    PubMed Central

    Maxwell, Annette E.; Wang, Judy H.; Young, Lucy; Crespi, Catherine M.; Mistry, Ritesh; Sudan, Madhuri; Bastani, Roshan

    2010-01-01

    This study evaluated the feasibility, acceptability and potential effect of a small-group video intervention led by trained Chinese American lay educators who recruited Chinese American women not up to date on mammography screening. Nine lay educators conducted 14 “breast health tea time workshops” in community settings and private homes that started with watching a culturally tailored video promoting screening followed by a question and answer session and distribution of print materials. Many group attendees did not have health insurance or a regular doctor, had low levels of income and were not proficient in English. Forty-four percent of the attendees reported receipt of a mammogram within 6 months after the small-group session with higher odds of screening among women who had lived in the U.S. less than 10% of their lifetime. Four of the educators were very interested in conducting another group session in the next 6 months. PMID:20720095

  7. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  8. Within Session Sequence of Balance and Plyometric Exercises Does Not Affect Training Adaptations with Youth Soccer Athletes

    PubMed Central

    Chaouachi, Mehdi; Granacher, Urs; Makhlouf, Issam; Hammami, Raouf; Behm, David G; Chaouachi, Anis

    2017-01-01

    The integration of balance and plyometric training has been shown to provide significant improvements in sprint, jump, agility, and other performance measures in young athletes. It is not known if a specific within session balance and plyometric exercise sequence provides more effective training adaptations. The objective of the present study was to investigate the effects of using a sequence of alternating pairs of exercises versus a block (series) of all balance exercises followed by a block of plyometric exercises on components of physical fitness such as muscle strength, power, speed, agility, and balance. Twenty-six male adolescent soccer players (13.9 ± 0.3 years) participated in an 8-week training program that either alternated individual balance (e.g., exercises on unstable surfaces) and plyometric (e.g., jumps, hops, rebounds) exercises or performed a block of balance exercises prior to a block of plyometric exercises within each training session. Pre- and post-training measures included proxies of strength, power, agility, sprint, and balance such as countermovement jumps, isometric back and knee extension strength, standing long jump, 10 and 30-m sprints, agility, standing stork, and Y-balance tests. Both groups exhibited significant, generally large magnitude (effect sizes) training improvements for all measures with mean performance increases of approximately >30%. There were no significant differences between the training groups over time. The results demonstrate the effectiveness of combining balance and plyometric exercises within a training session on components of physical fitness with young adolescents. The improved performance outcomes were not significantly influenced by the within session exercise sequence. Key points The combination of balance and plyometric exercises can induce significant and substantial training improvements in muscle strength, power, speed, agility, and balance with adolescent youth athletes The within training session sequence of balance and plyometric exercises does not substantially affect these training improvements. PMID:28344461

  9. Towards exergaming commons: composing the exergame ontology for publishing open game data.

    PubMed

    Bamparopoulos, Giorgos; Konstantinidis, Evdokimos; Bratsas, Charalampos; Bamidis, Panagiotis D

    2016-01-01

    It has been shown that exergames have multiple benefits for physical, mental and cognitive health. Only recently, however, researchers have started considering them as health monitoring tools, through collection and analysis of game metrics data. In light of this and initiatives like the Quantified Self, there is an emerging need to open the data produced by health games and their associated metrics in order for them to be evaluated by the research community in an attempt to quantify their potential health, cognitive and physiological benefits. We have developed an ontology that describes exergames using the Web Ontology Language (OWL); it is available at http://purl.org/net/exergame/ns#. After an investigation of key components of exergames, relevant ontologies were incorporated, while necessary classes and properties were defined to model these components. A JavaScript framework was also developed in order to apply the ontology to online exergames. Finally, a SPARQL Endpoint is provided to enable open data access to potential clients through the web. Exergame components include details for players, game sessions, as well as, data produced during these game-playing sessions. The description of the game includes elements such as goals, game controllers and presentation hardware used; what is more, concepts from already existing ontologies are reused/repurposed. Game sessions include information related to the player, the date and venue where the game was played, as well as, the results/scores that were produced/achieved. These games are subsequently played by 14 users in multiple game sessions and the results derived from these sessions are published in a triplestore as open data. We model concepts related to exergames by providing a standardized structure for reference and comparison. This is the first work that publishes data from actual exergame sessions on the web, facilitating the integration and analysis of the data, while allowing open data access through the web in an effort to enable the concept of Open Trials for Active and Healthy Ageing.

  10. The use of drama to support reflection and understanding of the residents' situation in dementia care: a pilot study.

    PubMed

    Bolmsjö, Ingrid; Edberg, Anna-Karin; Andersson, Petra Lilja

    2014-09-01

    One key aspect of person-centredness is striving to understand both the patients' experiences and behaviours from their perspective. These aspects are precisely those that staff in dementia care highlight as causing them most difficulty because the people in their care have major problems expressing themselves. There is thus a need to develop a method to help the staff to achieve interpretation through reflection. The aim of this study was to explore the use of drama as a tool to support reflection among staff working in the residential care of people with dementia. A qualitative evaluation of a programme consisting of three drama sessions with staff working in residential care (n = 10 nurse assistants). Data comprised observations and tape recordings of the sessions, the researchers' reflections after each session and a focus-group interview with the participants. The texts were analysed using qualitative content analysis. The analysis showed that: (i) the exercises stimulate reflection about daily caring practice; (ii) the participants must receive extensive information about the purpose of the sessions; (iii) the research team must secure the defined frames and conditions and have practical knowledge about caring for people with dementia and (iv) the management needs to be stable, committed and supportive. Drama seems to be a valid tool to aid reflection, but several adjustments are needed concerning both the content of the sessions and the methodology. When designing a larger intervention study, it would be preferable to the sessions to be combined with staff support to effect changes in care provision resulting from their increased awareness of the residents' situation and experience. Our results showed that drama can be a means to enhance reflection among staff in residential care for people with dementia. Further research is however needed concerning the effects for the staff's situation and nursing care quality. © 2012 Blackwell Publishing Ltd.

  11. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters

    PubMed Central

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164

  12. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    PubMed

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  13. Increasing children's physical activity through a teaching-assistant led extracurricular intervention: process evaluation of the action 3:30 randomised feasibility trial.

    PubMed

    Jago, Russell; Sebire, Simon J; Davies, Ben; Wood, Lesley; Banfield, Kathryn; Edwards, Mark J; Powell, Jane E; Montgomery, Alan A; Thompson, Janice L; Fox, Kenneth R

    2015-02-18

    Many children do not engage in recommended levels of physical activity (PA), highlighting the need to find ways to increase children's PA. Process evaluations play an important role in improving the science of randomised controlled trials. We recently reported the results of the Action 3:30 cluster randomised feasibility trial illustrating higher levels of moderate to vigorous intensity PA among boys but not girls. The aim of this paper is to report the process evaluation results including intervention fidelity, implementation, context and how intervention components and trial design could be improved before proceeding to a definitive RCT. Children's session enjoyment was assessed every two weeks. Reasons for non-attendance were provided by questionnaire at the end of the intervention. Post intervention interviews were held with participating teaching assistants (TAs) and school key contacts (KCs), and focus groups were conducted with children in all 10 intervention schools. Interviews and focus groups examined how recruitment and session attendance might be improved and established which elements of the programme that were and were not well received. Data indicated good intervention fidelity with TA's adopting enjoyment-focussed teaching styles and the sessions improving children's skills and self-esteem. Several positive aspects of implementation were identified, including high session variety, the opportunity to work in teams, the child-led sessions and the engaging leader style. In terms of context there was evidence that TA's faced difficulties managing challenging behaviour and that further training in this area was needed. TAs and KCs felt that recruitment could be improved by providing taster sessions during PE lessons and clarifying the days that the clubs would run at the point of recruitment. The programme could be improved to enhance interest for girls, by including training for managing disruptive behaviour and making some activities more age-group appropriate. Action 3.30 showed promise but could be improved by ensuring age appropriate activities, providing more appeal to girls and improving recruitment through taster sessions and early establishment of days of the week it is to be offered on. ISRCTN58502739.

  14. Compliance With Neuromuscular Training and Anterior Cruciate Ligament Injury Risk Reduction in Female Athletes: A Meta-Analysis

    PubMed Central

    Sugimoto, Dai; Myer, Gregory D.; Bush, Heather M.; Klugman, Maddie F.; McKeon, Jennifer M. Medina; Hewett, Timothy E.

    2012-01-01

    Context No consensus exists about the influence of compliance with neuromuscular training programs on reduction of the risk of anterior cruciate ligament (ACL) injury. Objective To systematically review and synthesize the published literature to determine if compliance with neuromuscular training is associated with reduced incidence of ACL injury in young female athletes. Data Sources We searched PubMed, SPORTDiscus, CINAHL, and MEDLINE for articles published from 1995 to 2010 using the key words anterior cruciate ligament prevention, ACL prevention, knee prevention, prospective knee prevention, neuromuscular training, and neuromuscular intervention. Study Selection Criteria for inclusion required that (1) the number of ACL injuries was reported, (2) a neuromuscular training program was used, (3) females were included as participants, (4) the study design was prospective and controlled, and (5) compliance data for the neuromuscular training program were provided. Data Extraction Extracted data included the number of ACL injuries, total number of participants per group, observation time period, number of participants who completed each session, number of sessions completed by an entire team, and number of total sessions. Attendance was calculated as the number of participants who completed each session converted into a percentage of the total number of participants. Intervention completion was calculated as the number of sessions completed by an entire team converted into a percentage of the total number of training sessions. These data were used to calculate an overall rate of compliance. Data Synthesis Six of 205 identified studies were included. Incidence rates of ACL injury were lower in studies with high rates of compliance with neuromuscular training than in studies with low compliance rates (incidence rate ratio = 0.27 [95% confidence interval = 0.07, 0.80]). Tertile analysis indicated rates of ACL injury incidence were lower in studies with high compliance rates than in studies with moderate and low compliance rates (incidence rate ratio = 0.18 [95% confidence interval = 0.02, 0.77]). Conclusions A potential inverse dose-response relationship exists between compliance with neuromuscular training and incidence of ACL injury. Attending and completing recommended neuromuscular sessions appears to be an important factor for preventing ACL injuries. PMID:23182020

  15. Maintenance-free operation of WDM quantum key distribution system through a field fiber over 30 days

    NASA Astrophysics Data System (ADS)

    Yoshino, Ken-ichiro; Ochi, Takao; Fujiwara, Mikio; Sasaki, Masahide; Tajima, Akio

    2013-12-01

    Maintenance-free wavelength-division-multiplexing quantum key distribution for 30 days was achieved through a 22-km field fiber. Using polarization-independent interferometers and stabilization techniques, we attained a quantum bit error rate as low as 1.70% and a key rate as high as 229.8 kbps, making the record of total secure key of 595.6 Gbits accumulated over an uninterrupted operation period.

  16. Daylight operation of a free space, entanglement-based quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Peloso, Matthew P.; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, Antía; Kurtsiefer, Christian

    2009-04-01

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  17. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  18. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    PubMed

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  19. High speed and adaptable error correction for megabit/s rate quantum key distribution

    PubMed Central

    Dixon, A. R.; Sato, H.

    2014-01-01

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90–94% of the ideal secure key rate over all fibre distances from 0–80 km. PMID:25450416

  20. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

Top